Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
Paper Title | : | The Cost Analysis of the Private and Public Health Facilities for Delivering Outpatient Services: A Study Conducted in Bangladesh |
Authors | : | Md. Mahfujur Rahman, Md. Al-Amin, Kazi Mahfuzur, , |
Affiliations | : | 1: Institute of Health Economics, University of Dhaka, Dhaka, Bangladesh ; 2: Institute of Education and Research, University of Dhaka, Dhaka, Bangladesh; 3: Institute of Disaster Management and Vulnerability Studies, University of Dhaka, Dhaka, Bangladesh |
Abstract | : | The government of Bangladesh tries to provide free healthcare services locally through community clinics, satellite clinics, Union Health & Family Welfare Center (UH&FWC), etc. But all these facilities still unable to fulfill the local demand. So, people visit private medical institutions to receive proper treatment. They need to pay for each unit of private healthcare services. The study considered eight UH&FWC in rural areas and eight private clinics in urban areas from 8 districts of Bangladesh. We accumulated the various categories of cost-related data of these facilities e.g. physicians and other staff's salary, hospital rent and other equipment costs, etc. and also the number of patients treated by each facility each month. Thus, we estimated the per month cost of producing each unit of outpatient services. The cost of producing per unit outpatient services differed from facilities to facilities. The cost in the UH&FWC ranged from BDT 178 ($2.09) to BDT 197 ($2.32). At the same time, this cost in the private clinic was BDT 87 ($1.02) to BDT 92 ($1.08). The health care cost between public and private health facilities altered due to the variation in cost and utilization of services from these health facilities. However, private health facilities are more efficient than public health facilities. If we would like to reduce the cost of public health facilities, we must ensure transparency in the facilities. |
![]() | : | 10.22362/ijcert/2020/v7/i12/v7i1202 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i12/v7i1202 |
[1] Begum F, Alam S, Hossain A. Funds for treatment of hospitalized patients: Evidence from Bangladesh. Journal of Health, J Health Popul Nutr. 2014; 32(3): p. 465-470. Available from: ncbi.nlm.nih.gov/pmc/articles/PMC4221452/ [2] Hollingsworth A, Soni A, Carroll A, Cawley J, Simon K. Gains in health insurance coverage explain variation in Democratic vote share in the 2008-2016 presidential elections. PLOS ONE. 2019;14(4): p. 1-16. doi: 10.1371/journal.pone.0214206 [3] Branning G, Vater M. Healthcare spending: Plenty of blame to go around. Am Health Drug Benefits. 2016; 9(8): p. 445-447. Available from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5394555/ [4] China: health expenditure per capita 2018 | Statista [Internet]. Statista. 2020 [cited 24 October 2020]. Available from: https://www.statista.com/statistics/279401/per-capita-health-expenditure-in-china/#:~:text=Per%20capita%20health%20expenditure%20in%20China%202008%2D2018&text=The%20graph%20shows%20health%20expenditures,yuan%20in%20the%20previous%20year. [5] Danilova M. ‘Free’ healthcare in Russia has cost. Los Angeles Times [Internet]. 2007 [cited 24 October 2020]; Available from: https://www.latimes.com/archives/la-xpm-2007-jul-15-adfg-rushospitals15-story.html [6] How does UK healthcare spending compare with other countries? - Office for National Statistics [Internet]. Ons.gov.uk. 2020 [cited 24 October 2020]. Available from: https://www.ons.gov.uk/peoplepopulationandcommunity/healthandsocialcare/healthcaresystem/articles/howdoesukhealthcarespendingcomparewithothercountries/2019-08-29#:~:text=As%20a%20percentage%20of%20GDP,the%20remaining%20six%20G7%20countries. [7] Italy: per capita expenditure on health 2006-2019 | Statista [Internet]. Statista. 2020 [cited 24 October 2020]. Available from: https://www.statista.com/statistics/788710/per-capita-expenditure-on-health-in-italy/#:~:text=Per%20capita%20expenditure%20on%20health%20in%20Italy%202006%2D2019&text=This%20statistic%20illustrates%20the%20expenditure,estimated%202%2C565%20euros%20in%2020. [8] China: health expenditure per capita 2018 | Statista [Internet]. Statista. 2020 [cited 24 October 2020]. Available from: https://www.statista.com/statistics/279401/per-capita-health-expenditure-inchina/#:~:text=Per%20capita%20health%20expenditure%20in%20China%202008%2D2018&text=The%20graph%20shows%20health%20expenditures,yuan%20in%20the%20previous%20year. [9] Li X, Krumholz H, Yip W, Cheng K, De Maeseneer J, Meng Q et al. Quality of primary health care in China: challenges and recommendations. The Lancet. 2020;395(10239):1802-1812. doi: 10.1016/S0140-6736(20)30122-7 [10] Tandon A. India’s per capita health spending dismal Rs 1,657. The Tribune [Internet]. 2019 [cited 24 October 2020]; Available from: https://www.tribuneindia.com/news/archive/nation/india-s-per-capita-health-spending-dismal-rs-1-657-855027#:~:text=NEW%20DELHI%3A%20India%20continues%20to,is%20a%20mere%20Rs%201%2C657. [11] Kasthuri A. Challenges to healthcare in India - the five A's. Ind J Community Med. 2018; 43(3): p. 141-143. doi:10.4103/ijcm.IJCM_194_18 [12] Pakistan Health expenditure per capita, 1960-2018 - knoema.com [Internet]. Knoema. 2020 [cited 24 October 2020]. Available from: https://knoema.com/atlas/Pakistan/Health-expenditure-per-capita#:~:text=Pakistan%20%2D%20Current%20health%20expenditure%20per%20capita&text=In%202017%2C%20health%20expenditure%20per,average%20annual%20rate%20of%208.57%25. [13] Sarwar A, Qureshi H. Awareness and willingness to buy private health insurance and a look into its future prospects in Pakistan. Eur J Business Soc Sci. 2013; 2(1): p. 69-81. [14] The Constitution of the People’s Republic of Bangladesh [Internet]. Bdlaws.minlaw.gov.bd. 2020 [cited 24 October 2020]. Available from: http://bdlaws.minlaw.gov.bd/act-367.html [15] Pavel M, Chakrabarty S, Gow J. Cost of illness for outpatients attending public and private hospitals in Bangladesh. Int J Equity Health. 2016; 15(1). doi: 10.1186/s12939-016-0458-x [16] Fahim S, Bhuayan T, Hassan M, Abid Zafr A, BF, Rahman M, et al. Financing health care in Bangladesh: Policy responses and challenges towards achieving universal health coverage. Int J Health Plann Manage. 2018; 34(1): p. e11-e20. doi: 10.1002/hpm.2666 [17] Brekke K, Sorgard L. Public versus private health care in a national health service. Health Econ. 2007; 16(6): p. 579-601. doi: 10.1002/hec [18] Financing health services in developing countries: an agenda for reform. [Internet]. Vol. 22, Bulletin of the Pan American Health Organization. Washington DC: World Bank; 1988. 416–429 p. Available from: http://documents.worldbank.org/curated/en/468091468137379607/pdf/multi-page.pdf [19] Migotti M. Paying a pice, fcing a Fine, cunting the Cost: The dfferences that mke the dfference. Ratia Juris. 2015; 28(3): p. 372-391. doi: 10.1111/raju.12088 [20] Harsvardhan R, Singh I, Sharma D. A cost analysis study of inpatient care services at a large tertiary care teaching institute at New Delhi, India. Int J Research F Hospital and Healthcare Admin. 2014; 2(1): p. 15-18. doi: 10.5005/jp-journals-10035-1009 [21] Vo T, Chaikledkaew U, Hoang M, Nguyen H, Riewpaiboon A. Hospital cost analysis in developing countries: A methodological comparison in Vietnam. Asian J Pharm. 2017;(Special Issue): p. 8-18. doi: 10.22377/ajp.v12i01.2341 [22] Plante C. The differentiation between for-profit and nonprofit hospitals: Another look. Res Healthcare Fin Manage. 2009; 12(1): p. 7-17. doi: 10.2139/ssrn.1911696 [23] Bazzoli G, Clement J, Hsieh H. Community benefit activities of private, nonprofit hospitals. J Health Polit Policy Law. 2010; 35(6): p. 999-1026. doi: 10.1215/03616878-2010-036
Paper Title | : | A Study on Role of Medical Representatives in Pharmaceutical Promotion in Bangladesh |
Authors | : | Md. Mahfujur Rahman, Md. Al-Amin, Kazi Mahfuzur, , |
Affiliations | : | 1: Institute of Health Economics, University of Dhaka, Dhaka, Bangladesh; 2: Institute of Education and Research, University of Dhaka, Dhaka, Bangladesh; 3: Institute of Disaster Management and Vulnerability Studies, University of Dhaka, Dhaka, Bangladesh |
Abstract | : | The pharmaceutical market in Bangladesh is highly concentrated and the top 10% of the company covered 70% of the market share. In this competitive market, pharmaceutical companies adopt aggressive marketing strategies to achieve greater market share, which sometimes crosses the limit. Every company employs medical representatives to survive and expand their share in this competitive market. This higher competition leads the pharmaceutical companies to be aggressive in promoting their drugs by hook or crook. The medical representatives adopt various strategies and make the physicians unethically prescribe extra medicines, antibiotics, and unnecessary drugs. Eventually, that burdens the patients with extra healthcare costs. The study was conducted using qualitative data. An interview-based research design was followed to collect data from healthcare providers, physicians, and medical representatives to explore the promotional strategy of the pharmaceutical companies. Healthcare providers, physicians and medical representatives from Dhaka, Gazipur and Magura districts participated in the face to face in-depth interviews (IDI). Their provided data was used to understand the marketing strategy and how it influences the relevant sectors. The health sector in Bangladesh is highly structured where the pharmaceutical companies play an important role to fulfill the drug demand of the people at the home and abroad as well as store foreign currency by exporting drugs. Sometimes, the unethical practices of the physicians and pharmaceutical companies increase the health care expenditure. The medical representatives of a company play a key role to create aggressive marketing which increases the health care expenditure. The physicians prescribe inappropriately through the influence of medical representatives, which transfer the patient’s family to catastrophic health expenditure. |
![]() | : | 10.22362/ijcert/2020/v7/i12/v7i1201 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i12/v7i1201 |
[1] Hossain M. Management and marketing practices and problems of Pharmaceuticals Industry in Bangladesh. 2014 [cited 2020 Nov 15]; Available from: http://dspace.bracu.ac.bd/xmlui/handle/10361/3263 [2] Murshid ME, Haque M. Bangladesh National Drug Policy 1982-2016 and Recommendations in Policy Aspects. Eurasian J Emerg Med. 2019 Jun 20;18(2):104–9. https://doi.org/10.4274/eajem.galenos.2019.43765 [3] Islam S, Rahman A, Mahmood AK Al. Bangladesh Pharmaceutical Industry: Perspective and the Prospects. Bangladesh J Med Sci [Internet]. 2018 Sep 19 [cited 2020 Nov 14];17(4):519–25. http://dx.doi.org/10.3329/bjms.v17i4.38306 [4] Bangladesh Health Watch (BHW). Bangladesh Health Watch Report 2009: how healthy is health sector governance? 2010 [cited 2020 Nov 14]; Available from: http://dspace.bracu.ac.bd/xmlui/handle/10361/597 [5] Mohiuddin M, Rashid SF, Shuvro MI, Nahar N, Ahmed SM. Qualitative insights into promotion of pharmaceutical products in Bangladesh: How ethical are the practices? BMC Med Ethics. 2015 Dec 1;16(1). https://doi.org/10.1186/s12910-015-0075-z [6] Raheem Ahmed R. Pharmaceutical drug promotion practices in Pakistan: Issues in ethical and non-ethical pharmaceutical practices Relationship between Demographic and Internet Usage View Project Social Loafing in Group Activities View project. Artic Middle East J Sci Res [Internet]. 2012 [cited 2020 Nov 14]; Available from: https://www.researchgate.net/publication/261360809 [7] Bansal RK, Das S. Unethical relationship between doctors and drugs companies. JIAFM [Internet]. 2005 [cited 2020 Nov 14];7(1):40–2. Available from: http://www.indianjournals.com/ijor.aspx?target=ijor:jiafm&volume=27&issue=1&article=010 [8] Rohra DK, Gilani AH, Memon IK, Perven G, Khan MT, Zafar H, et al. Critical evaluation of the claims made by pharmaceutical companies in drug promotional material in Pakistan. J Pharm Pharm Sci [Internet]. 2006 Feb 14 [cited 2020 Nov 14];9(1):50–9. Available from: https://pubmed.ncbi.nlm.nih.gov/16849008/ [9] Ahmad M, Akhtar N, Awan MHA, Murtaza G. Ethical Evaluation of Pharmaceutical Marketing in Pakistan. Acta Bioeth [Internet]. 2011 [cited 2020 Nov 14];17(2):215–24. http://dx.doi.org/10.4067/S1726-569X2011000200008 [10] National Institute of Population Research and Training (NIPORT), Mitra and Associates, and ICF International. Bangladesh demographic and health survey 2011. NIPORT, Mitra and Associates, and ICF International [Internet]. 2013 [cited 2020 Nov 14]. Available from: https://dhsprogram.com/publications/publication-fr265-dhs-final-reports.cfmd [11] Ventola CL. The antibiotic resistance crisis: causes and threats. P T J [Internet]. 2015 [cited 2020 Nov 14];40(4):277–83. Available from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4378521/ [12] Faiz M, Basher A. Antimicrobial resistance: Bangladesh experience. Reg Heal Forum [Internet]. 2011 [cited 2020 Nov 15];15(1):1–8. Available from: https://www.semanticscholar.org/paper/Antimicrobial-resistance-%3A-Bangladesh-experience-Faiz-Basher/7ebd071a34156b6558130154918f76aa607f42ea?p2df [13] Rahman MS, Huda S. Antimicrobial resistance and related issues: An overview of Bangladesh situation. Bangladesh J Pharmacol [Internet]. 2014 May 10 [cited 2020 Nov 15];9(2):218–24. Available from: www.banglajol.info [14] Arafat SMY, Ahmed Z. Medical Representative in Bangladesh: a Job with Different Pattern. Int J Acad Res Manag Bus [Internet]. 2016 [cited 2020 Nov 15];1(1):47–51. Available from: https://ideas.repec.org/a/iap/ijarmb/v1y2016i1p47-51.html [15] Bala K, Sharma K. Role of Medical Representatives in Influencing Medicine Prescription Behaviour of Doctors. J Bus Thought [Internet]. 2019 Mar 4 [cited 2020 Nov 15];10(0):39–52. Available from: http://www.informaticsjournals.com/index.php/jbt/article/view/23767 [16] Woolhouse M, Ward M, Van BB, Farrar J. Antimicrobial resistance in humans, livestock and the wider environmenT [Internet]. Vol. 370. Philosophical Transactions Of The Royal Society of London. Series B, Biological Sciences; 2015 [cited 2020 Nov 15]. p. 1931–1931. Available from: https://www.sid.ir/en/journal/ViewPaper.aspx?ID=493459 [17] Baqui AH, Black RE, Arifeen S El, Yunus M, Zaman K, Begum N, et al. Zinc therapy for diarrhoea increased the use of oral rehydration therapy and reduced the use of antibiotics in Bangladeshi children. J Heal Popul Nutr [Internet]. 2004 [cited 2020 Nov 15];22(4):440–2. Available from: https://pubmed.ncbi.nlm.nih.gov/15663177/ [18] Chowdhury F, Rahman M, Huq M, Begum S. Rationality of drug uses: its Bangladeshi perspectives. Mymensingh Med J [Internet]. 2006 [cited 2020 Nov 15];15(2):215–9. Available from: https://www.banglajol.info/index.php/MMJ/article/view/48 [19] Roy J. Health status, treatment and drug use in rural Bangladesh: A case study of a village. Aust J Rural Health [Internet]. 1997 May 1 [cited 2020 Nov 15];5(2):70–5. Available from: http://doi.wiley.com/10.1111/j.1440-1584.1997.tb00241.x [20] Ahmed SM, Hossain MA. Knowledge and practice of unqualified and semi-qualified allopathic providers in rural Bangladesh: Implications for the HRH problem. Health Policy (New York) [Internet]. 2007 Dec [cited 2020 Nov 15];84(2–3):332–43. Available from: https://pubmed.ncbi.nlm.nih.gov/17618702/ [21] Bhatt P. Study on Influence of Medical Representative in Conversation of Doctor’s Prescription in India. Glob J Manag Bus Reasearch [Internet]. 2018 [cited 2020 Nov 15];18(3-E). Available from: https://journalofbusiness.org/index.php/GJMBR/article/view/2470
Paper Title | : | A Comparative Study of Location Based Services Simulators |
Authors | : | Rida Qayyum, Hina Ejaz, , , |
Affiliations | : | 1 & 2 : Department of Computer Science, Government College Women University Sialkot, Pakistan |
Abstract | : | Location-based services are now extremely prevalent due to their massive usage in current and emerging technologies. The use of simulation tools has been gaining popularity in the domain of LBS systems, where researchers take advantage of simulators for evaluating the behavior and performance of new architecture design. This popularity results from the availability of various powerful and sophisticated LBS simulators that are continuously verifying the flexibility of proposed models of LBS research projects. Despite its popularity worldwide, there is still a problem for researchers to choose the best simulator according to their needs and requirements, which provide them accurate results. Furthermore, conducting research on the physical LBS environment for individuals or small educational institutes is very challenging due to the cost involved in setting up location-based services live. Therefore, for selecting an appropriate LBS simulator, it is important to have knowledge of simulators that are currently available along with their features and selection criteria considered for conducting research in a particular type of problems in the LBS system. In the current study, we have presented various simulators that provide a cost-effective way of conducting LBS research projects. This paper compares 10 simulators to help researchers and developers for selecting the most appropriate simulation tool depending on selection criteria. Moreover, a detailed discussion with the recommendation for best practice in LBS simulation tools is also included in this paper, which would surely help new researchers to quickly identify the most suitable simulator according to their research problem. |
![]() | : | 10.22362/ijcert/2020/v7/i11/v7i1101 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i11/v7i1101 |
[1] Ashraf, Muhammad Usman, Rida Qayyum, and Hina Ejaz. "STATE-OF-THE-ART, CHALLENGES: PRIVACY PROVISIONING IN TTP LOCATION BASED SERVICES SYSTEMS", International Journal of Advanced Research in Computer Science (IJARCS), 10(2), 2019 DOI: 10.26483/ijarcs.v10i2.6396 [2] Muhammad Usman Ashraf, Kamal M. Jambi, Rida Qayyum, Hina Ejaz and Iqra Ilyas, “IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Party-based Location-based Services Systems”, International Journal of Advanced Computer Science and Applications (IJACSA), 11(7), 2020. DOI: 10.14569/IJACSA.2020.0110773 [3] Rida Qayyum, Hina Ejaz, “Provisioning Privacy for TIP Attribute in Trusted Third Party (TTP) Location Based Services (LBS) System”, May 2019. DOI: 10.13140/RG.2.2.25631.59041 [4] LBS Simulation, Available at: https://www.learningbysimulation.eu/ [5] Calabrese, F., Diao, M., Di Lorenzo, G., Ferreira Jr, J. and Ratti, C., “Understanding individual mobility patterns from urban sensing data: A mobile phone trace example”, Transportation research part C: emerging technologies, 26, pp.301-313. 2013. [6] Suryateja, P.S., “A comparative analysis of cloud simulators”, International Journal of Modern Education and Computer Science, 8(4), p.64. 2016. [7] Bohanudin, S., Ismail, M. and Hussain, H., “Simulation model and location accuracy for observed time difference of arrival (OTDOA) positioning technique in third generation system”, In 2010 IEEE Student Conference on Research and Development (SCOReD), pp. 63-66. IEEE. 2010. [8] Fernandes, P. and Nunes, U., “Platooning of autonomous vehicles with intervehicle communications in SUMO traffic simulator”, In 13th International IEEE Conference on Intelligent Transportation Systems, pp. 1313-1318. IEEE. 2010. [9] Pfoser, D. and Theodoridis, Y., “Generating semantics-based trajectories of moving objects”, Computers, Environment and Urban Systems, 27(3), pp.243-263. 2003. [10] Memon, I., Arain, Q.A., Memon, H. and Mangi, F.A., “Efficient user based authentication protocol for location based services discovery over road networks”, Wireless Personal Communications, 95(4), pp.3713-3732. 2017. [11] Sun, G., Liao, D., Li, H., Yu, H., and Chang, V., L2P2: “A location-label based approach for privacy preserving in LBS”, Future Generation Computer Systems, 74, pp.375-384. 2017. [12] Weingartner, E., Vom Lehn, H. and Wehrle, K., June. “A performance comparison of recent network simulators”, In 2009 IEEE International Conference on Communications (pp. 1-5). IEEE. 2009. [13] Brinkhoff, T., “A framework for generating network-based moving objects”, GeoInformatica, 6(2), pp.153-180. 2002. [14] Zhang, S., Choo, K.K.R., Liu, Q. and Wang, G., “Enhancing privacy through uniform grid and caching in location-based services”, Future Generation Computer Systems, 86, pp.881-892. 2018. [15] Zhang, X., Gui, X. and Tian, F., “A Framework for measuring query privacy in Location-based Service”, KSII Transactions on Internet & Information Systems, 9(5). 2015. [16] Zhang, C. and Huang, Y., “Cloaking locations for anonymous location based services: a hybrid approach”, GeoInformatica, 13(2), pp.159-182. 2009. [17] Bennett, J., “OpenStreetMap”, Packet Publishing Ltd. 2010. [18] Memon, I., Ali, Q., Zubedi, A. and Mangi, F.A., “DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler”, Multimedia Tools and Applications, 76(22), pp.24359-24388. 2017. [19] ilazzo, V.A., “Specifications for updating USGS land use and land cover maps”, US Geological Survey. 1983. [20] Palanisamy, Balaji, and Ling Liu. "Mobimix: Protecting location privacy with mix-zones over road networks", In 2011 IEEE 27th International Conference on Data Engineering, pp. 494-505. IEEE, 2011. [21] Memon, I., Arain, Q.A., Memon, M.H., Mangi, F.A. and Akhtar, R., “Search me if you can: Multiple mix zones with location privacy protection for mapping services”, International Journal of Communication Systems, 30(16), p.e3312. 2017. [22] Maeda, K., Umedu, T., Yamaguchi, H., Yasumoto, K. and Higashino, T.H., “MobiREAL: scenario generation and toolset for MANET simulation with realistic node mobility”, In 7th International Conference on Mobile Data Management (MDM'06), IEEE. 2006. [23] Suzuki, A., Iwata, M., Arase, Y., Hara, T., Xie, X. and Nishio, S., “A user location anonymization method for location based services in a real environment”, In Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 398-401. 2010. [24] Hara, T., Suzuki, A., Iwata, M., Arase, Y. and Xie, X., “Dummy-based user location anonymization under real-world constraints”, IEEE Access, 4, pp.673-687. 2016. [25] Hiramatsu K, Kobayashi K, Benjamin B, Ishida T, Akahani J, “Map-based user interface for digital city Kyoto”, The Internet Global Summit (INET2000). [26] Kido, H., Yanagisawa, Y. and Satoh, T., July. “An anonymous communication technique using dummies for location-based services”, In ICPS'05. Proceedings. International Conference on Pervasive Services, 2005. pp. 88-97, IEEE. 2005. [27] Miquel Martin and Petteri Nurmi. “A generic large scale simulator for ubiquitous computing”, In Proc. of the 3rd Conference on Mobile and Ubiquitous Systems: Networks and Services. IEEE Computer Society, 2006. [28] Mascetti, Sergio, Claudio Bettini, X. Sean Wang, Dario Freni, and Sushil Jajodia. "ProvidentHider: An algorithm to preserve historical k-anonymity in LBS", In 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 172-181. IEEE, 2009. [29] Gedik, B. and Liu, L. “Protecting location privacy with personalized k-anonymity: Architecture and algorithms”, IEEE Transactions on Mobile Computing, 7(1), pp.1-18. 2007. [30] Bamba, Bhuvan, Ling Liu, Peter Pesti, and Ting Wang. "Supporting anonymous location queries in mobile environments with privacygrid", In Proceedings of the 17th international conference on World Wide Web, pp. 237-246. 2008. [31] Gedik, Bugra, and Ling Liu. "Location privacy in mobile systems: A personalized anonymization model", In 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), pp. 620-629. IEEE, 2005. [32] Gruteser, Marco, and Dirk Grunwald. "Anonymous usage of location-based services through spatial and temporal cloaking", In Proceedings of the 1st international conference on Mobile systems, applications and services, pp. 31-42. 2003. [33] Holtzman, J., Hui, J., Moayeri, N., Seskar, I., Varma, H., Yip, J., Maric, S. and Williams, T., “A vehicular traffic GIS and simulator for route guidance on NY/NJ highways”, In Proceedings of VNIS'93-Vehicle Navigation and Information Systems Conference, pp. 367-372, IEEE. [34] Sabah, L. and ?im?ek, M., “GEOSPATIAL SOCIAL NETWORK ANALYSIS WITH USING GIS FOR LOCATION-BASED SERVICE RECOMMENDATION”, Eski?ehir Technical University Journal of Science and Technology A-Applied Sciences and Engineering, 19(3), pp.585-606. [35] GIS For Location Based Services Available at: https://www.coursehero.com/file/17040554/GIS-for-LBS/ [36] Sherman, G.E., Sutton, T., Blazek, R. and Luthman, L., “Quantum GIS User Guide”, 2004. [37] Chen, F., Yang, C., Yu, W., Le, X. and Yang, J., “Research on mobile GIS based on LBS”, In Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium, Vol. 2, pp. 4-10, IEEE. 2005. [38] Memon, I., Arain, Q.A., Memon, H. and Mangi, F.A., “Efficient user based authentication protocol for location based services discovery over road networks”, Wireless Personal Communications, 95(4), pp.3713-3732. 2017. [39] Carneiro, G., “NS-3: Network simulator 3”, In UTM Lab Meeting, Vol. 20, pp. 4-5. 2010. [40] Henderson, T.R., Lacage, M., Riley, G.F., Dowell, C. and Kopena, J., “Network simulations with the ns-3 simulator”, SIGCOMM demonstration, 14(14), p.527. 2008. [41] R. McHaney, “Computer simulation: a practical perspective”, San Diego:Academic Press, 1991. [42] R. G. Sargent, “Validation and verification of Simulation Models”, In 2004 Winter Simulation Conference, pp. 17-28. 2004. [43] Rida Qayyum. "A Roadmap Towards Big Data Opportunities, Emerging Issues and Hadoop as a Solution", International Journal of Education and Management Engineering (IJEME), Vol.10, No.4, pp.8-17, 2020. DOI: 10.5815/ijeme.2020.04.02 [44] Rida Qayyum, Hina Ejaz, "Data Security in Mobile Cloud Computing: A State of the Art Review", International Journal of Modern Education and Computer Science (IJMECS), Vol.12, No.2, pp. 30-35, 2020. DOI: 10.5815/ijmecs.2020.02.04 [45] Jiang, B. and Yao, X., “Location-based services and GIS in perspective”, Computers, Environment and Urban Systems, 30(6), pp.712-725. 2006.
Paper Title | : | Diagnosis of Chronic Kidney Disease using Naïve Bayes algorithm Supported by Stage Prediction using eGFR |
Authors | : | A Victor Ikechukwu, K Nivedha, N M Prakruthi, Farheen Fathima, R Harini, L Shamitha |
Affiliations | : | Department of CSE, Maharaja Institute of Technology Mysore, Visvesvaraya Technological University, Belagavi, |
Abstract | : | The proliferation of data and availability of open source tools has simplified the diagnosis of diseases such as CKD (Chronic Kidney Disease). As one of the types of kidney disease which results in malfunctioning of kidney, it is paramount to effectively diagnose such diseases to prevent degeneration of vital organs in the body. Despite the advancements in the field of medical imaging, there exists no permanent cure for CKD, but the risk can be mitigated to a larger extent if detected at the early stage. This paper proposes a hybrid approach to early detection of chronic kidney disease by using Naïve Bayes classifier and eGFR (estimated Glomerular Filtration Rate). Naïve Bayes which works on the principle of conditional probability was used to predict whether a patient has CKD or not based on clinical symptoms, and the stage was determined using the eGFR formula. Results were promising as the model was able to predict the prevalence of CKD as well as the stage in which the patient was in. Although we were able to develop a web-based application using machine learning algorithms to aid in the diagnosis of CKD by serving as a “self-diagnostic” tool for medical practitioners, improvements could be made to ensure that the model works according to established ground truth by nephrologists. |
![]() | : | 10.22362/ijcert/2020/v7/i10/v7i1002 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i10/v7i1002 |
[1] H. Zhang, C. L. Hung, W. C. C. Chu, P. F. Chiu, and C. Y. Tang, “Chronic Kidney Disease Survival Prediction with Artificial Neural Networks,” Proc. - 2018 IEEE Int. Conf. Bioinforma. Biomed. BIBM 2018, pp. 1351–1356, 2019. [2] R. A. Alassaf et al., “Preemptive Diagnosis of Chronic Kidney Disease Using Machine Learning Techniques,” Proc. 2018 13th Int. Conf. Innov. Inf. Technol. IIT 2018, pp. 99–104, 2019. [3] T. Mahboob, A. Ijaz, A. Shahzad, and M. Kalsoom, “Handling Missing Values in Chronic Kidney Disease Datasets Using KNN, K-Means and K-Medoids Algorithms,” ICOSST 2018 - 2018 Int. Conf. Open Source Syst. Technol. Proc., pp. 76–81, 2019. [4] D. S. Sisodia and A. Verma, “Prediction performance of individual and ensemble learners for chronic kidney disease,” Proc. Int. Conf. Inven. Comput. Informatics, ICICI 2017, no. Icici, pp. 1027–1031, 2018. [5] V. Kunwar, K. Chandel, A. S. Sabitha, and A. Bansal, “Chronic Kidney Disease analysis using data mining classification techniques,” Proc. 2016 6th Int. Conf. - Cloud Syst. Big Data Eng. Conflu. 2016, pp. 300–305, 2016. [6] H. A. Wibawa, I. Malik, and N. Bahtiar, “Evaluation of Kernel-Based Extreme Learning Machine Performance for Prediction of Chronic Kidney Disease,” 2018 2nd Int. Conf. Informatics Comput. Sci. ICICoS 2018, no. x, pp. 33–36, 2019. [7] G. Kaur and A. Sharma, “Mining Algorithms In Hadoop,” no. Icici, 2017. [8] G. W.H.S.D, “Performance Evaluation on Machine Learning Classification Techniques for Disease (CKD),” Ieee, pp. 291–296, 2017. [9] M. P. N. M. Wickramasinghe, D. M. Perera, and K. A. D. C. P. Kahandawaarachchi, “Dietary prediction for patients with Chronic Kidney Disease (CKD) by considering blood potassium level using machine learning algorithms,” 2017 IEEE Life Sci. Conf. LSC 2017, vol. 2018-Janua, pp. 300–303, 2018. [10] R. Devika, S. V. Avilala, and V. Subramaniyaswamy, “Comparative study of classifier for chronic kidney disease prediction using naive bayes, KNN and random forest,” Proc. 3rd Int. Conf. Comput. Methodol. Commun. ICCMC 2019, no. Iccmc, pp. 679–684, 2019. [11] A. Charleonnan, T. Fufaung, T. Niyomwong, W. Chokchueypattanakit, S. Suwannawach, and N. Ninchawee, “Predictive analytics for chronic kidney disease using machine learning techniques,” 2016 Manag. Innov. Technol. Int. Conf. MITiCON 2016, pp. MIT80–MIT83, 2017. [12] L. Jena and R. Swain, “Work-in-Progress: Chronic Disease Risk Prediction Using Distributed Machine Learning Classifiers,” Proc. - 2017 Int. Conf. Inf. Technol. ICIT 2017, pp. 170–173, 2018. [13] E. Avci, S. Karakus, O. Ozmen, and D. Avci, “Performance comparison of some classifiers on Chronic Kidney Disease data,” 6th Int. Symp. Digit. Forensic Secur. ISDFS 2018 - Proceeding, vol. 2018-Janua, pp. 1–4, 2018. [14] A. Banerjee, A. Noor, N. Siddiqua, and M. N. Uddin, “Food Recommendation using Machine Learning for Chronic Kidney Disease Patients,” 2019 Int. Conf. Comput. Commun. Informatics, ICCCI 2019, pp. 1–5, 2019. [15] Arif-Ul-Islam and S. H. Ripon, “Rule Induction and Prediction of Chronic Kidney Disease Using Boosting Classifiers, Ant-Miner and J48 Decision Tree,” 2nd Int. Conf. Electr. Comput. Commun. Eng. ECCE 2019, pp. 7–9, 2019. [16] B. Khan, R. Naseem, F. Muhammad, G. Abbas, and S. Kim, “An empirical evaluation of machine learning techniques for chronic kidney disease prophecy,” IEEE Access, vol. 8, pp. 55012–55022, 2020. [17] V. I. Agughasi, Y. Dk, and S. Das M, “Early Prognosis of Heart Failure from Clinical Symptoms using K-Means and Naïve Bayes Algorithms,” vol. 9, no. 7, pp. 55–61, 2020.
Paper Title | : | Performance Analysis of Free Space Optical Communication Network with Different Modulation Techniques |
Authors | : | Ms. Shweta Patil, Dr. Jyothi Digge, Mr. Mahesh Kadam, , |
Affiliations | : | Terna Engineering College, Nerul, Navi Mumbai |
Abstract | : | Free space optics is one of the emerging technology of optical wireless communication which refers to propagation of light beams through atmosphere for broadband communication. It is a promising alternative solution for RF network, as it provides stable data transmission and highest data rates. However performance of this system could be prominently degraded due to various atmospheric conditions that may lead to increase in bit error rate and affect link sustainability. This paper presents analysis of proposed FSO system with comparative study of different modulation techniques under weak turbulence at 1550 nm wavelength in terms of BER and Q factor so as to mitigate adverse effects and improve efficiency. |
![]() | : | 10.22362/ijcert/2020/v7/i10/v7i1001 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i10/v7i1001 |
[1] A. Sree Madhuri, Govardhani Immadi, V. Mounika, A. Tarun Teja, T. Aakash, N. Sai Srinivasa, “Performance Evaluation of Free Space Optics Using Different Modulation Techniques at Various Link Ranges,†International Journal of Engineering and Advanced Technology (IJEAT), Volume-8, Issue-4, pp. 834 – 838, April 2019 [2] Sawhil, Swadha Agarwal, Yashasvi Singhal, Priyanka Bhardwaj, “An Overview of Free Space Optical Communication,†International Journal of Engineering Trends and Technology (IJETT), Volume-55, Number-3, pp. 120 – 125, January 2018 [3] Gurpreet Kaur, Harmeet Singh, Amandeep Singh Sappal, “Free Space Optical Using Different Modulation Techniques – A Review†International Journal of Engineering Trends and Technology (IJETT), Volume-43, Number-2, pp. 109 – 115, January 2017 [4] M. J. Lok, I. E. Lee, Z. Ghassemlooy, G. C. Chung, “Investigation on the Error Performance of Modulation Formats in Free-Space Optical Communication Links with Turbulences†IEEE, August 2016 [5] J. A. Desai, S. N. Kulkarni, “Effect of Noise on BER of BPSK, QPSK, DPSK and QAM Modulation Techniques†International Journal of Research and Scientific Innovation (IJRSI), Volumn-3, Issue-7, pp. 71 – 74, July 2016 [6] Sandip Das, Moitrayee Chakrabotry, “ASK and PPM Modulation based FSO System under Varying Weather Conditions†IEEE, May 2016 [7] Tomas Ivaniga, Petr Ivaniga, “Evaluation of the Bit Error Rate and Q-Factor in Optical Networks†IOSR Journal of Electronics and Communication Engineering†(IOSR-JECE), Volumn-9, Issue-6, pp. 1 – 3, Dec 2014 [8] Charu Sharma, Sukhbir Singh, Bhubneshwar Sharma, “Free Space Optics: A Last Mile Technology (Review)†International Journal of Engineering Research & Technology (IJERT), Volume-2, Issue-3, pp. 1 – 7, March 2013
Paper Title | : | Block-Chain Compliance for IoT Security: A Survey |
Authors | : | G.Chandra Sekhar, P. Balamurugan, , , |
Affiliations | : | 1 :Research Scholar, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, Chennai, Tamilnadu, India; 2: Professor , Department of Computer Science and Engineering at Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, Chennai, Tamilnadu, India. |
Abstract | : | Internet of Things would soon become pervasive and ubiquitous due to its uses and easy to manage across various applications. Moreover, IoT has reached the extent of communicating the data from very close proximity to a distant place more than 10Kilometers. The extensive usage of the IoT devices makes the service provider overwhelming in terms of the revenue. It poses challenges to scale the technology to respond to the requests from numerous devices and instances for the actions and decisions to be taken. In addition to the IoT communication, security is a vital activity for every communication across IoT devices. In this paper, an exhaustive study has been conducted on the significance of IoT communication and the challenges involved and the span of security across various layers of the IoT. Furthermore, the survey on Blockchain and the possible integration for IoT communication has been discussed. Finally, the study expresses different integration challenges existing in the present times, which further helps to explore the blockchain adaptability for IoT security. |
![]() | : | 10.22362/ijcert/2020/v7/i09/v7i903 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i09/v7i903 |
[1] Zhu, Yongxu, Gan Zheng, and Kai-Kit Wong. "Blockchain-Empowered Decentralized Storage in Air-to-Ground Industrial Networks." IEEE Transactions on Industrial Informatics15, no. 6 (2019): 3593-601. doi:10.1109/tii.2019.2903559. [2] Kogure, K. Kamakura, T. Shima, and T. Kubo, "Blockchain Technology for Next Generation ICT," Fujitsu Sci. Tech. J., vol. 53, no. 5, pp. 56–61, 2017. [3] Tosh, Deepak K., Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Kevin A. Kwiat, and Laurent Njilla. "Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack." 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2017. https://doi.org/10.1109/ccgrid.2017.111. [4] Ding, Sheng, Jin Cao, Chen Li, Kai Fan, and Hui Li. "A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT." IEEE Access7 (2019): 38431-8441. doi:10.1109/access.2019.2905846. [5] Xu, Xiwei, Ingo Weber, Mark Staples, Liming Zhu, Jan Bosch, Len Bass, Cesare Pautasso, and Paul Rimba. "A Taxonomy of Blockchain-Based Systems for Architecture Design." 2017 IEEE International Conference on Software Architecture (ICSA), 2017. https://doi.org/10.1109/icsa.2017.33. [6] Al-Sarawi, Shadi, Mohammed Anbar, Kamal Alieyan, and Mahmood Alzubaidi. "Internet of Things (IoT) Communication Protocols: Review." 2017 8th International Conference on Information Technology (ICIT), 2017. https://doi.org/10.1109/icitech.2017.8079928. [7] Gigli, Matthew, and Simon Koo. "Internet of Things: Services and Applications Categorization." Advances in Internet of Things 01, no. 02 (2011): 27–31. https://doi.org/10.4236/ait.2011.12004. [8] Datta, Soumya Kanti, Christian Bonnet, Rui Pedro Ferreira Da Costa, and Jerome Harri. "DataTweet: An Architecture Enabling Data-Centric IoT Services." 2016 IEEE Region 10 Symposium (TENSYMP), 2016. https://doi.org/10.1109/tenconspring.2016.7519430. [9] Zhu, Konglin, Zhicheng Chen, Wenke Yan, and Lin Zhang. "Security Attacks in Named Data Networking of Things and a Blockchain Solution." IEEE Internet of Things Journal6, no. 3 (2019): 4733-741. doi:10.1109/jiot.2018.2877647. [10] Ferrari, P., E. Sisinni, D. Brandao, and M. Rocha. "Evaluation of Communication Latency in Industrial IoT Applications." 2017 IEEE International Workshop on Measurement and Networking (M&N), 2017. https://doi.org/10.1109/iwmn.2017.8078359. [11] Khaled, Ahmed E., and Sumi Helal. "Interoperable Communication Framework for Bridging RESTful and Topic-Based Communication in IoT." Future Generation Computer Systems 92 (2019): 628–43. https://doi.org/10.1016/j.future.2017.12.042. [12] Kovacs, Erno, Martin Bauer, Jaeho Kim, Jaeseok Yun, Franck Le Gall, and Mengxuan Zhao. "Standards-Based Worldwide Semantic Interoperability for IoT." IEEE Communications Magazine 54, no. 12 (2016): 40–46. https://doi.org/10.1109/mcom.2016.1600460cm. [13] Qu, Chao, Ming Tao, Jie Zhang, Xiaoyu Hong, and Ruifen Yuan. "Blockchain Based Credibility Verification Method for IoT Entities." Security and Communication Networks2018 (2018): 1-11. doi:10.1155/2018/7817614. [14] Novo, Oscar. "Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT." IEEE Internet of Things Journal 5, no. 2 (2018): 1184–95. https://doi.org/10.1109/jiot.2018.2812239. [15] Vresk, Tomislav, and Igor Cavrak. "Architecture of an Interoperable IoT Platform Based on Microservices." 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2016. https://doi.org/10.1109/mipro.2016.7522321. [16] Negka, Lydia, Georgios Gketsios, Nikolaos A. Anagnostopoulos, Georgios Spathoulas, Athanasios Kakarountas, and Stefan Katzenbeisser. "Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection." Proceedings of the International Conference on Omni-Layer Intelligent Systems - COINS 19, 2019. doi:10.1145/3312614.3312650. [17] Chung, Kyungyong, and Roy C. Park. "P2P Cloud Network Services for IoT Based Disaster Situations Information." Peer-to-Peer Networking and Applications 9, no. 3 (2015): 566–77. https://doi.org/10.1007/s12083-015-0386-3. [18] Stergiou, Christos, Kostas E. Psannis, Byung-Gyu Kim, and Brij Gupta. "Secure Integration of IoT and Cloud Computing." Future Generation Computer Systems 78 (2018): 964–75. https://doi.org/10.1016/j.future.2016.11.031. [19] Abdur, Mirza, Sajid Habib, Muhammad Ali, and Saleem Ullah. "Security Issues in the Internet of Things (IoT): A Comprehensive Study." International Journal of Advanced Computer Science and Applications 8, no. 6 (2017). https://doi.org/10.14569/ijacsa.2017.080650. [20] Tweneboah-Koduah, Samuel, Knud Erik Skouby, and Reza Tadayoni. "Cyber Security Threats to IoT Applications and Service Domains." Wireless Personal Communications 95, no. 1 (2017): 169–85. https://doi.org/10.1007/s11277-017-4434-6. [21] Alam, Tanweer. "Blockchain and Its Role in the Internet of Things (IoT)," 2019. https://doi.org/10.31219/osf.io/cmza5. [22] Viriyasitavat, Wattana, and Danupol Hoonsopon. "Blockchain Characteristics and Consensus in Modern Business Processes." Journal of Industrial Information Integration 13 (2019): 32–39. https://doi.org/10.1016/j.jii.2018.07.004. [23] Kaivan Karimi, Gary Atkinson, "What the Internet of Things (IoT) Needs to Become a Reality", White paper of free scale and Arm. 2014. p. 1–16. [24] Zhang, Yu, and Jiangtao Wen. "The IoT Electric Business Model: Using Blockchain Technology for the Internet of Things." Peer-to-Peer Networking and Applications 10, no. 4 (2016): 983–94. https://doi.org/10.1007/s12083-016-0456-1. [25] Kum, Seung Woo, Jaewon Moon, Taeboem Lim, and Jong Il Park. "A Novel Design of IoT Cloud Delegate Framework to Harmonize Cloud-Scale IoT Services." 2015 IEEE International Conference on Consumer Electronics (ICCE), 2015. https://doi.org/10.1109/icce.2015.7066399. [26] Angin, Pelin, Melih Burak Mert, Okan Mete, Azer Ramazanli, Kaan Sarica, and Bora Gungoren. "A Blockchain-Based Decentralized Security Architecture for IoT." Lecture Notes in Computer Science Internet of Things – ICIOT 2018, 2018, 3-18. doi:10.1007/978-3-319-94370-1_1. [27] T. Salman, and R. Jain, "A Survey of Protocols and Standards for Internet of Things," Advanced Computing and Communications, Vol. 1, No. 1, March 2017. [28] Lee, Jay, Moslem Azamfar, and Jaskaran Singh. "A Blockchain Enabled Cyber-Physical System Architecture for Industry 4.0 Manufacturing Systems." Manufacturing Letters20 (2019): 34-39. doi:10.1016/j.mfglet.2019.05.003. [29] Ali, Jawad, Toqeer Ali, Yazed Alsaawy, Ahmad Shahrafidz Khalid, and Shahrulniza Musa. "Blockchain-based Smart-IoT Trust Zone Measurement Architecture." Proceedings of the International Conference on Omni-Layer Intelligent Systems - COINS 19, 2019. doi:10.1145/3312614.3312646. [30] Ganchev, I., Zhanlin Ji, and M. Odroma. "A Generic IoT Architecture for Smart Cities." 25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communities Technologies (ISSC 2014/CIICT 2014), 2014. https://doi.org/10.1049/cp.2014.0684. [31] T. hoon Kim, C. Ramos, S. Mohammed, Smart city and iot, Future Generation Computer Systems 76 (2017) 159 – 162. https://doi.org/10.1016/j.future.2017.03.034 [32] Skouby, K E, and P Lynggaard. "Smart Home and Smart City Solutions Enabled by 5G, IoT, AAI and CoT Services." 2014 International Conference on Contemporary Computing and Informatics (IC3I), 2014. https://doi.org/10.1109/ic3i.2014.7019822. [33] Lauridsen, Mads, Huan Nguyen, Benny Vejlgaard, Istvan Z. Kovacs, Preben Mogensen, and Mads Sorensen. "Coverage Comparison of GPRS, NB-IoT, LoRa, and SigFox in a 7800 km² Area." 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017. https://doi.org/10.1109/vtcspring.2017.8108182. [34] Chen, Hao, Xueqin Jia, and Heng Li. "A Brief Introduction to IoT Gateway." IET International Conference on Communication Technology and Application (ICCTA 2011), 2011. https://doi.org/10.1049/cp.2011.0740. [35] Rasid, M F A, W M W Musa, N A A Kadir, A M Noor, F Touati, W Mehmood, L Khriji, A Al-Busaidi, and A Ben Mnaouer. "Embedded Gateway Services for Internet of Things Applications in Ubiquitous Healthcare." 2014 2nd International Conference on Information and Communication Technology (ICoICT), 2014. https://doi.org/10.1109/icoict.2014.6914055. [36] Chze, Paul Loh Ruen, and Kan Siew Leong. "A Secure Multi-Hop Routing for IoT Communication." 2014 IEEE World Forum on Internet of Things (WF-IoT), 2014. https://doi.org/10.1109/wf-iot.2014.6803204. [37] Reyna, Ana, Cristian Martín, Jaime Chen, Enrique Soler, and Manuel Díaz. "On Blockchain and Its Integration with IoT. Challenges and Opportunities." Future Generation Computer Systems88 (2018): 173-90. doi:10.1016/j.future.2018.05.046. [38] Pustišek, Matevž, Dejan Dolenc, and Andrej Kos. "LDAF: Low-Bandwidth Distributed Applications Framework in a Use Case of Blockchain-Enabled IoT Devices." Sensors19, no. 10 (2019): 2337. doi:10.3390/s19102337. [39] Makhdoom, Imran, Mehran Abolhasan, and Wei Ni. "Blockchain for IoT: The Challenges and a Way Forward." Proceedings of the 15th International Joint Conference on E-Business and Telecommunications, 2018. doi:10.5220/0006905604280439. [40] Desai, Pratikkumar, Amit Sheth, and Pramod Anantharam. "Semantic Gateway as a Service Architecture for IoT Interoperability." 2015 IEEE International Conference on Mobile Services, 2015. https://doi.org/10.1109/mobserv.2015.51. [41] Duncan, Bob, Andreas Happe, and Alfred Bratterud. "Enterprise IoT Security and Scalability." Proceedings of the 9th International Conference on Utility and Cloud Computing - UCC 16, 2016. https://doi.org/10.1145/2996890.3007875. [42] Ahram, Tareq, Arman Sargolzaei, Saman Sargolzaei, Jeff Daniels, and Ben Amaba. "Blockchain Technology Innovations." 2017 IEEE Technology & Engineering Management Conference (TEMSCON), 2017. https://doi.org/10.1109/temscon.2017.7998367. [43] Christidis, Konstantinos, and Michael Devetsikiotis. "Blockchains and Smart Contracts for the Internet of Things." IEEE Access 4 (2016): 2292–2303. https://doi.org/10.1109/access.2016.2566339. [44] Puthal, Deepak, Nisha Malik, Saraju P. Mohanty, Elias Kougianos, and Chi Yang. "The Blockchain as a Decentralized Security Framework [Future Directions]." IEEE Consumer Electronics Magazine 7, no. 2 (2018): 18–21. https://doi.org/10.1109/mce.2017.2776459. [45] Biswas, Sujit, Kashif Sharif, Fan Li, Boubakr Nour, and Yu Wang. "A Scalable Blockchain Framework for Secure Transactions in IoT." IEEE Internet of Things Journal6, no. 3 (2019): 4650-659. doi:10.1109/jiot.2018.2874095. [46] Koš?ál, Kristián, Pavol Helebrandt, Matej Belluš, Michal Ries, and Ivan Kotuliak. "Management and Monitoring of IoT Devices Using Blockchain." Sensors19, no. 4 (2019): 856. doi:10.3390/s19040856. [47] Risius, Marten, and Kai Spohrer. "A Blockchain Research Framework." Business & Information Systems Engineering 59, no. 6 (2017): 385–409. https://doi.org/10.1007/s12599-017-0506-0. [48] Gervais, Arthur, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. "On the Security and Performance of Proof of Work Blockchains." Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS16, 2016. https://doi.org/10.1145/2976749.2978341. [49] Maroufi, M., Abdolee, R., & Tazekand, B. (2019). "On the Convergence of Blockchain and Internet of Things (IoT) Technologies". Journal of Strategic Innovation and Sustainability, 14(1). https://doi.org/10.33423/jsis.v14i1.990.
Paper Title | : | An Ischemic Heart Disease Prediction Model Based on Observed Symptoms Using Machine Learning |
Authors | : | Solomon Osarumwense Alile, , , , |
Affiliations | : | Department of Computer Science, Faculty of Physical Sciences, University of Benin, Benin City, Nigeria |
Abstract | : | Ischemic Heart Disease is a death-defying cardiovascular disease that disrupts the circulation of blood owing to plaques such as fats, cholesterol, calcium, and other substances resident in the blood, which coagulates hence narrowing the arteries. The symptoms of this disease are angina, sweating, nausea, breathlessness, heart attack, vomiting, pains of back, jaw, shoulder, arm, back, and neck, just to name but a couple. According to World Health Organization, the leading cause of death which has caused over 17 million untimely deaths of patients since 2015 to date especially individuals below the age of 70 years is Ischemic Heart disease which is a form of Cardiovascular Disease; where 81% of these recorded deaths occurring in individuals in respective of sex, particularly in low and middle-income countries of Sub-Sahara Africa. Nevertheless, in the recent past, a couple of systems have been developed to detect this non-transmittable ailment. Yet, they delivered a ton of bogus negative during testing and could not distinguish Ischemic Heart Disease given its covering symptoms it imparts to other Cardiovascular Diseases. Consequently, there was the need to proffer a solution for the issue of under-diagnosis and misdiagnosis of Ischemic Heart Disease, which is much uncontrolled in Sub-Sahara Africa. Hence, in this paper, we proposed and built up a model to predict Ischemic Heart Disease and Cardiovascular diseases using an AI technique called Bayesian Belief Network. The model was structured using Bayes Server and tested with data retrieved from the UCI Machine Learning Repository. The model had an overall prediction exactness of 99.99%; 98.86% and 99.66% sensitivity of Ischemic Heart Disease and Cardiovascular Diseases correspondingly. |
![]() | : | 10.22362/ijcert/2020/v7/i09/v7i0902 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i09/v7i0902 |
[1] M.A. Zoroddu, J. Aashet, G. Crisponi, S. Medici, M. Peana and V.M. Nurchi, “The Essentials Metals for Humans: A Brief Overview”. Journal of Inorganic Biochemistry. Vol. 195(1), pp. 120-129, 2019. DOI:10.1016/j.jinorgbio. [2] C.M. Jones, S. M. Baker-Groberg, F.A. Cianchetti, J. J. Glynn, L.D. Healy, W.Y. Lam, J.W. Nelson, D.C. Parrish5, K.G. Phillips, D.E. Scott-Drechsel, I.J. Tagge, J.E. Zelaya, M.T. Hinds, O.J.T. McCarty, “Measurement in the Circulatory System”. Cell Molecular Bioengineering Journal. Vol.7(1), pp. 1-14, March, 2014. [3] G.D. Buckberg, N.C. Nanda, C.Nguyen and M.J. Kocica, “What Is the Heart? Anatomy, Function, Pathophysiology, and Misconceptions”. Journal of Cardiovascular Development and Disease, Vol.5 (33), pp. 1-29, 2018. DOI: 10.3390/jcdd5020033. [4] S.Mendis, P.Puska and B.Norrving, “Global Atlas on Cardiovascular Disease Prevention and Control” (1st edition.). Geneva: World Health Organization in Collaboration with the World Heart Federation and the World Stroke Organization. pp. 3–18, 2011. ISBN 9789241564373. [5] World Health Organization, “Report on Cardiovascular Diseases: The Problem”. pp. 1-2, 17 May, 2017 . [6] I.D. Apostolopoulos, P.P. Groumpos, “Non - Invasive Modelling Methodology for the Diagnosis of Coronary Artery Disease using Fuzzy Cognitive Maps”. Computer Methods in Biomechanics and Biomedical Engineering, pp.1-9, 2020. DOI:10.1080/10255842.2020.1768534. [7] A. Adeli, M. Neshat, “A Fuzzy Expert System for Heart Disease Diagnosis”. Proceedings of International MultiConference of Engineers and Computer Scientists (IMECS), Hong Kong. Vol.1, March 17-20, 2010. [8] A.V.S. Kumar, “Diagnosis of Heart Disease using Fuzzy Resolution Mechanism”. Journal of Artificial Intelligence: Vol.5(1), pp.47-55, 2012. [9] S.S.Sikchi, S.Sikchi, M.S. Ali, “Design OF Fuzzy Expert System For Diagnosis Of Cardiac Diseases”. International Journal of Medical Science and Public Health, Vol.2 (1), pp. 56-61, 2013. DOI: .5455/ijmsph.2013.2.56-61 [10] P.K. Anooj, “Clinical Decision Support System: Risk Level Prediction of Heart Disease Using Weighted Fuzzy Rules”. Journal of King Saud University – Computer and Information Sciences, Vol.24, pp. 27–40, 2012. [11] S.Kumar, G.Kaur, “Detection of Heart Diseases using Fuzzy Logic”. International Journal of Engineering Trends and Technology (IJETT), Vol.4 (6), pp.2694-2699,June 2013. ISSN: 2231-5381. [12] R.Chitra, V.Seenivasagam, “Heart Attack Prediction System Using Fuzzy C Means Classifier”. IOSR Journal of Computer Engineering (IOSR-JCE), Vol.14 (2), pp. 23-31, 2013. e-ISSN: 2278-0661, p-ISSN: 2278-8727. [13] K.K. Oad, X.DeZhi, P.K.Butt, “A Fuzzy Rule based Approach to Predict Risk Level of Heart Disease”. Global Journal of Computer Science and Technology, Vol.14(3), Version 1,2014. [14] J.Kim, J.Lee,Y. Lee, “Data-Mining-Based Coronary Heart Disease Risk Prediction Model Using Fuzzy Logic and Decision Tree”. Healthcare Informatics Research, Vol. 21(3), pp.167-174, July, 2015. http://dx.doi.org/10.4258/hir.2015.21.3.167, pISSN 2093-3681 • eISSN 2093-369X. [15] N.Pathania, Ritika, “Implementation of Fuzzy Controller for Diagnose of Patient Heart Disease”. IJISET - International Journal of Innovative Science, Engineering & Technology, Vol.2(4),pp.694-698, April 2015. [16] R.A.Mohammadpour, S.M. Abedi, S.Bagheri, A.Ghaemian, “Fuzzy Rule-Based Classification System for Assessing Coronary Artery Disease”. Hindawi Publishing Corporation Computational and Mathematical Methods in Medicine, Vol.2015, Article ID 564867, pp.1-8, 2015. http://dx.doi.org/10.1155/2015/564867 [17] A.M Sajiah, N.A. Setiawan, O.Wahyunggoro, “Interval Type-2 Fuzzy Logic System for Diagnosis Coronary Artery Disease”. Communications in Science and Technology Journal, Vol.1 (2), pp.51-55, 2016. [18] K.H. Miao, J.H. Miao, G.J. Miao, “Diagnosing Coronary Heart Disease Using Ensemble Machine Learning”. International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 7(10), pp.30-39, 2016. [19] W.M. Baihaqi, N.A. Setiawan, I. Ardiyanto, “Rule Extraction for Fuzzy Expert System to Diagnose Coronary Artery Disease”, 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, pp.136-141, 2016. [20] T. Kasbe, R.S. Pippal, “Design of Heart Disease Diagnosis System using Fuzzy Logic”. IEEE, International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017), pp. 3183-3187, 2017. [21] T. Kasbe, R.S. Pippal, “Enhancement in Diagnosis of Coronary Artery Disease using Fuzzy Expert System”. International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), Vol.3 (3), pp.1324-1331, 2018. ISSN : 2456-3307. [22] L.Verma, S.Srivastava,V.Sapra, “Machine Learning Methods in Early Diagnosis of Coronary Artery Disease”. Journal of Cardiology and Cardiovascular Therapy, Mini Review, Vol.11 (1), pp.1-3, May, 2018. DOI: 10.19080/JOCCT.2018.11.555801. [23] M.S. Mahdi, M.F. Ibrahim, S.M. Mahdi, P. Singam, A.B. Huddin, “Fuzzy Logic System for Diagnosing Coronary Heart Disease”. International Journal of Engineering & Technology, Vol. 8 (1.7), pp.119-125, 2019. [24] D. Swain, S.K. Pani, D. Swain, “An Efficient System for the Prediction of Coronary Artery Disease using Dense Neural Network with Hyper Parameter Tuning”. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol.8 (6S), pp. 689-695, April, 2019. ISSN: 2278-3075 [25] A. Dutta, T. Batabyal, M. Basu, S.T. Acton, “An Efficient Convolutional Neural Network for Coronary Heart Disease Prediction”. Elvesier Journal Expert Systems with Applications, Vol. 159 (113408), pp. 1-37. 21 May, 2020. [26] A. Simon, M.S. Deo, S. Venkatesan, D.R.R. Babu, “Machine Learning and its Applications”. International Journal of Electrical Sciences & Engineering (IJESE), Vol. 1(1), pp. 22-24, 2015. [27] I. Ben-Gal, F. Ruggeri, F. Faltin, R. Kenett, “Bayesian Networks”. Encyclopedia of Statistics in Quality and Reliability. John Wiley and Sons, Ltd. www.eng.tau.ac.il/bengal/BN.pdf/. pp. 1-6, 2007. [28] Z-Alizadeh Sani Dataset, “UCI Machine Learning Repository”, Center for Machine Learning and Intelligent Systems, 2017.
Paper Title | : | Creditcard Fraud Detection and Classification Using Machine Learning Based Classifiers |
Authors | : | Y.Yashasree, Dr.K.Venkatesh Sharma, , , |
Affiliations | : | 1M.Tech (Pursuing),CVR College of Engineering , Department of Computer Science and Engineering 2Professor,Department of Computer Science and Engineering, CVR College of Engineering |
Abstract | : | Nowadays, most transactions take place online, which means that credit cards and other online payment systems are involved. This method is convenient for the company and the customer. The digital age seems to have provided some very useful features that have changed the way businesses and consumers interact, but for a charge. “Credit card fraud” outlays the card industry literally billions of dollars a year. Financial institutions are constantly striving to improve fraud detection systems, but at the same time, fraudsters are finding new ways to break into systems. Preventing and detecting “Credit card fraud” has become an emergency. Data mining techniques can be very useful in detecting financial fraud, as large and complex financial data processing poses major challenges for financial institutions. In recent years, several studies have used machine learning and data mining techniques to combat this problem. The main aim of this paper is to implement the performance of the machine learning based classifiers on Credit card fraud detection dataset. |
![]() | : | 10.22362/ijcert/2020/v7/i9/v7i901 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i9/v7i901 |
[1] Dornadula, V. N., & Geetha, S. (2019). Credit Card Fraud Detection using Machine Learning Algorithms. Procedia Computer Science, 165, 631–641. doi:10.1016/j.procs.2020.01.057 [2] Venkata Suryanarayana, S., N. Balaji, G., & Venkateswara Rao, G. (2018). Machine Learning Approaches for Credit Card Fraud Detection. International Journal of Engineering & Technology, 7(2), 917. doi:10.14419/ijet.v7i2.9356 [3] Al-Shabi, M. (2019). Credit Card Fraud Detection Using Auto encoder Model in Unbalanced Datasets. Journal of Advances in Mathematics and Computer Science, 33(5), 1-16. https://doi.org/10.9734/jamcs/2019/v33i530192 [4] SADGALI, I., SAEL, N., & BENABBOU, F. (2019). Performance of machine learning techniques in the detection of financial frauds. Procedia Computer Science, 148, 45–54. doi:10.1016/j.procs.2019.01.007 [5] Leo, M., Sharma, S., & Maddulety, K. (2019). Machine Learning in Banking Risk Management: A Literature Review. Risks, 7(1), 29. doi:10.3390/risks7010029 [6] Sohony, I., Pratap, R., & Nambiar, U. (2018). Ensemble learning for credit card fraud detection. Proceedings of the ACM India Joint International Conference on Data Science and Management of Data - CoDS-COMAD ’18. doi:10.1145/3152494.3156815 [7] Carcillo, F., Le Borgne, Y.-A., Caelen, O., Kessaci, Y., Oblé, F., & Bontempi, G. (2019). Combining Unsupervised and Supervised Learning in Credit Card Fraud Detection. Information Sciences. doi:10.1016/j.ins.2019.05.042 [8] John O. Awoyemi Department of Computer Science Federal University of Technology Akure, Nigeria johntobaonline@yahoo.com [9] Choi, D., & Lee, K. (2018). An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation. Security and Communication Networks, 2018, 1–15. doi:10.1155/2018/5483472 [10] Popat, R. R., & Chaudhary, J. (2018). A Survey on Credit Card Fraud Detection Using Machine Learning. 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). doi:10.1109/icoei.2018.8553963. [11] Roman Chuprina on April 14, 2020 at 1:30am; Blog, View. "The In-depth 2020 Guide to E-commerce Fraud Detection". www.datasciencecentral.com. Retrieved 2020-05-24. [12] Velasco, Rafael B.; Carpanese, Igor; Interian, Ruben; Paulo Neto, Octávio C. G.; Ribeiro, Celso C. (2020-05-28). "A decision support system for fraud detection in public procurement". International Transactions in Operational Research: itor.12811. doi:10.1111/itor.12811. ISSN 0969-6016. [13] Jump up to:a b c d Bolton, R. and Hand, D. (2002). Statistical fraud detection: A review. Statistical Science 17 (3), pp. 235-255 [14] Jump up to:a b G. K. Palshikar, The Hidden Truth – Frauds and Their Control: A Critical Application for Business Intelligence, Intelligent Enterprise, vol. 5, no. 9, 28 May 2002, pp. 46–51. [15] Vani, G. K. (February 2018). "How to detect data collection fraud using System properties approach". Multilogic in Science. VII (SPECIAL ISSUE ICAAASTSD-2018). ISSN 2277-7601. Retrieved February 2, 2019. [16] Michalski, R. S., I. Bratko, and M. Kubat (1998). Machine Learning and Data Mining – Methods and Applications. John Wiley & Sons Ltd. [17] Salazar, Addisson, et al. "Automatic credit card fraud detection based on non-linear signal processing." Security Technology (ICCST), 2012 IEEE International Carnahan Conference on. IEEE, 2012. [18] Delamaire, Linda, H. A. H. Abdou, and John Pointon. "Credit card fraud and detection techniques: a review." Banks and Bank system’s (2009). [19] Quinlan, J. Ross. "Induction of decision trees." Machine learning (1986). [20 Quinlan, J. R. (1987). "Simplifying decision trees". International Journal of Man-Machine Studies.
Paper Title | : | Bootstrap Education during Lockdown |
Authors | : | Ms.Mekhala, Ms. ShilpiGupta, , , |
Affiliations | : | 1:Research Scholar, Department of Computer Science, Uttarakhand Technical University, Uttarakhand, India; 2: Ph.D Student, Department of education, Shobhit Institute of Engineering & Technology (Deemed-to-be-University), Meerut-250110, India |
Abstract | : | Background/Objectives: As we all know COVID-19 has badly affected our country's past four months. Under the circumstances of a pandemic, the entire economical and educational system has been messing up across the world. Everything and every field now need continuous efforts to bring them on the same platform. Methods/Statistical analysis: In this article, we have focused on how E-learning is a bootstrap during this time. We have surveyed some articles and we have found that all the educators and educates are nowadays utilizing various methods of online learning so that their studies can never be halted. As we know today what is happening will have to fade one day and we have learned that we should never lock anything due to this. Findings: We have found that various technologies, methods, and challenges which educators are facing through E-learning. We found that this exception is a major change in our education system which is beneficial for all educators and educatees. |
![]() | : | 10.22362/ijcert/2020/v7/i08/v7i0809 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i08/v7i0809 |
1. Jonathan Adams et al. “Students acceptance and readiness for E-learning in northeastern Island”, International Journal of educational technology in higher education, volume 13, 2020. 2. Ahmad, M. Et al. “Enhancing the quality of education through E-learning. The case study of Allama of Iqbal open university” volume 11, 2011. 3. Charismiadji, I. et al. “Computer literacy and competency: A survey of Indonesian teachers of English as a foreign language.” EJ, 12(1), 2011. 4. Lan, P. Et al “Readiness of eLearning Connectivity in Thailand (Conference paper presented at the Fourth International Conference on eLearning for Knowledge-based Society”, November 2007. 5. Oliver et al. “Online learning help prepare pupils for university”. Education Journal, 2014. 6. Stoll, B. et al. “ Computer literacy and E-learning perception in Cameroon” Medical Education, 13,57, 2013. 7. Rho, J. et al. “Critical success factors for e-learning in developing countries”, 58, 843–855 2012. 8. Surendiran.R et al. “Impacts of E-content” International Journal of Computer Trends and Technology- March to April issue. 9. Jacoby, R. et al. “Computer Based Training” Journal of Health Care Compliance 2005. 10. Subhashrao A. et al. “ Utility of E –learning”, International Journal of Medicine, 88-93, 2016
Paper Title | : | A Survey on Deepfake Detection Techniques |
Authors | : | Ms.Bismi Fathima Nasar, Ms.Sajini. T , Ms.Elizabeth Rose Lalson , , |
Affiliations | : | 1: Computer Science and Engineering, ER & DCI Institute of Technology, KTU, Thiruvananthapuram, India , 2: Knowledge Resource Centre, CDAC, Thiruvananthapuram, India; 3 : Computer Science and Engineering, ER & DCI Institute of Technology, KTU, Thiruvananthapuram, India |
Abstract | : | With the recent advancement in the Deep Learning algorithm, its application has been broadened over various fields ranging from big data analytics to human biometric systems. One such field where it takes up the hand is the implementation of various application like FaceApp, FakeApp etc. that is used in the generation of manipulated media files which is termed as Deepfake. These application has a wider increase in its popularity among common public due to its user friendly features and are used in various domains like Digital Fraud, Cyber Crimes, Politics and in even in Military Activities. So, it is very much important to develop some kind of detection techniques that can take away this kind of forgeries and put up a new step in video and audio forensics. In this paper, we present the various creation and detection techniques that is up now in research in Deepfake using various techniques like Convolutional Neural Network (CNN), Recurrent Neural Network (RNN), Long Short Term Memory (LSTM) etc. and thus provide a backbone in the implementation of a new scheme that would be more compactable and accurate in the detection of Deepfakes. Also we done a comparison study on various techniques under traditional and state of the art approach and brought up a conclusion that most of the techniques under traditional approach are time consuming process, need expertise knowledge over the technology for the user to use them etc. where as in the case of state of the art approach, the techniques require less time for processing and anyone with less knowledge over the technology can use this technologies for the creation and detection of Deepfake. |
![]() | : | 10.22362/ijcert/2020/v7/i09/v7i0808 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i08/v7i0808 |
[1] Raahat Devender Singh, Naveen Aggarwal,” Video content authentication techniques: a comprehensive survey”, Springer, Multimedia Systems, pp. 211- 240, 2018. [2] David G’uera Edward J. Delp,” Deepfake Video Detection Using Recurrent Neural Networks”, Video and Image Processing Laboratory (VIPER), Purdue University,2018. [3] Ekraam Sabir, Jiaxin Cheng, Ayush Jaiswal, Wael AbdAlmageed, Iacopo Masi, Prem Natarajan,” Recurrent Convolutional Strategies for Face Manipulation Detection in Videos”, In proceeding of the IEEE Xplore Final Publication, pp. 80-87, 2018. [4] Xinyi Ding, Zohreh Razieiy, Eric C, Larson, Eli V, Olinick, Paul Krueger, Michael Hahsler,” Swapped Face Detection using Deep Learning and Subjective Assessment”, Research Gate, pp. 1-9, 2019. [5] Peng Zhou, Xintong Han, Vlad I. Morariu Larry S. Davis,” Two-Stream Neural Networks for Tampered Face Detection”, IEEE Conference on Computer Vision and Pattern Recognition, 2019 [6] Chih-Chung Hsu, Yi-Xiu Zhuang, and Chia-Yen Lee,” Deep Fake Image Detection based on Pairwise Learning”, MDPI, Applied Science,2020, doi:10.3390/app10010370. [7] Fang Liu, Licheng Jiao, Fellow, IEEE, and Xu Tang, Member” Task- Oriented GAN for PolSAR Image Classification and Clustering”, IEEE Transactions On Neural Networks and Learning Systems, Volume 30, Issue 9, 2019. [8] Jawadul H. Bappy, Cody Simons, Lakshmanan Nataraj, B.S. Manjunath, and Amit K. Roy-Chowdhury,” Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries”, IEEE Transaction on Image Processing, Volume: 28 , Issue: 7 ,pp. 1-14, 2019. [9] Xinsheng Xuan, Bo Peng, Wei Wang and Jing Dong,” On the Generalization of GAN Image Forensics”, Computer Vision and Pattern Recognition, Cornell University, Volume 1, pp. 1-8, 2019. [10] Yuezun Li, Siwei Lyu,” Exposing DeepFake Videos by Detecting Face Warping Artifacts”, In Proceedings of the IEEE Xplore Final Publication, pp. 46- 52, 2019. [11] Pavel Korshunov, S´ebastien Marcel,” Speaker Inconsistency Detection in Tampered Video”, 26th European Signal Processing Conference (EUSIPCO), 2018, ISBN 978-90-827970-1-5. [12] Huy H. Nguyen, Junichi Yamagishi, and Isao Echizen,” Capsule- Forensics: Using Capsule Networks to detect Forged Images and Videos”, ICASSP, pp. 2307 – 2311, 2019 [13] Li, Y., Chang, M. C., and Lyu, S, “Exposing AI created fake videos by detecting eye blinking”, In IEEE International Workshop on Information Forensics and Security (WIFS) (pp. 1-7). 2018. [14] Steven Fernandes, Sunny Raj, Rickard Ewetz, Jodh Singh Pannu, Sumit Kumar Jha, Eddy Ortiz, Iustina Vintila, Margaret Salte,” Detecting deepfake videos using attribution-based confidence metric”, In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (pp. 308-309), 2020. [15] A.M. Rodriguez, Z. Geradts,” Detection of Deepfake Video Manipulation”, In Proceedings of the 20th Irish Machine Vision and Image Processing conference, Belfast, Northern Ireland, pp. 133-136, 2018, ISBN 978-0-9934207-3-3. [16] Rohini Sawant and Manoj Sabnis,” A Review of Video Forgery and Its Detection”, IOSR Journal of Computer Engineering (IOSR-JCE) e- ISSN: 2278-0661, Volume 20, Issue 2, p-ISSN: 2278-8727, 2018. [17] Thanh Thi Nguyen, Cuong M. Nguyen, Dung Tien Nguyen, Duc Thanh Nguyen and Saeid Nahavandi,” Deep Learning for Deepfakes Creation and Detection”, IEEE, pp. 1-12, 2019.
Paper Title | : | Reuse Of Construction and Demolished Waste as Aggregates in Concrete: A Review |
Authors | : | A.H. Buller, B.A. Memon, I.N. Sodhar, M. Oad & A.S. Buller, |
Affiliations | : | 1* Engineer, Quaid-e-Awam University of Engineering, Science & Technology Nawabshah, 67480, Pakistan. 2 :Professor, Quaid-e-Awam University of Engineering, Science & Technology Nawabshah, 67480, Pakistan. 3 :Lecturer, Department of Information Technology, Shaheed Benazir Bhutto University, Shaheed Benazir Abad, 67480, Pakistan. 4: Assistant Professor, Quaid-e-Awam University of Engineering, Science & Technology Nawabshah, 67480, Pakistan. |
Abstract | : | This paper presents reviews of the authors for the use of construction and demolished waste of building in concrete as recycled coarse aggregates. It is observed that from many years ago that the peoples of rural areas shifted from villages/small towns to developed city centers. Due to this huge number of migration of peoples creates problems accommodations and their basic needs. For the solution of accommodation and other problems demolish old structures and construction will shift from horizontal to vertical space such as: high rise building. However, demolition of old structures creates many issues and for the solution those issues on and only the better option of reused of Construction & Demolition waste as in green concrete. The views of the several authors and construction industry are the utilization by consuming it in new concrete in various ways. Replacement of fine aggregates, coarse aggregates and even cement has been attempted. Green concrete is produced by replacing natural coarse aggregates in 50% dosage with coarse aggregates obtained from demolished old concrete which was suggested by the several authors. Use of recycled in concrete has not much effect on the basic properties (specific gravity, water absorption, unit weight and density) of Recycled coarse aggregates comparison with natural coarse aggregates. Therefore, the use of this waste in new concrete not only helps in reducing the waste management issues but also help to protect the environment greatly. |
![]() | : | 10.22362/ijcert/2020/v7/i08/v7i0807 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i08/v7i0807 |
[1] Oad M, and Memon BA. Compressive Strength of Concrete Cylinders Using Coarse Aggregates from Old Concrete. 1st National Conference Civil Engineering Department Quest Nawabshah. 23-24 April 2014. [2] Qasrawi H, Marie I. Towards better understanding of concrete containing recycled concrete aggregate. Advances in Materials Science and Engineering. 2013;2013. [3] Memon BA, Oad M, Buller AH, Shar SA, Buller AS. Effect of Mould Size on Compressive Strength of Green Concrete Cubes. Civil Engineering Journal. 2019 May 21;5(5):1181-8. [4] Kumutha R, Vijai K. Strength of concrete incorporating aggregates recycled from demolition waste. ARPN Journal of Engineering and Applied Sciences. 2010 May;5(5):64-71. [5] Malešev M, Radonjanin V, Marinkovi? S. Recycled concrete as aggregate for structural concrete production. Sustainability. 2010 May;2(5):1204-25. [6] Properties of Concrete Containing Recycled Concrete Aggregate” Technical Note No: 34, University Of Illinois, Dept. of Civil and Environmental Engineering, 1211 NCEL, Mc-250 Urbana, Il. 61801. [7] Malliga P. Strength characteristics of crushed mosaic as aggregates in concrete. InIEEE-International Conference On Advances In Engineering, Science And Management (ICAESM-2012) 2012 Mar 30 (pp. 292-294). IEEE. [8] Akbari YV, Arora NK, Vakil MD. Effect on recycled aggregate on concrete properties. International Journal of Earth Sciences and Engineering. 2011 Oct;4(6):924-8. [9] Blessen, S.T., and Ramesh, C.G. (2013), “Mechanical Properties and Durability Characteristics of Concrete Containing Solid Waste Materials” Journal of Cleaner Production, pp. 1-6. [10] Xiao Z, Ling TC, Poon CS, Kou SC, Wang Q, Huang R. Properties of partition wall blocks prepared with high percentages of recycled clay brick after exposure to elevated temperatures. Construction and Building Materials. 2013 Dec 1;49:56-61. [11] Chen J, Su Y, Si H, Chen J. Managerial areas of construction and demolition waste: A scientometric review. International journal of environmental research and public health. 2018 Nov;15(11):2350. [12] El Haggar SM. Sustainability of construction and demolition waste management. Sustainable Industrial Design and Waste Management Cradle-to-cradle for Sustainable Development. 2007:261-92. [13] B?aszczy?ski T, Król M. Usage of green concrete technology in civil engineering. Procedia Engineering. 2015 Jan 1;122:296-301. [14] Liu Q, Xiao J, Sun Z. Experimental study on the failure mechanism of recycled concrete. Cement and Concrete Research. 2011 Oct 1;41(10):1050-7. [15] Silva RV, De Brito J, Dhir RK. Comparative analysis of existing prediction models on the creep behaviour of recycled aggregate concrete. Engineering Structures. 2015 Oct 1;100:31-42. [16] Cervantes V, Roesler J, Bordelon A. Fracture and drying shrinkage properties of concrete containing recycled concrete aggregate. CEAT Technical Note. 2007(29). [17] Wang YZ, Fu CG. Calculation of ultimate bearing capacity of prestressed steel reinforced concrete structure under fire. InAdvanced Materials Research 2011 (Vol. 250, pp. 2857-2860). Trans Tech Publications Ltd. [18] Yeheyis M, Hewage K, Alam MS, Eskicioglu C, Sadiq R. An overview of construction and demolition waste management in Canada: a lifecycle analysis approach to sustainability. Clean Technologies and Environmental Policy. 2013 Feb 1;15(1):81-91. [19] ASTM C. 128-15.“. Standard Test Method for Relative Density (Specific Gravity) and Absorption of Fine Aggregate”, ASTM Current Edition Approved Jan. 2015;1. [20] Oad M, Memon BA, Buller AH, Buller AH. Numerical Modeling Of Deflection And Strain Of Reinforced Green Concrete Beams Under Sustained Loading. Baltica. 2020; 33(3): 2-13. [21] Buller AH, Memon BA, Sodhar J, Oad M, Sodhar IN. Effect Of Specimen Size On Strength Of Green Concrete Cylinders. Agrociencia. 2020; 54(1): 96-106. [22] Oad M, Buller AH, Memon BA, Memon NA, Tunio ZA, Memon MA. Effect of Water-Cement Ratio on Flexural Strength of RC Beams Made with Partial Replacement of Coarse Aggregates with Coarse Aggregates from Old Concrete. Engineering, Technology & Applied Science Research. 2019 Feb 16;9(1):3825-30. [23] Oad M, Buller AH, Memon BA, Memon NA, Sohu S. Flexural stress-strain behavior of rc beams made with partial replacement of coarse aggregates with recyclable concrete aggregate: Part-2: Rich mix. Engineering Technology and Applied Science Research. 2018 Oct 1;8(5):3338-43. [24] Oad M, Buller AH, Memon BA, Memon NA. Flexural Stress-Strain Behavior of RC Beams Made with Partial Replacement of Coarse Aggregates with Coarse Aggregates from Old Concrete. Engineering, Technology & Applied Science Research. 2018 Jun 1;8(3):3048-53. [25] Soomro FA, Memon BA, Oad M, Buller AH, Tunio ZA. Shrinkage of Concrete Panels Made with Recyclable Concrete Aggregates. Engineering, Technology & Applied Science Research. 2019 Apr 10;9(2):4027-9.
Paper Title | : | Tools Used In Online Teaching and Learning through Lock-Down |
Authors | : | I.N. Sodhar, A.H. Jalbani, A.H. Buller, A.N. Sodhar , |
Affiliations | : | 1*: Lecturer, Shaheed Benazirabad University, Shaheed Benazirabad (SBBUSBA), Sindh, Pakistan 2 Associate Professor, Quaid-e-Awam University of Engineering, Science & Technology, Nawabshah, Sindh Pakistan 3 Engineer, Quaid-e-Awam University of Engineering, Science & Technology, Nawabshah, Sindh, Pakistan. 4 Postgraduate student, Quaid-e-Awam University of Engineering, Science & Technology Nawabshah, Sindh Pakistan |
Abstract | : | Now-a-days, the whole world faced the pandemic situation due to spreading of the novel- corona virus (COVID-19) rapidly; in this situation Pakistan’s government has imposed the lock-down in all provinces. As the pandemic situation increased throughout the world and the impact of this is also increase repaid. The impact of these pandemic situations is economy of the country, education of the country and increased the Poverty in the country. To reduce the impact of this pandemic situation on education, online education system was introduced. That’s why government take the step towards of online classes of universities students to save the education without wasting time of students. Pakistan government also announce the channel for students to teach the students of 1st to 12th standards students from 8:00 AM to 6:00 PM at home without any difficulty. The main objective of research this is to find out the online tools used in teaching and learning process during lock-down. At the university level teachers in higher education institutes used different tools such as: Google class, Email, WhatsApp group, Facebook group, Zoom, MS Office 360, YouTube channel, Recorded PowerPoint presentation, laptop screen recorder and X-recorder for mobile screen to fulfil the task of online classes and also get the few percent of results from students. |
![]() | : | 10.22362/ijcert/2020/v7/i08/v7i0806 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i08/v7i0806 |
[1] Ramya K, Variyar A. Impact of lockdown on teachers in higher education institutions. Aust. Res. J.. 2020;11(5):33-8. [2] Teclehaimanot B, You J, Franz DR, Xiao M, Hochberg SA. Ensuring academic integrity in online courses: A case analysis in three testing environments. The Quarterly Review of Distance Education. 2018 Jan 1;12(1):47-52. [3] Moloi DM. COVID-19 and the Digital Transformation of Education: What we are learning in South Africa. Preprints. 2020 Apr 12. [4] De Guzman MF, Ecle R. The Social Studies Curriculum Standards in Junior Secondary Schools; Input to Quality Instruction and Students’ Civic Competence. International Journal of Computer Engineering in Research Trends. 2019 Mar;6. [5] Ganaden AR. Strategies to Enhance Physical Activity Participation Level among Pupils. International Journal of Computer Engineering in Research Trends. Volume-6, Issue-6, 2019. [6] Porwal P, Iyyer K. Review on Augmented Reality Applications in Education. International Journal of Computer Engineering in Research Trends. Volume-5, Issue-3, 2018 [7] Turkle S. Computer Science Technology: Tutor, Tool and to explore Language Teaching. International Journal of Computer Engineering in Research Trends. 2016 Oct;3(10):540-3. [8] Sodhar, I.N., Mirani, A.A. and Sodhar, A.N., 2019. Automated Usability Evaluation of Government and Private Sector Educational Websites of Pakistan. Information Sciences Letters, 8(2), pp.51-55. [9] Sodhar, I.N., Bhanbhro, H. and Amur, Z.H., 2019. Evaluation of Web Accessibility of Engineering University Websites of Pakistan through Online Tools. IJCSNS, 19(12), pp.85-90. [10] Sodhar, I.N., Mirani, A. and Brohi, A.J., 2019. Information Communication and Technology Tools Integration in Higher Education. International Journal of Progressive Sciences and Technologies (IJPSAT), Vol. 15 No. 1 June 2019, pp. 127-133. [11] Margaret RE, Uma B, Tejonidhi MR, Neelakantappa BB. A Recipe for the Use of ICT Tools in an Educational Institute. Journal of Engineering Education Transformations. 2018 Jan 1;31(3):114-9. [12] Babafemi MA. Information and Communication Technology (ICT) in technical education. SCIREA Journal of Information Science and Systems Science, Volume1, Issue1. 2016 Oct.
Paper Title | : | Non-academic online activities among Bangladeshi University students: Case Study |
Authors | : | Md. Obaidullah, Abdullah Al Zubayer , , , |
Affiliations | : | 1*: Department of Public Administration, University of Barishal, Barishal 8200, Bangladesh; 2: Department of Sociology, University of Barishal, Barishal 8200, Bangladesh |
Abstract | : | Objectives: E-learning has become the mandatory component of all educational institutions like schools, colleges, and universities in and around the world due to the pandemic crisis of COVID-19. Students are not busy now. They are spending time online. This study examines the non-academic online activities of public university students in Bangladesh. Methods: The study is qualitative-explorative. Data has been collected through a semi-structured questionnaire. That was qualitatively thematic analysed through manual coding to achieve the research objectives. The sample was taken from 20 Students of 10 public universities in Bangladesh for a case study by purposive sampling technique from July 5 to July 15, 2020. Findings and Conclusion: The findings of the study shows, that students are engaged in online activities, both productive and non-productive. Especially focus on non-academic online activities. We found that leisure time activities, Soft skills development, spending time online and exceptional thinking from the academic area of students. However, they are facing different problems. Finally, some solutions are provided in this paper. |
![]() | : | 10.22362/ijcert/2020/v7/i08/v7i0805 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i08/v7i0805 |
1. Cucinotta D, Vanelli M. WHO declares COVID-19 a pandemic. Acta bio-medica: Atenei Parmensis. 2020 Mar 19;91(1):157-60. 2. Khan, D. I. A. (2020). Learners’ Perception of Virtual Learning Amidst COVID-19. International Journal of Computer Engineering in Research Trends (IJCERT), 07(06), 19–28. https://doi.org/10.22362/ijcert/2020/v7/i06/v7i0603 3. Clark R, Mayer R, Thalheimer W. E-learning and the science of instruction: Proven guidelines for consumers and designers of multimedia learning. Performance Improvement. 2003;42(5):41-43. 4. Masrom M. Technology acceptance model and e-learning. Technology. 2007 May;21(24):81. 5. Radha R, Mahalakshmi K, Sathis Kumar V, Saravanakumar AR. E-Learning During Lockdown of Covid-19 Pandemic: A Global Perspective. International Journal of Control and Automation. 2020;13(4):1088-99. 6. World Economic forum.2020 [cited 12 August 2020]. Availablefrom:https://www.weforum.org/agenda/2020/04/coronavirus-education-global-covid19-online-digital-learning/ 7. Paul, R. (2020, March 8). Bangladesh confirms its first three cases of coronavirus. Reuters. https://www.reuters.com/article/us-health-coronavirus-bangladesh-idUSKBN20V0FS 8. Uddin |, M. (2020, June 13). Effects of the pandemic on the education sector in Bangladesh. The Financial Express. 9. Alamgir, M. (2018, August 31). Students brace for stiff contest for a university seat. New Age. https://www.newagebd.net/article/49478/students-brace-for-stiff-contest-for-a-university-seat 10. Ramij M, Sultana A. Preparedness of Online Classes in Developing Countries amid COVID-19 Outbreak: A Perspective from Bangladesh. Afrin, Preparedness of Online Classes in Developing Countries amid COVID-19 Outbreak: A Perspective from Bangladesh (June 29, 2020). 2020 June 29. 11. Basilaia G, Kvavadze D. Transition to Online Education in Schools during a SARS-CoV-2 Coronavirus (COVID-19) Pandemic in Georgia. Pedagogical Research. 2020;5(4). 12. Sarker M, Mahmud R, Islam M, Islam M. Use of e-learning at higher educational institutions in Bangladesh. Journal of Applied Research in Higher Education [Internet]. 2019 [cited 14 August 2020];11(2):210-223. Available from: https://www.emerald.com/insight/content/doi/10.1108/JARHE-06-2018-0099/full/html 13. Yvonne, N. (2016), “MIT OpenCourseWare celebrates 15 years of open sharing”, (accessed 14 August , 2020 ). available at: http://news.mit.edu/2016/mit-opencourseware-celebrates-15-years-open-sharing-0404 14. Nichols M. A theory for eLearning. Journal of Educational Technology & Society. 2003 Apr 1;6(2):1-0. 15. Mahmud K, Gope K. Challenges of implementing e-learning for higher education in least developed countries: a case study on Bangladesh. In2009 international conference on information and multimedia technology 2009 Dec 16 (pp. 155-159). IEEE. 16. New Age. Bangladesh poverty rate rises to 35pc amid COVID-19 fallout: CPD. [Internet]. 2020 [cited 14 August 2020];.Available from: https://www.newagebd.net/article/107855/bangladesh-poverty-rate-rises-to-35pc-amid-covid-19-fallout-cpd 17. [Internet]. 2020 [cited 11 August 2020];. Available from: https://www.thedailystar.net/business/news/mobile-internet-slowest-bangladesh-among-42-countries-1892761 18. Multiple Indicator Cluster Survey 2019. Bangladesh Bureau of Statistics; 2019. 19. Blue Light from Phone and Eye Damage [Internet]. Health line. 2020 [cited 20 July 2020]. Available from: https://www.healthline.com/health-news/phone-may-be-damaging-your-eyes#1 20. Bangladesh's Mobile and Broadband Internet Speeds - Speedtest Global Index [Internet]. Speedtest Global Index. 2020 [cited 21 July 2020]. Available from: https://www.speedtest.net/global-index/bangladesh 21. Internet Packages | Grameenphone [Internet]. Grameenphone.com. 2020 [cited 14 August 2020]. Available from: https://www.grameenphone.com/personal/plans-offers/internet-packages 22. Islam M, Barna S, Raihan H, Khan M, Hossain M. Depression and anxiety among university students during the COVID-19 pandemic in Bangladesh: A web-based cross-sectional survey. PLOS ONE. 2020;15(8):e0238162.
Paper Title | : | Vigorous Recognition of Child Marriage Prophylaxis Through Cryptography: Impeccable Solutions Within Concatenated Management |
Authors | : | Ms.Tarun Danti Dey, Ms. Tanny Das, Mr.S.M. Shahen Alam, Mr. Sritha Zith Dey Babu, |
Affiliations | : | 1*:Department of LAW, Chittagong Independent University, Chittagong, Bangladesh 2: Department of English Literature and Language, Brindaban Government College, Habiganj, Bangladesh 3: Department of Sociology, University of Dhaka, Bangladesh 4: Department of Computer Science, Chandigarh University, Punjab, India |
Abstract | : | Child marriage is the pervasive smeared crux in our Asia continent. It sways all-encompassing concavity on gender-oriented prejudice, emerging rate of the population as well. The objective of our paper defines settling up the age with deficient latitude accordant the propounded strait, fabricating a cryptosystem into society, embellishing the temporal and spatial equation to amplify a society. The collection of random or unstructured data replicates the method of cryptosystem and genetic algorithm through the deviation of true and standard value related to the concentration of the determined attributes of the analyte. Exertion and correlation of doctors with related schools corroborate the cultivation of physical and elementary mental health, ascertainment of sanitation. Indemnifying society consolidation regarding education cognition fastens partaking of Education Officers and Volunteers. Consciencement of parents’ employment endorses with the Representatives of NGOs’. Implementation of a female child ratifies with the aid of Banks and Financial Institutions. Social awareness fleeces with the concurrence of religious confessors and the honorable figures of the entertainment sphere. Birth registration, existing child's data, and rationing are verified respectively under the aegis of the root leveled officials and public representatives. Our proposed methodology comprehensively facilitates both the prerogative and underprivileged female children, along with their parents. Adolescents’ as well as females engaging in the skill development arena, certify their elevation of social status. The novelty of the paper is that it’s going to concrete the span of social science and big data. |
![]() | : | 10.22362/ijcert/2020/v7/i08/v7i0804 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i08/v7i0804 |
[1] Bartels SA, Michael S, Roupetz S, Garbern S, Kilzar L, Bergquist H, Bakhache N, Davison C, Bunting A. Making sense of child, early and forced marriage among Syrian refugee girls: a mixed methods study in Lebanon. BMJ global health. 2018 Jan 1;3(1). [2] McFarlane J, Nava A, Gilroy H, Maddoux J. Child brides, forced marriage, and partner violence in America: Tip of an iceberg revealed. Obstetrics & Gynecology. 2016 Apr 1;127(4):706-13. [3] Montazeri S, Gharacheh M, Mohammadi N, Alaghband Rad J, Eftekhar Ardabili H. Determinants of early marriage from married girls’ perspectives in Iranian setting: a qualitative study. Journal of environmental and public health. 2016 Mar 30;2016. [4] Cherri Z, Gil Cuesta J, Rodriguez-Llanes JM, Guha-Sapir D. Early marriage and barriers to contraception among Syrian refugee women in Lebanon: a qualitative study. International journal of environmental research and public health. 2017 Aug;14(8):836. [5] Santoso MV, Kerr RB, Hoddinott J, Garigipati P, Olmos S, Young SL. Role of women's Empowerment in child nutrition outcomes: a systematic review. Advances in Nutrition. 2019 Nov 1;10(6):1138-51. [6] Galiè A, Teufel N, Korir L, Baltenweck I, Girard AW, Dominguez-Salas P, Yount KM. The women’s empowerment in livestock index. Social Indicators Research. 2019 Apr 15;142(2):799-825. [7] Alcázar L, Balarin M, Espinoza Iglesias KH. Impacts of the Peruvian Conditional Cash Transfer Program on Womens Empowerment: A Quantitative and Qualitative Approach. [8] Cornwall A. Women's empowerment: What works?. Journal of International Development. 2016 Apr;28(3):342-59. [9] Bandiera O, Buehren N, Burgess R, Goldstein M, Gulesci S, Rasul I, Sulaiman M. Women’s empowerment in action: evidence from a randomized control trial in Africa. World Bank; 2018 Dec. [10] Woya AA, Tekile AK, Mitiku AA. Womens empowerment on contraceptive use among married women in Amhara Region, Ethiopia. ISABB Journal of Health and Environmental Sciences. 2018 Jan 31;5(1):1-8. [11] Prata N, Tavrow P, Upadhyay U. Women’s empowerment related to pregnancy and childbirth: introduction to special issue. BMC pregnancy and childbirth. 2017 Nov;17(2):1-5. [12] Crittenden VL, Crittenden WF, Ajjan H. Empowering women micro-entrepreneurs in emerging economies: The role of information communications technology. Journal of Business Research. 2019 May 1;98:191-203. [13] Abubakar NH, Dasuki SI. Empowerment in their hands: use of WhatsApp by women in Nigeria. Gender, Technology and Development. 2018 May 4;22(2):164-83. [14] Adeni S. Information Communication Technology (ICT) and Women Empowerment for Rural Area. Jurnal InterAct. 2016 Nov 12;5(2):1-5. [15] Singh S, Singh S, Kumar A. Women and ICT: A Study on Access and Perceptions in North India. Indian Journal of Human Development. 2018 Dec;12(3):401-19. [16] Dey TD, Zith SZ, Pandey D, Sheik I. Persuasive Metamorphosis of Manufacturing Overhead at The Golden Doors of Disparaging Uttermost Cost of Goods. The International Journal of Technology Information and Computer (TIJOTIC). 2020 Jun 2;1(1):8-15. [17] Babu SZ, Pandey D, Narayan V, Al Zubayer A, Sheik I. Abridgement of Business Data Drilling with the Natural Selection and Recasting Breakthrough: Drill Data With GA.
Paper Title | : | The Study of Development of Standard Operating Protocols for Nurses With Reference To Communication with Client and Relatives in Intensive care Unit (ICU) |
Authors | : | Dr. Sangeetha Sunil Bhujbal, , , , |
Affiliations | : | Nursing Lecturer, Dept. Of Nursing, B.J.Govt Medical, Pune,Maharastra, India. |
Abstract | : | Intensive care unit is an area which creates fear and worries in client and relatives while nurses working in this area undergo stress to overcome, this there is a need for the nurse to understand the importance of communication in an Intensive care Unit . Communication skills are relatively poorly developed among critical care nurses compared to nurses in wards.1 Objective- It was to enhance communication between the nurse and client by assessing the effectiveness of Standard Operating Protocol on practices of nurses regarding communication with the clients and relatives in intensive care unit at selected hospitals in the state of Maharashtra as there were no protocols existing in the intensive care unit for nurses. Method and Statistical analysis- A descriptive evaluative approach, Pre experimental time series one group pretest post-test design was used. Total of 220 nurses selected by purposive sampling technique. Tools were Standard Operating Protocols. Teaching Module, An observation checklists with socio-demographic data. Observation technique was used to observe the practices. Data were analyzed using both descriptive and inferential statistics. The result of the study showed. There was a significant association of educational qualification with post-test-1 observational practices as p = < 0.0001. There was no association with observed practice score and socio-demographic data during pretest and posttest- 2. In Communication with client Area of nonverbal communication improved from 41% to 91%. Reassurance and comfort also increased from 41% to 84%. Communication with client’s relatives enhanced from 43% to 93% in the majority as an aspect of the checklist. |
![]() | : | 10.22362/ijcert/2020/v7/i08/v7i0803 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i08/v7i0803 |
1. Park Y, Oh EG. Factors related to intensive care unit nurses’ patient centered communication competency. J Korean Crit Care Nurs. 2018; 11:51–62. 2. Mary Beth Happ, Kathryn Garrett, Dana DiVirgilio Thomas, Judith Tate, Elisabeth George, MartinHouze, Jill Radtke, Susan Sereika, Nurse-Patient Communication Interactions in the intensive Care Unit, American Journal of Critical Care March 2011 vol. 20 no. 2 e28-e40. 3. Enrique Rivero, Communication Board Can Ease Frustration Intubated Patients Feel When Trying to Convey Their Needs, American Journal of Critical Care UCLA November 28, 2006. 4. GrazinaWojnicki-Johansson , Communication between nurse and patient during ventilator treatment: patient reports and Registered Nurse Response. Intensive Critical Care Nursing Journal. 2000 Jun; 12(3):167-80. 5. Judith E Hupcey. The psychological needs of the ICU patients, Journal of Nursing Scholarship 2000; vol 32(4) 361-367. 2007 6. Cazorla C, Cravoisy A, Gibot S, Nace L, Levy B, Bollaert PE. Patients' perception of their experience in the intensive care unit. . 2007 Feb; 36(2):211-6. Epub 2006 Dec 20. 7. Polit F Denise, Beck Tatanocherly. Nursing Research: Generating and Assessing Evidence for Nursing Practice.8th ed. New Delhi: Wolters Kluwer Pvt. Ltd, 2008. 8. Burns Nancy, Grove Susan. Understanding Nursing Research: Building an Evidence Based Practice.4th ed. Noida: Elsevier India Private Limited, 2007. 9. Wanga S.K.L. and Leweshow S. “Sample size determination in health studies”, Publication World Health Organization Geneva 1991 pg -125-27. 10. Suresh K Sharma: Nursing Research & Statistics. Reed Elsevier India Private Ltd.2011B.T 11. Black. J. M and Matassarin, J. Medical Surgical Nursing Psychophysiological Approach, Philadelphia: W.B.Saunders and Company. 1993. 12. Richard J. Wall, Robert’s, Ditter& E Waley Ely. Protocol driven care in the intensive care unit: a tool for quality. http:/ccforum.com/content 5/6/283.
Paper Title | : | Detection of Malicious URLs using Artificial Intelligence |
Authors | : | Monisha.T, Sridevi.R, Tirumalini.K.R, , |
Affiliations | : | Computer Science and Engineering, S.A. Engineering College, Anna University, Chennai, India |
Abstract | : | Background/Objectives: The main objective of the project is to avoid various security threats and network attacks by detecting malicious Uniform Resource Locator(URL) based on the keyword text classification. Methods/Statistical analysis: A semi-supervised technique, naive Bayes classification is proposed to locate malicious URL by text classification phenomena. The probabilities of the predicted and the exact values are calculated, and it results with high probability. With more accuracy, the malignant URL is predicted. A page rank algorithm is used to detect the blacklist which contains the URLs that are already noted as spam, malware or phishing URL. Findings: With the persistent improvement of Web assaults, many web applications have been languishing from different types of security dangers and system assaults. The security identification of URLs has consistently been the focal point of Web security. One of the main sources of attacks is via malicious URLs; the attackers may send embedding executable codes or injects malicious codes through these URLs. Thus, it is important to improve the unwavering quality and security of web applications by precisely identifying malignant URLs. The utilization of profound figuring out how to group URLs to recognize Web guests' aims has significant hypothetical and scientific values for Web security investigate, giving new plans to canny security discovery. |
![]() | : | 10.22362/ijcert/2020/v7/i08/v7i0802 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i08/v7i0802 |
[1] Surendra Sedhai; AixinSun" Semi-Supervised Spam Detection in Twitter Stream" IEEE Transactions on Computational Social Systems (Volume: 5, Issue: 1, March 2018) [2] Bo Feng; Qiang Fu; Mianxiong Dong; Dong Guo; Qiang Li "Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning"IEEE Network ( Volume: 32 , Issue: 4 , July/August 2018 ) [3] Jonghyuk Song; Sangho Lee; Jong Kim " Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata" IEEE Transactions on Dependable and Secure Computing (Volume: 13, Issue: 3, May-June 1 2016) [4] Longfei Wu; Xiaojiang Du; JieWu" Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms" IEEE Transactions on Vehicular Technology (Volume: 65, Issue: 8, Aug. 2016) [5] Eric Lancaster ; TanmoyChakraborty ; V. S. Subrahmanian"MALTP : Parallel Prediction of Malicious Tweets"IEEE Transactions on Computational Social Systems( Volume: 5 , Issue: 4 , Dec. 2018 ) [6] Hong Zhao; Zhaobin Chang; Weijie Wang; XiangyanZeng" Malicious Domain Names Detection Algorithm Based on Lexical Analysis and Feature Quantification" IEEE Access (Volume: 7) [7] Xuanzhe Liu ; Yun Ma ; Xinyang Wang ; Yunxin Liu ; Tao Xie ; Gang Huang"SWAROVsky: Optimizing Resource Loading for Mobile Web Browsing"IEEETransactions on Mobile Computing( Volume: 16 , Issue: 10 , Oct. 1 2017 ) [8] DohoonKim" Potential Risk Analysis Method for Malware Distribution Networks" IEEE Access (Volume: 7) [9] JoostBerkhout"Google's PageRank algorithm for ranking nodes in general networks"IEEE 2016 13th International Workshop on Discrete Event Systems (WODES) [10] Zhou Hao; PuQiumei; Zhang Hong; ShaZhihao"An Improved PageRank Algorithm Based on Web Content" IEEE 2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES) [11] Yuguang Huang ; Lei Li"Naive Bayes classification algorithm based on small sample set" IEEE 2011 IEEE International Conference on Cloud Computing and Intelligence Systems [12] HaiyiZhang; Di Li"Naïve Bayes Text Classifier" IEEE 2007 IEEE International Conference on Granular Computing (GRC 2007) [13] Mohammed Al-Janabi: Ed de Quincey: Peter Andras: “Using supervised machine learning algorithms to detect suspicious URLs in online social networks” 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. [14] Justin Ma: Lawrence K. Saul: Stefan Savage: Geoffrey M. Voelker:“Identifying Suspicious URLs: An Application of Large-Scale Online Learning” 26th International Conference on Machine Learning, Montreal, Canada, 2009. [15] Training Datasets: https://www.kaggle.com/teseract/urldataset
Paper Title | : | Developing Framework of Web Scraper for Agriculture Data using Client Server Module |
Authors | : | Prateeksha Nashipudi, Dr. S. B. Kulkarni, , , |
Affiliations | : | 1:PG Scholar, SDM College of Engineering and Technology, Dharwad, Karnataka, India. 2:Associate Professor SDM College of Engineering and Technology, Dharwad, Karnataka, India. |
Abstract | : | Searching for relevant information becomes very difficult and sometimes we don’t find the exact information what we are actually seeking, so it results in time-consuming and repeating the same web page without knowingly. A system which will know our needs, requirements, preferences and patterns. This will retrieve the correct information and helps in fast processing. In this work, it is proposed that the personalized search engine for information retrieval system using the client-server module for user preferred information through intelligent search and storing the searched result in a database for further accessing of information is implemented. For information retrieval, a framework known as scrappy is used for retrieving all the user needed information by specifying the URL of that data. The fetched information is stored in the database. It helps in offline browsing, full-text search in the database and fast response and no repeating of web pages. |
![]() | : | 10.22362/ijcert/2020/v7/i08/v7i0801 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i08/v7i0801 |
[1] Alvarado, Antonio Cuahtlapantzi, Eduardo Vázquez Santacruz, and Mariano Gamboa Zúñiga. "Construction of a basic intelligent agent." Intelligent Systems Conference (IntelliSys). IEEE, 2017. [2] Pacheco-Reyes, Juan J., et al. "Multi-agent Architecture for User Adaptive Information Retrieval Systems." New Trends in Networking, Computing, Elearning, Systems Sciences, and Engineering. Springer, Cham, 2015. [3] Shankhdhar, Gaurav Kant, and Manuj Darbari. "Building custom, adaptive and heterogeneous multi-agent systems for semantic information retrieval using organizational-multi-agent systems engineering, O-MaSE." 2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA). [4] Singh, Aarti, and Anu Sharma. "A framework for semantics and agent based personalized information retrieval in agriculture." 2nd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2015. [5] Nunes, Ingrid, et al. "Dynamically Adapting BDI Agent Architectures based on High level User Specifications." Computer Science Department, King’s College London(2010). [6] Luo, Junwei, and Xiao Xue. "Research on information retrieval system based on Semantic Web and multi-agent." International Conference on Intelligent Computing and Cognitive Informatics. IEEE, 2010. [7] Czibula, Gabriela, et al. "IPA-An intelligent personal assistant agent for task performance support." 5th International Conference on Intelligent Computer Communication and Processing. IEEE, 2009. [8] Liu, Lizhen, Shujing Wang, and Hantao Song. "Intelligent agents for cooperative designs in individual information retrieval." 8th International Conference on Computer Supported Cooperative Work in Design. Vol. 2. IEEE, 2004. [9] Xu, Yuanzhong. "A model based on a three-layer agent of personalized information retrieval systems." International Conference on Image Analysis and Signal Processing. IEEE, 2011. [10] THANGARAJ, MM. "Agent-Based Personalized Semantic Web Information Retrieval System." International Journal of Advanced Computer Science and Applications 5.8 (2014)
Paper Title | : | Inverter-based MUX: A Low Overhead Approach for Logic Encryption |
Authors | : | Mr. Ghobad Zarrinchian, , , , |
Affiliations | : | 1*Dept. of Computer Engineering, Islamic Azad University of Yadegar-e-Imam Khomeini (rah) Shahr-e-Rey, Tehran, Iran |
Abstract | : | IC overproduction and design theft have been a concern in recent decades for the revenue loss of digital design companies. Logic encryption is a well-known approach to address this problem by locking the functionality of digital designs. In logic encryption techniques, key-gates are added to the design whose functionality is to lock (or obfuscate) the operation of the circuit. Correct functionality is achieved by applying a correct key, which is only known to the IC designer, to these key-gates. The key-gates, however, may incur a considerable overhead to the area and performance of the design. In this paper, a new technique based on simple inverter cells is proposed, which can provide the required locking functionality with low overhead. The results on a set of ISCAS’89 benchmarks reveal that the proposed approach incurs about 2% to 19% area overhead, which is less than any other technique, as well as low power overhead. |
![]() | : | 10.22362/ijcert/2020/v7/i07/v7i0706 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i07/v7i0706 |
[1] U. Guin, D. DiMase, M. Tehranipoor, “Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead,” Journal of Electronic Testing, Vol. 30, Issue 1, pp. 9-23, 2014. [2] S. Bhunia, M.S. Hsiao, M. Banga, S. Narasimhan, “Hardware Trojan Attacks: Threat Analysis and Countermeasures,” In Proc. IEEE, Vol. 102, Issue 8, 2014. [3] Y. Alkabani, F. Koushanfar, M. Potkonjak, “Remote Activation of ICs for Piracy Prevention and Digital Right Management,” In Proc. ICCAD, pp. 674-677, 2007. [4] F. Koushanfar, “Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management,” IEEE Transactions on Information Forensics and Security, Vol. 7. Issue 1, pp. 51-63, 2012. [5] J.A. Roy, F. Koushanfar, I.L. Markov, “EPIC: Ending Piracy of Integrated Circuits,” In Proc. DATE, pp. 1069-1074, 2008. [6] J. Rajendran, H. Zhang, C. Zhang, G.S. Rose, Y. Pino, O. Sinanoglu, R. Karri, “Fault Analysis-based Logic Encryption,” IEEE Transactions on Computers, Vol. 64, Issue 2, pp. 410-424, 2013. [7] J.A. Roy, F. Koushanfar, I.L. Markov, “Protecting Bus-based Hardware IP by Secret Sharing,” In Proc. DAC, pp. 846-851, 2008. [8] S. Zamanzadeh, A. Jahanian, “Automatic Netlist Scrambling Methodology in ASIC Design Flow to Hinder the Reverse Engineering,” In Proc. VLSI-SoC, pp. 52-53, 2013. [9] J. Zhang, “A Practical Logic Obfuscation Technique for Hardware Security,” IEEE Transactions on VLSI, Vol. 24, Issue 3, pp. 1193-1197, 2016. [10] A. Baumgarten, A. Tyagi, J. Zambreno, “Preventing IC Piracy Using Reconfigurable Logic Barriers,” IEEE Design & Test of Computers, Vol. 27, Issue 1, pp. 66-75, 2010. [11] K. Juretues, I. Savidis, “Reduced Overhead Gate Level Logic Encryption,” In Proc. GLSVLSI, 2016. [12] A. Morgenshtein, A. Fish, I.A. Wagner, “Gate-Diffusion Input (GDI): A Power-Efficient Method for Digital Combinatorial Circuits,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 10, No. 5, 2002. [13] Predictive Technology Model (PTM), Available online at: http://ptm.asu.edu.
Paper Title | : | Satellite-Based AIS for Improved Navigation and Maritime Safety - STUDSAT-2 |
Authors | : | Guruprasad C Kulkarni, Pooja K P, Raghuveer H G, Puneeth G P, N Charan |
Affiliations | : | 1,2Research Associate, Team STUDSAT, Dept. of ECE, NMIT, Bangalore, Karnataka, India. : 3, 4, 5: Student, Team STUDSAT, Dept. of CSE, NMIT, Bangalore, Karnataka, India. |
Abstract | : | Automatic Identification System is designed to prevent water automobiles like ships and corvettes from colliding, by allowing them to know the exact location of ships at sea which has a danger of Collision over the track of vessel. AIS is the discrete method used by all Sailors for exchanging their co-ordinates using SOTDMA for collision avoidance over the track. This paper discusses AIS message transmission and Reception and how it can be used for realizing traffic control in Maritime. In this paper, we show how GMSK Modulation and NRZI encoding techniques can be used for transmission of a signal from AIS Transmitter in Satellite to the receiver in the ground station. The ground station thus will have an extensive database of such received AIS Messages which are decoded at ground station end system level. |
![]() | : | 10.22362/ijcert/2020/v7/i07/v7i0705 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i07/v7i0705 |
[1] http://cdn2.hubspot.net/hub/183611/file-967076079-pdf/Collateral_for_Download/Satellite_AIS_For_Dummies_E-book.pdf [2] https://www.tutorialspoint.com/digital_communication/digital_communication_data_encoding_techniques.htm [3] https://www.electronics-notes.com/articles/radio/modulation/what-is-gmsk-gaussian-minimum-shift-keying.php [4] "Understanding the JD Edwards EnterpriseOne Application Interface Services (AIS) Server "https://docs.oracle.com/cd/E53430_01/EOIIS /aisguide_intro.htm#EOIIS134 [5] "BSSV or AIS: How to Choose the Right One for Your Business" https://www.suretysystems.com/insights/jd-edwards-bssv-or-ais-server/ [6] Chandra Dayan - Academia.eduwww.academia.edu › satelite_AIS, " https://www.academia.edu/9209557/satelite_AIS" [7] Frontier Computing: Theory, Technologies and Applications FC, [8] Design and development of 3-axis reaction wheel for ieeexplore.ieee.org›document, " https://ieeexplore.ieee.org/document/7119181" [9] http://www.allaboutais.com/index.php/en/technical-info/transmission-types/105-ais-technicals/technical-lfundamentals/93-sotdma [10] Data Encoding Techniques - "https://www.tutorialspoint.com/digital_ communication/digital_communication_data_encoding_techniques. htm" [11] Digital Communication Data Encoding Techniques - " https://www.scribd.com/document/394988564/Digital-Communication-Data-Encoding-Techniques" [12] Gaussian Minimum Shift Keying - " https://www.electronics-notes.com/articles/radio/modulation/what-is-gmsk-gaussian-minimum-shift-keying.php
Paper Title | : | NISSC: A New Information Security System Using Cryptography |
Authors | : | Ira Nath, Avijit Baidya, Sajal Kumar Biswas, Snehartha Dam, Kabita Singha |
Affiliations | : | 1,2,3,4 &5Computer Science and Engineering, JISCE, Kalyani, Nadia, West Bengal, India, 741235 |
Abstract | : | When we talk one to one that is called human language that is called plain text or normal text. When we talk in normal text or plain text, then all human can understand this text or language easily. That is why we create a cryptography security system to convert this plain text to cipher text. In this security system, we use both number and English alphabet for encryption and decryption the text to hide the plain text. In this security system encryption is mainly depend upon the key generation. The main goal of this security system is to convert simple message or text to non-readable text to secure the messages from hackers; this is called decryption. In this project, at first we find the ASCII value and binary value of the number and alphabet then after all calculation of this value we find the encrypted value and using this value we find decrypted value. In this project, we use RSA and DES and Cryptography for doing encryption and decryption. Moreover, use the ASCII number. In improvement, we complete the whole key generation and encryption and decryption process, which will take linear time. |
![]() | : | 10.22362/ijcert/2020/v7/i07/v7i0704 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i07/v7i0704 |
[1] Liddell, Henry George; Scott, Robert; Jones, Henry Stuart; McKenzie, Roderick (1984). A Greek-English Lexicon.Oxford University Press. [2] David Naccache, “Cryptography and Security: From Theory to Applications”, Springer, 2012. [3] H.B. Pethe, Dr S. R. Pande, “An overview of Cryptographic Hash Function M-5 and SHA”, IOSR-JCE, 2016. [4] Ius Mentis: Law and technology explained, "The MD5 cryptographic hash function", October 1, 2005. [5] Alok Kumar Kasgar, Mukesh Kumar Dhariwal, NeerajnTantubay, HinaMalviya, “A Review Paper of Message Digest 5 (MD5)”, IJMEMR, Volume1, Issue 4, December 2013, ISSN: 2320- 9984 (Online). [6] EvgenyMilanov, “The RSA Algorithm”, June, 2009. [7] AviKak, “Public-Key Cryptography and the RSA Algorithm”, Lecture Notes on “Computer and Network Security”, February 16, 2017. [8] William Stallings, “Cryptography and Network Security: Principles and Practices”, Publisher: Prentice Hall, November 16, 2005, Pages-592. [9] Nath, Ira. "NHSKCA: A New Heuristic for Symmetric Key Cryptographic Algorithm." Ira Nath, Deepashree Bhattacharyya AgnisuddhaMandal, NandiniKundu and Oindrila De (2017). NHSKCA: A NEW HEURISTIC FOR SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM. International Journal of Computer Engineering in Research Trends 4, no. 12 (2017): 547-553.
Paper Title | : | Abridgement of Business Data Drilling with the Natural Selection and Recasting Breakthrough:Drill Data With GA |
Authors | : | Sritha Zith Dey Babu, Digvijay Pandey, Vipul Narayan, Abdullah Al Zubayer, Ismail Sheik |
Affiliations | : | 1*Computer Science and Engineering, Chittagong Independent University, Chittagong, Bangladesh; 2 :Department of Technical Education, Kanpur, India 3: M .M.M University of Technology, Gorakhpur, India ; 4:Department of Sociology, University of Barishal, Bangladesh 5: Management College of Southern Africa, Durban, South Africa |
Abstract | : | We know about data visualization in business sectors where the graph of a company is now crying for the looker. But, companies are compromising very much with this option and looker don't have any clue to see the per day graph of a company. If one can improvise this option, the looker can get great satisfaction while buying a particular product from the company. This feature can also give a fair marketing policy to the buyers with the sight of any product's proper fitness. Many companies are now using the commence streaming of data by which customers are now getting advantages and sellers. But, for daily purposes, we need to execute drill through the process with an evolutionary algorithm. For pursuing the green era for the marketing field, we need to put the omnipotent values for data analysis. The procedure will make the look towards the HAR method, which one already been executed in business research. Here, we recast the technique with different shadows. This paper shows the golden doors of the green, economic arena where their lookers can get direct access to the database. We aim to show the suasory of the bridge between computer science and business. Now, it's clear to understand that this paper will show the pathway of "Profit and increase exponentially."The objectives of this paper are to create a sustainable strategy in the field of business where we can quickly improve the data analysation part of any business sector. This paper always directs the simple home science pathway for improving business analysation which can help the entrepreneurs of starting any business such as e-commerce with less fund. |
![]() | : | 10.22362/ijcert/2020/v7/i07/v7i0703 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i07/v7i0703 |
[1] Earnshaw R. Data Science. InData Science and Visual Computing 2019 (pp. 1-10). Springer, Cham. [2] Gowrishankar S, Veena A, Gowrishankar S, Veena A, Gowrishankar S, Veena A. Introduction to Data Science. Introduction to Python Programming 2019 (pp. xiii-xiv). CRC Press. [3] Blei DM, Smyth P. Science and data science. Proceedings of the National Academy of Sciences. 2017 Aug 15;114(33):8689-92. [4] Wu X, Zhu X. Member, S.(2014). Data mining with big data. IEEE Transactions on Knowledge and Data Engineering.;26(1):97-107. [5] Skiena SS. The data science design manual. Springer; 2017 Jul 1. [6] Kruschke JK. Bayesian data analysis. Wiley Interdisciplinary Reviews: Cognitive Science. 2010 Sep;1(5):658-76. [7] Donoho D. 50 years of data science. Journal of Computational and Graphical Statistics. 2017 Oct 2;26(4):745-66. [8] Petersen AM, Pan RK, Pammolli F, Fortunato S. Methods to account for citation inflation in research evaluation. Research Policy. 2019 Sep 1;48(7):1855-65.
Paper Title | : | Automated Human Following Trolley Using Image and Video Processing |
Authors | : | B Honnaraju, H Hemanth Bharath Bhushan, L Hemanth Raj, T C Kishore, V Likhith |
Affiliations | : | Department of CSE, Maharaja Institute of Technology Mysore, Visvesvaraya Technological University, Belagavi, India |
Abstract | : | In today's world, the trolleys are used in most places like a shopping mall, hospitals, colleges, etc., and everything is manually operated using their physical strength. This paper proposes an automated human following trolley using the image and video processing. The HSV value of the image taken from the camera will be calculated. If it matches the valid sticker's value, then the trolley will follow that person who has a specific sticker by maintaining a constant distance from that person. The distance estimation technique is used to calculate the distance between the user and the trolley. Background subtraction algorithm is used for recognition and detection purposes. The basic model of the following human trolley was designed, and it was tested under various lighting conditions and verified the correctness of background subtraction by keeping invalid stickers. The designed model was confined with a boundary like hospitals and shopping malls. The same approach with some improvements could be used in other fields like schools and colleges, libraries, agricultural fields, war fields, etc. |
![]() | : | 10.22362/ijcert/2020/v7/i07/v7i0702 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i07/v7i0702 |
[1]. S N Joshi, V K patki, P S deekshith, H K baldhaar, “Design and Development of Human Following Trolley” International Journal of Innovative Science and Research Technology (IJISRT), Vol. 4, Issue. 4, PP 222-225, 2019. [2] D Iravan, Misbha, J R Baihaqi, “Design of Human Followers Trolley Robot Based on Object Tracking (Colour Detection) Method”, International Journal of Engineering Research and Advanced Technology (IJERAT), Vol. 5, Issue. 3, PP 15-23, 2019. [3] S Lokesh, J Antony, G Vijayalakshmi, “Trolley Followers for Hypermarkets”, International Journal of Advance Research and Innovative Ideas in Education (IJARIIE), Vol. 4, Issue. 2, PP 564-569, 2018. [4] M Banusundareshwari, R Santosh Vishnu, G Goushik, S Prakash, S Arvinth, “Automation of Shopping Cart Using Raspberry pi”, Student Journal of Electrical and Electronics Enigineering (Student JEEE), Vol. 4, Issue. 1, PP 25-28, 2018. [5] L S Y Dehigaspege, M K C Liyanage, N A M Liyanage, M I Marzook, D dhammearatchi, “Follow Me Multifunctional Automated Trolley”, International Journal of Engineering Research and Technology (IJERT), Vol. 6, Issue. 7, 2017. [6] N G YenLeng, ChengSiongLim, K A Danapalasingam, M L PengTan, C WeiTan, “Automatic Human Guided Shoppinf Trolley with Smart Shopping System”, Journal Technology (Science and Engineering), Vol. 73, Issue. 3, PP 49-56, 2015. [7] S Patil, A Mahale, A Landge, A Mahajan, “Smart Trolley”, International journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Vol. 5, Issue. 3, PP 1011-1015, 2016. [8] B Ilias, R Nagarajan, M Murgappan, K Helmy, A S Awang Omar, M A Abdul Rahman, “Hospital Nurse Following Robot”, International Journal of Medical Engineering and Informatics (IJMEI), Vol. 6, Issue. 1, PP 1-13, 2014. [9] M Kumar, J Singh, Anju, S Varun, “Smart Trolley with Instant Billing to Queues at Shopping Malls using ARM 7 LPC 2148”, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Vol. 4, Issue. 8, PP 39-42, 2015. [10] C Akshay, B Ashwini, B Pradnia, J Uddhav, “Follwer Robotic Cart using Ultra-Sonic Sensor”, International Journal of Engineering Science and Computing (IJESC), Vol. 7, Issue. 3, PP 5794-5797, 2017. [11] K Akhila, P Sampath Kumar "Smart Phone Based Robotic ARM Control using Raspberry Pi and wi-fi", International Journal of Advanced Technology and Innovative Research (IJATIR), Vol. 8, Issue. 10, PP 1930-1932, 2016.
Paper Title | : | Computer succoured prognosis of Brain knob spotting and histogram enhancement using Fuzzification |
Authors | : | Sritha Zith Dey Babu, Digvijay Pandey, Vipul Narayan, , |
Affiliations | : | 1*Computer science and engineering, Chittagong Independent University, Chittagong, Bangladesh ,2 :Department of Technical Education, I.E.T., Lucknow, India 3 : M.M.M University of Technology, Gorakhpur, India |
Abstract | : | Brain cancer has rapidly occurred in many medical arenas. The tumour pandemic dangerously infects the health and well-being of the natural population. In this proposed pathway, Fuzzification with the Picture enhancement approach has acted. The clicked Picture contains noises of brain cancer that cannot directly proceed for diagnosis. The clicked Picture includes a sound of dizzy and blurred Pictures. However, the objective of this paper to overcome this problem and to get a high-level picture from aggregated panoramic with image processing methodology. For extracting Pictures, the division has acted to split up the clicked values to samples. Fuzzification targets the infected areas of brain cells for better classification. But, before dividing, extraction has to performed to remove out the noises of Picture. It has performed with train data set and a highly accurate Picture. It has performed using a neighbour equality algorithm classifier. This methodology helps clinical doctors to get the best prediction. The motive of this system is to put improvisation of the effectivity of the classifier and also the efficiency. According to this method can reduce the (N.R.) negative right rate. The findings of the paper are that now clinical doctors can get some help about detection, and also we have improved the image processing system with straightforward methodology. |
![]() | : | 10.22362/ijcert/2020/v7/i07/v7i0701 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i07/v7i0701 |
[1] Kut C, Chaichana KL, Xi J, Raza SM, Ye X, McVeigh ER, Rodriguez FJ, Quiñones-Hinojosa A, Li X. Detection of human brain cancer infiltration ex vivo and in vivo using quantitative optical coherence tomography. Science translational medicine. 2015 Jun 17;7(292):292ra100-. [2] Jermyn M, Mok K, Mercier J, Desroches J, Pichette J, Saint-Arnaud K, Bernstein L, Guiot MC, Petrecca K, Leblond F. Intraoperative brain cancer detection with Raman spectroscopy in humans. Science translational medicine. 2015 Feb 11;7(274):274ra19-. [3] Yuan W, Kut C, Liang W, Li X. Robust and fast characterization of OCT-based optical attenuation using a novel frequency-domain algorithm for brain cancer detection. Scientific reports. 2017 Mar 22;7:44909. [4] Jermyn M, Desroches J, Mercier J, Tremblay MA, St-Arnaud K, Guiot MC, Petrecca K, Leblond F. Neural networks improve brain cancer detection with Raman spectroscopy in the presence of operating room light artifacts. Journal of biomedical optics. 2016 Sep;21(9):094002. [5] Lazcano R, Madroñal D, Salvador R, Desnos K, Pelcat M, Guerra R, Fabelo H, Ortega S, López S, Callicó GM, Juarez E. Porting a PCA-based hyperspectral image dimensionality reduction algorithm for brain cancer detection on a manycore architecture. Journal of Systems Architecture. 2017 Jun 1;77:101-11. [6] Fabelo H, Ortega S, Kabwama S, Callico GM, Bulters D, Szolna A, Pineiro JF, Sarmiento R. HELICoiD project: A new use of hyperspectral imaging for brain cancer detection in real-time during neurosurgical operations. InHyperspectral Imaging Sensors: Innovative Applications and Sensor Standards 2016 2016 May 10 (Vol. 9860, p. 986002). International Society for Optics and Photonics. [7] Franchino F, Rudà R, Soffietti R. Mechanisms and therapy for cancer metastasis to the Brain. Frontiers in oncology. 2018 May 24;8:161. [8] Koo YE, Reddy GR, Bhojani M, Schneider R, Philbert MA, Rehemtulla A, Ross BD, Kopelman R. Brain cancer diagnosis and therapy with nanoplatforms. Advanced drug delivery reviews. 2006 Dec 1;58(14):1556-77. [9] Fabelo H, Ortega S, Ravi D, Kiran BR, Sosa C, Bulters D, Callicó GM, Bulstrode H, Szolna A, Piñeiro JF, Kabwama S. Spatio-spectral classification of hyperspectral images for brain cancer detection during surgical operations. PLoS One. 2018 Mar 19;13(3):e0193721. [10] Kateb B, Ryan MA, Homer ML, Lara LM, Yin Y, Higa K, Chen MY. Sniffing out Cancer using the J.P.L. electronic nose: A pilot study of a novel approach to detection and differentiation of brain cancer. NeuroImage. 2009 Aug 1;47:T5-9.
Paper Title | : | Dynamic Crop-yield and Price Forecasting using Machine Learning |
Authors | : | Chaitra Kotnikall, Jayateerth Vadavi, , , |
Affiliations | : | 1*Student, Dept. Of CSE, Shri Dharmasthala Manjunatheshwara College of Engineering, Dharwad, India. 2: Associate Professor, Dept. Of CSE, Shri Dharmasthala Manjunatheshwara College of Engineering, Dharwad, India. |
Abstract | : | Background: Guaranteeing food profitability is a significant issue for creating nations like India, where more than 33% of the individuals is live in neediness. To estimate cost, there is no system in place to advise farmers what crops to grow. Hence, this paper explains the attempt to predict crop price that a farmer can obtain from his land by analyzing patterns in past data. Methods/Statistical analysis: This method makes use of several data such as rainfall, temperature, market prices, and past yield of a crop. The supervised machine learning algorithm, namely, the Decision tree algorithm and analyse the data and predict for the new set of data, is implemented. It also predicts the price and the gain for the next twelve months over the past twelve months and gives the time series analysis of the same. Findings: The proposed model is developed to help farmers make better decisions concerning which crop is most suitable during his desired time of sowing and the location. This System predicts the yield and price of the crop of choice, giving the farmer useful information well before starting the process of cultivation. Improvements: The System can introduce and make available climate-aware cognitive farming techniques and identifying systems of crop monitoring, early warning on pest/disease outbreak based on advanced AI innovation. |
![]() | : | 10.22362/ijcert/2020/v7/i06/v7i0607 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i06/v7i0607 |
[1] S. Kulkarni, S. N. Mandal, G. S. Sharma, M. R. Mundada and Meeradevi, "Predictive Analysis to Improve Crop Yield Using a Neural Network Model," 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, 2018, pp. 74-79. [2] S. V. Bhosale, R. A. Thombare, P. G. Dhemey and A. N. Chaudhari, "Crop Yield Prediction Using Data Analytics and Hybrid Approach," 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India, 2018, pp. 1-5. [3] T. Siddique, D. Barua, Z. Ferdous and A. Chakrabarty, "Automated farming prediction," 2017 Intelligent Systems Conference (IntelliSys), London, 2017, pp. 757-763. [4] S. Bhanumathi, M. Vineeth and N. Rohit, "Crop Yield Prediction and Efficient use of Fertilizers," 2019 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 2019, pp. 0769-0773. [5] P. Bose, N. K. Kasabov, L. Bruzzone and R. N. Hartono, "Spiking Neural Networks for Crop Yield Estimation Based on Spatiotemporal Analysis of Image Time Series," in IEEE Transactions on Geoscience and Remote Sensing, vol. 54, no. 11, pp. 6563-6573, Nov. 2016. [6] N. Hemageetha and G. M. Nasira, "Radial Basis Function Model for Vegetable Price Prediction", International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 424-428, 2013 [7] Yung-Hsing Peng, Chin-shun Hsu, and Po-Chuang Huang, "An investigation of Spatial approaches for crop price forecasting in different Taiwan markets",2015. [8] Prof A K Mariappah and J Austin Ben Das, "A Paradigm for rice yield prediction in Tamil Nadu", IEEE International Conference on Technological Innovations in ICT For Agriculture and Rural Development (TIAR), pp. 18-21, 2017. [9] J. Hartigan, Clustering Algorithms, John Wiles & Sons, New York, 1975. [10] Fagerlund S Bird species recognition using Support Vector Machines. EURASIP J Adv Signal Processing, Article ID 38637, p 8, 2007. [11] Holmgren P, Thuresson T Satellite remote sensing for forestry planning: a review. Scand J for Res 13(1):90– 110, 1998. [12] Das KC, Evans MD Detecting fertility of hatching eggs using machine vision II: Neural Network classifiers. Trans ASAE 35(6):2035–2041, 1992.
Paper Title | : | Semantic & Behavioral Feature analysis for Detecting Fake Reviews using Machine Learning |
Authors | : | Anjali S Dilliwala, Raghavendra G S, , , |
Affiliations | : | 1*Student, Dept. Of CSE, Shri Dharmasthala Manjunatheshwara College of Engineering, Dharwad, India. 2: Professor, Dept. Of CSE, Shri Dharmasthala Manjunatheshwara College of Engineering, Dharwad, India. |
Abstract | : | Background: In this age of technology, online business is playing a vital role in the growth of the economy of the business. Hence, people need feedback on various products, technologies, businesses, etc. Since their opinions are the input for an individual to evaluate and adapt them. Therefore, the Review system is playing a vital role in decision making. So there arises a necessity to evaluate the reviews as well since the business units are trying to generate fake reviews to identify more clients for their products. Methods/ Statistical Analysis: In this paper, we implement two machine learning algorithms SVM and Naïve Bayes algorithm and analyse the data and predict for the new set of data. We also compare the performance of both algorithms. Findings: In this paper, we are trying to develop a Machine learning model which analyses the reviews on various factors and obtain the necessary features and classify the reviews as a fake or non-fake review. This helps in identifying fraudulent reviews and predicts the trustworthiness of the reviews in the future. Improvements: The system can introduce and make available Machine learning techniques and identifying fake reviews at the earliest stage. |
![]() | : | 10.22362/ijcert/2020/v7/i06/v7i0606 |
DOI Link | : | https://doi.org/110.22362/ijcert/2020/v7/i06/v7i0606 |
[1] Esposito, Gennaro. LP-type methods for Optimal Transductive SVMs. Vol. 3. Gennaro Esposito, PhD, 2014. [2] N. Jindal and B. Liu, "Review spam detection", Proceedings of the 16th international conference on World Wide Web - WWW 07 (2007), ACM, pp. 1189–1190, 2007 [3] Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey T. Hancock. Finding deceptive opinion spam by any stretch of the imagination. Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1, HLT, 2011. [4] S. Xie, G. Wang, S. Lin, and P. S. Yu, "Review spam detection via temporal pattern discovery," p. 823, 2012. [5] W. Etaiwi,G.Naymat, "The impact of applying pre-processing steps on review spam detection", The 8th international conference on emerging ubiquitous system and pervasion networks, Elsevier, pp. 273-279, 2017. [6] P.Rosso, D.Cabrera, M. Gomez, "Detecting positive and negative deceptive opinions using PU-learning", Elsevier, pp.1-11, 2014. [7] S. Feng, L. Xing, A Gogar and Y. Choi, "Distributional footprints of deceptive product reviews". In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media (ICWSM), pp. 98- 105, 2012. [8] M. I. Ahsan, T. Nahian, A. A. Kafi, M. I. Hossain, and F. M. Shah, "Review spam detection using active learning," 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2016. [9] M. Singh, L. Kumar, and S. Sinha, "Model for Detecting Fake or Spam Reviews," Advances in Intelligent Systems and Computing ICT Based Innovations, pp. 213–217, Jan. 2017.
Paper Title | : | Repair and Rehabilitation of Fireside Damaged Concrete Structure |
Authors | : | Arun, Hardik Dhull, , , |
Affiliations | : | 1*,2: Department Of Civil Engineering , Matu Ram Institute Of Engineering and Management, Rohtak(Hr), India Affiliated by Maharishi Dayanand University, Rohtak. |
Abstract | : | This research work is completed to embrace the project work on rehabilitation and retrofitting of fireside damaged concrete buildings. This study explains the rehab process of fireside damaged concrete buildings in three basic categories; condition evaluation, higher cognitive process, rehabilitation & retrofitting. Evaluation method of damaged building has been based upon understanding of fabric properties at elevated temperatures, condition survey and condition assessment. Condition survey includes visual inspection, hammering and chiselling techniques whereas condition assessment includes both non-destructive and destructive tests that are selected upon the premise of efficiency, economy, and performance. Feasibility study is required to form right decisions for the rehab of fireside damaged building. Such a feasibility study should include all important aspects which will have a control within the future, therefore must be considered in higher cognitive process. The method and testing procedures can be used to evaluate the level of damage and feasibility of repair needed. The evaluation can be used to whether to repair or to demolish the structure |
![]() | : | 10.22362/ijcert/2020/v7/i06/v7i0605 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i06/v7i0605 |
[1] "Handbook On repair and Rehabilitation of RCC Buildings", Published by Director General (Works), General Public Works Department, Government of India, 2002. [2] H.U. Zaman, "Retrofitting and Rehabilitation of High Rise Fire Damaged Concrete Building", Master Thesis, Study Course Construction and Real Estate Management ,September 2014 [3] CPWD, India: Handbook of repair and rehabilitation of R.C.C buildings. 2002, [4] Concrete Society: Assessment, Design and Repair of Fire-damaged Concrete Structures. Technical Report No. 68. 2008 [5] http://www.engineeringcivil.com/visual-inspection-of-concrete-structure.html [6] Introduction to the fire safety engineering of structures.2007 [7] Reinforced concrete jacketing of existing structures. 1992.
Paper Title | : | Review Analysis & Enlightening Entity about Green Buildings |
Authors | : | Mukul Attri, Nitu, , , |
Affiliations | : | 1 & 2: Civil department, Matu Ram Institute of Engineering and Management, MDU, Rohtak, Haryana, INDIA |
Abstract | : | The Increase in the level of pollution, global warming, and the effect of greenhouse gases resulted in an urgent need of sustainable green building technology. The methodology adopted is to spread awareness among the entity about green buildings and save cost for them for a long term. In this various case studies are thoroughly studied along with which a site is selected, than the overall quantity estimation is done, than from the market studies cost analysis is prepared and we compare a new green building with the traditional building. We found that the developed nations like U.S.A, U.K, and Russia had already made certain rules and regulations regarding eco-friendly development and the developing nations like India, Pakistan, and Bangladesh are trying to achieve a sustainable development. This paper shows the need of green building as a sustainable development all over the globe especially in developing countries. This case study selects a residential house which is constructed as per the green structure norms in the state of Haryana in India. As India is the second largest populated nation in the world with its 68.84% of total population living in villages (according to 2011 census of India).This paper helps villagers of India to construct and implement simple, sustainable and economic techniques for construction of their residential houses which also results in developing India rapidly. |
![]() | : | 10.22362/ijcert/2020/v7/i06/v7i0604 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i06/v7i0604 |
[1] “The economic benefits of green building-year book” 2009-10, Australia Bureau of statics, Canberra, Australia; 2010 [2] T.Ramesh, Ravi Prakash, KK Shukla, “Life cycle energy analysis of buildings” [3] US energy information administration, “Life cycle assessment of the building materials outlook 2010” [4] of integrated analysis and forecasting, US Department of Energy, Washington, DC 20585; 2010 [5] JianZuo and Zhen Yu Zhao, “Renewable and sustainable energy reviews-ELSEVIER” (2013) [6] Ignacio Zabalza Bribian, Antonio Valero Capilla, “Life cycle assessment of building materials” [7] Omer Tatari; Murat Kucukvar, “Cost premium prediction of certified green building” [8] Berkeley program on housing and urban policy; Eichholtz, piet: Maastricht University [9] Guy R, Newsham, Sandra Mancini, Do LEED-certified buildings save energy? Yes, but…
Paper Title | : | Learners’ Perception of Virtual Learning Amidst COVID-19 |
Authors | : | Dr. Intakhab Alam Khan, , , , |
Affiliations | : | Faculty of Applied Studies, King Abdulaziz University, Jeddah- Saudi Arabia, |
Abstract | : | Background: paper intends to explore students’ perceptions of virtual learning amidst COVID-19. It also elicits information about an alternative e-learning strategy which is perhaps the only option left after an official call for social distancing. The research was initially undertaken to find out the pedagogic relevance of virtual learning as a novel teaching strategy. Hence it is essential to mention that King Abdul-Aziz university-Jeddah has been utilizing technology and e-learning/blended learning technique for around 11 years. Method of the study The study is qualitative-descriptive. Data collected through an adapted questionnaire was qualitatively analysed to achieve the research objectives. The sample was taken from a government university in Saudi Arabia. Findings & Conclusions The results show that many students think distance or e-learning was a good experience. However, they felt a lot other personal, pedagogic and technical issues. All of them agreed that distance learning as a mode of education could be both useful and innovative, yet it poses many challenges during successful implementation for achievement of objectives. Implications Based on the findings the researcher recommends that distance learning can be made more relevant, effective and quality - oriented if teachers are well trained, students are motivated and administration is supportive. |
![]() | : | 10.22362/ijcert/2020/v7/i06/v7i0603 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i06/v7i0603 |
Adler, R. W., Milne, M. J. & Stablein, R. Situated motivation: An empirical test in an accounting class. Canadian Journal of Administrative Sciences, 18(2), 101-116,2001. Al-Asmari, A.R. Evaluating the Prospects of Integrating Technology in Pre-service EFL Teacher Training. Arab World English Journal. 2(2)133–166.2011 Al-Qahtani AAY, Higgins SE. Effects of traditional, blended and e-learning on students_ achievement in higher education. Journal of Computer Assisted Learning. 29(3)220–234,2013 Al-Shehri AM. E-learning in Saudi Arabia: To E or not to E, that is the question. J Family Community Med. 17(3)147–150,2010 Allo, M.D.G. Is the online learning good in the midst of Covid-19 Pandemic? The case of EFL learners, Jurnal Sinestesia, Vol. 10(1), 2020 (https://sinestesia.pustaka.my.id/journal/article/view/24 1) Benbunan-Fich, R. & Starr, R. H. Mediators of the effectiveness of online courses. IEEE Transactions on Professional Communication, 46(4), 296-312,2003. Brass, K. Pushing E-learning. Sales and Marketing Management, 154(3), 56,2002. Burke, L. A. & Moore, J. E. A perennial dilemma in OB education: Engaging the traditional student. Academy of Management Learning & Education, 2(1), 37-53,2003. Buzzetto-More N. A. Student perceptions of various e-learning components. Interdisciplinary Journal of E-Learning and Learning Objects, Vol. 4.,2008. Retrieved November 9, 2015 from www.ijello.org/Volume4/IJELLOv4p113-135Buzzetto413.pdf Buzzetto-More, N. Student attitudes towards the integration of youtube in online, hybrid, and web-assisted courses: An examination of the impact of course modality on perception. MERLOT Journal of Online Learning and Teaching Vol. 11(1)2015. Retrieved November 10, 2015 from http://jolt.merlot.org/vol11no1/Buzzetto- More_0315.pdf Geiger, M. A. & Cooper, E. A. Using expectancy theory to assess student motivation. Issues in Accounting Education, 11(1), 113-125,1996. Golladay, R., Prybutok, V. & Huff, R. Critical success factors for the online learner. Journal of Computer Information Systems, 40(4), 69-71,2000. Khan, I.A. Effectiveness of E-learning for the Teaching of English: A Study of Comparative Strategies. Advances in Language and Literary Studies, 7(3): 126-27,2016 Khan, I.A. Electronic Learning Management System: Relevance, Challenges and Preparedness, JETIR, Volume 7(5)p471, 2020 Kocur, D., & Kosc, P. E-learning Implementation in Higher Education. Acta_Electrotechnica et Informatica, Vol. 9, No. 1, pp20-26,2009. Mamattah, R.S. Students’ Perceptions of E-Learning. Master dissertation, Linköping University , Department of Behavioural Sciences and Learning, LIU-IBL/IMPALGC-A—16/005-SE, 2016. Masrom, M. Technology acceptance model and e-learning. In: 12th International Conference on Education, 21-24, May 2007, Sultan Hassanal Bolkiah Institute of Education, Universiti Brunei Darussalam http://eprints.utm.my/5482/1/MaslinMasrom2006_Techn.pdf McDonald, D. Improved training methods through the use of multimedia technology. Journal of Computer Information Systems, 40(2), 17-20,1999-2000 McEwen, T. Communication training in corporate settings: Lessons and opportunities for the academe. Mid-American Journal of Business, 12(1), 49-58, 1997. McKeachie, W. McKeachie’s Teaching Tips: Strategies, Research, and Theory for College and University Teachers (11th ed.). Boston, MA: Houghton Mifflin.p.19,2002. Mirza A.A. Is E-Learning finally gaining legitimacy in Saudi Arabia? Applied Computing and Informatics. 6(2),2008. Rubin, B and Fernandes, R. “The teacher as leader: effect of teaching behaviors on class community and agreement,” International Review of Research in Open and Online Learning, vol. 14(5), 2013, http://www.irrodl.org/index.php/irrodl/article/view/1510/2707. Serwatka, J. Assessment in on-line CIS courses. Journal of Computer Information Systems, 43(3), 16-20,2003 Smart, K. L., & Cappel, J. J. Students’ perceptions of online learning: A comparative study. Journal of Information Technology Education, Volume 5, 2006. Retrieved November 9, 2015 from http://jite.org/documents/Vol5/v5p201-219Smart54.pdf
Paper Title | : | Workplace Sex Bias and Employees Opinion: A Study about India Perspective |
Authors | : | Deepa Sharma, Dr. C. Venkateswaran, , , |
Affiliations | : | 1 & 2: Dept. Management, Maharishi Markandeshwar (Deemed to be University), Mullana, India |
Abstract | : | Background/Objectives: In this paper, we examination include relatives from a distributed and unpublished investigation from around the globe to survey associates of apparent work environment sexual orientation segregation that have critical ramifications for representatives. Methods/Statistical analysis: In this paper Quota sampling technique to be used. In this paper, three variables should be used to meet the objectives. These are controlled variables, dependent variables and Independent variables define in this paper. Sample size should be taken 120. Questionnaires will be divided into three segments mentally stress, family conflict and job satisfaction for estimation of dependent variables to be used appropriate statistical tools. Findings: Our finding of this paper mentally stresses factors remembered to study about include mental indications and judgements of psychological conditions, sickness, what’s more, aliments estimated utilizing different clinical lists and wellbeing markers. We characterize the physical wellbeing as one’s capacity to genuinely work and perform workday today exercises without limitations. Improvements/Applications: Seen sexual orientations separations is related to sparse representatives occupations perspectives, physical wellbeing results and practices |
![]() | : | 10.22362/ijcert/2020/v7/i07/v7i0602 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i06/v7i0602 |
[1] Heilman E. Madeline, 2012, Gender stereotypes and workplace bias, www.sciencedirect.com, Research in Organizational Behavior 32 (2012) 113–135. [2] Buchanan, N. T. 2002. Examining the impact of racial harassment on sexually harassed African American women, Doctoral dissertation. Retrieved from Proudest Dissertations and Theses database. (UMI No. 3070268). [3] Lake, S. T., & Taylor, S. E. (1991). Social cognition (2nd Ed.). New York, NY/England: McGraw Hill Book Company. [4] Fudge, K., Beignet, M., Haines, E., & Daub, K. (2004). Mothers and fathers in the workplace: How gender and parental status influence judgments of job-related competence. Journal of Social Issues, 60(4), 737–754. [5] Gauche, D (2011). Evidence that gendered wording in job advertisements exists and sustains gender inequality. Journal of Personality and Social Psychology, 101, 109–128. [6] Erich, C. G., & Crawford, M. S. (1998). Sex stereotyping in the executive suite: ‘‘Much ado about something’’. Journal of Social Behavior and Personality, 13, 127–138. [7] Matschiner, M., & Mermen, S. K. (1999). Hyper femininity and influence. Psychology of Women Quarterly, 23, 342–631. [8] N. P., & Motowidlo, S. J. (1995). Effects of rater accountability on the accuracy and the favorability of performance ratings. Journal of Applied Psychology, 80, 524–527. [9] Anna, A. L. (2003). Effects of accountability on rating behavior and rater accuracy. Journal of Applied Social Psychology, 33, 2493–2514. [10] Reusing, C. A., Peen, J. E., & Rudman, L. A. (2010). When men break the gender rules: Status incongruity and backlash against modest men, Psychology of Men and Masculinity, 11, 140–151.
Paper Title | : | Diagnosing Chronic Obstructive Pulmonary Disease (COPD) Using Bayesian Belief Network |
Authors | : | Alile Solomon.O, Bello Moses.E, , , |
Affiliations | : | 1 &2 : Computer Science, Faculty of Physical Sciences, University of Benin, Benin City, Nigeria |
Abstract | : | Chronic Obstructive Pulmonary Disease (COPD) is a death-defying respiratory tract ailment that causes trouble in breathing which deteriorates after some time. COPD is an umbrella term used to order the amalgamation of Chronic Bronchitis and Emphysema. The manifestations of this infection are frequent coughing, fatigue, sweating, breathlessness, tiredness, weight loss, wheezing, fast heart rate, fast breathing and chest tightness just to name not many. This malady is pervasive with individuals whose age ranges from 30 or more and afterward arrives at its top in patients over 50. Because of the covering manifestations this malady imparts to other respiratory tract illnesses; it is in some cases under-analyzed and misdiagnosed a circumstance which is much uncontrolled in Sub-Sahara Africa. In time past, COPD has caused a large number of deaths overall yearly because of absence of early determination of the illness. In ongoing past, a few frameworks have been created to analyze this non-transmittable malady, yet they produced a ton of bogus negative during testing and couldn't identify COPD because of its covering side effects it imparts to other respiratory tract illnesses. Consequently, in this paper, we proposed and developed a model to foresee COPD utilizing an AI procedure called Bayesian Belief Network. The model was structured utilizing Bayes Server and tested with data gathered from COPD medical repository. The model had a general expectation precision of 99.98%; 99.79%, 95.91% and 98.39% sensitivity of COPD, Chronic Bronchitis and Emphysema in that order. |
![]() | : | 10.22362/ijcert/2020/v7/i06/v7i0601 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i06/v7i0601 |
[1] M.A. Zoroddu, J. Aashet, G. Crisponi, S. Medici, M. Peana and V.M. Nurchi, “The Essentials Metals for Humans: A Brief Overview”. Journal of Inorganic Biochemistry. 195:.DOI:10.1016/j.jinorgbio. 2019. pp.120-129. [2] GOLD Executive Committee, “Global Initiative for Chronic Obstructive Lung Disease (GOLD): Global Strategy for the Diagnosis, Management and Prevention of Chronic Obstructive Pulmonary Disease”. 2006 MCR Vision. Inc. pp. 1-15. [3] American Thoracic Society A. (2016): “Chronic Obstructive Pulmonary Disease (COPD)”. American Journal of Respiratory and Critical Care Medicine Vol.199 (1), pp. 1-2, 2019. [4] M. Varmaghani, M. Dehghani, E. Heidari, F. Sharifi, S.S. Moghaddam and F.Farzadfar,“Global Prevelence of Chronic Obstructive Pulmonary Disease: Systematic Review and Meta-Analysis”. Eastern Mediterranean Health Journal, Vol.25 (1), 2019. [5] World Health Organization, “Global Status Report Status Report on Non-Communicable Diseases 2010: Description of the Global Burden of NCDs, Their Risk Factors and Determinants”, April, 2011, ISBN: 978-92-4-156422-9, pp. 1-176. [6] S. Salvi, (2017): “The Silent Epidemic of COPD in Africa”. Lancet Global Health, Doi: 10.1016/S2214-109X(14)70359-6, 2015; 3(1), pp. e6-e7. [7] FIRS, “Respiratory Diseases in the World: Realities Today-Opportunities for Tomorrow”. 2013, ISBN: 978-1-84984-057-6, pp. 1-35. [8] D.A. Grant, P.J. Van Harrison, R., Othman, A., Roark, S.E., Han, M.K., Remington, T.L. (2017): “Chronic Obstructive Pulmonary Disease”. University of Michigan Hospitals and Health Centres, COPD Guideline, November 2017, pp. 1-28. [9] J.C. Hogg, F. Chu, , S. Utokaparch, W.M. Elliot, , L. Buzatu, , R.M. Cherniack, F.C. Sciurba, H.O, Coxson and P.D, Pare, “The Nature of Small Airway Obstruction in Chronic Obstructive Pulmonary Disease”. New England Journal of Medicine 2004; Vol. 350, pp. 2645–2653. [10] M. Zolnoori, M.H.F. Zarandi and M. Moin, "Fuzzy Rule-Base Expert System for Evaluation Possibility of Fatal Asthma". Journal of Health Informatics in Developing Countries, 2010, pp: 171-184. [11] I.C. Mary and J. Preethi, "A Survey on Computerized Detection, Quantification and Classification of Lung Disease". IJAICT Vol. 1(7), November 2014, Doi:01.0401/ijaict.2014.07.25, ISSN 2348–9928. pp. 631-634. [12] D. Sanchez-Morillo, M.A. Fernandez-Granero and A. Leon-Jimenez, “Use of Predictive Algorithms in-Home Monitoring of Chronic Obstructive Pulmonary Disease and Asthma: A Systematic Review”. Chronic Respiratory Disease 2016, Vol. 13(3), pp. 264–283. DOI: 10.1177/1479972316642365. [13] G. Gonzalez, S.Y. Ash, , G. Vegas-Sanchez-Ferrero, J.O. Onieva, F.N. Rahaghi, J.C. Ross, A. D?az, R.S.J. Estepar and G.R. Washko, “Disease Staging and Prognosis in Smokers Using Deep Learning in Chest Computed Tomography”. American Journal of Respiratory Critical Care Medicine, Vol. 197(2), Jan 15, 2018, pp. 193–203. DOI: 10.1164/rccm.201705-0860OC. [14] P. ShubhaDeepti, S.V.N.N. Rao, V.N. Kumar and Y.P. Sai, “Expert System using Artificial Neural Network for Chronic Respiratory Diseases”. ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, 2017, Vol.4 (9), pp. 6-14. [15] A. Badnjevic, L. Gurbeta and E. Custovic, “An Expert Diagnostic System to Automatically Identify Asthma and Chronic Obstructive Pulmonary Disease in Clinical Settings”. 8:11645 | DOI:10.1038/s41598-018-30116-2. 2018, pp. 1-9. [16] F. Braido, P. Santus, A.G. Corsico, F. Di Marco, G. Melioli, , N. Scichilone and P. Solidoro, “Chronic Obstructive Lung Disease “Expert System”: Validation of A Predictive Tool for Assisting Diagnosis”. International Journal of COPD, Vol.2018 (13), pp. 1747–1753. [17] R.H. Abiyev and M.K.S. Ma’aitah, “Deep Convolutional Neural Networks for Chest Diseases Detection”. Hindawi Journal of Healthcare Engineering Vol. 2018(4168538), pp.1-11. [18] S. Sathiya, G.Priyanka and S. Jeyanthi, “Detection of Chronic Obstructive Pulmonary Disease in Computer Aided Diagnosis System with CNN Classification”. International Journal of Pure and Applied Mathematics Vol. 119(12), 2018, pp. 13815-13822, Special Issue, ISSN: 1314-3395. [19] I. Ben-Gal, F. Ruggeri, F. Faltin, R. Kenett, “Bayesian Networks”. Encyclopedia of Statistics in Quality and Reliability. John Wiley and Sons, Ltd, 2007, pp. 1-6. [20] V. Cheplygina, I.P. Peña, J.H. Pedersen, D.A. Lynch, L. Sørensen and M. De Bruijne, “Transfer Learning for Multi-Center Classification of Chronic Obstructive Pulmonary Disease” International Journal of Biomedical and Health Informatics Vol. 22(5), 2018 pp. 1486-1496. DOI 10.1109/JBHI.2017.2769800.
Paper Title | : | Secure Authentication Mechanism in IoT Based Healthcare System |
Authors | : | Anita Chaudhari, Janice Rodrigues , Aparna Vattamparambil , Revati Warang, Vidya More |
Affiliations | : | Information Technology, St. John College of Engineering and Management, Mumbai University, India |
Abstract | : | In today's world, security is the most significant concern. We produce tons of data that must be unbroken secure. Be it our data or data associated with a transnational company. The data can be protected with the usage of authentication and authorization. Authentication and authorization help to verify and validate a user's identification. Applications in today's society are swaying towards IoT concepts as this delivers them agility, competency, conventionality, and future-proof. However, this winds up into a higher security risk. The projected system proposes a multi-factor authentication methodology or, in simple terms, presents a 3-way authentication. This constitutes the well-known authentication levels that are the password and OTP but mainly focuses on the third step signifying the most protected method of authentication that's the challenge-response pair mechanism. The generated challenge is exclusive to each user, and therefore, the gadget. |
![]() | : | 10.22362/ijcert/2020/v7/i05/v7i0503 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i05/v7i0503 |
1. Two Factor Authentication Using Mobile Phones" by Fadi Aloul, Syed Zahidi, Wassim El-Hajj, IEEE, 2016. 2. "A Security-Enhanced Authentication and Key Distribution Protocol for Wireless Networks" by Chao Lv, Maode Ma, Hui Li, and Jianfeng Ma, IEEE, 2010. 3. "Token Based Authentication using Mobile Phone" by Parekh Tanvi, Gawshinde Sonal, Sharma Mayank Kumar, IEEE, 2011. 4. "A survey on Biometric Based Authentication in cloud computing" by P. Padma and Dr. S. Srinivasan, IEEE, 2016. 5. "Password Security system with 2-way authentication" by Subhradeep Biswas and Sudipa Biswas, IEEE, 2017. 6. "Secure Authentication with Dynamic Password" by Zubayr Khalid, Pritam Paul, Soummyo Priyo Chattopadhyay, Anik Naha Biswas, IEEE, 2016. 7. "Overview of PUF - Based Hardware Security Solutions for Internet of Things" by Basel Halak, Mark Zwolinski and M. Syafiq Mispan, IEEE, 2016. 8. "Performance Evaluation of Cryptographic Ciphers on IoT Devices" by Kedar Deshpande and Praneet Singh. 9. “Secure Medical Data Transmission Model for IoT-based Healthcare Systems” by Mohamed Elhoseny, Gustavo Ramírez-González, Osama M. Abu-Elnasr, Shihab A. Shawkat, Arunkumar N, Ahmed Farouk, IEEE, 2018. 10. "A PHY-Aided Secure IoT Healthcare System With Collaboration of Social Networks" by Peng Hao and Xianbin Wang, IEEE, 2017. 11. "Device Authentication Mechanism for IoT Enabled Healthcare System" by Shantha Mary Joshitta. R and Arockiam L. 12. "Design of a secure medical data sharing system via an authorized mechanism" by Chin-Ling Chen, Jin-Xin Hu, Chun-Long Fan and Kun-hao Wang, IEEE, 2016. 13. "A Comprehensive Survey of Security Mechanisms in Healthcare Applications" by Mr. D. Stalin David and Dr. A. Jeyachandran. 14. "A Robust Physical Unclonable Function with Enhanced Challenge-Response Set" by Abhranil Maiti, Inyoung Kim, and Patrick Schaumont, IEEE, 2012. 15. "Authenticating IoT Devices with Physically Unclonable Functions Models" by Mario Barbareschi, Pierpaolo Bagnasco, Antonino Mazzeo, IEEE, 2015. 16. "Lightweight PUF-Based Authentication Protocol for IoT Devices" by Yildiran Yilmaz, Steve R. Gunn, Basel Halak, IEEE, 2018. 17. "E-Healthcare: Remote Monitoring, Privacy, and Security" by Olga Boric-Lubecke, Xiaomeng Gao, Ehsan Yavari, Mehran Baboli, Aditya Singh, and Victor M Lubecke, IEEE, 2014. 18. "System Level Design of a Secure Healthcare Smart Card System" by Merve Oksar and Berna Ors and Gokay Saldamli, IEEE, 2011. 19. "Monitoring Patients Via A Secure And Mobile Healthcare System" By Yonglin Ren, Richard Werner Nelem Pazzi, And Azzedine Boukerche, Ieee, 2010. 20. "Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey" by YINGNAN SUN , FRANK P.-W. LO , AND BENNY LO, IEEE, 2019
Paper Title | : | Family Responsibilities Make a Barrier in the Career of Female Faculty |
Authors | : | Mrs.Deepa Sharma, Dr. C. Venkateswaran, , , |
Affiliations | : | 1-Management, Maharishi Markandeshwar Institute of Management, Maharishi Markandeshwar (Deemed to be University) Mullana, Ambala, India ; 2- Management, Maharishi Markandeshwar Institute of Management, Maharishi Markandeshwar (Deemed to be University) Mullana, Ambala, India |
Abstract | : | Background/Objectives: This paper presents how to maintain family responsibilities and their careers successfully. Working women in daily life faced many challenges. To identify the problems among family responsibilities and their careers. Methods/Statistical analysis: In this paper sample data is 120 to be used to get the appropriate results. SPSS tools used to convert the information in statics data. Demographic of respondents and Descriptive statistics used to reach the results. And the study of all factors impacts on respondents to maintain a balance between family responsibility and their careers. Correlation shows between family responsibility and growth in careers. Collection of data respondents are working in the academic sector. Findings: In this paper, we found its fact a working woman faced many problems to maintain the balance between their professions and care for their families. So in this paper, all issues describe how to female managed the family responsibilities and job stability with growth. It's very critical situations handled by them. Many problems and challenges suffered by female faculty in the education sector. That's why behind the reason some time women quit their jobs. The workplace is seen as men's space and engaging of women is taken as lack of regard. Regardless, this technique is rapidly advancing now, and cash related similarity as other social components have not quite recently extended the number of working women in all circles of life, yet what's more, have improved the value of their non-conventional duty towards society. Sometimes women faced unhealthy jokes on women at the workplace. The main reason of behind these issues as unformulated manners unhelpful concepts in the effective atmosphere, nonappearance of beliefs, deception group effort, is deficient in leaning along with the consumption of an assortment of dialects, stringent ethnicity and convictions etc. Improvements/Applications: In future perspectives study the male also faces these types' problems in their lives. Family responsibilities also make a barrier in their career growth. Male and female has the same family responsibilities, problems and issues faced in their lives. |
![]() | : | 10.22362/ijcert/2020/v7/i05/v7i0502 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i05/v7i0502 |
1. Moreno E., Work-family Conflicts and the Organizational Work Culture as Barriers to women educational managers, Gender, Work & Organization, https://doi.org/10.1111/j.1468-0432.2009.00463.x, Volume 17, issue 2, Page no.219-239, 2010. 2. Turnbull Sarah, Barriers to women leaders in academia: tales from science and technology, 41, issue 3,https://doi.org/10.1080/03075079.2014.929102,Volume Pages 415-428, 2014. | 3. Youngs. Diane, career decisions and experiences of social work faculty: a gender comparison, volume 41, issue 2, journal of social work education, https://doi.org/10.5175/jswe.2005.200303115, pages 297-313, 2013. 4. Nguyen Huong LAN Thi, Barriers to and facilitators of female Deans’ career advancement in higher education: an exploratory study in Vietnam, https://link.springer.com/article/10.1007/s10734-012-9594-4, Education volume 66, pages123–138(2013). 5. Corbin M. Campbell, 2011, Faculty Sense of Agency in Decisions about Work and Family, review of higher education,https://muse.jhu.edu/article/420728,2011. 6. Watson Pamela, Understanding the experiences of female doctoral students, https://doi.org/10.1080/0309877X.2010.484056, volume 34, issue 3. Pages 385-404, 2010. 7. MD Carr Phyllis, Race, Disadvantage and Faculty Experiences in Academic Medicine, https://link.springer.com/article/10.1007/s11606-010-1478-7Journal of General Internal Medicine Volume 25, pages1363–1369 (2010) 8. Jogulu Uma, Women managers' career progression: an Asia Pacific perspective, https://www.emerald.com/insight/content/doi/10.1108/17542411111183893/full/html, volume 8, issue 2, Gender in Management journal, 2011. 9. Morley Louise, Lost leaders: women in the global academy, Journal of https://doi.org/10.1080/07294360.2013.864611, |Higher education research & development, volume 33, Pages 114-128, 2014.
Paper Title | : | Infectivity, Preclusion, and Control (IPC) of Pandemic Novel COVID-19 |
Authors | : | Digvijay Pandey ,Srith ZithDey Babu,Birhanu Ayenew, Binay Kumar Pandey,Dr NidhiVerma,Wegayehu Enbeyle, Tajamul Islam,Edeh Michael Onyema ,Moisés Filiberto Mora Murillo, Jonathan James O. Canete,P Madhusudana Patra,Lalgoulen Khongsai, |
Affiliations | : | 1*Department of Technical Education, IET, Lucknow, India. 2-Chittagong independent university, Chittagong, Bangladesh;3-Nursing department, health Science College, Assosa University, Assosa, Ethiopia. 4-Dept of IT, GovindBallabh Pant University of Agriculture and Technolog, U.K, India. 5-Government P.G College for Women, Rohtak, India. 6-MSc in Biostatistics, Mizan-Tepi University, Tepi,Ethiopia; 7-University of Kashmir ,Hazratbal Srinagar ;8-University,KSA,Coal City University,Nigeria; 9-Instituto Superior TecnológicoTsa'chila; 10-De La Salle University, Manila Philippines; 11-SRM DBT Facility, SRM Institute of science and technology, Chennai, India-603203, 12-Department of Commerce, Manipur University |
Abstract | : | The developing country is facing this unprecedented disease called COVID-19. Ever since its conception in the area of Wuhan, it is rapidly spreading and creating respiratory disorders not only to humans but also to other species as well, resulting in common colds to further critical conditions, for instance, MERS (Middle-Eastern-Respiratory Syndrome) and SARS (Severe-Acute-Respiratory-Syndrome). Among the identified measures, regular hand-washing, and maintaining social (physical) distance consistent with expert recommendations, the most straightforward available choice to manage the extend of COVID-19. Currently, developing countries have a low health care workforce. Crowded uses of public transportation, lack of sanitation, hiding suspected cases, lack of personal protective equipment for health care providers, and immune-compromised presence make a significant impact. |
![]() | : | 10.22362/ijcert/2020/v7/i05/v7i0501 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i05/v7i0501 |
1. World Health Organization. Coronavirus. World Health Organization, cited January 19, 2020. Available: https://www.who.int/health-topics/coronavirus. 2. Zhou P, Yang XL, Wang XG, Hu B, Zhang L, Zhang W, et al. “A pneumonia outbreak associated with a new coronavirus of probable bat origin. Nature”.https://doi.org/10.1038/s41586-020-2012-7, 2020. 3. Li Q, Guan X, Wu P, Wang X, Zhou L, Tong Y, et al. “Early transmission dynamics in Wuhan, China, of novel coronavirus-infected pneumonia” N Engl J Med. https://doi.org/10.1056/NEJMoa2001316, 2020. 4. Huang C, Wang Y, Li X, Ren L, Zhao J, Hu Y, et al. “Clinical features of patients infected with 2019 novel coronavirus in Wuhan, China”. Lancet. https://doi.org/10.1016/S0140-6736(20)30183-5, 2020. 5. Abere, O. J.,“Survival Analysis of Novel Corona Virus (2019-Ncov) Using Nelson Aalen Survival Estimate. International Journal 0f Business Education And Management Studies” Vol. 3'. Issue 1. P30-40,2020. 6. Bhola J, Venkateswaran VR, Koul M. “Corona Epidemic in Indian context: Predictive Mathematical Modelling”. medRxiv. 2020 Jan 1. 7. Bloukh SH, Shaikh AA, Pathan HM, Edis Z. “Prevalence of COVID-19” A Look behind the Scenes. 8. Nseobot IR, Hamid D, Elyassami D, Effiong AI, Ette U, Ahmed Soomro M. COVID-19 City Locked Down: Implications on Human Welfare in Developing Countries 9. Khin, M. M., Nair, A. S., Babu, V. J., Murugan, R., and Ramakrishna, S. (2012). “A review on nanomaterials for environmental remediation. Energy Environ”. Sci. 5, 8075–8109. doi: 10.1039/c2ee21818, 2012 10. Khot, L. R., Sankaran, S., Maja, J. M., Ehsani, R., and Schuster, E. W. (2012). “Applications of nanomaterials in agricultural production and crop protection: a review”. Crop Prot. 35, 64–70. doi: 10.1016/j.cropro.2012.01.007,2012 11. https://www.ecdc.europa.eu/en/geographical-distribution-2019-ncov-cases 12. Ayenew B. and Digvijay Pandey “Challenges and opportunities to tackle COVID-19 spread in Ethiopia”. Journal of Peer Scientist. 2020;2(2):e1000014, 2020. 13. Sharma L. “Dietary management to build adaptive immunity against COVID-19”. Journal of Peer Scientist. ; 2(2):e1000016, 2020. 14. World Health Organization. Coronavirus disease (COVID-19): situation report, 72. 2019. 15. Shukman D. Social distancing and Coronavirus: The science behind the two-metre rule: BBC News Services; 2020 [updated 3 May 2020. Available from: https://www.bbc.com/news/science-environment-52522460. 16. Wu Z, McGoogan JM. “Characteristics of and important lessons from the coronavirus disease 2019 (COVID-19) outbreak in China: summary of a report of 72 314 cases from the Chinese Center for Disease Control and Prevention”. Apr 7; 323(13):1239-42, 2020. 17. Cohen J, Kupferschmidt K. Strategies shift as coronavirus pandemic looms. 18. Siegel FR. “Mitigation of dangers from natural and anthropogenic hazards: Prediction, prevention, and preparedness”. Springer; 2016 Jun 23. 19. World Health Organization Surveillance case definitions for (nCov) infection with novel coronavirus human interim guidance v1, January 2020. World Health Organization 2020. 20. Peng X, Xu X, Li Y, Cheng L, Zhou X, Ren B. “Transmission routes of 2019-nCoV and controls in dental practice. International Journal of Oral Science”. Mar 3;12(1):1-6, 2020. 21. Stoecklin SB, Rolland P, Silue Y, Mailles A, Campese C, Simondon A, Mechain M, Meurice L, Nguyen M, Bassi C, Yamani E. “First cases of coronavirus disease 2019 (COVID-19) in France: surveillance, investigations and control measures”,Eurosurveillance. Feb 13;25(6):2000094, 2020. 22. Srithazith, DeyBabu , Digvijay Pandey , "web-act of detecting covid 19", ijiert- International Journal of Innovations in Engineering Research and Technology, Volume 7, Issue 5, ISSN : 2394-3696, Page No. 21-30, 2020. 23. YItayew M, Ayenew B, Pandey D, Pandey B. “Indigenous Conflict Resolution Systems and Practices: Implications for Social Relation Ship Developmen”: The Case of Debre Markos Town, 2019. Alq J Med App Sci. ;3(1)53-60, 2020. 24. SrithaZithDeyBabu , Digvijay Pandey , Ismail Sheik , "an overview of a crime detection system using the art of data mining",ijiert- International Journal of Innovations in Engineering Research and Technology, Volume 7, Issue 5, ISSN : 2394-3696, Page No. 125-128, 2020.
Paper Title | : | Prototype for Design and Development of Video Surveillance Robot |
Authors | : | Vikram Jain, Kritika Poojari, Anita Chaudhari, , |
Affiliations | : | Mumbai University, India |
Abstract | : | This paper proposes a method for the surveillance in the vicinity of the armed forces where there is exposure to intruders/prosecutor throughout. The Video Surveillance Robot is designed in such a way using the IoT (Internet of Things) it can give an overview of the operations all over. The armed forces require 24×7 vigilance, which is not feasible for human because of invasion of the intruders, which is extensive at times. In earlier days, the robots were composed with an unreliable approach that it had several limitations comparably of expenditure, magnitude, confidentiality, connection and manual surveillance. So, the wireless Video Surveillance Robot plays an essential role in armed forces and becomes a helping hand to the military personnel. The Video Surveillance Robot provides continuous live video streaming of the area on a Webpage or mobile phone with the help of a web camera. And the pi camera captures the images of circumstances and simultaneously uploads them on the Cloud. The ultrasonic sensors detect the obstacle in the lead and find the most extended pathway for continuous supervision. The exclusive Video Surveillance system is implemented on Raspberry Pi3, which includes the Raspbian Operating System, and it operates with the language Python to write a program for numerous segments for the robotic system. |
![]() | : | 10.22362/ijcert/2020/v7/i04/v7i0406 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i04/v7i0406 |
[1] P.Ajaykumar, P.Ramesh babu, Joshila Grace "A Intelligent Unmanned Secure Robot using IoT" International Journal of Pure and Applied Mathematics, Volume 118 No. 20, 2018. [2] Ben Kehoe, Sachin Patil, Pieter Abbeel, Ken Goldberg Fellow "A Survey of Research on Cloud Robotics and Automation" IEEE Transactions on Automation Science and Engineering,2014. [3] Wen-Tsuen Chen, Po-Yu Chen, Wei-Shun Lee, Chi-Fu Huang "Design and Implementation of a Real Time Video Surveillance System with Wireless Sensor Networks" 2008 IEEE. [4] K. Damodhar, B. Vanathi, K.Shanmugam "A Surveillance Robot For Real Time Monitoring And Capturing Controlled Using Android Mobile" Middle-East Journal of Scientific Research, 2016. [5] Huu-Quoc Nguyen, Ton Thi Kim Loan, Bui Dinh Mao, Eui-Nam Huh "Low Cost Real-Time System Monitoring Using Raspberry Pi" 2015 IEEE. [6] Widodo Budiharto " Design of Tracked Robot with Remote Control for Surveillance" 2014 IEEE. [7] Nazirah Ahmad Zaini, NorlizaZaini, Mohd Fuad Abdul Latip, Nabilah Hamzah " Remote Monitoring System based on a Wi-Fi Controlled Car Using Raspberry Pi" Conference on Systems, Process and Control, 2016 IEEE. [8] Shahajada Mahmudul Hasan, Syed Mamun R Rasid, Avijit Mallik, Md. Rokunuzzaman “Development of a Wireless Surveillance Robot for Controlling from Long Distance”, International Journal of Engineering Research And Management (IJERM), Volume-05, Issue-09, September 2018. [9] SouvikSaha, Murshed Nawaz Kamal, SayakPramanik, Arko Singh, Soumya Dutta, Angshuman Khan, Palash Bera, UttamGorian, Surajit Sur “GPS Based Smart Spy Surveillance Robotic System Using Raspberry Pi for Security Application and Remote Sensing”, 2017 IEEE. [10] Ketan Dumbre, Ajinkya Dhekne, SnehalGaneshkar “Robotic Vehicle Control using the Internet via Webpage and Keyboard”, International Journal of Computer Applications, Volume 114 – No. 17, March 2015. [11] MrAnanthapadmanabhan J, MsAnnu Mariam Abraham, MrLibin M George, MsVineetha Anna Saji, Prof. Anil A R “Smart Robotic Assistant Using IoT”, International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 06 June -2017. [12] Mr.T.Saravanakumar, D.Keerthana, D.Santhiya, J.Sneka, D.Sowmiya " Surveillance Robot Using Raspberry Pi-IoT"International Journal of Electronics, Electrical and Computational System , ISSN 2348-117X Volume 7, 2018. [13] S.Kavitha, S.R.KamaliVarshini, Mrs.P.Vijayalakshmi “Military Based Security System Using Raspberry Pi”, International Journal Of Engineering And Computer Science, Volume 7 Issue 3 March 2018. [14] VaibhaviWanjari, Chandrashekhar Kamargaonkar “A Review Paper on IoT based Cognitive Robot for Military Surveillance”, International Research Journal of Engineering and Technology (IRJET), Volume: 06 Issue: 11 Nov 2019 . [15] R.Venkatasubramanium, N.Adithiyan, R. Jagadesh, V. Deepak Ramanan “Surveillance Robot based on Raspberry Pi-3”, International Research Journal of Engineering and Technology (IRJET), Volume: 06 Issue: 02 Feb 2019. [16] Ghanem Osman Elhaj Abdalla, T. Veeramanikandasamy “Implementation of Spy Robot for A Surveillance System using Internet Protocol of Raspberry Pi”, 2nd IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017.
Paper Title | : | IoT Based Weather Monitoring System |
Authors | : | Suryakant Acharekar, Prashant Dawnade, Binay Kumar Dubey, Prof. Prabhakar Mhadse , |
Affiliations | : | Electronics & Telecommunication, Bharat College Of Engineering, University Of Mumbai |
Abstract | : | The IoT Technology provided in this paper is a good option for surveillance the weather data at a particular region and make the data visible anywhere in the world. The idea behind this is Electronic sensors connected to the Public Internet by using IoT technology. The data fetched from the embedded system can be accessible over the Internet from anywhere in the world. In some area, it will be challenging to check and monitor the vital weather parameter through wires and analogue devices during some weather hazards. To resolve this problem here, electronic sensors are used to review and monitor the weather parameters. |
![]() | : | 10.22362/ijcert/2020/v7/i04/v7i0404 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i04/v7i0404 |
[1] A Study on IoT Approach for Monitoring Water Quality Using MQTT Algorithm, Alfiya Abubaker1, Kavya C R2, Tilju Thomas3, Nikhil Joseph4, Shifana Begum5, 1,2,3,4 Final Year UG Students, Dept. of CSE, Srinivas School Of Engineering, Mangalore [2] IoT Based Water Quality Monitoring System, Mourvika Shirode, Monika Adaling, Jyoti Biradar, Trupti Mate, Department of Electronics & Telecommunication Keystone School of Engineering, Pune, Maharashtra, India [3] https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT [4] Girija C Department of Electronics and Communication, NIEIT, Andreanna Grace ShiresDepartment of Electronics and Communication, NIEIT, Mysuru Internet of Things (IoT) based Weather, International Journal of Engineering Research & Technology (IJERT) [5] Mobile APP & IoT Based Station Weather Station. AUTHOR: K. N. V. SATYANARAYANA, S. R. N. REDDY, K. N. V. SURESH VARMA & P. KANAKA RAJU [6] Arduino Based Weather Monitoring System. AUTHOR: Karthik Krishnamurthi, Suraj Thapa, Lokesh Kothari, Arun Prakash [7] Internet of Things (IoT) Based Weather Monitoring system, Bulipe Srinivas Rao1, Prof. Dr K. Srinivasa Rao2, Mr N. Ome3, international Journal of Advanced Research in Computer and Communication Engineering, ISO 3297:2007 Certified, Vol. 5, Issue 9, September 2016 [8] https://how2electronics.com [9] https://developer.android.com/training/basics/firstapp
Paper Title | : | Real-Time Indoor Floor Detection for Mobile Robots using Iterative Approach |
Authors | : | Honnaraju B, S Murali, , , |
Affiliations | : | 1&2 . Dept. of Computer Science and Engineering, Maharaja Institute of Technology Mysore, Karnataka, India. |
Abstract | : | This paper introduces an iterative technique to segmentation of indoor floor from a single 2-D camera connected to a mobile robot. The segmentation of the floor is an essential function for efficient mobile robot navigation, unlike previous approaches which rely on geometric indications, edges etc. Mobile robot mounted with the 2-D camera can capture floors images over long indoor sequences. Both floor and non-floor regions are all of a similar color when the conditions of illumination vary over a single image. The texture of the floor varies over a single image, and features may be lost as lighting changes. As mobile robot rotates, lot of information may be lost in the presence of small obstacles. Some floor areas are very shining under the artificial light condition. The radiant floor gives the wrong segmentation output. In the proposed approach does not require multiple images. The floor patterns are dynamically selected in the proposed research, and segmentation is performed based on the chosen designs. Camera calibration is not required in the proposed approach for floor segmentation. Also, edge cues and geometric cues are not necessary. The extensive experiment is conducted on a broad set of real indoor corridor floor image set. |
![]() | : | 10.22362/ijcert/2020/v7/i04/v7i0405 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i04/v7i0405 |
1. J Adorno et al. “Smartphone-based Floor Detection in Unstructured and Structured Environments”, 978-1-5090-1941-0/16/$31.00 ©2016 IEEE 2. R. Deepu, B. Honnaraju, and S. Murali, "Path Generation for Robot Navigation using a Single-Camera", Procedia Computer Science, vol. 46, pp. 1425–1432, 2015, DOI: 10.1016/j.procs.2015.02.061. 3. Soumabha Bhowmick and Abhishek Pant, “A novel floor segmentation algorithm for mobile robot navigation ” 978-1-4673-8564-0/15/$31.00 c 2015 IEEE 4. Suryansh Kumar and K Madhava Krishna, “Fusing Appearance and Geometric Cues for Adaptive Floor Segmentation over Images”, Centre for Robotics International Institute of Information Technology 2013. 5. X.-N. Cui, Y.-G. Kim, and H. Kim, “Floor segmentation by computing plane normal from image motion fields for visual navigation”. International Journal of Control, Automation, and Systems, 7(5):788–798, 2009. 6. Y.-G. Kim and H. Kim, “Layered ground floor detection for vision-based mobile robot navigation”. In Proceedings of the IEEE International Conference on Robotics and Automation, 2004. 7. J. Zhou and B. Li. “Robust ground plane detection with normalized homography in monocular sequences from a robot platform”. In Proceedings of the International Conference on Image Processing, 2006.
Paper Title | : | Comparing BlockChain with other Cryptographic Technologies (DAG, Hashgraph, Holochain) |
Authors | : | Dr. M. R. Arun, Prof. M. R. Sheeba, Prof. F. Shabina Fred Rishma, , |
Affiliations | : | Associate Professor, ECE, PBR Visvodaya Institute of Technology and Science , Nellore, India , 2. Assistant Professor& RS, CSE, Manonmaniam Sundaranar University, Tirunelveli, India, 3. Assistant Professor, CSE, Cape Institute of Technology, Levinjipuram, India |
Abstract | : | With the rapid advancement in technological innovation, block Chain has become one of the hottest transformative techniques in the internet domain in recent times. As considered to be a decentralized, distributed and highly encrypted technology in data transfer, the blockchain has restored the trust for secured business transactions by the sophisticated cryptographic algorithm. Here the protocol validates that all nodes are merely synchronized with one another, thus providing security, anonymity, and data integrity without the requirement of any other third party intrusion. Block chain technology which is also known as DLT (Distributed Ledger Technology) that is a great platform for non-physical money transaction such as bitcoin and other online crypto currencies. It is seen as emerging foundational security-based technology having enormous potential across different sectors. Blockchain as a decentralized mode useful for a peer-to-peer network without the essential of any central or controlling authority server. This will, in general, reduce transaction costs, improved security, and execute the financial transaction in real-time. Block chain is significant and not the same as of now existing techniques. Since it empowers disseminated, independent decreases grating in business exchanges with safety and shares decentralized records, this paper gives a discussion on the comparative analysis of block chain technology with other existing technologies. |
![]() | : | 10.22362/ijcert/2020/v7/i05/v7i0403 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i05/v7i0403 |
[1] F. Tschorsch and B. Scheuermann, “Bitcoin and beyond: A technical survey on decentralized digital currencies”, IEEE Communications Survey Tutorials, vol. 18, no. 3, pp. 2084–2123, 2016. [4] https://www.ibm.com/blogs/blockchain/2018/01/digitizing-global- trade-maersk-ibm/ last accessed on Sept 15, 2018 [2] L. Lamport, R. Shostak, and M. Pease, “The byzantine generals problem”, ACM Transactions on Programming Languages and Systems, vol. 4, no. 3, pp. 382–401, 1982 [3] D. Kraft, “Dif?culty control for block chain-based consensus systems”, Peer-to-Peer Networking and Applications, vol. 9, no. 2, pp. 397–413, 2016 [4] Yuee, X., Wang, H., Jin, D., Li, M., & Jiang, W., “Healthcare data gateways: found healthcare intelligence on block chain with novel privacy risk control”, Journal of medical systems, vol. 40, no. 10, pp. 218, 2016. [5] P. K. Sharma, S. Singh, Y.-S. Jeong, and J. H. Park, “Dist Block Net: A Distributed Block chains-Based Secure SDN Architecture for IoT Networks,” IEEE Communication Magazine, vol. 55, no. 9, pp. 78–85, 2017. [6] K. Fan, Y. Ren, Y.Wang, H. Li, and Y. Yang, “Block chain-based efficient privacy preserving and data sharing scheme of content-centric networking 5G,” IET Communication, vol. 12, no. 5, pp. 527–532, Mar. 2018. [7] G. Karame, S. Capkun, "Block chain security and privacy", IEEE Security Privacy, vol. 16, no. 4, pp. 11-12, Jul. 2018. [8] B. Wang, M. Dabbaghjamanesh, A. Kavousi-Fard, S. Mehraeen, " Cyber security enhancement of power trading within the networked micro grids based on block chain and directed acyclic graph approach", IEEE Transaction Industrial Application, vol. 55, no. 6, pp. 7300-7309, Nov. 2019. [9] F. M. Beni, I. Podnar Arko, "Distributed Ledger Technology: Block chain Compared to Directed Acyclic Graph", 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 1569-1570, 2018 [10] T. T. Kuo, H. E. Kim, L. Ohno-Machado, "Block chain distributed ledger technologies for biomedical and health care applications", Journal of the American Medical Informatics Association, vol. 24, no. 6, pp. 1211-1220, 2017. [11] C. Fan, H. Khazaei, Y. Chen, P. Musilek, "Towards a scalable DAG-based distributed ledger for smart communities", Proc. IEEE 5th World Forum Internet Things (WF-IoT), pp. 177-182, Apr. 2019. [12] B. Lee and J.-H. Lee, “Block chain-based secure firmware update for embedded devices in an Internet of Things environment,” Journal Supercomputing, vol. 73, no. 3, pp. 1152–1167, Mar 2017. [13] O. Novo, “Block chain Meets IoT: An Architecture for Scalable Access Management in IoT,” IEEE Internet Things Journal, vol. 5, no. 2, pp. 1184– 1195, Apr. 2018. [14] C. Yang, X. Chen, and Y. Xiang, “Block chain-based publicly verifiable data deletion scheme for cloud storage,” Journal Network Computing Application, vol. 103, pp. 185–193, Feb 2018. [15] N. Kshetri, “Block chain’s roles in strengthening cyber security and protecting privacy,” Telecommunications Policy, vol. 41, no. 10, pp. 1027–1038, Nov. 2017. [16] J. Wang, M. Li, Y. He, H. Li, K. Xiao, and C. Wang, “A Block chain Based Privacy-Preserving Incentive Mechanism in Crowd sensing Applications,” IEEE Access, vol. 6, pp. 17 545–17 556, 2018. [17] A. Lei, H. Cruickshank, Y. Cao, P. Asuquo, C. P. A. Ogah, and Z. Sun, “Block chain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems,” IEEE Internet Things Journal, vol. 4, no. 6, pp. 1832–1843, Dec 2017. [18] A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak, “BlockChain: A Distributed Solution to Automotive Security and Privacy,” IEEE Communication Magazine, vol. 55, no. 12, pp. 119–125, Dec 2017. [19] D. Puthal, N. Malik, S. P. Mohanty, E. Kougianos, and G. Das, “Everything you wanted to know about the block chain: Its promise, components, processes, and problems,” IEEE Consumer Electronics Magazine, vol. 7, no. 4, pp. 6–14, July 2018.
Paper Title | : | A TRADE INTENSITY ANALYSIS BETWEEN INDIA AND UAE SINCE 2001 |
Authors | : | Saima Farhat, Khalid Ul Islam Rather , , , |
Affiliations | : | 1. Department of West Asian and North African studies (Economics), Aligarh Muslim University, UP-202001, India |
Abstract | : | International trade has been considered as an engine of economic growth since very long. India has also been involved in trading terms with the world in fact in order to enhance its trading terms, India has adopted economic reforms in 1991 in the form of liberalization, Globalization and Privatization .India’s major trading partners are China, USA, UAE, Germany, Saudi Arabia, Kuwait, Oman .But here we are confined to the study of trade between India and UAE. India is having good trading terms with UAE since 1972 that is from the establishment of UAE.UAE has remained important source for India not only for imports and exports but for remittances also. In this study we have tried to analyze trade intensity index for India with respect to UAE. Study period has been taken from 2001 to 2016.We have found that India’s export intensity index (wrt) UAE, was highest in 2001 estimated as 12.5 while lowest in the year 2010.Then import intensity index highest in 2010 and lowest in 2002.Besides that we have also discussed the composition of trade between the two countries. |
![]() | : | 10.22362/ijcert/2020/v7/i04/v7i0402 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i04/v7i0402 |
World Trade Organization, 2008. “Trade in a globalized World”, World Trade Report. UN Comrade Statistics database. World Trade Organization, 2011. RTA Gateway, 2011 Annual report 2016-17, ministry of commerce. UAE-India?bilateral?trade?to?grow?by?6%?per?year,?says?official,?The?National,?Sarah?Townsend,?Nov.?08?2017. 2. K.A. Goyal & A. Vajid 2017, “Revealed Comparative Advantage of India's Rice Export with selected countries (A?Case?Study),?Pacific?Business?Review?International,?Vol?9,?Issue?9,?March?2017?PP?51-56. 3. K.A. Goyal & A. Vajid 2016, “An Analysis of Bilateral Trade between India and UAE”, Pacific Business Review International,?Vol?1,?Issue?2,?July?2016?PP?94-100. 4. Sundar Raj P & Ambrose B 2014, “A Brief Analysis of India-Japan Bilateral Trade: A Trade Intensity Approach”, International?Journal?of?Economics,?Commerce?and?Management?Vol?2,?Issue?2,?2014,?PP?1-7. 5. Beretta, S. and R. T. Lenti. 2012. 'India and China: Trading with the World and Each Other', Economic & Political?Weekly,?Vol.?47,?No.?44,?35–Federation of Indian Chambers of Commerce and Industry. (2013). India-UAE Economic Relations, Retrieved from Federation of Indian Chambers of Commerce and Industry, New Delhi website: http://www.ficci.com/international/75185 Samir Ranjan. “India’s Export Potential to the Gulf Cooperation Council (GCC) Countries: A Gravity Model Analysis.” IUP Journal of Applied Economics (UNESCA), 2006: 48-71. Krishna, A, Goyal and Abdul Vajid “An analysis of India’s trade with UAE” journal of commerce and trade, April 2018,UGC approved,journal number 48687. Muhammad Azhar, Economic Cooperation between India and United Arab Emirates in the 1990’s, journal of Middle Eastern studies. Volume 40, 2004, issue 5. trade%20intensity%20definition.pdf Alok.k.Yadav and Umesh.K.Yadav “Ananalysis of India Bahrain trade relations” IOSR journal of economics and finance.e-ISSN: 2321-5933, p-ISSN: 2321-5925.Volume 8, Issue 1 Ver. I (Jan-Feb. 2017), PP 73-82. Rishabh, Kumar, and Rajiv Ranjan. “Evolution of Indo-GCC Trade Relations: The Last Two Decades.” International Journal of Economics, Commerce and Research, 2012: 1-8.
Paper Title | : | Utilization of Plastic Waste Materials in Manufacturing of Bricks & Paver Blocks |
Authors | : | Mr. Abhay Singh Chahal, Mrs. Neetu Balhara , , , |
Affiliations | : | Civil department, Matu Ram Institute of Engineering and Management, MDU University, Rothak, Haryana, INDIA |
Abstract | : | The paper elucidates about the proper utilization of plastic materials in civil construction projects. The volume of plastic waste is increased, which results in creating unbalance in the environment by polluting land, air as well as water. According to CPCB (central pollution control board), India generates almost 26,000tonnes of plastic per day. From 26,000tonnes near about 10,000 tonnes a day, the plastic waste remains uncollected, and that plastic ends up in the natural environment mostly in seas. A vast amount of plastic waste is brought from tourist attraction regions, which further burnt and finally leads to toxic gasses that are harmful to even living beings. To outcome from this problem, the use of plastic should be controlled, and plastic waste should be utilized properly so that it does not create pollution. Nowadays, such waste material utilized in a different type of road construction and in other civil construction, which shows the hope of tackling this issue. In brick blocks, carry bags, disposable, PET, HDPE, and PE are used with sand to obtain high strength. These days, plastic waste used as a modifier, which further helps in a reduction in the volume of cement and results as a decrease in the overall cost required to complete the construction work. The plastic helps to raise the melting point for bitumen. Even moisture will not seep from brick due to the presence of plastic, which increases the working periods before any repairs of the building. |
![]() | : | 10.22362/ijcert/2020/v7/i04/v7i0401 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i04/v7i0401 |
[1] Aeslina Abdul Kadir, Noor Amira Sarani, “An Overview of Wastes Recycling in Fired Clay Bricks” International Journal of Integrated Engineering, Vol. 4 No. 2 (2012) p. 53-69. [2] AmitGawande, G. Zamare., V.C Renge., SaurabhTayde, G. Bharsakale.. (2012) “An overview on waste plastic utilization in asphalting of roads”, Journal of Engineering Research and Studies (JERS), Vol.III, Issue II, pp 01-05. [3] Ganesh Tapkire, Satish Parihar, PramodPatil, Hemraj R Kumavat, “Recycled Plastic used in Concrete Paver Block” International Journal of Research in Engineering and Technology eissn: 2319-1163, Vol: 03 special issue: 09, NCETCE-2014. [4] P K Jain, Shanta Kumar & J B Sengupta, “Mitigation of rutting in bituminous roads by use of waste polymeric packaging materials” Indian Journal of Engineering & Materials Sciences Vol. 18, June 2011, pp. 233-238. [5] V.Kasselouri-Rigopoulou, S. Gavela, S. Kolias“Use Of Polymeric Wastes in The Concrete Production” Polymers in concrete: a vision for the 21st century, Cement & Concrete Composites 21: (1999) 449-452. [6] L.R Schroeder, “The Use of Recycled Materials in Highway construction”, Public Roads, Vol 58,Issue 2, 1994. [7] Madan mohanreddy ,k,ajitha .B and bhavani.R(2012) “Melt- Densified Post-Consumer Recycled Plastic Bags Used as Light Weight Aggregate in Concrete”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 2, Issue, pp.1097-1101. [8]Dr.prahallada M.C and Dr.prakash K.B “strength and workability characteristics of waste plastic fibre reinforced concrete produced from recycled aggregates”international journal of engineering research and applications(IJERA) ISSN:2248-962.
Paper Title | : | Biometric Uncorrelated Face Recognition Using Unsupervised Learning |
Authors | : | Mrs.NAZIA BEGUM, Mr.SYED NOORULLAH, , , |
Affiliations | : | M.Tech(DECS) Student, DR.K.V Subba Reddy College of Engineering For Women,Kurnool, Andhra Pradesh, India. |
Abstract | : | In this paper we developed a new dimensionality reduction method, named Biomimetic Uncorrelated Locality Discriminate Projection (BULDP), for face recognition. It is based on unsupervised discriminate projection and two human bionic characteristics: principle of homology continuity and principle of heterogeneous similarity. With these two human bionic characteristics, we propose a novel adjacency coefficient representation, which does not only capture the category information between different samples, but also reflects the continuity between similar samples and the similarity between different samples. By applying this new adjacency coefficient into the unsupervised discriminant projection, it can be shown that we can transform the original data space into an uncorrelated discriminant subspace. A detailed solution of the proposed BULDP is given based on singular value decomposition. Moreover, we also develop a nonlinear version of our BULDP using kernel functions for nonlinear dimensionality reduction. The performance of the proposed algorithms is evaluated and compared with the state-of-the-art methods on four public benchmarks for face recognition. Experimental results show that the proposed BULDP method and its nonlinear version achieve much competitive recognition performance.. |
![]() | : | 10.22362/ijcert/2020/v7/i09/v7i0303 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i09/v7i0303 |
[1] Z. R. Lai, D. Q. Dai, C. X. Ren, and K. K. Huang, “Discriminative and compact coding for robust face recognition,” IEEE Transactions on Cybernetics, vol. 45, pp. 1900–1912, 2015. [2] J. Lu, V. E. Liong, G. Wang, and P. Moulin, “Joint feature learning for face recognition,” IEEE Transactions on Information Forensics and Security, vol. 10, pp. 1371–1383, 2015. [3] W. Hwang and J. Kim, “Markov network-based uni?ed classi?er for face recognition,” IEEE Transactions on Image Processing, vol. 24, pp. 4263–4275, 2015. [4] M. Kafai, L. An, and B. Bhanu, “Reference face graph for face recognition,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 12, pp. 2132–2143, 2014. [5] M. De Marsico, M. Nappi, D. Riccio, and H. Wechsler, “Robust face recognition for uncontrolled pose and illumination changes,” IEEE Transactions on Systems Man and Cybernetics Systems, vol. 43, no. 1, pp. 149–163, 2013. [6] T. Zhou and D. Tao, “Double shrinking sparse dimension reduction,” IEEE Transactions on Image Processing, vol. 22, no. 1, pp. 244–257, 2013. [7] M. Turk and A. Pentland, “Eigenfaces for recognition,” Journal of cognitive neuroscience, vol. 3, no. 1, pp. 71–86, 1991. [8] P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, “Eigenfaces vs. ?sherfaces: Recognition using class speci?c linear projection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711–720, 1997. [9] P. Belhumeur, J. Hespanha, and D. Kriegman, “Eigenfaces vs. ?sherfaces: recognition using class speci?c linear projection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711–720, 1997. [10] L. F. Chen, H. Y. M. Liao, M. T. Ko, J. C. Lin, and G. J. Yu, “A new lda-based face recognition system which can solve the small sample size problem,” Pattern Recognition, vol. 33, no. 99, p. 1713C1726, 2000. [11] H. Yu and J. Yang, “A direct lda algorithm for high-dimensional data ? with application to face recognition,” Pattern Recognition, vol. 34, no. 00, p. 2067C2070, 2001. [12] C. Liu and H. Wechsler, “A shape- and texture-based enhanced ?sher classi?er for face recognition,” IEEE Transactions on Image Processing, vol. 10, no. 4, pp. 598–608, 2001. [13] W. Zhao, A. Krishnaswamy, R. Chellappa, D. L. Swets, and J. Weng, Discriminant analysis of principal components for face recognition. IEEE, 1998. [14] J. Yang, D. Zhang, A. F. Frangi, and J. Y. Yang, “Two-dimensional pca: a new approach to appearance-based face representation and recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 26, no. 1, pp. 131–137, 2004. [15] H. Wang, J. Hu, and W. Deng, “Compressing ?sher vector for robust face recognition,” IEEE Access, vol. PP, no. 99, pp. 1–1, 2017. [16] E. Begelfor and M. Werman, “The world is not always ?ot or learning curved manifolds,” School of Engineering and Computer Science, Hebrew University of Jerusalem., Tech. Rep, vol. 3, no. 7, p. 8, 2005. [17] M. Balasubramanian and E. L. Schwartz, “The isomap algorithm and topological stability,” Science, vol. 295, no. 5552, pp. 7–7, 2002. [18] M. Belkin and P. Niyogi, “Laplacian eigenmaps and spectral techniques for embedding and clustering.” in NIPS, vol. 14, 2001, pp. 585–591. [19] L. K. Saul and S. T. Roweis, “Think globally, ?t locally: unsupervised learning of low dimensional manifolds,” Journal of Machine Learning Research, vol. 4, pp. 119–155, 2003. [20] Z.-y. Zhang and H.-y. Zha, “Principal manifolds and nonlinear dimensionality reduction via tangent space alignment,” Journal of Shanghai University (English Edition), vol. 8, no. 4, pp. 406–424, 2004.
Paper Title | : | Reproduction of 3-D Model of Indoor Environment by Moveable Robot with Single 2-D camera for Navigation |
Authors | : | Mr. Honnaraju B, Dr. Murali S, , , |
Affiliations | : | Dept. of Computer Science and Engineering, Maharaja Institute of Technology Mysore, Karnataka, India. |
Abstract | : | The creation of a 3-D model of indoor environments is increasingly gaining more importance due to the wide variety of applications. Applications are the representation of building, indoor facilities information representation, etc. This paper represents an approach to create visually persuasive 3-D models of indoor corridor based on the mobile robot that is connected to a single 2-D camera. The sequence of images acquired from the 2-D camera and distance between surrounding and the robot is determined. In this paper, the new approach for distance estimation between the wall and the robot is proposed. Distance estimation is achieved using skirting height as a reference. The panoramic stitching of images generates the walls of the indoor corridor. Doors in the corridor are identified using an edge-based approach. The proposed approach is tested for real datasets and getting visually effective results. The proposed approach is intended to address navigation in complex buildings. |
![]() | : | 10.22362/ijcert/2020/v7/i03/v7i0302 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i03/v7i0302 |
1. Biber P. Andreasson H., Duckett T. and Schilling A: 3D Modeling of Indoor Environments by a Mobile Robot with a Laser Scanner and Panoramic Camera. Proc. IEEE/RSJ Int. Conf. on Intelligent Robots and Systems (IROS), 2004. 2. Fleck S, Busch F, Biber P, Andreasson H, and Straer W. Omni-Direction 3D modeling on a Mobile Robot using Graph Cuts.†Proc. IEEE Int. Conf. on Robotics and Automation (ICRA) 2005. 3. Biber P, Fleck S, Busch F, Wand M, Duckett T and Stranger W. 3D Modeling of Indoor Environments by a Mobile Platform with Laser Scanner and Panoramic Camera. Proc. 13th Europen Signal Processing Conference (EUSIPCO) 2005. 4. Thrun .S, et al, " A Real-Time Expectation-Maximization Algorithm for Acquiring Multi-Planar Maps of Indoor Environments with Mobile Robots.", IEEE Trans. On Robotics and Automation, 20(3), pp. 433-442, 2003. 5. Christian Weiss and Andreas Zell, Automatic Generation of Indoor VR-Models by a Mobile Robot with a Laser Range Finder and a Color Camera. 2011 6. Lucia Diaz-Vilarino, Kourosh Khoshelham, Joaquin Martinez-Sanchez, and Pedro Arias, "3D Modeling of Building Indoor Spaces and Closed Door from Imagery and Point Clouds.", Sensors in 2015.
Paper Title | : | Forensic Approach For Object Elimination and Frame Replication Detection Using Noise Based Gaussian Classifier |
Authors | : | Govindraj Chittapur, S. Murali, Basavaraj S. Anami , , |
Affiliations | : | Department of Computer Applications, Basaveshwar Engineering College, Bagalkot India |
Abstract | : | In the modern world, people are beliving videos as part of social communication; as camera editing techniques are advanced, video doctoring is a technique for editing and recreating new details in the footage. Identifying these doctored videos poses a problem for the media source, the court of law, and the framework of evidence service. The research on video forensics, and specifically on the automatic recognition of object-based detection of video forgery, is still in its infancy. The approach proposed in this paper uses noise properties, extracted from each frame of the video using Wavelet Transform and nonlinear thresholding such as optimal SURE shrinkage. Gaussian Mixture Density (GMD) uses this as a Gaussian classifier, and the Expectation-Maxima algorithm sets the GMD parameter. Results of the output matrix show that we get excellent precision 99.36 percent recall 99.80 and precision 97.34 percent respectively for object removal and frame duplication detection compared to subsisting methods. The proposed approach effectively detects traces in the forensic video dataset and recognizes these. |
![]() | : | 10.22362/ijcert/2020/v7/i03/v7i0301 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i03/v7i0301 |
2012). Surrey University Library for Forensic Analysis (SULFA) of video content. 1-6. 10.1049/cp.2012.0422. [2] S. Chen, S. Tan, B. Li, and J. Huang, "Automatic Detection of Object-Based Forgery in Advanced Video," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, no. 11, pp. 2138-2151, Nov. 2016. [3] Czyzewski, A., Kostek, B., Bratoszewski, P. et al. An audio-visual corpus for multimodal automatic speech recognition. J Intell Inf Syst 49, 167–192 (2017). https://doi.org/10.1007/s10844-016-0438-z [4] Pandey, Ramesh C., Singh, Sanjay K., and Shukla, K.K. ‘A Passive Forensic Method for Video: Exposing Dynamic Object Removal and Frame Duplication in the Digital Video Using Sensor Noise Features’. Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3339-3353, 2017. [5] R. Chen, G. Yang, N. Zhu, "Detection of object-based manipulation by the statistical features of object contour," Forensic Science International, vol. 236, pp. 164-169, 2014. [6] S. Murali, B. S. Anami and G. B. Chittapur, "Detection of Copy-Create Image Forgery Using Luminance Level Techniques," 2011 Third National Conference on Computer Vision, Pattern Recognition, Image Processing, and Graphics, Hubli, Karnataka, 2011, pp. 215-218 [7] S. Tan, S. Chen, and B. Li, "GOP based automatic detection of object-based forgery in the advanced video," 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Hong Kong, 2015, pp. 719-722. [8] Govindraj Chittapur, S. Murali, and Basavaraj Anami “Video Forgery Detection Using Motion Extractor By Referring Block Matching Algorithm” International Journal of Scientific and Technology Research, Volume 8, Issue 10 2019, PP 3240-3243. http://www.ijstr.org/final-print/oct2019/Video-Forgery-Detection-Using-Motion-Extractor-By-Referring-Block-Matching-Algorithm.pdf [9] Chittapur G.B., Murali S., Prabhakara H.S., Anami B.S. (2014) Exposing Digital Forgery in Video by Mean Frame Comparison Techniques. In: Sridhar V., Sheshadri H., Padma M. (eds) Emerging Research in Electronics, Computer Science and Technology. Lecture Notes in Electrical Engineering, vol 248. Springer, New Delhi [10] Chittapur G.B., Murali S., Prabhakara H.S., Anami B.S. (2019) “Forensic Approach for detecting the region of Copy-Create Video Forgery By applying frame similarity approach” volume7 issue 2, 2019.,pp 12-17 http://www.isca.me/COM_IT_SCI/Archive/v7/i2/3.ISCA-RJCITS-2019-006.pdf [11] Govindraj Chittapur, S. Murali, Basavaraj S. Anami."Copy Create Video Forgery Detection Techniques Using Frame Correlation Difference by Referring SVM Classifier"., International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.6, Issue 12,pp.4-8, December- 2019.
Paper Title | : | Feasibility of Wellhead Technology Power Plants for Electricity Generation |
Authors | : | Moses Jeremiah Barasa Kabeyi, , , , |
Affiliations | : | Lecturer, Department of Mechanical and Manufacturing Engineering, University of Nairobi |
Abstract | : | The overall objective of this research was to determine the feasibility of wellhead power plants for a sustainable supply of geothermal electricity. Technical, financial and environmental sustainability and feasibility were investigated. A profitability assessment model showed that the payback period based on profit after Tax is 4.4 and 3.4 years without corporate tax which demonstrates financial feasibility. Environmental challenges encountered include corrosive geothermal fluid contamination and emissions of no condensable gases. Technically, it was found out that wellhead plants have lower power plant availability and capacity factor but still acceptable since it is over 70% compared to over 95% for central power plants. Lack of reinjection wells, however, raise concerns over sustainability of resource use in the long term. The study concluded that the Eburru and Olkaria wellhead power plants in Kenya are technically, financially and environmentally sustainable and feasible. Financial viability can be enhanced by tax rebates and holidays while re-injection of geothermal fluid can enhance resource sustainability. The research showed that wellhead power plants make an investment in geothermal less risky and ensure quick returns though technically the central power plants are superior. |
![]() | : | 10.22362/ijcert/2020/v7/i02/v7i0201 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i02/v7i0201 |
[1] Alshareef, A.S. (2017).Technology Assessment Model of Developing Geothermal Energy Resources for Supporting Electrical System: the Case for Oregon" (2017). Dissertations and Theses. Paper 3515. Retrieved from . BP (2012): statistical review of world energy, 2012. Retrieved from https://www.laohamutuk.org/DVD/docs/BPWER2012report.pdf. [2] ESMAP (2012). Geothermal handbook: Planning and financing power generation. Energy Sector Assistance Management Program. Retrieved from https://www.esmap.org/sites/esmap.org/files/DocumentLibrary/FINAL_Geothermal%20 Handbook_TR002-2_Reduced.pdf. [3] ESMAP (2018). Opportunities and challenges for scaling up geothermal development in lac. Energy sector Assistance Management Program.Retrieved from http://documents.worldbank.org/curated/en/173681539626591426/pdf/128045-ESMAP- REVISED-PUBLIC.pdf [4] European Commission (1999). Blue book on geothermal resources. European Commission http://www.geoelec.eu/wp-content/uploads/2012/04/EU-Blue-Book-Geothermal-2000.pdf. [5] Geothermal Energy Association (2014). Geothermal energy. Retrieved from http://geo-energy.org/basics.aspx. [6] Gitogo, W. (2019, July). Kenya ranked 8th largest geothermal power producer in the world. The Kenyan Wall Street. https://kenyanwallstreet.com/kenya-ranked-8th-largest-geothermal-power-producer-in- the-world/. [7] Johnson, W.J. & Ogeya, M. (2018). Risky business: developing geothermal power in Kenya Stockholm Environment Institute https://www.sei.org/wp-content/uploads/2018/10/181025b-gill-johnson-keny a-geothermal-transrisk-db-1810g-1.pdf. [8] Kabeyi, M.J.B (2019). Geothermal electricity generation, challenges, opportunities and recommendations. International Journal of Advances in Scientific Research and Engineering, 5(8), 53-95. doi: 10.31695/IJASRE.2019.33408 Retrieved from https://ijasre.net/uploads/2/4019_pdf.pdf. [9] Karytsas, C. & Mendrinos, D. (2013, June). Global Geothermal Power Market. European Geothermal Congress, Pisa Italy. Retrieved from https://www.researchgate.net/publication/258926033_ Global_Geothermal_Power_Market. [10] Kenya Electricity Generating Company (2020). Olkaria Wellhead Generation Plants. https://www.kengen.co.ke/index.php/business/power-generation/geothermal.html [11] Kiptanui,S. & Kipyego,E. (2016). Viability of wellhead power plants in accelerating geothermal development in Kenya: case of Menengai. Proceedings, 6th African Rift Geothermal Conference Addis Ababa, Ethiopia, 2nd – 4th November 2016. Retrieved from http://theargeo.org/fullpapers/FEASIBILITY%20OF%20USING%20WELLHEAD%. [12] Kruszewski, M., Wittig, V.(2018). Review of failure modes in supercritical geothermal drilling projects. Geothermal Energy 6, 28. doi: 10.1186/s40517-018-0113-4. [13] Liu XM, Wei M, Yang LN, Wang X. (2017). Thermo-economic analysis and optimization selection of ORC system configurations for low temperature binary-cycle geothermal plant. Appl Therm Eng. 125,153–64. https://doi.org/10.1016/j.applthermaleng.2017.07.016. [14] Lund, J.W. (2007, June).Characteristics, development and utilization of geothermal resources. GHC Bulletin. Retrieved from https://pdfs.semanticscholar.org/084d/ecf2a958f35fa125251181253401600a5708.pdf [15] Lundin,J., Lundin,U.& Leijon,M.( 2014). EUSUSTEL-WP3 report- Geothermal power production. Retrieved from https://www.academia.edu/30759059/1_EUSUSTEL_WP3_Report_Geothermal_power. [16] Mwagomba, T. (2015). Opportunities and challenges of developing geothermal in developing countries. Proceedings World Geothermal Congress 2015Melbourne, Australia, 19-25April 2015. Retrieved from https://pangea.stanford.edu/ERE/db/WGC/papers/WGC/2015/03016.pdf. [17] Saitet, D. & Kwambai, C. (2017). Wellhead Generating Plants: KenGen Experience. Proceedings World Geothermal Congress 2015, Melbourne, Australia, 19-25 April 2015 https://pangea.stanford.edu/ERE/db/WGC/papers/WGC/2015/08016.pdf. [18] Stober and K. Bucher(2013). History Of Geothermal Energy Use, Berlin Heldelberg: Springer-Verlag, [19] Simiyu, S. (2010). Status of Geothermal Exploration in Kenya and Future Plans for Its Development. Retrieved from https://orkustofnun.is/gogn/unu-gtp-30-ann/UNU-GTP-30. [20] Imaidi, D.L. (2017). Analysis of maintenance methods and developing strategies for optimal maintenance of wellhead power plants at olkaria geothermal field in Kenya. Retrieved from https://orkustofnun.is/gogn/unu-gtp-report/UNU-GTP-2017-12.pdf. [21] Kombe, E.Y. & Muguthu, J. (2018). Geothermal energy development in East Africa: Barriers and Strategies. Journal of Energy Research Reviews. 2(1), 1-6. Doi: 10.9734/JENRR/2019/45278. [22] Loksha, M. Gehringer and V. Loksha, (2012). Geothermal handbook; Planning and Financing power generation," ESMAP/ World bank Group, Washington DC, 2012. [23] Ogola, P.F.A. (2015). KenGen geothermal energy carbon credit projects: status, benefits, challenges, lessons learnt and post-2012 plans. Proceedings World Geothermal Congress 2015 Melbourne, Australia, 19-25 April 2015 Retrieved from https://pangea.stanford.edu/ERE/db/WGC/papers/WGC/2015/36001.pdf. [24] Quick, H., Mechael,J., Huber,H. & Arslan,U. (2010). History of international geothermal power plants and geothermal projects in Germany. Proceedings World Geothermal Congress 2010 Bali, Indonesia, 25-29 April 2010. Retrieved from https://www.geothermal-energy.org/pdf/IGAstandard/WGC/2010/0605.pdf. [25] Tubei, G. (2019, July). Kenya beats Iceland to be ranked 8th globally in world’s largest geothermal Powerhouses. Business Insider. Retrieved from https://www.pulselive.co.ke/bi/finance/kenya-ranked-8th-globally-in-worlds-largest- geothermal-powerhouses/442penz Ugochukwu, A.A. (2013). Geothermal energy resources. https://www.academia.edu/5358353/GEOTHERMAL_ENERGY_RESOURCES [26] Micale, V., Trabacchi, C., & Boni, L.(2015). Using Public Finance to Attract Private Investment in Geothermal: Olkaria III Case Study, Kenya. https://climatepolicyinitiative.org/publication/using-public-finance-to-attract- private-investment-in-geothermal-olkaria-iii-case-study-kenya/.
Paper Title | : | A Novel Technique for Enhancement of the Security of Playfair Cipher |
Authors | : | Sarita Singh, -, -, -, - |
Affiliations | : | Assistant professor, Department of Computer Science and Engineering. Shri Ram Murti Smarak College of Engg & Tech, Bareilly AKTU, Luck now, India |
Abstract | : | In today's world advancement of data transmission over the unsecured channel and data is not secure. In this scenario, data should be in encrypted form and that data transmitted over the network. In cryptography, have two methods to encrypt data are substitution and Transposition. Transposition is referring to changing the position of a character in the given text. On the other hand, Substitution is referring to replacing the character with another character in the given text. Play fair cipher is based on polyalphabetic substitution cipher; classical play fair cipher has a 5*5 matrix. To increase the security of play fair cipher, this paper presents a new approach to introducing double encryption in the sender side and double decryption in the receiver side approach by vigenere cipher, play fair cipher, and linear congruently method. |
![]() | : | 10.22362/ijcert/2020/v7/i01/v7i0102 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i01/v7i0102 |
[1]Bhowmick, Anirban, Anand Vardhan Lal, and Nitish Ranjan. "Enhanced 6x6 Playfair Cipher using Double Myszkowski Transposition."International Journal of Engineering Research and Technology. Vol. 4. No. 07, July-2015. IJERT, 2015. [2] Negi, Ashish, et al. "Cryptography Playfair Cipher using Linear Feedback Shift Register."IOSR Journal of Engineering 2.5 (2012): 1212-1216. [3] Kumar, Vinod, et al. "Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept'."International Journal of Innovative Technology and Exploring Engineering (IJITEE) 3 (2013). [4] Bhattacharyya, Subhajit, Nisarga Chand, and Subham Chakraborty. "A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps." [5] Dhenakaran, S. S., and M. Ilayaraja. "Extension of Playfair Cipher using 16X16 Matrix."International Journal of Computer Applications 48.7 (2012). [6] Basu, Sanjay, and Utpal Kumar Ray. "Modified Playfair Cipher using Rectangular Matrix."IJCA (0975-8887) Volume (2012) [7]. Alam, A. Aftab, B. Shah Khalid, and C. Muhammad Salam. "A Modified Version of Playfair Cipher Using 7? 4 Matrix."International Journal of Computer Theory and Engineering 5.4 (2013): 626. [8] Kaur, Amandeep, Harsh Kumar Verma, and Ravindra Kumar Singh. "6 X 6 Playfair Cipher using LFSR based Unique Random Number Generator."International Journal of Computer Applications 51.2 (2012). [9] Murali, Packirisamy, and Gandhidoss Senthilkumar. "Modified version of Playfair cipher using a linear feedback shift register."Information Management and Engineering, 2009. ICIME'09. International Conference on. IEEE, 2009. [10] Srivastava, Shiv Shakti, and Nitin Gupta. "Security Aspects of the Extended Playfair cipher."Communication Systems and Network Technologies (CSNT), 2011 International Conference on. IEEE, 2011. [11] https://en.wikipedia.org/wiki/Pseudorandom_number_generator [12] William, Stallings. Cryptography and Network Security: For VTU. Pearson Education, India, 2006.
Paper Title | : | Detection of Common Beta Globin Gene Mutations on Heterozygous Beta Thalassemia Including Haemoglobin E among High School Students |
Authors | : | Khin Moe Aung, Aye Aye Lwin, Haung Naw, Nan Cho Nwe Mon, Hnin Ohmar Soe ,Myitzu Tin Oung,Nilar Wynn, Ne Win |
Affiliations | : | *1 Department of Medical Research (Pyin Oo Lwin Branch) 2 Department of Medical Research 3 University of Medicine (Mandalay) 4 Myanmar Academy of Medical Science |
Abstract | : | Beta thalassemia is one of the most common genetic disorders worldwide with a defect in haemoglobin synthesis including Myanmar. This study was conducted to determine the proportion of high school students who have heterozygous ?-thalassaemia including Hb E and different types of common beta globin gene mutations by multiplex polymerase chain reaction. This community-based cross-sectional descriptive study was done in Myanmar adolescents in 2017. A total 290 apparently healthy high school students in which male 140 (48.3%) and female 150 (51.7%) studying in Basic Education High School, Anisakhan, Pyin Oo Lwin Township, Mandalay District, Myanmar were involved. Thalassaemia screening tests were done by combined NESTROFT/DCIP precipitation and confirmed test was done by Isoelectric Focusing (IEF). PCR- based genetic confirmatory by using mutant genes IVS 1-1, CD 41/42, IVS 1-5, CD 17, and nt-28. Total 131 cases (131/290, 45.2%) were positive with either of the two screening tests. These cases were considered as thalassaemia trait (carrier) and/or haemoglobin E carrier. Isoelectric focusing was done to find Hb E by which 45 cases (45/131, 34.3%) were found to have Hb E carrier. Remaining 86 cases were further run multiplex- PCR to detect beta thalassaemia carrier. Total 44 out of 86 cases were ?-thalassaemia traits (25 CD 41/42 (-TCTT), 13 IVS 1-5 (G-C), 1 IVS 1-1 (G-T); 5 compound heterozygous (IVS 1-5(G-C) /CD 41/42 (-TCTT)). CD 17 (A-T) and nt 28 (A-G) mutations were not detected in this study. NESTROFT screening test has 87% sensitivity and 82% sensitivity for the detection of Hb E carrier and ?-thalassaemia carrier respectively. DCIP screening test has 67.1% sensitivity and 68% sensitivity for the Hb E carrier and ?-thalassaemia carriers respectively. Combined both screening tests have 100% sensitivity for the detection of Hb E and ?-thalassaemia carriers. This study has highlighted that both screening tests should be used for population screening of thalassaemia and haemoglobinopathies in Myanmar. |
![]() | : | 10.22362/ijcert/2020/v7/i01/v7i101 |
DOI Link | : | https://doi.org/10.22362/ijcert/2020/v7/i01/v7i101 |
1. Origa, R, ‘Beta Thalassaemia, In: Pagon RA, Adam MP, Ardinger HH, et al., editors. Gene Reviews® [Internet]. Seattle (WA): University of Washington, Seattle; 1993-2016, Retrieved 2016 August 18. Retrieved 2016August10, 2014. http://www.ncbi.nlm.nih.gov/books/NBK1426/ 2. Galanello, R & Origa, R, ‘Beta-thalassaemia’, Orphanet Journal of Rare Diseases, vol. 5, pp. 1-15, 2010. 3. TIF Guidelines (Thalassaemia International Federation Guidelines), ‘Guideline for the Management of Transfusion Dependent Thalassaemia’, 3rd ed, pp. 12-17, 2012. 4. Origa, R, Galanello, R, Ganz, T, Giagu, N, Maccioni, L, Faa, G & Nemeth, E, ‘Liver Iron Concentrations and Urinary Hepcidin in Beta-Thalassaemia’, Haematologica, vol. 92, pp. 583–588, 2007. 5. Winichagoon, P, Thitivichianlert, A, Lebnak, T, Piankijagum, A & Fucharoen, S, , ‘Screening for the Carriers of Thalassemias and Abnormal Hemoglobins at the Community Level Southeast Asian’ , J Trop Med Public Health, vol. 33, pp. 145-150, 2002. 6. Fucharoen, G, Sanchaisuraiya, K, Sae-ung, N, Dangwibul, S & Fucharoen, S, ‘A Simplified screening Stragey for Thalassaemias and Haemoglobin E in Rual Communities in Southeast Asia’, Bull World Health Organ, vol. 82, pp. 364-372, 2004. 7. Old, J, Harteveld, CL, Traeger-Synodinos, J, Petron, M, Angastiniotis, M & Galanello, R, ‘Prevention of Thalassaemias and Other Haemoglobin Disorders’: Volume 2: Laboratory Protocols [Internet]. 2nd ed. Nicosia, Cyprus: Thalassaemia International Federation;2012.Retrieved2016August9, 2012 https://www.ncbi.nlm.nih.gov/books/NBK190576/ 8. Aung-Than-Batu, Khin-Kyi-Nyunt & Hla-Pe, ‘The Thalassaemia in Burma’, Union of Burma, J life Sciences, vol. 1, pp. 241-247, 1968. 9. Harano, K, Ne-Win & Harano, T, ‘Molecular Aspects of Transfusion Dependent Thalassaemic Children in Myanmar: Analysis of Common - Thalassaemia in Myanmar by Amplification Refractory Mutation System (ARMS) ’, Kawasaki Med J, vol. 26, pp. 161-164, 2000. 10. Yi-Yi-Tin, ‘Phenotypic and Genotypic Heterogeneity of Beta-Thalassaemia Intermedia in Myanmar’, Ph. D (Pathology) Thesis, University of Medicine (2), Yangon, Republic of the Union of Myanmar, Retrieved 2016 August 18, from University of Medicine, Mandalay Digital Thesis, 2004. 11. Sein-Win, ‘Clinical Spectrum and Genetic Heterogeneity of E-? Thalassaemia Intermedia in Myanmar Adults at Yangon General Hospital’, Ph.D. (Clincal Hematology) Thesis; University of Medicine (I), Yangon, Republic of the Union of Myanmar, Retrieved 2016 August 18, from University of Medicine, Mandalay Digital Thesis, 2010. 12. Brown, JM, Thein, SL, Weatherall, DJ & Khin-Mar-Mar, ‘The Spectrum of ?- Thalassaemia in Burma’, Br J Haematol, vol. 81, pp. 574-578, 1992. 13. Ne-Win, Harano, T., Harano, K., Thein-Thein-Myint, Rai-Mra, Okada, S., Shimono K. & Aye-Aye-Myint, ‘A Wider Molecular Spectrum of ?-Thalassaemia in Myanmar’, Br J Haematol, vol. 117, pp. 988-992, 2002. 14. Ne Win.. ‘Clinical and Molecular Heterogeneity of Hemoglobine E-Beta Thalassemia and Beta-Thalassemia Major in Myanmar’, Thesis for the degree of Doctor of Philosophy (PhD) Pathology, University of Medicine I, Yangon, Republic of the Union of Myanmar, Retrieved 2016 August 12, from University of Medicine, Mandalay Digital Thesis, 2002. 15. Hassan, S, Ahmad, R, Zakaria, Z, Zulkafli, Z & Abdullah, WZ, ‘Detection of ?-Globin Gene Mutations Among ?-thalassaemia Carriers and Patients in Malaysia: Application of Multiplex Amplification Refractory Mutation System–Polymerase Chain Reaction’, Malays J Med Sci., vol. 20, pp. 13-20, 2013. 16. Boonyawat, B., Monsereenusorn, C. & Traivaree, C. Molecular Analysis of Beta Globin Gene Mutations among Thai Beta-Thalassaemia Children: Results from a Single Center Study. The Application of Clinical Genetics. 7, 253–258, 2014. 17. Tongprasert, F., Sirichotiyakul, S., Piyamongkol, W., Tongsong, T. Sesitivity and Specificity of Erythrocyte Osmotic Fragility Test for Screening of ?-Thalassaemia-1 and ?-Thalassaemia in Pregnant Women. Gynaecol Obstet Invest, 69, 217- 20, 2010. 18. Viroj, W. Osmotic Fragility Test for Screening for Thalassaemia in Thai Pregnant Subjects: A Re-evaluation. J Haema. 7(2), 205-7, 2004. 19. Mamtani, M., Das, K. & Jawahirani A. Is NESTROFT sufficient for mass screening for ?-thalassemia trait? J Med Screen. 14, 169–73, 2007. 20. Singh, SP. & Gupta, SC. Effectiveness of red cell osmotic fragility test with varying degrees of saline concentration in detecting ?-thalassaemia trait. Singapore Med J. 49(10), 823-6, 2008. 21. Yazdani, SM., Ahmed, S. & Abbas F. One Tube Osmotic Fragility Test: A Screening Test for Microcytic Red Cells. Pak Armed Forces Med J. 58(1), 45-50, 2008. 22. Chakrabarti, I., Sinha, SK., Ghosh, N. & Goswami, BK. Beta-Thalassemia Carrier Detection by NESTROFT: An Answer in Rural Scenario? Iranian Journal of Pathology. 7 (1), 19 – 26, 2012. 23. Bobhate, S., Gaikwad, S. & Bhaledrao, T. NESTROFT as a Screening Test for Detection of ?-Thalassemia Trait. Indian J Pathol Microbiol. 45 (3), 265-7, 2002. 24. Sangkitporn, S., Sangnoi, A., Supangwiput, O., Tanphaichitr, VS. Validation of Osmotic Fragility and Dichlorophenol Indophenol Precipitation Test for Screening of Thalassaemia and Hb E. South East Asian J Trop Med Public Health. 36(3), 1538-42, 2005. 25. Jopang Y., Thinkhamrop, B., Puangpruk R. & Netnee, P. False positive rates of thalassaemia screening in rural clinical setting: 10- year experience in Thailand. South East Asian J Trop Med Public Health. 40(3), 576-580, 2009. 26. Sanchaisuriya, K., Fucharoen, S., Fucharoen G., et al. A Reliable Screening Protocol for Thalassemia and Hemoglobinopathies in Pregnancy: an Alternative Approach to Electronic Blood Cell Counting. Am J Clin Pathol. 123, 113-8, 2005. 27. Weatherall, DJ. & Clegg, JB. The Thalassaemia Syndromes’, Oxford: Blackwell Scientific Publications, 4th Ed, 770-80, 2001. 28. Insiripong, S., Yingsitsiri, W., Boondumrongsagul, J. & Noiwatanakul, J. Prevalence of Thalassaemia Traits in People without Anaemia or Microcytosis. J haematol Transfus Med. 24, 25-9, 2014. 29. Ambekar, SS., Phadke, MA., Balpande, DN., Mokashi, GD., Khedkar, VA., Bankar, MP., Gambhir, PS., Bulakh, PM. & Basutkar, DG. The Prevalence and Heterogeneity of Beta Thalassemia Mutations in the Western Maharashtra Population: A Hospital Based Study. International Journal of Human Genetic.1 (3), 219-223, 2001. 30. Huisman, THJ., Carver, MFH. & Baysl, E. A Syllabus of Thalassa Mutations. The Augusta, GA: Sickle Cell Anaemia Foundation. (http://globin.cse.psu.edu)., 1997.
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|
Citations Indices | All |
Citations | 1026 |
h-index | 14 |
i10-index | 20 |
Source: Google Scholar |
Acceptance Rate (By Year) | |
Year | Rate |
2021 | 10.8% |
2020 | 13.6% |
2019 | 15.9% |
2018 | 14.5% |
2017 | 16.6% |
2016 | 15.8% |
2015 | 18.2% |
2014 | 20.6% |