- Home
- A-Z Publications
- Recent Advances in Computer Science and Communications
- Previous Issues
- Volume 15, Issue 4, 2022
Recent Advances in Computer Science and Communications - Volume 15, Issue 4, 2022
Volume 15, Issue 4, 2022
-
-
Inspecting Briquette Machine with Different Faults
Authors: Divesh Garg, Reena Garg and Vanita GargBackground: A briquette machine can be considered very useful in modern times as the need for energy consumption is increasing rapidly. Considering the harm to the environment, the study of the briquette machine is the need of present times. In this paper, the operative unit is considered as briquette machine, also known as bio-coal, which is used for agroforestry waste. Objective: A single operative unit has be Read More
-
-
-
IFWG-TOPSIS Model for Supporting Infant Failure Assessment in an Offshore Wind Turbine System
Authors: Daniel O. Aikhuele, Desmond E. Ighravwe and Olubayo Moses BabatundeIntroduction: System failure analysis is an essential aspect of equipment management. This analysis improves equipment reliability and availability. However, to assess infant failure under dynamic criteria, reliability engineers require special models. Methods: Hence, this study uses an Intuitionistic Fuzzy Weighted Geometric (IFWG) and Intuitionistic Fuzzy Technique for Order of Preference by Similarity to Ideal Solution ( Read More
-
-
-
Effect of Human Errors on an Inventory Model Under Two Warehouse Environments
Authors: Mandeep Mittal, Sarla Pareek and Aastha PanwarBackground: The surety of production of all the goods in the standard inventory model to be of good quality comes out to be an impractical assumption. Though, the observation in the practical environment shows the possibility of occurrence of errors in the controlled batch. The collection of these items is generally done at the time of the process of selection and selling is done in a single batch when the process o Read More
-
-
-
An Adaptive Jamming Device
More LessBackground: All currently known wireless signals jammers have in common is the fact that there is no delimiting of the geographical location where the jamming is done. This jamming is delimited only by the power of the generated signal. The covered area is a sphere with a center on the emitter of the wireless signal. The reviewed patent provides a solution to the problem of how to restrict the wireless signal in a specific g Read More
-
-
-
Meta-heuristic Techniques to Train Artificial Neural Networks for Medical Image Classification: A Review
Authors: Priyanka and Dharmender KumarMedical imaging has been utilized in various forms in clinical applications for better diagnosis and treatment of diseases. These imaging technologies help in recognizing body's ailing region easily. In addition, it causes no pain to the patient as the interior part of the body can be examined without difficulty. Nowadays, various image processing techniques such as segmentation, registration, classification, restoratio Read More
-
-
-
Assembly Sequence Planning: A Review
By Han-Ye ZhangBackground: Assembly Sequence Planning (ASP) is an important stage in the process of product design and manufacturing. A reasonable assembly sequence can reduce the complexity of assembly operations, reduce the number of tools and fixtures, improve assembly efficiency, reduce assembly time, and reduce assembly costs. Methods: The purpose of this paper is to review the objective function, constraint conditions, Read More
-
-
-
Automating Duplicate Detection for Lexical Heterogeneous Web Databases
Authors: Anil Ahlawat and Kalpna SagarIntroduction: The need for efficient search engines has been identified with the everincreasing technological advancement and huge growing demand for data on the web. Method: Automating duplicate detection over a query results in identifying the records from multiple web databases that point to a similar real-world entity and return non-matching records to the end-users. The proposed algorithm in this paper is based Read More
-
-
-
Multi-objective Optimization Model for Clustering Based Secure Routing with Congestion Avoidance in Mobile ADHOC Networks
Authors: Srinivasan Murugan and Jeyakarthic MohanIntroduction: In Mobile Ad-Hoc Network (MANET), some of the major design issues are clustering, routing, and security. Clustering and routing techniques distribute the load to many network correlations so as to attain better utilization of resources, improved throughput and reduction in response time and workload. Besides, trust-based schemes help in sending messages in a secured manner and prevent the data from a Read More
-
-
-
Research on Crack Detection Algorithm of Mining Car Baffle
Authors: Weiwei Li and Fanlei YanIntroduction: Image processing technology is widely used for crack detection. This technology is used to build a data acquisition system and uses computer vision technology for image analysis. Because of its simplicity in processing, many of the image processing detection methods were proposed. It is relatively easy to deploy and has a low cost. Methods: The heterogeneity of the external light usually changes the authent Read More
-
-
-
Improving Fine-grained Opinion Mining Approach with a Deep Constituency Tree-long Short Term Memory Network and Word Embedding
Authors: Dalila Bouras, Mohamed Amroune, Hakim Bendjenna and Issam BendibObjective: One key task of fine-grained opinion mining on product review is to extract product aspects and their corresponding opinion expressed by users. Previous work has demonstrated that precise modeling of opinion targets within the surrounding context can improve performances. However, how to effectively and efficiently learn hidden word semantics and better represent targets and the context still needs to be fu Read More
-
-
-
Research on Improved Gamma Transform Face Image Preprocessing Fusion Algorithm Under Complex Lighting Conditions
Authors: Xiaolin Tang, Xiaogang Wang, Jin Hou, Huafeng Wu and Ping HeIntroduction: Under complex illumination conditions, such as poor light sources and light changes rapidly, there are two disadvantages of current gamma transform in pre-processing face image: one is that the parameters of transformation need to be set based on experience; the other is that the details of the transformed image are not obvious enough. Objective: To improve the current gamma transform. Methods: This s Read More
-
-
-
Rule-based Classifiers for Suspect Detection from CCTV Footages
By Sunil PathakBackground: A significant work has been presented to identify suspects, gathering information and examining any videos from the CCTV Footage. This exploration work expects to recognize suspicious exercises, i.e., object trade, the passage of another individual, peeping into other's answer sheet and individual trade from the video caught by a reconnaissance camera amid examinations. This requires the procedure of face a Read More
-
-
-
Big Data Analytics for MANET Based Sustainable Smart Healthcare Solution
Authors: Ashu Gautam, Rashima Mahajan and Sherin ZafarObjective: Collaboration of most promising upcoming technologies like big data and Internet of Things (IoT) plays a significant role in the sustainable development of the smart world. One of the important applications is the amalgamation of such technology in the e-healthcare sector, where private information is being transferred from one end device to other equipment. Sensors and different other instruments engaged in th Read More
-
-
-
Analysis of Univariate and Multivariate Filters Towards the Early Detection of Dementia
Authors: Deepika Bansal, Kavita Khanna, Rita Chhikara, Rakesh K. Dua and Rajeev MalhotraObjective: Dementia is a progressive neurodegenerative brain disease emerging as a global health problem in adults aged 65 years or above, resulting in the death of nerve cells. The elimination of redundant and irrelevant features from the datasets is however necessary for accurate detection thus timely treatment of dementia. Methods: For this purpose, an ensemble approach of univariate and multivariate feature s Read More
-
-
-
A Computational Model for Driver Risk Evaluation and Crash Prediction Using Contextual Data from On-board Telematics
Authors: Neetika Jain and Sangeeta MittalIntroduction: Vehicle crashes can be hazardous to public safety and may cause infrastructure damage. Risky driving significantly raises the possibility of the occurrence of a vehicle crash. As per statistics by the World Health Organization (WHO), approximately 1.35 million people are involved in road traffic crashes resulting in loss of life or physical disability. WHO attributes events like over-speeding, drunken driving, dis Read More
-
-
-
Fast and Efficient Data Masking Method for Securing Image Over Cloud Computing Environment
Authors: B.K. Siddartha and G.K. RavikumarObjective: Preserving the confidentiality of sensitive information is becoming more and more difficult and challenging, considering current scenarios, as a huge amount of multimedia data are stored and communicated over the internet among users and cloud computing environment. The existing cryptography security model for storing images on a cloud platform cannot resist various kinds of modern attacks, such as Read More
-
Most Read This Month
Article
content/journals/rascs
Journal
10
5
false
en
