- Home
- A-Z Publications
- International Journal of Sensors Wireless Communications and Control
- Previous Issues
- Volume 10, Issue 4, 2020
International Journal of Sensors Wireless Communications and Control - Volume 10, Issue 4, 2020
Volume 10, Issue 4, 2020
-
-
A Collaborative Edge-Cloud Internet of Things Based Framework for Securing the Indian Healthcare System
Authors: Syed R. Zahra and Mohammad Ahsan ChishtiToday, 73 years after the independence and twenty years after the turn of the century, “Health for All” which should have been accomplished by now, remains a far-fetched and an elusive dream. Instead, the people of India are bequeathed a triple burden of disease: sustaining the weight of transmittable infections, expanding burden of nontransferable illnesses, and a healthcare system not efficient enough to handle them b Read More
-
-
-
Exploring the Applications of Machine Learning in Healthcare
Authors: Tausifa J. Saleem and Mohammad Ahsan ChishtiThe rapid progress in domains like machine learning, and big data has created plenty of opportunities in data-driven applications particularly healthcare. Incorporating machine intelligence in healthcare can result in breakthroughs like precise disease diagnosis, novel methods of treatment, remote healthcare monitoring, drug discovery, and curtailment in healthcare costs. The implementation of machine intellige Read More
-
-
-
An Enhanced Multiple Linear Regression Model for Seasonal Rainfall Prediction
Authors: Pundra C. Shaker Reddy and Alladi SureshbabuAims & Background: India is a country which has exemplary climate circumstances comprising of different seasons and topographical conditions like high temperatures, cold atmosphere, and drought, heavy rainfall seasonal wise. These utmost varieties in climate make us exact weather prediction is a challenging task. Majority people of the country depend on agriculture. Farmers require climate information to decide the Read More
-
-
-
Integrating Employee Value Model with Churn Prediction
Background: In recent years, human resource management is a crucial role in every companies or organization's operation. Loyalty employee or Churn employee influence the operation of the organization. The impact of Churn employees is difference because of their role in organization. Objective: Thus, we define two Employee Value Models (EVMs) of organizations or companies based on employee features that are pop Read More
-
-
-
Automated Diagnostic Hybrid Lesion Detection System for Diabetic Retinopathy Abnormalities
Authors: Charu Bhardwaj, Shruti Jain and Meenakshi SoodBackground: Early diagnosis, monitoring disease progression, and timely treatment of Diabetic Retinopathy (DR) abnormalities can efficiently prevent visual loss. A prediction system for the early intervention and prevention of eye diseases is important. The contrast of raw fundus image is also a hindrance in effective manual lesion detection technique. Methods: In this research paper, an automated lesion detection diagnos Read More
-
-
-
Low Complexity Adaptive Nonlinear Models for the Diagnosis of Periodontal Disease
Authors: Anurag Satpathy, Ganapati Panda, Rajasekhar Gogula and Renu SharmaBackground / Objective: The paper addresses a specific clinical problem of diagnosis of periodontal disease with an objective to develop and evaluate the performance of low complexity Adaptive Nonlinear Models (ANM) using nonlinear expansion schemes and describes the basic structure and development of ANMs in detail. Methods: Diagnostic data pertaining to periodontal findings of teeth obtained from patient Read More
-
-
-
TLBO-FLN: Teaching-Learning Based Optimization of Functional Link Neural Networks for Stock Closing Price Prediction
Authors: Sarat C. Nayak, Subhranginee Das and Mohammad Dilsad AnsariBackground and Objective: Stock closing price prediction is enormously complicated. Artificial Neural Networks (ANN) are excellent approximation algorithms applied to this area. Several nature-inspired evolutionary optimization techniques are proposed and used in the literature to search the optimum parameters of ANN based forecasting models. However, most of them need fine-tuning of several control parameters as well Read More
-
-
-
Intuitionistic Fuzzy Score Function Based Multi-Criteria Decision Making Method for Selection of Cloud Service Provider
Authors: Sonal Agrawal and Pradeep TripathiAims & Background: Cloud Computing (CC) has received great attention from the scholarly researchers and IT companies. CC is a standard that offers services through the Internet. The standard has been manipulated by existing skills (such as collect, peer-to-peer and grid computing) and currently accepted by approximately all major associations. Various associations like as Microsoft and Facebook have revealed moment Read More
-
-
-
Big Data Analysis for Trend Recognition Using Machine Learning Techniques
More LessBackground: Machine learning is one of the most popular research areas today. It relates closely to the field of data mining, which extracts information and trends from large datasets. Aims: The objective of this paper is to (a) illustrate big data analytics for the Indian derivative market and (b) identify trends in the data. Methods: Based on input from experts in the equity domain, the data are verified statistically using da Read More
-
-
-
Comparative Analysis of Load Balancing Algorithms for Cloud Computing in IoT
Authors: Mohammad I. Bala and Mohammad Ahsan ChishtiBackground: Cloud computing is a widely adopted computing paradigm and its importance has increased multi-folds in the recent past due to the inception of Internet of Things (IoT). Objectives: Efficient load balancing techniques are required to optimize the use of the cloud resources although load balancing in cloud is known to be a NP-hard problem. Methods: This work focuses on multiple load balancing algorithms w Read More
-
-
-
Malicious apps Identification in Android Devices Using Machine Learning Algorithms
Authors: Ravinder Ahuja, Vineet Maheshwari, Siddhant Manglik, Abiha Kazmi, Rishika Arora and Anuradha GuptaBackground & Objective: In this paper, malicious apps detection system is implemented using machine learning algorithms. For this 330 permission based features of 558 android applications are taken into consideration. Methods: The main motto of this work is to develop a model which can effectively detect the malicious and benign apps. In this we have used six feature selection techniques which will extract important featu Read More
-
-
-
Adaptive Deep Neural Networks for the Internet of Things
Authors: Mohammad K. Pandit, Roohie Naaz Mir and Mohammad Ahsan ChishtiBackground: Deep neural networks have become the state of the art technology for real- world classification tasks due to their ability to learn better feature representations at each layer. However, the added accuracy that is associated with the deeper layers comes at a huge cost of computation, energy and added latency. Objective: The implementations of such architectures in resource constraint IoT devices are co Read More
-
-
-
An Improved Intelligent Approach to Enhance the Sentiment Classifier for Knowledge Discovery Using Machine Learning
Authors: Midde V. Naik, D. Vasumathi and A.P. Siva KumarAims: The proposed research work is on an evolutionary enhanced method for sentiment or emotion classification on unstructured review text in the big data field. The sentiment analysis plays a vital role for current generation of people for extracting valid decision points about any aspect such as movie ratings, education institute or politics ratings, etc. The proposed hybrid approach combined the optimal feature selection Read More
-
-
-
Cluster-based Ensemble Classification Approach for Anomaly Detection in the Internet of Things
Authors: Mostafa Hosseini and Hamidreza S. BrojeniBackground & Objective: The next generation of the internet where physical things or objects are going to interact with each other without human interventions is called the Internet of Things (IoT). Its presence can improve the quality of human lives in different domains and environments such as agriculture, smart homes, intelligent transportation systems, and smart grids. In the lowest layer of the IoT architecture (i.e., the perc Read More
-
-
-
Elephant Intrusion Warning System Using IoT and 6LoWPAN
Authors: Prasanna V. Theerthagiri and Menakadevi ThangaveluBackground: This work proposes an automatic IoT based elephant intrusion warning system specifically designed for detecting elephant intrusions into Krishnagiri villages that border wildlife reserves and alerting threatened communities of the location. Objective: The first one is to find the spectral energy magnitude of the elephant's vocal communication signal and the other to determine highest pitch frequency produced Read More
-
-
-
Imposing Packet Relaying for Mobile Adhoc Networks Using Genetic Algorithm
More LessBackground: Packet forwarding is an essential network operation in wireless networks to establish communication among wireless devices. In mobile wireless networks, data transmission occurs in the form of packet relaying. In dynamic environmental networks, relaying of the packet is a more complex process and much essential activity. Objective: It requires the co-operation of intermediate nodes in the network. Specific Read More
-
-
-
Outage Analysis in Underlay OFDMA Based Cooperative Cognitive Radio Networks
Authors: Rupali Sawant and Shikha NemaBackground: Efficient resource allocation in Cooperative Cognitive Radio Network (CCRN) is necessary in order to meet the challenges in future wireless networks. With proper resource allocation, the Quality of Service (QoS) comprising of outage probability and data rate are evaluated in this paper and sufficiently improved with proper subcarrier allocation. > Objectives: Another important parameter is Signal to Interference R Read More
-
-
-
VLSI Implementation and Software Co-Simulation of Digital Image Watermarking with Increased Security
Authors: Vardhana M. and Anil K. BhatBackground: Security is one of the fundamental and essential factors, which has to be addressed in the field of communication. Communication refers to the exchange of useful information between two or more nodes. Sometimes it is required to exchange some of the confidential information such as a company's logo, which needs to be hidden from the third person. The data that is being exchanged between thes Read More
-
Volumes & issues
Most Read This Month
Article
content/journals/swcc
Journal
10
5
false
en
