Now-a-days, food is very important in order to feed to the live people or animals. It is required to know the statistics about the food in terms of proteins, fat, and factors that increase immunity power. Hence, the p...
Now-a-days, food is very important in order to feed to the live people or animals. It is required to know the statistics about the food in terms of proteins, fat, and factors that increase immunity power. Hence, the proposed methodology called food IoT is developed that will scan the food and displays the statistics that guide details to the customer or client. The details describe about calories that are helpful, the details that will increase fat, the details like food is poisoned, and from the provided statistics, any one could judge the food is useful to feed. This proposed application guarantees the good health because health depends on feeding of food. This is more proactive because it guides which items to be added in case there is less kind of positive minerals and less proteins identified. Hence, a sensor to be required that will display the statistics about the food and is more helpful to the people in order to know category of factors involved in the food. The timed out and mineral less food is identified and could come to be known in this proposed approach. Also, this proposed approach helpful in terms of alerting as a guide based on past experience and reports future predictions about the health as like future weather predictions.
This article has been withdrawn: please see Elsevier Policy on Article Withdrawal ( https://***/about/our-business/policies/article-withdrawal ). This article has been withdrawn at the request of the Editor in Chief. ...
This article has been withdrawn: please see Elsevier Policy on Article Withdrawal ( https://***/about/our-business/policies/article-withdrawal ). This article has been withdrawn at the request of the Editor in Chief. Subsequent to acceptance of this special issue paper by the responsible Guest Editor Vimal Shanmuganathan, the integrity and rigor of the peer-review process was investigated and confirmed to fall beneath the high standards expected by Microprocessors & Microsystems. There are also indications that much of the Special Issue includes unoriginal and heavily paraphrased content. Due to a configuration error in the editorial system, unfortunately the Editor in Chief did not receive these papers for approval as per the journal's standard workflow.
The ideology of the people has changed over the decades, with the people's interest shifting towards a more closed environment, thinking about themselves, rather than their environment, consisting of their kith an...
详细信息
ISBN:
(纸本)9781538624609;9781538624593
The ideology of the people has changed over the decades, with the people's interest shifting towards a more closed environment, thinking about themselves, rather than their environment, consisting of their kith and kin and others. The result of this isolation is that the mental psychology of the people changes in accordance with the technological advancement. The major disadvantage is that the people's mental psychology could not be identified to follow any specific pattern. But the root of the tree is clear, the technology. Hence the analysis of the behavior of the user is done by allowing them answer a series of questions.
In the process of medication, it is a common practice to treat patients with saline for dehydration and other medical ailments to improve the health condition of the patients. When fed with saline continuous observati...
In the process of medication, it is a common practice to treat patients with saline for dehydration and other medical ailments to improve the health condition of the patients. When fed with saline continuous observation of nurses is mandatory in monitoring the level of the saline. There are many cases where patients are being harmed due to the staff inattentiveness, as their absence does not notice the completion of saline level in the container. This arise the problem of back flow of blood immediately after the completion of saline in container. Hence to protect the patient from getting harmed an IoT based saline level monitoring system has been developed. The proposed model incorporates a sensor which continuously detects the saline drops. Whenever the sensor does not detect the drops for a certain interval it alerts the staff of the hospital with the buzzer, helping to monitor the safety of the patients.
An Agile Methodology of software development has been more popular in the software industry in terms of fast software delivery, less documentation, more satisfaction and more interactions between developers and users....
详细信息
ISBN:
(纸本)9781538658741
An Agile Methodology of software development has been more popular in the software industry in terms of fast software delivery, less documentation, more satisfaction and more interactions between developers and users. In this paper Fuzzy Inference System based model is proposed to select an appropriate agile method for successful software development. A number of agile methods such as Extreme Programming (XP), Scrum, Feature Driven Development (FDD) and Dynamic System Development Method (DSDM) have been proposed in the literature. Selection of an appropriate method for a given project is a pivotal and a challenging issue. As a solution to this problem, the projects are categorized into four classes namely, Small scale, Medium scale, large scale and safety critical projects, where project size is estimated based on programmer months (PM) and the proposed model is applied to select the most appropriate agile method for each of the project category. MATLAB Simulation results reveal that the proposed model is efficient in predicting the suitability of one of the agile methods.
作者:
R. KrithigaE. IlavarasanAssistant Professor
Department of Computer Applications Perunthalaivar Kamaraj Arts College Puducherry Professor
Department of Computer Science & Engineering Pondicherry Engineering College Puducherry
Social networks have grown into a popular way for internet surfers to interact with friends in addition to family members, reading news, and also discuss events. Users spend more time on popular social platforms (e.g....
Social networks have grown into a popular way for internet surfers to interact with friends in addition to family members, reading news, and also discuss events. Users spend more time on popular social platforms (e.g., Facebook, Twitter, etc.) storing and sharing their personal information. This fact together with the prospect of communicating thousands of users fascinates the concentration of malicious users. They exploit the implicit trust interactions concerning users with the purpose of accomplishing their malicious objectives, for instance, create malicious links inside the posts/tweets, spread fake news, send out unsolicited messages to genuine users and so on. In this paper, we reviewed various existing techniques on spam profile detection in online social networks.
作者:
Arunkumar O. N.Divya D.Tony MathewAssociate Professor
Department of Mechanical Engineering Sree Narayana Gurukulam College of Engineering Kadayiruppu Kolenchery Ernakulam Kerala India. Assistant Professor
Department of Computer Science and Engineering Adi Shankara Institute of Engineering and Technology Vidya Bharathi Nagar Mattoor Kalady Ernakulam District Kerala India. Assistant Professor
Department of Mechanical Engineering Kottayam Institute of Technology and Science Kottayam Kerala India.
This article discusses goal programming model for optimizing working capital management (WCM) of a tire manufacturing company. The mathematical model is run for the years 2008–2009 to 2012–2013 and values of the res...
详细信息
This article discusses goal programming model for optimizing working capital management (WCM) of a tire manufacturing company. The mathematical model is run for the years 2008–2009 to 2012–2013 and values of the respective goals are taken from it. The validation for the model values with the actual values from the financial data are carried out to check the significance of the model values. The significance test is carried out in one sample t-test. It is observed that all the values got from the model are significant. The sales of the company for the year 2013–2014 is forecasted from the past data by linear regression using Microsoft Excel as a trend line. The model is used to 2analyze the values of variables of WCM for the year 2013–2014 to achieve a 30 percent return on assets (ROA) for the forecasted sales.
Due the fast growth of new technology application like social media analysis, web data analysis and medical information network analysis, here the various types of data are processed frequently. The large amount of ef...
Due the fast growth of new technology application like social media analysis, web data analysis and medical information network analysis, here the various types of data are processed frequently. The large amount of effective data management and analysis is very vital goal. To reduce the data processing complexity, time complexity, and space complexity in Big Data, the paper going to propose the k-nearest neighbor join (KNN) operation. KNN is used to find the K nearest points in S. It is a computational task that will handle the large range of applications such as knowledge discovery or data mining. When the volume and the dimension of data increases, then only distributed approaches can perform the big operations in a given time. Recent works have done on implementing the efficient solutions using the map reduce programming model because it is used for distributing the large scale data processing. Although these works provide different solutions for the same problem, each one has particular constraints and properties. This paper compares the existing of different computation of KNN on MapReduce. First the paper compares the solutions in to three steps for KNN computation on MapReduce: 1) Data processing, 2) Data partitioning and 3) Computation. The Experiment in this paper explains the variety of different data sets, and analyzes the data volume, data dimension and the value of k from many perspectives like time and space complexity, and accuracy.
The primary objective of this paper is to verify individuals as indicated by their finger surfaces. We propose to remove Finger Texture (FT) highlights of the two finger pictures (center, ring) from a low goal contact...
The primary objective of this paper is to verify individuals as indicated by their finger surfaces. We propose to remove Finger Texture (FT) highlights of the two finger pictures (center, ring) from a low goal contactless hand picture utilizing LBP strategy. The utilization of Inner-Knuckle-Print (IKP) in biometric recognition is the most broadly proposed validation work. The unique characteristics of the IKP give us the requirement for recognizable proof. During the IKP filtering process, the image created by the scanner might be partially unique. This paper proposes artificial neural networks for effectively coordinating procedures to IKP validation. By utilizing the Back-Propagation method, the algorithm coordinates IKP and relates them to a novel accomplished client. After grouping, the procedure restores to the best counterpart for the given finger impression variables.
The article deals with issues of impact of the digital economy on the development of agriculture, it determines the degree of influence of information technologies on agricultural production processes, presents the ty...
The article deals with issues of impact of the digital economy on the development of agriculture, it determines the degree of influence of information technologies on agricultural production processes, presents the types of information received from farmers and proposes process solutions for digitalization of production for each agricultural producer. The main directions of digitalization of breeding and seed production have been considered. It has been established that digital technologies make it possible to achieve the intended results faster and more efficiently and to reveal the fullest genetic potential of plants.
暂无评论