{"title":"Automatic identification of acute arthritis from ayurvedic wrist pulses","authors":"N. Arunkumar, P. Shakeel, V. Venkatraman","doi":"10.1504/ijcaet.2020.10025501","DOIUrl":"https://doi.org/10.1504/ijcaet.2020.10025501","url":null,"abstract":"Traditional ayurvedic doctors examine the state of the body by analysing the wrist pulse from the patient. Mysteriously, the characteristics of the pulses vary corresponding to the various changes in the body. The three pulses acquired from the wrist are named as vata, pitta and kapha. Ayurveda says that when there is imbalance in these three doshas, one will have disease. Two different diseases will have different patterns in their pulse characteristics. Thus, the wrist pulse signal serves as a tool to analyse the health status of a patient. In the earlier work, we have standardised the signals for normal persons and then classified the diabetic cases using approximate entropy (ApEn) (Arunkumar and Sirajudeen, 2011) and later enhanced the results using sample entropy. In the present work, sample entropy (SampEn) is being used to classify for the acute arthritis cases.","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88785278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SOFTWARE DEVELOPMENT EFFORT ESTIMATION USING SOFT COMPUTING METHODS","authors":"Puja Sinha, P. Srivastava, Sumeet Kumar","doi":"10.34218/ijcet.10.5.2019.001","DOIUrl":"https://doi.org/10.34218/ijcet.10.5.2019.001","url":null,"abstract":"","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77826006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kuruganty Seetha Ram Babu, A. Satyanarayana, A. Kumar
{"title":"INVENTORY HOLDING PERIOD ANALYSIS OF SAP IMPLEMENTED COMPANIES","authors":"Kuruganty Seetha Ram Babu, A. Satyanarayana, A. Kumar","doi":"10.34218/ijcet.10.5.2019.002","DOIUrl":"https://doi.org/10.34218/ijcet.10.5.2019.002","url":null,"abstract":"","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"199 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74251344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COOPERATIVE POSITIONING OR UAV SWARMS BY FUSING IMU/UWB/GPS WITH FEDERAL KALMAN FILTER","authors":"Rubin Zou","doi":"10.34218/ijcet.10.5.2019.004","DOIUrl":"https://doi.org/10.34218/ijcet.10.5.2019.004","url":null,"abstract":"","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79154902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MODEL BASED SOFTWARE PROCESS","authors":"R. Biswas, P. Talwar","doi":"10.34218/ijcet.10.5.2019.005","DOIUrl":"https://doi.org/10.34218/ijcet.10.5.2019.005","url":null,"abstract":"","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90889053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CONGESTION CONTROL FOR A ULTRA-WIDEBAND DYNAMIC SENSOR NETWORK USING AUTONOMIC BASED LEARNING","authors":"N SanjayK, K. Shaila, R. VenugopalK.","doi":"10.34218/ijcet.10.5.2019.003","DOIUrl":"https://doi.org/10.34218/ijcet.10.5.2019.003","url":null,"abstract":"The physical conditions of the area of interest is being collected at the central location using a set of dedicated sensors that forms a network is referred to as Wireless Sensor Network. A dynamic environment is required for a secure multi-hop communication between nodes of the heterogeneous Wireless Sensor Network. One such solution is to employ autonomic based learning in a MAC Layer of the UWB TxRx. Over a time period the autonomic based network learns from the previous experience and adapts to the environment significantly. Exploring the Autonomicity would help us in evading the congestion of about 30% in a typical UWB-WSNs. Simulation results showed an improvement of 5% using Local Automate Collision Avoidance Scheme (LACAS-UWB) compared to LACAS. Key words: Autonomic Network Architecture, Dynamic Environment, LACAS, Stocastic Model, Ultra Wide-band, Wireless Sensor Networks. Cite this Article: Sanjay K N, Shaila K, Venugopal K R, Congestion Control for a Ultra-Wideband Dynamic Sensor Network Using Autonomic Based Learning, International Journal of Computer Engineering and Technology 10(5), 2019, pp. 20-37. http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=10&IType=5 Congestion Control for a Ultra-Wideband Dynamic Sensor Network Using Autonomic Based Learning http://www.iaeme.com/IJCET/index.asp 21 editor@iaeme.com 1. INTRODUCTION In collaborative space-timing task requires a low cost integrated sensing, communicating and computing nodes that involves an innovative technology in wireless networking, array processing and microelectronics. In the areas of embedded systems, networking, multi-agent systems and pervasive computing WSN finds a significant consideration due to the real time scenarios like environment monitoring, disaster relief. With the combination of large number of static sensor nodes the distributive sensing would be achieved in WSNs [1]. The unique functioning of WSNs can be characterized and the effective use of the communication protocol itself is mandatory and demands for the cross-layer design. One such approach is to combine the Local Automate and Autonomic Network Architecture at the MAC level of the network [2]. This leads to self-healing network that are energy efficient MAC with self-organizing and fault-tolerant routing protocols that involves distributed algorithms. MAC rules have been developed to minimize interference and packet collisions that includes [4], [5], [6]: optimizing the channel access, packet transmission and retransmission methods; packets lengths; modulation and coding; transmission powers; etc. are few of the well-known algorithms that are used till date [8], [9]. These techniques, are not well-suited to the WSNs due to the addressing issues. Thus, a serious paradigm shift in MAC designs is required. Therefore, the decentralized character of a typical WSNs has to be rolled out that complicates with any number of attempts that are required to attain a network wide synchronization [10], [11]. ","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"92 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76832774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PREDICTION OF DIABETES MELLITUS USING MACHINE LEARNING TECHNIQUES ","authors":"T. Asfaw","doi":"10.34218/ijcet.10.4.2019.004","DOIUrl":"https://doi.org/10.34218/ijcet.10.4.2019.004","url":null,"abstract":"","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83836688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AUDIO STEGANOGRAPHY TECHNIQUE USING CIRCULAR BIT REPLACEMENT","authors":"S. Bahuguna","doi":"10.34218/ijcet.10.4.2019.003","DOIUrl":"https://doi.org/10.34218/ijcet.10.4.2019.003","url":null,"abstract":"Audio steganography is one of the important methods to transit hidden information by modifying an audio signal in an imperceptible manner. In audio steganography, determining the best possible position for embedding the secret message with minimum alteration of the cover audio remains a challenging issue. In this technique we hide secrete text or audio information in a host message such that no one except the intended receiver is aware of its existence and prevents unauthorised access. Various techniques have been used for embedding information in digital audio. Least significant bit (LSB) technique is most commonly used technique for secure data transfer. This paper presents replacement of bits of samples to hide a sequence of bits of secrete text. The bits of samples are selected in a circular manner from LSB to MSB or vice versa. The results reveal satisfactory performance of the system and may be used for secure movement of data.","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87440869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GA BASED DIMENSIONALITY REDUCTION IN HYPERSPECTRAL IMAGE SEGMENTATION FRAMEWORK ","authors":"B. Srinivas, J. Prasad","doi":"10.34218/ijcet.10.4.2019.001","DOIUrl":"https://doi.org/10.34218/ijcet.10.4.2019.001","url":null,"abstract":"","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73856125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COMPARATIVE ANALYSIS OF CLASSIFICATION APPROACHES FOR BREAST CANCER","authors":"T. Asfaw","doi":"10.34218/ijcet.10.4.2019.002","DOIUrl":"https://doi.org/10.34218/ijcet.10.4.2019.002","url":null,"abstract":"Breast cancer is one of the greatest common diseases among women in Africa and worldwide. Accurate and early diagnosis is very significant phase in therapy and action. However, it is not an easy one due to some doubts in detection of breast cancer. Machine learning helps us to extract information and knowledge from this the basis of past experiences and detect hard-to-perceive pattern from large and noisy dataset. This paper compares and analysis the performance of machine learning algorithms, namely Decision Tree (DT), Logistic Regression (LR), Naïve Bayes (NB), and K-Nearest Neighbors (KNN) for detecting breast cancer. The data set used for comparison was from UCI Wisconsin original breast cancer data set. The result outcome shows that Logistic Regression performs better and classification accuracy is 96.93%.","PeriodicalId":38492,"journal":{"name":"International Journal of Computer Aided Engineering and Technology","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88679486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}