-
Chapter and Conference Paper
Designing an Iterative Adaptive Arithmetic Coding-Based Lossless Bio-signal Compression for Online Patient Monitoring System (IAALBC)
Various new generation research works on real-time healthcare monitoring system are performing on to fulfill the demands of medical signal compression. In this paper, we proposed a state-of-the-art technique t...
-
Chapter and Conference Paper
A Markovian Analysis of Low Back Pain on Jute Mill Workers
Jute industry which employs around 3,50,000 labors, is a large contributor to India’s economy. With the prevalence of chronic low back pain among jute mill workers being 55%, the paper proposes a Markov model-...
-
Chapter and Conference Paper
On Mono-Line Boolean Symmetry Detection
detection of symmetries in a switching function is an NP-complete problem. In this paper, a single-line solution for detecting total symmetry has been proposed. The proposed method exploits the linearit...
-
Chapter and Conference Paper
Online Recommendation System Using Human Facial Expression Based Emotion Detection: A Proposed Method
Online recommendation system is a computer-based intelligent technique which has become popular in many e-commerce Web sites. It is used to recommend items to a user on the basis of some information like past ...
-
Chapter and Conference Paper
Implementation of Real-Time Virtual Dressing Room Using Microsoft Kinect SDK and Supervised Learning
Presently the usage of Electronic Commerce has been growing at a rapid space and many customers choose the online shop** option available, to avoid waiting in a long queue. Before buying an item specially cl...
-
Chapter and Conference Paper
Rotational Cryptographic Technique (RCT)
A Security scheme based on Block Cipher is being designed where the Encoding and Decoding be prepared using Modular Adding, Rotational Shift operation and binary XNOR operation. The original message is stream...
-
Chapter and Conference Paper
Forest Covers Classification of Sundarban on the Basis of Fuzzy C-Means Algorithm Using Satellite Images
The present study deals with forest cover classification of Sundarban on the basis of fuzzy c-means algorithm using satellite images from 1975 to 2018. Four features are considered in this region such as dense...
-
Chapter and Conference Paper
A Dynamic Threshold-Based Trust-Oriented Intrusion Detection System in MANET
In order to discard and detect rushing attacker in the network, this article analyses the MANET with dynamic threshold-based trust-oriented AODV (DTT-AODV) model. In the proposed method has been simulated and ...
-
Chapter and Conference Paper
Design Considerations of a Medical Expert System for Differential Diagnosis of Low Back Pain (ESLBP)
Low back pain is a communal musculoskeletal ailment that deprives many individuals worldwide of doing their daily and normal activities. With the absence of external biomarkers, most of the symptoms of low bac...
-
Chapter and Conference Paper
Product Recommendation for E-Commerce Data Using Association Rule and Apriori Algorithm
As internet technology advances and its usage gets popular among people Electronic Commerce (E-Commerce) business increases at a rapid pace. But the problem lying here is that E-commerce sites provide their cu...
-
Chapter and Conference Paper
Shared Memory Implementation and Scalability Analysis of Recursive Positional Substitution Based on Prime-Non Prime Encryption Technique
The paper reports shared memory implementation of Recursive Positional Substitution Based on Prime-Nonprime (RPSP) algorithm using OpenMP application programming interface
-
Chapter and Conference Paper
High Entropy and Avalanche Based Non-Feistel Cascaded CFB Block Cipher Through RSBPNDS and TE
Security solutions in today’s data driven solutions have become an inevitable part. Through this privacy, confidentiality and trust can be achieved and this cascaded technique is proposed. Cryptography is mos...
-
Chapter and Conference Paper
A Hybrid PSO-Fuzzy Based Algorithm for Clustering Indian Stock Market Data
Partitioning data points into several homogeneous sets is known as clustering. This paper proposes a hybrid clustering algorithm based on Different Length Particle Swarm Optimization (DPSO) algorithm and is ap...
-
Chapter and Conference Paper
Clustering of Noisy Regions (CNR)—A GIS Anchored Technique for Clustering on Raster Map
In this proposed work, a GIS anchored system has been approached, which initially takes as input, a digitized map, generally of a very large region, with the population of the common mass in different wards/ar...
-
Chapter and Conference Paper
Z Transformation-Based High Payload Authentication Technique with Higher Region of Convergence Value (ZATHRoc)
In this paper, a Z transformation-based authentication technique has been proposed with higher Region of Convergence (ROC) value. Sequentially, five bits from the authenticating mask in row major order are con...
-
Chapter and Conference Paper
Authentication of Audio Signals in Frequency Domain (AASF)
In this paper, an approach has been made to authenticate an audio song in a collection of a similar one. Generating a unique signature with the help of another short length audio signal that will not be direct...
-
Chapter and Conference Paper
A GIS Anchored System for Clustering Discrete Data Points – A Connected Graph Based Approach
Clustering is considered as one of the most important unsupervised learning problem which groups a set of data objects, in such way, so that the data objects belongs to the same group (known as cluster) are ve...
-
Chapter and Conference Paper
Directional Multi-scaled Fusion Based Median Filter for Removal of RVIN
In this paper Directional Multi-scaled Fusion Based Median Filter for Removal of RVIN (DMFBMF) has been proposed to restore images corrupted with random valued impulse noises. This filter employs a technique o...
-
Chapter and Conference Paper
Authentication in Higher Region of Convergence of Z Transform Domain (AHRocZ)
In this paper a novel technique for authentication has been proposed in composite real and imaginary components of Z transform domain in higher region of convergence
-
Chapter and Conference Paper
Neuro-key Generation Based on HEBB Network for Wireless Communication
In this paper a key generation technique for encryption/decryption, based on a single-layer perceptron network (Hebb Network), for wireless communication of information or data has been proposed. Two HEBB Neur...