- Kamlesh Ku. Lahre
- S. R. Tandan
- Pooja Jaiswal
- Praveen Chouksey
- Shikha Gupta
- Priyanka Tripathi
- Sunita Dinkar
- Kamlesh Lahre
- Rachana Tiwari
- Kamlesh Lehre
- Tarun Dhar Diwan
- Glori Gunjan Bagh
- Rachna Verma
- Brijendra Singh
- Shivanee Pandey
- Pramod Rajput
- Amrita Verma
- Ashima Sahu
- Ayush Agrawal
- Asha Miri
- Aakanksha
- Akhilesh Shrivas
- Prashant Sahu
- Jageshwer Shriwas
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Miri, Rohit
- Implementation of Improved Distributed Wireless Channel Allocation Algorithm for Mobile Computing
Authors
1 Dr.C.V.Raman University, Kota, Bilaspur 495113, IN
2 National Institute of Technology, Raipur (C.G.) 495113, IN
Source
Wireless Communication, Vol 3, No 13 (2011), Pagination: 935-940Abstract
A channel allocation algorithm includes a channel acquisition and a channel selection scheme. Most of the previous work concentrates on the channel selection algorithm since early channel acquisition algorithms are centralized and rely on a mobile service station (MSS) to accomplish channel acquisition. The centralized schemes are neither scalable nor reliable. Recently, implementation of improved distributed wireless channel allocation algorithm have received considerable attention due to their high reliability and scalability. The most of the distributed algorithm is based on non-resource planning model in which a borrower needs to consult with every interference neighbors in order to borrow a channel. The proposed implementation of improved distributed wireless channel allocation algorithm is based on resource-planning model, a borrower need not to receive replies from every interfering neighbors, it can borrow a channel from that neighbor whose all group members replies with common free channels within the predefined time period. The proposed algorithm makes efficient reuse of channels and evaluates the performance in terms of message complexity, blocking rate.Keywords
Channel Allocation, Distributed Wireless, Mobile Computing.- A New Speaker Recognition System with Combined Feature Extraction Techniques in Continuous Speech
Authors
1 Department of CSE, Dr.C.V. Raman University (C.G.), IN
Source
Software Engineering, Vol 7, No 6 (2015), Pagination: 153-158Abstract
Speech knowledge can be conked out down into language mixture, lecturer detection and words detection. mixture refers to the process of repeatedly produce speech using a processor. The other main areas of notice both involve speech as input: whereas the objective of lecturer detection is to make out an entity based on his or her voice, language detection attempt to routinely understand the linguistic contented of such a word. Human easily and professionally communicate in order via speech despite a lot of complication, including environment noise, slip related to natural speech (stammer, full pause, false starts, etc.) and the innate inconsistency of person words. The latter represent the most confront for routine language detection, and will be examine from the viewpoint of the following three areas of linguistic learn:
1. Phonetics: expression and Acoustics
2. Phonology: Phonemes, Phonotactics and Coarticulation
3. Prosody: tension, field and rhythm
A lecturer confirmation method is collected of two different phase, a teaching stage and a test stage. Each of them can be see as a sequence of autonomous module. The first and foremost unit is the element removal unit assigning lecturer in order extract from the words. This is the plinth module, where the entire system presentation relies. The next unit is speaker modeling unit, represent that speaker’s say and audio features. The collection of model is mainly dependent on the type of words to be used, desired presentation, the ease of teaching and updating and storage space and computation consideration. The final module is for creation choice based on the teaching and testing stage. The system, in turn, output a dual choice: Either admit or reject the validity for the claim lecturer. Victory in speaker certification depends on extract and model the lecturer needy uniqueness of the speech signal which can efficiently differentiate one talker from another.
Keywords
Speech Technology, Stream of Sound, Desired Performance, Efficient Communication, Graphical User Interface.- MVC Model 2 Architecture with AJAX Technology Makes Web More Efficient and More Powerful By Reducing Web Traffic and Man Power Load
Authors
1 Dr C V Raman Institute of Science & Technology, Kargi Road Kota, Bilapsur, CG, IN
Source
Software Engineering, Vol 5, No 7 (2013), Pagination: 267-270Abstract
This paper represents how to reduce the traffic in web applications and to make high interactive web applications with rich client interface with great security issue. We have used MVC Model 2 architecture to reduce programmer traffic. In this architecture we can find the error very easily and quickly and using Ajax in this architecture makes our web project more robust and powerful. There are several highly interactive web applications and web sites. Those sites faced a common problem of page refreshing and data trafficking. Sometimes user has to wait for long time to reload the page. This paper also presents the interactive responsiveness from the server as well as from user‟s perspective in MVC Model 2 Architecture. To avoid such kind of situation AJAX came to a rescue. It also saves the round trip to the server with java security. It also reduces the development costs, in particular in the realm of quite simple, form-based GUIs which are common-place in commercial e-business-systems.Keywords
Web, MVC Model 2, AJAX , Error.- Improved MVC for J2EE Architecture
Authors
1 Dr. C.V. Raman University, Kota, Bilaspur, 495113, IN
2 National Institute of Technology, Raipur (C.G.), 92010, IN
3 Department of Computer Science & Engineering, Dr.C.V. Raman University, Kota, Bilaspur, 495113, IN
Source
Software Engineering, Vol 4, No 11 (2012), Pagination: 468-472Abstract
The model view controller (MVC) is a fundamental design pattern for the separation between user interface logic and business logic. Since applications are very large in size these days and the MVC design pattern can weak the coupling among the different application tiers of application. this paper presents a web application framework based on MVC in J2EE platform, and extends it with XML so that the framework is more flexible, expansible and easy to maintain. This is a multi tier system including presentation layer, business layer, data persistence layer and database layer. This separate codes, and improve maintainability and reusability of the application. In this paper proposes a fusion model to reinforce MVC architecture, where we are trying to display different types of error on same page with the help of try catch and finally block in place of displaying various errors on different pages. In this paper we are displaying the type of error with the help of error code generated by the database server and with the help of try, catch and finally block.Keywords
J2EE, MVC, Try Catch Block.- Image Retrieval Based On Color and Texture Features Modification in Watermarking Technique
Authors
1 Department of CSE, Dr.C.V. Raman University (C.G.), IN
Source
Digital Image Processing, Vol 7, No 6 (2015), Pagination: 172-176Abstract
In This Paper Due to the blast of information trade on the Internet and the broad utilization of computerized media, it has been of extreme enthusiasm to advanced information proprietors in sight and sound security and mixed media copyright insurance. In this paper, an exhaustive methodology for securing and overseeing feature duplicate rights with watermarking procedures is presented. We propose a novel computerized feature watermarking plan in view of picture LSB watermarking plan. Power and devotion are the crucial prerequisites of a fruitful watermarking plan. In past work, a vigor scene-based watermarking plan is proposed. We concentrate on enhancing the loyalty of the plan in this paper. The constancy of the plan is upgraded by applying a LSB watermarking calculation, which streamlines the nature of the watermarked feature. The viability of this plan is confirmed through a progression of tests.Keywords
Picture Watermarking, Feature Outlines Extraction, Audio Extraction, Copyrights, Authentication.- Performance Evaluation and Comparison of Principal Component Analysis for Complex Images
Authors
1 Department of CSE, Dr.C.V. Raman University (C.G.), IN
Source
Digital Image Processing, Vol 7, No 6 (2015), Pagination: 177-181Abstract
Human Face recognition technique is widely used in many fields now a day. Different types of experiment were conducted on the human face and on the basis of those experiments various results and technologies were adopted or taken in the real life. Like; adhar card, driving license, police verification, pass port, bank identification proof each and every where demand photograph. adhar card connected voter id card because vote authentication is important issue in India.
Many type of form in any exam is done on the basis of the photograph of the applicant. Hence the face images processing is quite useful for different purposes. In recent competitive exams like in engineering entrance exam or in medical entrance exams various frauds related to photograph of face were there in national news. Many types of things related to face identification are there like;
Watching the face from Front side, from right side, from left side, from diagonally, and watching the changes in the human face.
Normally we are recognized important things are there in the human face from which a human face can be authenticated: - in which feature (such as eyes,) from face image was located.
(a)Eye, (b) Eye Brows Nose (c) Lips (d) Forehead (e) Cheeks,(f) ears,(g) nose (h)mouth (i) Facial Expression are Changed.
Keywords
Classification, Verification, Authentication, Facial Expression, Component Analysis.- Current Approaches and Challenges for Skin Cancer Detection
Authors
1 Deptt. of Engineering (CSE), Dr. C. V. Raman University, Bilaspur (C.G), IN
2 Deptt. of Engineering (CSE),Dr. C. V. Raman University, Bilaspur (C.G), IN
3 Dr. C. V. Raman University, Bilaspur, (C.G), IN
Source
Digital Image Processing, Vol 6, No 1 (2014), Pagination: 33-36Abstract
within the last several years, Cancer detected in medical sector has been very active research area of computer vision. Cancer can be recognition in a number of different ways, following the presence of certain signs and symptoms, screening tests, or medical imaging. A possible cancer is recognition it is diagnosed by microscopic examination of a tissue sample. Radiation therapy at some point during the treatment process. While cancer can be affected male and female of all ages, and a cancer are more affected common in children, most cases the risk of improving cancer generally increases with age. In 2007, cancer caused about 13% of all human deaths worldwide (8million). The most common treatment modalities for cancer are surgery, radiation therapy, and systemic therapy (i.e., drugs). These medical interventions have documented survival advantages, but the implications for QOL are not trivial. Surgery is performed on about 60% of cancer survivors Rates are raising as more people live to an old age and as mass lifestyle changes occur in the developing world. The growing risk of cervical cancer in India makes it necessary to develop methods for early detection of the disease and its subsequent treatment. Lack of knowledge is found to be the main reason for not having had of screening, non availability of female screener, inconvenient clinic times, lack of awareness of the test indication and benefits, considering onset not a risk of developing cancer and fear of embracement , detection of cancer are the factors , which has influenced cervical cancer screening. Over the past decade, the global health community has been giving increased attention to the importance of addressing cervical cancer prevention where the disease burden is greatest.Keywords
Immunotherapy, Biologic Therapies, Cancer Prevention, Cell Transplants, Cancer Survivors.- Fuzzy Logic Based Information Retrieval System
Authors
1 Department of Computer Science & Engineering, Dr. C.V. Raman University, Kota, Bilaspur-495113, IN
2 Department of MCA, NIT, Raipur, IN
3 Dept. of Computer Science & Engg., Dr. C.V. Raman University, Kota, Bilaspur-495113, IN
Source
Fuzzy Systems, Vol 4, No 7 (2012), Pagination: 248-251Abstract
The paper presents the basic idea involved in information retrieval using fuzzy set theory and fuzzy logic. It attempts to clarify the definition and some terms and discuss the possible sources of fuzziness within this sub-field. It also tries to prove that how this way retrieving information is more realistic and expressive than their crisp counterparts.Keywords
Vagueness, Imprecision, Uncertainty, Fuzzy, Information Retrieval.- Algorithm for Position and Path Estimation of Mobile Robot in Dynamic Environment Using Fuzzy Approach
Authors
1 Dr. C.V. Raman University, Kargi Road, Kota, Bilaspur-495001, (CG), IN
2 Dr. C.V. Raman University, Kargi Road, Kota, Bilaspur (CG), IN
Source
Fuzzy Systems, Vol 2, No 2 (2010), Pagination: 14-18Abstract
In this paper, we proposed algorithm for position and path estimation of mobile Robot in dynamic environment with the help of fuzzy approach. The application of the combined soft computing approaches are best techniques because of their ability to handle imprecision and uncertainties that are often present in the many real world problem and mobile Robot navigation is one of them. Rules of a Fuzzy Logic Controller (FLC) which a Robot uses to navigate among moving obstacles. The use of a fuzzy logic controller makes the approach easier to handle the uncertainties. A mobile Robot can then use this FLC to navigate in presence of moving obstacles. Fuzzy approach can produce efficient knowledge base of a FLC for controlling the motion of a Mobile Robot among moving obstacles.Keywords
Dynamic Environment, Fuzzy Approach Position and Path Estimation.- Improve the Accuracy and Efficiency of Medical Diagnosis Analysis Using Knowledge Discovery
Authors
1 Deptt. of Engineering (CSE), Dr. C. V. Raman University, Bilaspur (C.G), IN
2 Dr. C. V. Raman University, Bilaspur (C.G), IN
Source
Data Mining and Knowledge Engineering, Vol 5, No 8 (2013), Pagination: 319-322Abstract
The main objective Computer-based support in health care is becoming ever more important. No other domain has so many innovative changes that have such a high social impact. There has already been a long standing tradition for computer-based decision support, dealing with complex problems in medicine such as diagnosing disease, managerial decisions and assisting in the prescription of appropriate treatment. The Healthcare industry is among the most information intensive industries. Medical information, knowledge and data keep growing on a daily basis. It has been estimated that an acute care hospital may generate five terabytes of data a year. The ability to use these data to extract useful information for quality healthcare is crucial. Computer assisted information retrieval may help support quality decision making and to avoid human error. Although human decision-making is often optimal, it is poor when there are huge amounts of data to be classified. Also efficiency and accuracy of decisions will decrease when humans are put into stress and immense work. Imagine a doctor who has to examine 5 patient records; he or she will go through them with ease. But if the number of records increases from 5 to 50 with a time constraint, it is almost certain that the accuracy with which the doctor delivers the decisions will not be as high as the ones obtained when he had only five records to be analyzed.Keywords
Health Care, Natural Language Processing, Fuzzy Logic, Classification, Intelligent Decision Support System, Identifying Patients, Diagnosis.- A Fuzzy Approach to Multimodal Biometric Authentication
Authors
1 Dr. C.V. Raman University, Kota, Bilaspur, 495001, IN
Source
Biometrics and Bioinformatics, Vol 4, No 2 (2012), Pagination: 86-89Abstract
In the last few years the security of the user’s identity has become of paramount importance. In this paper we investigate the opportunity of using a multimodal biometric system as input of a fuzzy controller designed with the aim of preventing user substitution after the initial authentication process.Keywords
Biometry, Fuzzy System, Strong Authentication, Security.- An Innovative Study on PCA and ICA Based Face Recognition System for Static Images Using Interval Type2 Fuzzy Logic
Authors
1 Deptt. of Engineering (CSE), Dr. C. V. Raman University, Bilaspur (C.G), IN
2 Dr. C. V. Raman University, Bilaspur (C.G), IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 5, No 11 (2013), Pagination: 435-439Abstract
Within the last several years, Recognition of Human's Facial Expression has been very active research area of computer vision. It has the important role in the human-computer interaction (HCI) systems. This paper proposes a novel interval type2 fuzzy method for facial expression recognition on still images of the face. The new technique involves in extracting mathematical data from some special regions of the face and fed them to an interval type2 fuzzy rule-based system. Fuzzy fictions operation uses trapezoidal membership functions for both input and output. The Distinct feature of a system is its simplicity and high accuracy. Experimental results on database indicate good performance of the developed technique. New approach of information extraction based on interval type2 fuzzy logic, which can be used for robust face recognition system is proposed here. The results clearly confirmed the superiority of proposed approach. To improve the face recognition performance, a PCA-ICA signal preprocessing and interval type2 fuzzy based recognition algorithm is proposed. In this approach, signals of human face are firstly preprocessed effectively by combination of Principal Component Analysis (PCA) and Independent Component Analysis (ICA), and then processed with interval type2 fuzzy logic for the purpose of face recognition.Keywords
Face Recognition System, Principle Component Analysis (PCA), Independent Component Analysis (ICA), Linear Discriminate Analysis (LDA), Interval Type-2 Fuzzy Inference System, Interval Type-2 Fuzzy Logic.- Knowledge of Word Alignment Position Related To Parallel English-Hindi Sentences
Authors
1 Deptt. of Engineering (CSE), Dr. C. V. Raman University, Bilaspur (C.G), IN
2 Dr. C. V. Raman University, Bilaspur (C.G), IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 5, No 8 (2013), Pagination: 366-370Abstract
This paper is based on knowledge of word alignment position related to parallel English Hindi sentences. This methodology is base to develop the parallel English Hindi word dictionary, after syntactically and semantically analysis of the English Hindi source text. Proposed system is using for aligning the English and Hindi sentences the methodology can be used for other languages. Large parallel corpus of english-hindi pair language is not frequently available. Solve this problem used two strategies. First is normalization of tagged English sentences and Hindi sentences. Second technique is mapping english-hindi sentence using parallel english-hindi word dictionary. Hence proposed system is desirable to encourage English and Hindi parallel sentences. A more detailed explanation is done for rule-based (constraint-based) part-of-speech tagging and morphological disambiguation. Some rule-based part-of-speech tagging studies on Turkish language are presented. Besides, there is an attached to the paper. English language recommend monolingual dictionaries as a source of important information concerning grammar information, collocations, spelling, pronunciation, context and etymology of words. There are a large number of materials which help students and teachers to work with dictionaries. However, not all of these materials can be used at lower secondary schools, because the situation at many primary and secondary schools is different. Results indicate that by combining these hand-crafted, statistical and learned information sources, a recall of 96 to 97% with a corresponding precision of 93 to 94% and ambiguity of 1.02 to 1.03 parses per token, on test texts is attained. However the impact of the rules that are learned is not significant as handcrafted rules do most of the easy work at the initial stages.Keywords
Handcrafted Rules, Monolingual, Parser, Automatically, Speech Tagging, Parallel Sentences.- Smart E-Classroom
Authors
1 Department of CS, Dr. C.V. Raman University, Bilaspur, IN
2 Department of CSE, Dr. C.V. Raman University, Bilaspur, Chhattisgarh, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 5, No 7 (2013), Pagination: 320-323Abstract
To overcome the difficulties posed by more traditional and conventional learning methods, more and more organizations and institute are turning to e-learning to offer their employees an effective means of increasing their knowledge and understanding. E-learning offers organizations/institute the ability to deliver education independent of time and place. One of the major disadvantages of e-learning is it being monotonous which is the main reason of candidate lacking their interest during the e-learning courses, and hurdle e-learning in achieving its desire result (satisfaction) from candidates. In this paper we are trying to propose an attention analysis model to track and maintain the attention level of candidate, this system will concentrate on the ability of human non-verbal communication consisting of body posture, gestures, facial expressions, and eye movements, the value of these behaviour of every candidate is uncertain w.r.t. to time, and to solve this uncertainty we proposed to use Fuzzy logic.
This system will also notify the lecturer, to give break when most of the candidates in the class are showing inattentiveness in lectures.
Keywords
Attention Analysis, E-Classroom, Non-Verbal Communication.- A Novel Approach for Reducing the Candidate Item Sets and Large Item Sets by Fuzzy Mining Association Rule
Authors
Source
Fuzzy Systems, Vol 8, No 5 (2016), Pagination: 126-128Abstract
In this era of modern computing world, there are many fuzzy association algorithms is developed and still lots of work have to performed in this area. Some already proposed algorithm reduces data sets or space complexity and some reduces the time complexity and so on. Our proposed algorithms reduce the space complexity by reducing the candidate item sets and large item sets from data sets. We use the row count technique in fuzzy association rules.
Keywords
Candidate Item Sets, Large Item Sets, Time Complexity.- A Review Paper on Parallel Association Rules Mining Algorithm in Data Mining and MapReduce Framework
Authors
Source
Data Mining and Knowledge Engineering, Vol 8, No 5 (2016), Pagination: 147-149Abstract
Database Technology needed in all the areas. It’s a platform that provides facility to work with data in any digital domain. Data mining is a wide topic in the database world. This paper presented here, talks for data mining issue, Association Rules, the basic algorithm and parallel association rules algorithm for association rules mining in data streams. Study these algorithms and compare them. Also discuss the future scope for better algorithms and for the very large database.
Keywords
Data Mining, Association Rules, Apriori Algorithm, Parallel Association Rules, Mapreduce Framework.- ERP of Employee Management System Using MVC Architecture with Strong Session Management
Authors
1 Department of Information Technology, Dr C V Raman University, Bilaspur, Chhttishgarh, IN
2 Department of Computer Science Engineering, Dr C V Raman University, Bilaspur, Chhttishgarh, IN
Source
Software Engineering, Vol 8, No 9 (2016), Pagination: 227-229Abstract
To organize the data, the website plays an important role. For the security purpose the servlet technology is very robust. The session management in servlet also plays an important security issue. The Ajax technology is user friendly. The JSP technology to enhance the front end of web based project. These are the things to maintain the ERP of Employee Management System. The frequent data changes may also find with the help of the matching algorithm. The matching is done from the copy of original employee table. This papers or a proposed algorithm maintains the record of the Employee in a very easy and safe manner. Also populates the frequent changes occurs in the field of Employee tables. The Algorithm also maintains the strong session management using the MVC Architecture.Keywords
Session Management, Security, Frequent Changes Data, Data Backup, JSP, ERP, Web.- Survey Paper on Various Classification Approaches in Data Mining
Authors
1 Department of Computer Science & Engineering, Dr C V Raman University, Bilaspur Chhttishgarh, IN
2 Department of Computer Science & Engineering, Khairagarh, Chhttishgarh, IN