Sadashiv Ramkrushna Puranik, Sachin Ballal, V. Kharat
{"title":"Associated graphs of le-modules","authors":"Sadashiv Ramkrushna Puranik, Sachin Ballal, V. Kharat","doi":"10.47164/IJNGC.V12I2.761","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.761","url":null,"abstract":"Let M be an le-module over a commutative ring with unity. In this paper, an associated graph G(M) of M with all \u0000nonzero proper submodule elements of M as vertices has been introduced and studied. Any two distinct vertices \u0000n and m are adjacent if n+m = e. Some algebraic, topological and, graph theoretic properties of le-modules have \u0000been established. Also, it is shown that the Beck's conjecture is true for coatomic le-modules.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126560243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Video Surveillance System for Indian Farms","authors":"S. Sakhare, Priyanka More","doi":"10.47164/IJNGC.V12I2.795","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.795","url":null,"abstract":"Security is incredibly signicant for farms. Crops may be devastated by the intruders coming to the farm. Besides, \u0000because farms are often attacked by the intruders and it is stolen during yield, the farmer is forced to stay and \u0000protect the crops. In this paper remote farm monitoring system with video surveillance is described. This system \u0000will observe the intruders in the farm and force intruder to leave the farm. The system will also alert farmer \u0000regarding weather condition, grass cutting, and crop cutting. The electrical energy is generated by solar to \u0000provide sucient electrical power required to run the system. The main system is xed on the pole, comprising \u0000Raspberry-Pi, Camera, ultrasonic sensors, Humidity sensors, temperature sensors, smoke sensors, Wi-Fi module. \u0000The camera takes the frames of intruders, the system will detect the intruder and classify the intruders with time \u0000stamp. At the same time the alarm and light will be initiated to scare the intruder. The frames with intruders will \u0000be further analyzed for the intruder's classication and its timing of arrival. The smoke sensor is used to protect \u0000the farm from re, if re is detected, it turns ON the motor. The information collected by humidity sensors and \u0000temperature sensors will alert the farmer regarding weather condition to take precautionary measures. Proposed \u0000system is designed for Indian farms and it will be cost eective also. \u0000Keywords: Video Analytics, Internet of Things, Deep Learning in Agriculture, Smart agriculture.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127044651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on Heart Disease Diagnosis Using Deep Learning Methods","authors":"Trupti Vasantrao Bhandare, Selvarani Rangasamy","doi":"10.47164/IJNGC.V12I2.757","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.757","url":null,"abstract":"Developments for automation and advanced computing in the area of medical data processing has outcome with different new learning techniques. Deep learning has evolved as an advanced approach in machine learning applied to different old and new area of applications. Deep learning approaches have evolved as supervised, semi-supervised and un-supervised mode applied for different real time applications. The approach has shown a significant usage for image processing, computer vision, medical diagnosis, robotic and control operation application. Among various usage of machine learning approaches for automation, medical diagnosis has been observed as a new upcoming application. The criticality of data processing, response time, and accuracy in decision, tends the learning system more complex in usage for medical diagnosis. This paper outlines the developments made in the area of medical diagnosis and deep learning application for heart disease diagnosis. The application, database and the learning system used in the automation process is reviewed and outlined the evolution of deep learning approach for medical data analysis.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128736564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Various Cryptanalytic Attacks on the AES Algorithm","authors":"Harshali D. Zodpe, A. Shaikh","doi":"10.47164/IJNGC.V12I2.756","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.756","url":null,"abstract":"The Advanced Encryption Standard (AES) Algorithm is popularly being used for securing classified information of Military and Banking services. This has led to intensifying the research on various attacks on AES algorithm either to test the security of the algorithm itself or to obtain the secret information i.e. the key. The AES algorithm is constantly subjected to various cryptanalytic attacks since its release in 2001. However, most of these attacks are theoretical and have been incapable of breaking the AES algorithm completely. These attacks are performed on the reduced rounds of the AES algorithm are compared with the brute force attack for time and data complexity. The brute force attack tries all possible values of keys and is the most effective technique of cryptanalytic technique. This research paper presents an extensive survey on various existing cryptanalytic attacks on the AES Algorithm.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129544092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Based Recommendation System: A Review","authors":"Shreya Sharda, G. Josan","doi":"10.47164/IJNGC.V12I2.770","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.770","url":null,"abstract":"The digital era has created an extreme choice paradigm with an explosion of endless content. A user who is just \u0000starting on the platform or looking for a creature can be lost in this ocean. Therefore, it is necessary to design a \u0000system that can guide users as per their interest. To overcome this problem, the Recommendation System (RS) \u0000came into existence. RS is a tool used to recommend items as per user’s interests. The benefits of the RS cannot \u0000be exaggerated, given the potential impact to improve many of the problems associated with widespread use and \u0000over-selection in many web applications. In recent years, Machine learning (ML) shows great interest in different \u0000research areas, such as computer vision and Natural Language Processing (NLP), not only because of its stellar \u0000performance but also because of its attractive feature of demonstrating learning from scratch. The effect of ML \u0000techniques can be seen while applying these techniques to the prediction and recommender system. This paper \u0000presented a comprehensive survey on recommendation techniques used in conjunction with the ML approach in \u0000many domains. This work aims to find the shortcoming of available RS for different fields and the areas that \u0000require more effort to attain higher accuracy.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128762952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scheduling Algorithms of Cloud Computing: State of the Art","authors":"V. Kolekar, S. Sakhare","doi":"10.47164/IJNGC.V12I2.787","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.787","url":null,"abstract":"Cloud computing comes in center advancement of network guring, virtualization and web advances. The cloud computing is a blend of advancements where countless frameworks are associated in private or public organizations. This innovation oers powerfully adaptable framework for information, record stockpiling, and application. \u0000Scheduling is a primary task in a cloud computing climate. In cloud computing environment datacenters deal with this undertaking. The determination of a scheduling algorithm calculation relies on diffierent components like the parameters to be upgraded (cost or time), nature of administration to be given and data accessible with respect to diffierent parts of work. Work ow applications are the applications which need diffierent sub-taks to be executed in a specic manner so as to nish the entire undertaking. Diffierent scheduling algorithms are studied in this paper. The objective of cloud task scheduling is to accomplish high framework throughput and to appoint diffierent processing assets to applications. The Complexness of scheduling inconvenience increments with the size of the task and turns out to be exceptionally hard to fathom viably. Min-Min scheduling is utilized to decrease the make span of tasks by assuming the undertaking task length. Remembering this, cloud suppliers ought to \u0000accomplish client fulllment.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"285 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120979225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolutionary Computation Techniques for Intelligent Computing in Commercial Mobile Adhoc Network","authors":"Kavita Taneja, Harmunish Taneja, Ramanpreet Kaur","doi":"10.47164/IJNGC.V12I2.780","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.780","url":null,"abstract":"Ubiquitous smart devices and applications are constructing pavement for Mobile Adhoc Networks (MANETs) that allow the users to communicate without any physical infrastructure. The immense usage of pervasive computing devices have fuelled virtual environments which have exponentially enhanced the popularity of commercial MANET. In today’s scenario, MANETs are used by each and every individual to perform even routine tasks. This extensive growth in number of users of mobile network has posed a gigantic challenge in catering needs of a huge set of varied users. To deliver Quality of Service (QoS) to users, there is a need to incorporate intelligent computing techniques in commercial MANETs. Emerging intelligent computing trends in commercial MANET are explored in this paper. It further explores the role of evolutionary computation approach in tackling commercial MANET challenges for improving its performance. Comparative analysis of evolutionary computation techniques for commercial MANET is presented in this paper.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterizations of deletable elements and reducibility numbers in Some Classes of lattices","authors":"M. Agalave, R. Shewale, V. Kharat","doi":"10.47164/IJNGC.V12I2.772","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.772","url":null,"abstract":"In this paper, we have obtained some characterizations of deletable elements and studied reducibility in chains, graded, complete, planar, algebraic, relatively atomic and locally modular lattices. \u0000 \u0000The notion of reducibility number introduced by Kharat et al. is also studied in these classes of lattices.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"140 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Test Case Generation using UML diagrams and Feasibility Study to Generate Combinatorial Logic Oriented Test Cases","authors":"Subhash Tatale, V. Chandraprakash","doi":"10.47164/IJNGC.V12I2.781","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.781","url":null,"abstract":"Generating test cases automatically from the design specification of a system is the most challenging phase in Software Development Life Cycle. UML diagrams are the industrial standard design modelling artifacts and the same can also be used for automatic generation of test cases which can be subsequently used by the testers to verify the functionality of the System under Test. In the present survey, authors have focused on automatic \u0000generation of test cases using UML Sequence and Activity diagrams. Also, the authors have conducted a feasibility study to know whether these diagrams can be made use of to generate combinatorial logic oriented test cases.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"14 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123680945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Different Asr Classifiers on Mobile Device","authors":"Gulbakshee J. Dharmale, Dipti D. Patil","doi":"10.47164/IJNGC.V12I2.774","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.774","url":null,"abstract":"Automatic speech recognition is an option in contrast to composing on cell phones. Recently, it is usual and increasingly popular trend in communication. Classifier is used to classify the fragmented phonemes or words after the fragmentation of the speech signal. Several techniques are used for the classification of phoneme or word such as Neural Network, Support Vector Machine, Hidden Markov Model and Gaussian Mixture Model (GMM). This paper presents detailed study and performance analysis of above classification techniques. The performance evaluation is done to prove that GMM is better at the classification of signal data, and can be effectively used for improving the classification accuracy of the existing system. Our results show that accuracy of GMM is more than 20% better than other three classifiers. The performance of ASR classifier is evaluated on android phones, and evaluated for normal conversations in Hindi language used in day to day human to machine communications, using high-quality recording equipment.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123611633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}