Electrocardiogram (ECG) Signal Analysis and Feature Extraction: A Survey
Survey Paper | Journal Paper
Vol.2 , Issue.5 , pp.1-3, May-2014
Abstract
ECG Signal plays an important role in the primary diagnosis, prognosis and survival analysis of heart diseases. ECG feature extraction plays an important role in the cardiac diseases. One cardiac cycle in an ECG signal consist of the P-QRS-T waves. It has amplitude and interval value which determines the functioning of heart of every human. ECG measures the rate and regularity of heartbeat. It displays the electrical activity of the heart in form of wave line on the paper. The ECG Signal is conducted with the data compression and reconstruction. Today so many research and techniques have been developed for analyzing the ECG signal. The information will then analyzed and classified on basis of compression method, fuzzy logic, etc.
Key-Words / Index Term
Electrocardiogram; DWT; WT; Fuzzy Logic Method
References
[1]. C. Saritha, V. Sukanya, Y. Narasimha Murthy �ECG Signal Analysis Using WaveletTransforms��, Department of Physics and Electronics, S.S.B.N. College (Autonomous) Anantapur � 515 001, Andhrapradesh, India Received 16 February 2008.
[2]. K.V.L.Narayana, A.Bhujanga Rao �Wavelet based QRS detection in ECG using MATLAB�, Innovative Systems Design and Engineering ISSN 2222-1727 (Paper) ISSN 2222-2871, Vol 2, No 7, 2011.
[3]. Muhammad Fahad Shinwari, Naveed Ahmed, Hassan Humayun, Ihsan ul Haq, Sajjad Haider and Atiq ul Anam �Classification Algorithm for Feature Extraction using Linear Discriminant Analysis and Cross-correlation on ECG Signals�, National University of Modern Languages, Islamabad, Pakistan Vol 2, No 7, 2011.
[4]. Tanveer Syeda-Mahmood, David Beymer, and Fei Wang, Sachin singh �Shape-based Matching of ECG Recordings�, (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 07, 2010, 2502-2505.
[5]. Gordan Cornelia, Reiz Romulus �ECG Signal Processing Using Wavelet�, University of Oradea: Electronics Department, Faculty of Electrical Engineeringand Information Technology, Oradea, Romania.
[6]. Yaniv Zigel, Arnon Cohen, and Amos Katz �ECG Signal Compression Using Analysis by Synthesis Coding�, IEEE Transactions on Biomedical Engineering,Vol. 47, NO. 10, OCTOBER 2000.
[7]. Sachin singh, Netaji Gandhi.N � Pattern analysis of different ECG signal using Pan-Tompkin�s algorithm�, Institute of Technology Roorkee, India (IJCSE) International Journal on Computer Science and EngineeringVol. 02, No. 07, 2010, 2502-2505.
[8]. Tatiparti Padma, M. Madhavi Latha, Abrar Ahmed � ECG compression and labview implementation�, GRIET, JNTU, Hyderabad, India, Member IETE; JNTU, Hyderabad, India, Member IEEE; GRIET, Hyderabad, India.
[9]. Ruqaiya Khanam, Syed Naseem Ahmad �ECG Signal Compression for Diverse Transform�, Faculty of Engineering, Electronics & Communication Engineering, Jamia Millia Islamia University, Delhi.India Information and Knowledge Management ISSN 2224-5758 (Paper) ISSN 2224-896X (Online) Vol 2, No.5, 2012.
[10]. V S S Readdy Orireaddy, Dr. I Santiprabha � Noise Supression from ECG Signal using LMS and RLS Technique�,ECE Dept., Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, INDIA-533033 International Journal of Advanced and Innovative Research ISSN : 2278-7844 Avaliable online Vol 1, Issue 2, July 2012.
[11]. Emran M. Tamil, Nor Hafeezah Kamarudin, Rosli Salleh, M. Yamani Idna Idris, Noorzaily, M. Noor, Azmi Mohd Tamil,�Heartbeat Electrocardiogram Signal Feature Extraction Using Discrete Wavelet Transform�,University of Malaysia.S.
[12]. Shivi Tyagi, Mahendra Kumar Patil � Analysis of EMD Based QRS Detection Methods in Electrocardiogram (ECG) Signal�, Department of ECE, MM Engineering College MM University, Mullana, Ambal, India
[13]. International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online Volume 3, Issue 3, March 2013.
Citation
P.S. Jagatap, R.R. Jagtap, "Electrocardiogram (ECG) Signal Analysis and Feature Extraction: A Survey," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.1-3, 2014.
Improving the Stability and Quality of Service in Cluster Head Rule Base System Using MANETs
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.4-7, May-2014
Abstract
Abstract-This paper considers the problem of finding high and low frequency node disjoint and multi constrained QoS multipath from source to destination by using agent based fuzzy inference system. CGSR protocol divide the network into several small areas called clusters and the members of each cluster entrusted to a special node called cluster-head. A fuzzy logic system was proposed by which we select a suitable cluster-head to improve the quality of CGSR protocol. Selecting an appropriate cluster-head can save the power of overall network because the Cluster-Head node consumes more power than other ordinary nodes and the node with the highest chance is elected as the cluster-head. (1) Determination of multiple paths and picking up of resource information (available energy, mobility,distance,and chance) of the intermediate nodes from source to destination. (2) Recognition of node disjoint, and multi-constrained QoS fit paths by using Takagi-Sugeno Fuzzy Inference System (TSFIS). TSFIS extracts a fuzzy QoS weight from available resource information of the intermediate nodes. (3) Selection of the best path depending on the fuzzy QoS weight. (4) Maintenance of QoS path when path breaks due to mobility of node or link failure. To test the performance effectiveness of the approach. Simulation results show that our proposed protocol is better than I-MAN on the basis of data drop, load, delay and throughput parameters. Hence, the proposed system gives an efficient result in the presence and absence of threats because it launches an appropriate protocol on the basis of network contexts.
Key-Words / Index Term
Fuzzy Logic System, Hops, QoS, MANET, FIS
References
[1]. G. Pei, M. Gerla, X. Hong, and C. Chiang. A wireless hierarchical routing protocol with group mobility. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), September 1999.
[2]. A. Iwata, C.-C. Chiang, G. Pei, M. Gerla and T.-W. Chen, "Scalable routing strategies for ad hoc wireless networks," IEEE J. Select. Areas Commun., Vol. 17, No. 8, August 1999, pp. 1369-1379.
[3]. Hui-Yao An; Ling Zhong; Xi-Cheng Lu; Wei Peng, A cluster-based multipath dynamic source routing in MANET Wireless And Mobile Computing, Networking And Communications, 2005.
[4]. Rendong Bai and Mukesh Singhal, "DOA: DSR over AODV Routing for Mobile Ad Hoc Networks," IEEE Transactions on Mobile Computer, vol. 5, NO. 10, October 2006
[5]. Akhtar M A K, and Sahoo G (2013). A novel methodology for securing ad hoc network by friendly group model, Computer Networks & Communications (NetCom), vol 131, 23�35.
[6]. Saeed N H, Abbod M F et al. (2010). IMAN: An Intelligent MANET routing system, 2010 IEEE 17th International Conference on Telecommunications (ICT), 401�404.
[7]. Saeed N (2011). Intelligent MANET optimisation system.
[8]. Biswas K, and Ali M I (2007). Security threats in mobile Ad Hoc network, Master Thesis, Thesis no: CS-2007:07, Department of Interaction and System Design, School of Engineering Blekinge Institute of Technology, Sweden.
[9]. Ilyas M (2010). The handbook of Ad Hoc wireless networks, vol 29, CRC press.
[10]. Boukerche A (2008). Algorithms and protocols for wireless, mobile Ad Hoc networks, vol 77, John Wiley & Sons.
[11]. Anjum F and Mouchtaris P (2007). Security for wireless ad hoc networks, Wiley.com.
[12]. Michiardi P, and Molva R (2002). Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Advanced Communications and Multimedia Security, 107�121.
[13]. Buchegger S, and Le Boudec J Y (2002). Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile Ad Hoc networking and computing, 226�236.
[14]. Buchegger S, and Le Boudec J Y (2002b). Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile Ad Hoc networks, 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002. Proceedings, 403�410.
[15]. Balasubramanian A, and Ghosh J (2005). A reputation based scheme for stimulating cooperation in MANETs, Proceeding-s of The 19th International Teletraffic Congress, Beijing.
[16]. Bajaj L, Takai M et al. (1999). Glomosim: a scalable network simulation environment, UCLA Computer Science Department Technical Report, 990027, 213.
[17]. GloMoSim (1999). Global Mobile Information System Simulator, Available from: http://pcl.cs.ucla.edu/projects/glomosim/
[18]. Das S R, Belding-Royer E M et al. (2003). Ad hoc on-demand distance vector (AODV) routing.
[19]. Hu Y C, Perrig A et al. (2003). Packet leashes: a defense against wormhole attacks in wireless networks, INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol 3, 1976�1986.
Citation
Smita, R. Bhakar, "Improving the Stability and Quality of Service in Cluster Head Rule Base System Using MANETs," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.4-7, 2014.
A study on variations of Bottlenecks in Software Testing
Review Paper | Journal Paper
Vol.2 , Issue.5 , pp.8-14, May-2014
Abstract
Software testing is a crucial activity in software development and it determines to completeness of a product. Being a crucial activity it needs to be carried out smoothly without any difficulties. But in reality it is difficult to carry out testing smoothly. There exists number of factors and issues that alter the smooth happening of testing. Those factors and issues are collectively called as bottlenecks. This work aims at the process of identifying the bottlenecks that are very common to testing, bottlenecks that are application specific and testing type specific, analyse the reasons and provide recommendations that will make Software Testing[1] to happen without bottlenecks or with minimum bottlenecks. This work was carried out in two phases. Phase 1, was conducted to know and understand the existence of bottlenecks in software testing. Phase 2, deals with the analysis of bottlenecks and recommendations to avoid or minimize bottlenecks.
Key-Words / Index Term
IST, UAT, SUT, SRS
References
[1] Brain Marick, Classic Testing Mistakes, RSTAR97 conference.
[2] Amit Paradkar, Automated Generation of Self-Checking Function Tests, ISSRE, July 2002.
[3] Clay Williams, Thresa Kratschmer, A Technique for Generating Optimized System Test Suites, FSE 10th Symposium, November 2002.
[4] B.Hailpern and P.Santhanam, Software Debugging, testing and verification IBM Systems Journal, Vol. 41, No. 1, February 2002.
[5] Hongxia Jin and P.Santhanam, An approach to higher reliability using software components, ISSRE, November 2001.
[6] Clay Williams and Amit Paradkar, Efficient Regression Testing of Multi-Panel Systems, ISSRE, November 1999.
[7] Jeff Dunmall and Keith Clarke, Real-World Load Testing Tips to Avoid Bottlenecks when Your Web Apps Goes Live, MSDN , January 2003.
[8] Jeff Straathorf, Load Testing Intranet Applications Finding Hidden Bottlenecks, www.pureatria.com.
[9] Nina Godbole, Try Not to Make these Classic Mistakes, Information Technology October 2000.
[10] Mark Johnson,How to do good testing � an interview, STQE Magazine.
[11 Doug Nickerson, Software Quality Assurance � not for Dummies, www.computerbits.com/archive/2000
[12]BS 7925-1-1998, Software Testing Vocabulary
[13]IEEE 610, Standard Computer Dictionary.
[14]IEEE Std 1028-1997, Standard for software reviews.
[15]www.stickyminds.com
[16]www.rational.com
[17]www.mercury-interactive.com
[18]www.vlib.org
[19]www.thinkquest.org
[20]www.reality-test.com
[21]www.riceconsulting.com
[22]www.aptest.com
[23]www.worksoft.com
[24]www.computer.org
[25]www.sqatester.com
[26]www.stqemagazine.com
[27]www.softwareqatest.com
[28]www.rspa.com
[29]www.qalinks.com
[30]www.ibm.com
[31]www.sdmagazine.com
[32www.cmu.edu
[33]www.tamingthebeast.com
[34]www.testing.com
[35]www.unicomm.co.uk
[36]www.testingreflections.com
[37]www.perftestplus.com
[38]http://www.sisqa.com/SISQA_downloads.htm
[39]http://weblogs.asp.net/rosherove/articles
[40]http://www.theserverside.com/articles
[41]Roger S.Pressman, Software Engineering a Practitioner�s Approach, TMH
[42]W.E.Howden, A functional Approach to Program Testing and Analysis, IEEE Trans, Vol. SE- 12, No.10, October 1986
[43]Mordechai Ben-menachem / Garry s.Marliss, Software Quality Producting Practical, Consistent Software, Thomson Learning
Citation
S. Kannan, T. Pushparaj, "A study on variations of Bottlenecks in Software Testing," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.8-14, 2014.
A Comparison and Performance Evaluation of On-Demand Routing Protocols for Mobile Ad-hoc Networks
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.15-19, May-2014
Abstract
Mobile Ad-Hoc network is a collection of mobile nodes that form a network without any fixed infrastructure. Each mobile node will act as a host or router to forward the packets to other nodes. an ad-hoc network performance it is necessary to develop and use mobility models that accurately represent movements of the mobile nodes. In this paper we compared various On-demand routing protocols such as Ad hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). Simulation is universally considered the most effective method of evaluating the routing protocols. NS-2 simulation capabilities, the key performance indicators of the routing protocols have been analyzed such as routing overhead generation, data delivery and delay.
Key-Words / Index Term
MANET, AODV, DSR, NS2
References
[1] Anastasi G., Borgia E., Conti M., Gregori E, 2003. IEEE 802.11 Ad Hoc networks: protocols, performance and open issues, in: S.Basagni, M.Conti, S.Giordano,Stojmenvoic (Eds.), Ad hoc Networking, IEEE Press Wiley, New York
[2] Puja Kumari Sharma �Extended Dynamic Source routing Protocol for Adhoc Networks� Indian Journal of Computer Science and Engineering (IJCSE) ISSN : 0976-5166, Vol. 3 No.3 Jun-Jul 2012
[3] Bettstetter C., Hartenstein H., and Perez-Costa X., 2002, Stochastic Properties of the Random Waypoint Mobility Model: Epoch Length, Direction Distribution and Cell Change Rate, Fifth ACM Int`l Workshop Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM `02) pp. 7-14
[4] Broch J., Johnson B., and Maltz D., 1998, The Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks, IETF MANET Working Group, INTERNET DRAFT December 1998, http://tools.ietf.org/html/draft-ietf-manet-dsr-00
[5] Broch J., Maltz D A., Johnson B., Yih-Chun., and Jetcheva J., 1998, A Performance Comparison of Multi-Hop Wireless Ad-Hoc Network Routing Protocol, Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 98), pp 85-97
[6] Camp T., Boleng J., and Davies V., 2002, A Survey of Mobility Models for Ad-Hoc Network Research, Wireless Communication and Mobile Computing (WCMC), Special issue on Mobile Ad-Hoc Networking Research Trends and Applications, Vol. 2 No 5, pp.483-502197
[7] Chen B., and Chang C.H., 2003, Mobility Impact on Energy Conservation of Ad-Hoc Routing Protocols.� Proceedings of International Conference Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet (SSGRR �03) Italy, 2003
[8] Chen T W., and Gerla M., 1998, Global State Routing: A New Routing Scheme for AdhocWireless Networks, Proc. IEEE ICC�98, pp. 171-175
[9] Chiang C C., 1997, Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel, Proceedings IEEE SICON�97 Apr. 1997, pp.197-211.
[10] Corson M S., and Ephremides A., 1995, A Distributed Routing Algorithm for Mobile Wireless Networks, ACM/Baltzer Wireless Networks J., Vol. 1, no. 1, pp. 61-81.
[11] Corson M.S, and Macker J., 1999, Mobile Ad-Hoc Networking (MANET Routing Protocol Performance Issues and Evaluation Consideration, IETF RFC 2501, http://www.ietf.org/rfc/rfc2501.txt
[12] Das S R., Castaneda R., Yan J., Sengupta R., 1998, Comparative performance evaluation of routing protocols for m o b i l e , Ad Hoc Networks, October 1998, pp. 153�161.
[13] Vasudha Arora and C. Rama Krishna, �Performance Evaluation of Routing protocols for MANETs under Different Traffic Conditions�, 2nd IEEE International Conference on Computer Engineering and Information Technology, 2010.
[14] Vikas Singla and Parveen Kakkar, �Traffic Pattern based performance comparison of Reactive and Proactive Protocols of Mobile Ad-hoc Networks�, International Journal of Computer Applications, Volume 5-No. 10, August 2010.
[15] Mobile Ad Hoc Networking: �An Essential Technology for Pervasive Computing�, Jun-Zhao Sun Media Team, Machine Vision and Media Processing Unit.
[16] George Adam, Vaggelis Kapoulas, Chhristos Bouras, Georgios Kioumourtzis, Apostolos Gkamas and Nikos Tavoularis, �Performance Evaluation of Routing Protocols for multimedia transmission over mobile Ad hoc networks�,IFIP WMNC�2011.
[17] Mehran Abolhasan, Tadeusz Wysocki, and Eryk Dutkiewicz, �A review of routing protocols for mobile ad hoc networks�, Technical report, Telecommunication and Information Research Institute, University of Wollongong, Wollongong, NSW 2522; Motorola Australia Research Centre, 12 Lord St., Botany, NSW 2525, Australia,2003.
[18] Georgios Kiou Mourtzis, �Simulation and Evaluation of Routing Protocols for Mobile Ad hoc Networks�, Master thesis in Computer Science and Engineering, Naval Postgraduate School, Monterey California, September, 2005.
[19] D.B Johnson, D.A Maltz, and Yih-Chun Hu., �The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)�, Internet draft (draft-ietf-manet-dsr- 10.txt), 19 July 2004.
[20] Perkins E. Belding-Royer, and S.Das, �Ad hoc On- Demand Distance Vector (AODV) Routing�, RFC 3561, July2003.
[21] �The Network Simulator version 2�, the source code of ns-allinone-2.34 can be downloaded from http://www.isi.edu/nsnam/ns/ns-build.html
Citation
M. Nagendra, B. Kondaiah, "A Comparison and Performance Evaluation of On-Demand Routing Protocols for Mobile Ad-hoc Networks," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.15-19, 2014.
Mobile Application Development with Augmented Reality
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.20-25, May-2014
Abstract
Recently, because of the rapid development of mobile devices, augmented reality has extended from personal computers to mobile devices. They are getting popular as a platform for Augmented Reality (AR) application such as a Smartphone. The highly interactive nature of augmented reality with its user has given rise to various augmented reality applications for mobile devices, ranging from mere interaction to marketing, games, navigation, and so on. Mobile AR is mainly available whenever people require an informational support for a focused task. The combination of mobile applications and collaborative Augmented Reality into a single system makes the power of computer enhanced interaction and communication in the real world accessible anytime and everywhere. The objectives of the proposed work include main aspects of Augmented Reality (AR) for development of mobile applications. It describes the main fields in which mobile applications are developed using AR devices & systems. A mobile platform implementing the described features and collaboration between mobile and augmented reality is being demonstrated.
Key-Words / Index Term
Augmented Reality, Virtual Reality, Scientiï¬c Visualization, Unity Game Engine, Application Development
References
[1] R. Azuma. A survey of augmented reality. ACM SIGGRAPH, 1-38, 1997.
[2] Introduction to Augmented Reality: R. Silva, J. C. Oliveira, G. A. Giraldi. ITA, 1-11, 2003
[3] Berlin, Leslie. "Kicking Reality Up a Notch." New York Times. http://www.nytimes.com/2009/07/12/business/12proto.html/. July11,2009
[4] MARA https://research.nokia.com/page/219/
[5] Ensha, Azadeh. "Another Augmented-Reality App for the iPhone."New-YorkTimes. http://gadgetwise.blogs.nytimes.com/2009/10/15/augmented-reality-apps-continute-to-roll-out/ Oct. 15, 2009.
[6] Ganapati, Priya. "How it Works: Augmented Reality." Wired. http://www.wired.com/gadgetlab/2009/08/total-immersion/ Aug.25,2009.
[7] Inbar Ori. "Top 10 reality demos that will revolutionize video games." Games Alfresco. http://gamesalfresco.com/2008/03/03/top-10-augmented-reality-demos-that-will-revolutionize-video-games/ March 3, 2008.
[8] Metz, Rachel. "Another use for your phone: `augmented reality.`" Associated Press. http://www.google.com/hostednews/ap/article/ALeqM5gFbriFFi-0wGSgNbrUlpqQtvry5AD9B4D2BO0 Oct. 4, 2009.
[9] Parr, Ben. "Easter Egg: Yelp Is the iPhone`s First Augmented Reality App." Mashable. http://mashable.com/2009/08/27/yelp-augmented-reality/ Aug. 27, 2009.
[10] R. Azuma. A survey of augmented reality. ACM SIGGRAPH, 1-38, 1997.
[11] DigitalTrends http://www.digitaltrends.com/mobile/best-augmented-reality-apps/#!CReZ1/ Mar. 14 , 2014.
[12] Introduction to Augmented Reality: R. Silva, J. C. Oliveira,G.A.Giraldi. ITA, 1-11, 2003
[13] ARToolkit http://sourceforge.net/projects/artoolkit/ http://www.artoolworks.com/products/mobile/ Aug. 5, 2004
[14] SLARToolkit http://slartoolkit.codeplex.com/ May. 20, 2010.
[15] Metaio Creator � http://www.metaio.com/products/creator/ March, 2014
[16] Layar SDK https://www.layar.com/documentation/layar-sdk/ https://www.layar.com/products/custom-solutions/sdk/ Jan, 2013
[17] WikitudeSDK http://www.wikitude.com/products/wikitude-sdk/ Jan. 4, 2014
[18] Junaio http://www.junaio.com/get-started/ June. 21, 2012
[19] Metaio SDK http://www.metaio.com/sdk/ Dec. 8, 2011
[20] NyARToolkit http://nyatla.jp/nyartoolkit/wp/ July. 18, 2013
[21] Windows Phone 8 SDK http://www.microsoft.com/en-us/download/details.aspx?id=35471/ Oct. 30, 2012
[22] GetPreviewBufferY http://msdn.microsoft.com/en-us/library/microsoft.devices.photocamera.getpreviewbuffery(v=VS.92).aspx. April, 2013
Citation
A. Agarwal, N. K. Sharma, P. Gupta, P. Saxena, R.K. Pal, S. Mehrotra, P. Nair, M. Wadhwa, "Mobile Application Development with Augmented Reality," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.20-25, 2014.
Artificial Intelligence Based DAM Monitoring and Water Quality Measurement System
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.26-28, May-2014
Abstract
In order to enhance reliability and safety procedures of the dam, it is very important to gather dam behavior data in real-time monitoring system. The main aim to implement the automatic dam monitoring based on 8051 microcontroller is mainly designed to precisely measure, store and transmit various parameters output to the computer server. These sensor systems monitor the condition of the dam automatically by sensing water acidity level, water conduction level, pressure and temperature level of the dam .The sensor output is signal conditioned and it is digitized by using an analog to digital converter. The microcontroller controls the operation of the ADC and the digital output of the ADC is transferred to the input port of the microcontroller. Then the transmitter section transmits that digital output to the receiver section. When the water level of the dam goes above a threshold level the microcontroller automatically turns ON the Buzzer to indicate the critical condition. In the receiver section will be having GSM Modem to send the condition that presents in the dam to the supervisor and nearby people of the dam. The communication between transmitter and receiver is zigbee for the real time application for high reliability.
Key-Words / Index Term
zigbee, ph Sensor, Level Sensor, Temperature Sensor
References
[1] Robert D. Rugg, 1Max J. Egenhofer and Werner Kuhn, �Formalizing behaviour of geography features types�, Geographical Systems, Vol.4,, No. 2, pp. 159-179, 1997.
[2] Hao-Feng Xing, Xiao-Nan Gong, Xiao-Guang Zhou, and Hai-Feng Fu, �Construction of Concrete-Faced Rockfill Dams with Weak Rocks�, J. Geotech. andGeoenvir. Engrg. Volume 132, Issue 6, pp.778-785, June 2006.
[3] Ersayin, D., �Studying seepage in a body of earth-fill dam by (Artificial Neural Networks) ANNs�, Master Thesis, Izmir Institute of Technology, January 2006.
[4] Matthew P. McCarthy, �Decision support systems for large dam planning and operation in Africa�, International Water Management Institute, January 2007
[5] M. Acreman, J. Aldrick, C. Binnie, A. Black, I. Cowx, H. Dawson,M. Dunbar, C. Extence, J. Hannaford, A. Harby, N. Holmes, N.Jarritt, G. Old, G. Peirson, J. Webb and P. Wood, �Environmental flows from dams: the water framework directive�, Engineering Sustainability, Volume 162, Issue: 1, pp. 13-22, March 2009.
[6] Uwe M�ller, �Flood protection with, dams and flood control Reservoirs�before and after the extreme flood event of August 2002, Saxony�, Dams and Reservoirs, Volume 18, Issue: 2, pp. 85-91, July 2008.
[7] Aitken PL., �Informal discussion. Hydrological aspects of hydroelectric schemes�, ICE Proceedings, Volume 45, Issue 4, pp. 733-736.
[8] Lentz, Rodrick D., Kincaid, Dennis C. and USDA, ARS,�Polyacrylamide Treatments for Reducing Seepage in Soil-Lined Reservoirs: A Field Evaluation�, Transactions of the ASABE., Volume 51, Issue 2, pp. 535-544, March-April 2008.
[9] http://www.adb.org/water/topics/dams/dams0600.asp, August 2009.
Citation
L. Hemalatha, S. Sakthivel, "Artificial Intelligence Based DAM Monitoring and Water Quality Measurement System," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.26-28, 2014.
Design and Implementation of a Fast Unsigned 32-bit Multiplier Using Verilog HDL
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.29-31, May-2014
Abstract
This project deals with the comparison of the VLSI design of the carry look-ahead adder (CLAA) based 32-bit unsigned integer multiplier and the VLSI design of the carry select adder (CSLA) based 32-bit unsigned integer multiplier. Both the VLSI design of multiplier multiplies two 32-bit unsigned integer values and gives a product term of 64-bit values. The CLAA based multiplier uses the delay time of 99ns for performing multiplication operation whereas in CSLA based multiplier also uses nearly the same delay time for multiplication operation the overall simulation can be observed by using model sim and the synthesis report can be given by using Xilinx ise.
Key-Words / Index Term
CLAA; CSLA; Delay; Area; Array Multiplier; HDL Modeling & Simulation
References
[1]. P. Asadi and K. Navi, �A novel highs-speed 54-54 bit multiplier�, Am. J. Applied Sci., vol.4 (9), pp. 666-672.2007. http://www.scipub.org/fulltext/ajas/ajas49666-672.pdf.
[2]. W. Stallings, Computer Organization and Architecture Designing for Performance, 7th ed., Prentice Hall, Pearson Education International, USA, 2006, ISBN: 0-13-185644- 8.
[3]. J. F. Wakerly, Digital Design-Principles and Practices, 4th ed., Pearson Prentice Hall, USA, 2006. ISBN: 0131733494.
[4]. A. Sertbas and R.S. �zbey, �A performance analysis of classified binary adder architectures and the VHDL simulations�, J. Elect. Electron. Eng., Istanbul, Turkey, vol. 4, pp. 1025-1030, 2004. http://www.istanbul.edu.tr/eng/ee/jeee/main/pages/issues/is41/41005.pdf .
[5]. P. S. Mohanty, �Design and Implementation of Faster and Low Power Multipliers�, Bachelor Thesis. National Institute of Technology, Rourkela, 2009. http://ethesis.nitrkl.ac.in/213/1/10509019_final.pdf.pdf.
[6]. S. Brown and Z. Vranesic, Fundamentals of Digital Logic with VHDL Design, 2nd ed., McGraw-Hill Higher Education, USA, 2005. ISBN: 0072499389.
Citation
D.V. Gopal, M.M. Reddy, "Design and Implementation of a Fast Unsigned 32-bit Multiplier Using Verilog HDL," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.29-31, 2014.
Review of Ant Colony Optimization for Software Project Scheduling and Staffing with an Event Based Scheduler
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.32-38, May-2014
Abstract
Software project scheduling is one of the most important scheduling areas faced by software project management team. For a successful project, both software engineering and software management are very necessary. To complete the software project within a specified time limit, allocate a start and end date that determine the milestones and outcomes of the tasks and, determine which tasks depend on another task to complete its operation. It does the task of save time, build consistency, enhance visibility scheduling is very essential. There are several software project management resources and schedule estimation methods have been developed. Here, represents review of some of these software project scheduling techniques which are used recently and are helpful in handling the various type of scheduling used in software projects.
Key-Words / Index Term
Ant colony optimization, discrete optimization, Hybridization, Project Scheduling, Event based scheduler
References
[1]. V.Karthiga and K.Sumangala �A Hybrid approach for software project scheduling� International Journal of Computer Applications (0975 � 8887) Volume 59� No.16, December 2012
[2]. k.n.vitekar, s.a.dhanawe, d.b.hanchate �a review of various software project scheduling techniquesRamandeep Kaur et al. International Journal of Computer Science & Engineering Technology (IJCSET)
[3]. Filomena Ferrucci, Mark Harman, Federica Sarro �Meta-Heuristic Algorithm Based On Ant Colony Optimization Algorithm And Project Scheduling Problem (Psp) For The Traveling Salesman Problem� Proceedings of the 2013 International Conference on Systems, Control, Signal Processing and Informatics
[4]. S. G. Ponnambalam, N. Jawahar and B. S. Girish �An Ant Colony Optimization Algorithm For Flexible Job Shop Scheduling Problem� December 2009
[5]. Ramandeep Kaur, Sukhpreet Singh, Dr. Madhuchanda Rakshit �Review Of Solving Software Project Scheduling Problem With Ant Colony Optimization� .International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 4, April 2013
[6]. Bo Liu, Hussein A. Abbass, and Bob McKay �.Classification Rule Discovery With Ant Colony Optimization� Feature Article (2005)
[7]. Christian Blum �Ant Colony Optimization: Introduction and Recent Trends� Physics of Life Reviews 2 (2005) 353�373
[8]. Thomas st�utzlez and marco dorigo �Aco Algorithms For The Traveling Salesman Problems� (2000)
[9]. Massimiliano Di Penta, Mark Harman, and Giuliano Antoniol �The Use Of Search-Based Optimization Techniques Schedule And Staff Software Projects: An Approach An Empirical Study�Softw. Pract. Exper., 00(00), 1�7 (2009) Prepared using speauth.cls [Version: 1999/06/11 v1.1a]
[10]. Wei-Neng Chen, Member, IEEE, and Jun Zhang, Senior Member, IEEE �Ant Colony Optimization For Project Scheduling And Staffing With An Event-Based Scheduler� ieee transactions on software engineering, vol. 39, no. 1, january 2013
Citation
S. Taj, D.V.S. Ramana, "Review of Ant Colony Optimization for Software Project Scheduling and Staffing with an Event Based Scheduler," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.32-38, 2014.
Web Data Scraper Tools: Survey
Survey Paper | Journal Paper
Vol.2 , Issue.5 , pp.39-44, May-2014
Abstract
World Wide Web contains a huge amount of information that is increasing rapidly. Usually data stored on the web are in unstructured and semi-structured form. In order to obtain the essential data from the web, certain data scraper tools had been invented. In this paper we intend to briefly survey Web Data Scraper Process, the taxonomy for characterizing Web Data Scraper Tools and provide qualitative analysis of them. Hopefully, this work will simulate other studies aimed at a more comprehensive analysis of data scraper approaches and tools for Web data.
Key-Words / Index Term
Wrapper; Scraper;Document Object Model(DOM)
References
[1] Searchsoa website : www.searchsoa.techtarget.com
[2] Adelberg, B.Nodose: A Tool for semi-Automatically extracting structured and semi-structured data from text documents.In proceeding of ACM SIGMOD International conference on management of data (Seattle, WA, 1998) pp. 283-294.
[3] Arocena, G.O., Mendelzon, A.O.WebOQL: Restructuring Documents, Databases and Web. In proceedings of the 14th IEEE international conference on data engineering (Orlando, Florida, 1998) pp. 24-33.
[4] Califf, M.E., Mooney, and R.J.: Relational learning of pattern-match rules for information extraction. In proceeding of 16th national conference on artificial intelligence and 11th conference on innovative applications of artificial intelligence (Orlando, Florida, 1999) pp. 328-334.
[5] Crescenzi, V., Mecca, G.: Grammer have exceptions. Information Systems 23, 8 (1998), 539-565.
[6] Baumgartner, R., Gatterbauer, W., Gottlob, G. 2009: Web data extraction system. Encyclopedia of database systems, 3465-3471.
[7] Valter, G. Mecca, Paolo 2001: Road Runner Toward Automatic Generation from Large Web Sites
[8] Noha Negm, Passent, Abdel. B. Salem 2012:A survey of Web Information Extraction Tools
[9] Alberto, Berthier, Altigran, Julianan S.Teixeira : A brief survey of Web Data Extraction Tools
[10] Emilio Ferrara, Giacomo F., Robert Baumgartner: Web Data Extraction, Applications and Techniques: A survey. In ACM Transcations on Computational Logic June 2010.
[11] Baumgartner, R., Flesca, S., and Gottlob, G. Visual Web information extraction with Lixto. In Proceedings of the 26th International Conference on Very Large Database Systems (Rom, Italy, 2001), pp.119-128.
[12] Buneman, P. Semistructured data. In Proceedings of the sixteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (Tucson, Arizona, 1997), pp.117-121.
[13] Califf, M. E., and Mooney, R. J. Relational Learning of Pattern-Match Rules for Information Extraction. In Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence (Orlando, Florida, 1999), pp.328-334.
[14] Crescenzi, V., and Mecca, G. Grammars Have Exceptions. Information Systems 23,8 (1998), 539-565.
[15] Crescenzi, V., Mecca, G., and Merialdo, P. RoadRunner: Towards Automatic Data Extraction from Large Web Sites. In Proceedings of the 26th International Conference on very large Database Systems (Rome, Italy, 2001).
[16] Embley, D. W., Campbell, D. M., Jiang, Y. S., Liddle, S. W., Kai Ng, Y., Quass, D., and Smith, R. D. Conceptual-Model-Based Data Extraction from Multiple-Record Web Pages. Data and Knowledge Engineering 31, 3 (1999), 227-251.
Citation
S. Nain, B. Lall, "Web Data Scraper Tools: Survey," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.39-44, 2014.
Effect of WEKA Filters on the Performance of the NavieBayes Data Mining Algorithm on Arrhythmia and Parkinson�s Datasets
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.45-51, May-2014
Abstract
Data mining is the process of selecting, exploring and modeling a large database in order to discover model and pattern that are unknown [1]. Enormous gathered data in Health care Information society are scattered with different archive systems which are not connected with one another. This unorganized data leads to delay in monitoring, improper planning, defocus the analysis which leads to inaccuracy in decision making. The purpose of this study is to explore Supervised and Non Supervised WEKA filters on the data mining algorithm NavieBayes which is used for classification the data sets of Arrhythmia and Parkinson�s diseases. This in turn helps in increasing the performance accuracy of the classifier used for knowledge discovery [2] . Both the Datasets were taken from UCI Repository [3].
Key-Words / Index Term
Filters, Parkinson�s Data, Arrhythmia Data, NavieBayes, Performance Matrices
References
[1] I.H. Witten, E. Frank. Data Mining: Practical machine learning tools and techniques, 2nd Edition. Morgan Kaufmann, San Francisco, 2005.
[2] Basilis Boutsinas Nikolaos Mastrogiannis and Ioannis Giannikos. A method for improving the accuracy of data mining classification algorithms. Computers & Operations Research, vol. 36, no. 10, pp. 2829-2839, 2009.
[3] A. Asuncion, D.J. Newman. UCI Machine Learning Repository. Irvine, CA: University of California, School of Information and Computer Science,2007,http://www.ics.uci.edu/~mlearn/MLRepository.html.
[4] Arrhythmia�s in adults with congenital heart disease John K Triedman Heart 2002; 87: 383 389.
[5] Parkinson�s Disease , Challenges ,Progress And Promise ,November 2004 , National Institute Of Neurological Disorders and Stroke ,National Institutes Of Health.
[6] Diagnosis and Pharmacological Management Of Parkinson�s Disease, A National Clinical Guideline By Scottish Intercollegiate Guidelines Network.
[7] G.H.John and P.Langley, ―Estimating Continuous Distributions in Bayesian Classifiers,‖ Proceedings of the 11th Conference in University in Artificial Intelligance,San Francisco,1995,pp.338-345.
[8] D. Pedro and M. Pazzani "On the optimality of the simple Bayesian classifier under zero-one loss". Machine Learning, 29:103�137, 1997.
[9] Witten, T.H and Frank, E. 2000 Data mining: Practical machine learning tools and techniques with Java implementations. Morgan Kaufmann, San Francisco.
[10] Hirdes J.P., Perez E., Curtin-Telegdi N., et al, 1999. RAI-Mental Health (RAI-MH) Training manual and resource Guide Version 1.0.
[11] P.T.Kavitha, Dr.T.Sasipraba , Knowledge Driven HealthCare Decision Support System using Distributed Data Mining, Indian Journal of Computer Science and Engineering (IJCSE) , Vol. 3 No.3 Jun-Jul 2012.
[12] Blaz Zupan Riccardo Bellazzi. Predictive data mining in clinical medicine. International Journal of Medical Informatics, vol. 77, no. 2, pp. 81-97, 2008.
[13] Nickolas Savarimuthu Sarojini BalaKrishnan, Ramaraj, NarayanaSwamy and Rita Samikannu. Feature Selection using FCBF in TYPE II Diabetes Databases. Proceedings of 7th Annual Conference on Information Science, Technology and Management New Delhi, 2009.
Citation
T.A. Shaikh, A. Chhabra, "Effect of WEKA Filters on the Performance of the NavieBayes Data Mining Algorithm on Arrhythmia and Parkinson�s Datasets," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.45-51, 2014.