A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Tandan, S. R.
- Implementation of Improved Distributed Wireless Channel Allocation Algorithm for Mobile Computing
Authors
1 Dr.C.V.Raman University, Kota, Bilaspur 495113, IN
2 National Institute of Technology, Raipur (C.G.) 495113, IN
Source
Wireless Communication, Vol 3, No 13 (2011), Pagination: 935-940Abstract
A channel allocation algorithm includes a channel acquisition and a channel selection scheme. Most of the previous work concentrates on the channel selection algorithm since early channel acquisition algorithms are centralized and rely on a mobile service station (MSS) to accomplish channel acquisition. The centralized schemes are neither scalable nor reliable. Recently, implementation of improved distributed wireless channel allocation algorithm have received considerable attention due to their high reliability and scalability. The most of the distributed algorithm is based on non-resource planning model in which a borrower needs to consult with every interference neighbors in order to borrow a channel. The proposed implementation of improved distributed wireless channel allocation algorithm is based on resource-planning model, a borrower need not to receive replies from every interfering neighbors, it can borrow a channel from that neighbor whose all group members replies with common free channels within the predefined time period. The proposed algorithm makes efficient reuse of channels and evaluates the performance in terms of message complexity, blocking rate.Keywords
Channel Allocation, Distributed Wireless, Mobile Computing.- Web Content Mining Applications and Methods-A Survey
Authors
1 Computer Science Department, Dr. C.V. Raman University, Bilaspur (C.G.), IN
Source
Software Engineering, Vol 7, No 6 (2015), Pagination: 164-175Abstract
This survey paper concerned with the approaches of web substance mining and different uses of web mining. The World Wide Web (www) is the colossal wellspring of data which is available and searchable as well as a gigantic and huge correspondence channel for world wide. Web contains accumulation of hyperlinks, texts and images. Web mining methods are incredible framework utilized for data extraction. This review goes for giving an organized and extensive outline of the writing in the region of Web Data Extraction Methods and Applications.
Keywords
Eb Content Mining, Application, Methods, Web Mining.- MVC Model 2 Architecture with AJAX Technology Makes Web More Efficient and More Powerful By Reducing Web Traffic and Man Power Load
Authors
1 Dr C V Raman Institute of Science & Technology, Kargi Road Kota, Bilapsur, CG, IN
Source
Software Engineering, Vol 5, No 7 (2013), Pagination: 267-270Abstract
This paper represents how to reduce the traffic in web applications and to make high interactive web applications with rich client interface with great security issue. We have used MVC Model 2 architecture to reduce programmer traffic. In this architecture we can find the error very easily and quickly and using Ajax in this architecture makes our web project more robust and powerful. There are several highly interactive web applications and web sites. Those sites faced a common problem of page refreshing and data trafficking. Sometimes user has to wait for long time to reload the page. This paper also presents the interactive responsiveness from the server as well as from user‟s perspective in MVC Model 2 Architecture. To avoid such kind of situation AJAX came to a rescue. It also saves the round trip to the server with java security. It also reduces the development costs, in particular in the realm of quite simple, form-based GUIs which are common-place in commercial e-business-systems.Keywords
Web, MVC Model 2, AJAX , Error.- Improved MVC for J2EE Architecture
Authors
1 Dr. C.V. Raman University, Kota, Bilaspur, 495113, IN
2 National Institute of Technology, Raipur (C.G.), 92010, IN
3 Department of Computer Science & Engineering, Dr.C.V. Raman University, Kota, Bilaspur, 495113, IN
Source
Software Engineering, Vol 4, No 11 (2012), Pagination: 468-472Abstract
The model view controller (MVC) is a fundamental design pattern for the separation between user interface logic and business logic. Since applications are very large in size these days and the MVC design pattern can weak the coupling among the different application tiers of application. this paper presents a web application framework based on MVC in J2EE platform, and extends it with XML so that the framework is more flexible, expansible and easy to maintain. This is a multi tier system including presentation layer, business layer, data persistence layer and database layer. This separate codes, and improve maintainability and reusability of the application. In this paper proposes a fusion model to reinforce MVC architecture, where we are trying to display different types of error on same page with the help of try catch and finally block in place of displaying various errors on different pages. In this paper we are displaying the type of error with the help of error code generated by the database server and with the help of try, catch and finally block.Keywords
J2EE, MVC, Try Catch Block.- Current Approaches and Challenges for Skin Cancer Detection
Authors
1 Deptt. of Engineering (CSE), Dr. C. V. Raman University, Bilaspur (C.G), IN
2 Deptt. of Engineering (CSE),Dr. C. V. Raman University, Bilaspur (C.G), IN
3 Dr. C. V. Raman University, Bilaspur, (C.G), IN
Source
Digital Image Processing, Vol 6, No 1 (2014), Pagination: 33-36Abstract
within the last several years, Cancer detected in medical sector has been very active research area of computer vision. Cancer can be recognition in a number of different ways, following the presence of certain signs and symptoms, screening tests, or medical imaging. A possible cancer is recognition it is diagnosed by microscopic examination of a tissue sample. Radiation therapy at some point during the treatment process. While cancer can be affected male and female of all ages, and a cancer are more affected common in children, most cases the risk of improving cancer generally increases with age. In 2007, cancer caused about 13% of all human deaths worldwide (8million). The most common treatment modalities for cancer are surgery, radiation therapy, and systemic therapy (i.e., drugs). These medical interventions have documented survival advantages, but the implications for QOL are not trivial. Surgery is performed on about 60% of cancer survivors Rates are raising as more people live to an old age and as mass lifestyle changes occur in the developing world. The growing risk of cervical cancer in India makes it necessary to develop methods for early detection of the disease and its subsequent treatment. Lack of knowledge is found to be the main reason for not having had of screening, non availability of female screener, inconvenient clinic times, lack of awareness of the test indication and benefits, considering onset not a risk of developing cancer and fear of embracement , detection of cancer are the factors , which has influenced cervical cancer screening. Over the past decade, the global health community has been giving increased attention to the importance of addressing cervical cancer prevention where the disease burden is greatest.Keywords
Immunotherapy, Biologic Therapies, Cancer Prevention, Cell Transplants, Cancer Survivors.- Fuzzy Logic Based Information Retrieval System
Authors
1 Department of Computer Science & Engineering, Dr. C.V. Raman University, Kota, Bilaspur-495113, IN
2 Department of MCA, NIT, Raipur, IN
3 Dept. of Computer Science & Engg., Dr. C.V. Raman University, Kota, Bilaspur-495113, IN
Source
Fuzzy Systems, Vol 4, No 7 (2012), Pagination: 248-251Abstract
The paper presents the basic idea involved in information retrieval using fuzzy set theory and fuzzy logic. It attempts to clarify the definition and some terms and discuss the possible sources of fuzziness within this sub-field. It also tries to prove that how this way retrieving information is more realistic and expressive than their crisp counterparts.Keywords
Vagueness, Imprecision, Uncertainty, Fuzzy, Information Retrieval.- Algorithm for Position and Path Estimation of Mobile Robot in Dynamic Environment Using Fuzzy Approach
Authors
1 Dr. C.V. Raman University, Kargi Road, Kota, Bilaspur-495001, (CG), IN
2 Dr. C.V. Raman University, Kargi Road, Kota, Bilaspur (CG), IN
Source
Fuzzy Systems, Vol 2, No 2 (2010), Pagination: 14-18Abstract
In this paper, we proposed algorithm for position and path estimation of mobile Robot in dynamic environment with the help of fuzzy approach. The application of the combined soft computing approaches are best techniques because of their ability to handle imprecision and uncertainties that are often present in the many real world problem and mobile Robot navigation is one of them. Rules of a Fuzzy Logic Controller (FLC) which a Robot uses to navigate among moving obstacles. The use of a fuzzy logic controller makes the approach easier to handle the uncertainties. A mobile Robot can then use this FLC to navigate in presence of moving obstacles. Fuzzy approach can produce efficient knowledge base of a FLC for controlling the motion of a Mobile Robot among moving obstacles.Keywords
Dynamic Environment, Fuzzy Approach Position and Path Estimation.- A Fuzzy Approach to Multimodal Biometric Authentication
Authors
1 Dr. C.V. Raman University, Kota, Bilaspur, 495001, IN
Source
Biometrics and Bioinformatics, Vol 4, No 2 (2012), Pagination: 86-89Abstract
In the last few years the security of the user’s identity has become of paramount importance. In this paper we investigate the opportunity of using a multimodal biometric system as input of a fuzzy controller designed with the aim of preventing user substitution after the initial authentication process.Keywords
Biometry, Fuzzy System, Strong Authentication, Security.- Securing Android Application with Anti- Reversing Techniques
Authors
1 Department of Computer Science & Engineering, Dr. C V Raman Institute of Science & Technology, Bilaspur, Chhattisgarh, IN
2 Department of Computer Science & Engineering, Dr. C.V. Raman University, Bilaspur, Chhattisgarh, IN
3 Department of Computer Science & Engineering, Dr. C.V. Raman University, Bilaspur, Chhattisgarh,, IN
Source
Automation and Autonomous Systems, Vol 5, No 4 (2013), Pagination: 149-154Abstract
In this growing market of smart phones, Android is an open source platform of Google that has become one of the most popular operating system. As a result, protecting applications running on Android becomes of interest. Currently, Reverse engineering of Android applications is much easier than on other architectures, due to the high level but simple byte code language used. Hence, the goal is to minimize and manage risks of software flaws. Anti-Reverse engineering techniques can be used to prevent reverse engineering. This paper discusses the possible code obfuscation techniques and process exploitation techniques on the android platform. Our approach aims at increasing the complexity of the control flow of the application so that it becomes tough for a reverse engineer to get the business logic performed by an android application.Keywords
Android, Anti-Reverse Engineering, Code Obfuscation, Reverse Engineering.- Dynamic Motion Planning of Mobile Robot with Fuzzy Approach
Authors
1 Birla Institute of Technology, Mesra, Ranchi (JH), IN
2 Dept. of Computer Science, Birla Institute of Technology, Mesra, Ranchi (JH), IN
Source
Automation and Autonomous Systems, Vol 1, No 1 (2009), Pagination: 1-5Abstract
One of the key challenges in Dynamic Motion Planning of Mobile Robots is navigation in environment that are cluttered with obstacle. Motion planning becomes more complex when the configuration and position of obstacle are not known priori for such system Soft Computing Techniques are popularly used. Due to the dynamic uncertainties posed by the vary nature of the problem use of Fuzzy Approach makes the handling the task easier. In this paper a solution is proposed for dynamic motion planning of Mobile Robot with and without obstacle. A Fuzzy Logic Controller is design as a solution to the problem.Keywords
Dynamic Motion Planning, Fuzzy Logic Controller, Fuzzy Logic System.- Smart E-Classroom
Authors
1 Department of CS, Dr. C.V. Raman University, Bilaspur, IN
2 Department of CSE, Dr. C.V. Raman University, Bilaspur, Chhattisgarh, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 5, No 7 (2013), Pagination: 320-323Abstract
To overcome the difficulties posed by more traditional and conventional learning methods, more and more organizations and institute are turning to e-learning to offer their employees an effective means of increasing their knowledge and understanding. E-learning offers organizations/institute the ability to deliver education independent of time and place. One of the major disadvantages of e-learning is it being monotonous which is the main reason of candidate lacking their interest during the e-learning courses, and hurdle e-learning in achieving its desire result (satisfaction) from candidates. In this paper we are trying to propose an attention analysis model to track and maintain the attention level of candidate, this system will concentrate on the ability of human non-verbal communication consisting of body posture, gestures, facial expressions, and eye movements, the value of these behaviour of every candidate is uncertain w.r.t. to time, and to solve this uncertainty we proposed to use Fuzzy logic.
This system will also notify the lecturer, to give break when most of the candidates in the class are showing inattentiveness in lectures.
Keywords
Attention Analysis, E-Classroom, Non-Verbal Communication.- A Novel Approach for Reducing the Candidate Item Sets and Large Item Sets by Fuzzy Mining Association Rule
Authors
Source
Fuzzy Systems, Vol 8, No 5 (2016), Pagination: 126-128Abstract
In this era of modern computing world, there are many fuzzy association algorithms is developed and still lots of work have to performed in this area. Some already proposed algorithm reduces data sets or space complexity and some reduces the time complexity and so on. Our proposed algorithms reduce the space complexity by reducing the candidate item sets and large item sets from data sets. We use the row count technique in fuzzy association rules.