MATHEMATICAL ANALYSIS OF REAL TIME DATA MINING MODEL FOR THE MEDICAL AND HEALTH CARE APPLICATION

Size: px
Start display at page:

Download "MATHEMATICAL ANALYSIS OF REAL TIME DATA MINING MODEL FOR THE MEDICAL AND HEALTH CARE APPLICATION"

Transcription

1 International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 13, December 2018, pp , Article ID: IJMET_09_13_145 Available online at ISSN Print: and ISSN Online: IAEME Publication Scopus Indexed MATHEMATICAL ANALYSIS OF REAL TIME DATA MINING MODEL FOR THE MEDICAL AND HEALTH CARE APPLICATION J Samson Immanuel and G. Manoj, Shajin Prince Department of Electronics and Communication Engineering, Karunya Institute of Technology and Sciences (Deemed to be University), Coimbatore, India ABSTRACT Data mining models for Medical and Health care electronic data collection is a major developing field in this modern era of electronics. Data mining is done using machine languages for the medical field data collected electronically and are converted using the various data mining algorithms. In this paper, A variety of machine learning data mining intelligent tools which are accessible is discussed. In any case, over a while, not all tools are best for all issues inside the realized informational collection. The data mining model proposed in the paper is the modified cross-industrial medical data mining (CRISP- MDM). The performance of the proposed data mining retrieval method is much higher up to 30% increase in the system performance. Keywords: Data mining, machine intelligence, retrieval, CRISP-DM Cite this Article: J Samson Immanuel and G. Manoj, Shajin Prince, Mathematical Analysis of Real Time Data Mining Model for the Medical and Health Care Application, Journal of Mechanical Engineering and Technology, 9(13), 2018, pp INTRODUCTION At the point when data gathered electronically, in additionally, quantity and quality calculation of applied mathematics which acts as indicators inherent in the aid, and the aid relishes the various data mining (DM) [1] ways. When applying data processing in health care and drugs, additional issues like different data in different formats linguistics ability and patient privacy should be determined. The motivation of real-time analysis is the method and strategies of knowledge mining in drugs. The list of topics is directly related to: medical knowledge pre-processing strategies, medical images [2] process, and multi-relational data processing. In the literature, summary works of Philip Baylis [3][4], the means for the booming of mining of medical knowledge for the correct classification of clinical activity. Belazzi R, Zupan B [3] indicated that mining ways generally convey the data s medical specialty data regression, grouping, cataloguing and visualization tasks, to facilitate decision-making to support professionals in keeping with the first recent and sound regular literature impression, performed by Esfandiari et al. [5] editor@iaeme.com

2 J Samson Immanuel and G. Manoj, Shajin Prince 2. DATA MINING IN THE MEDICAL DOMAIN SYSTEM The long-ago decade has witnessed remarkable growth in electronic biomedical journalism, that is generated and keep digitally and is usually thought to be a reliable data source. [6] The completely different tools initially pre-process this information and regenerate into plans understood by the various tools that are in the mining method. The primary objective of this medical data mining was to develop a tool on a hand-held or a mobile machine. The design of the clinical system is shown in the figure1 [7] Generalizing both methods, the objectives of Data Mining usage for medical data's can be comprehensive into 2 main sets: Treatment resources optimization (healthcare organization domain), and Treatment quality improvement (medical treatment and research domain) [8]. In the next section, the different methodologies of data mining (DM) is discussed. 3. METHODOLOGIES OF DATA MINING The methodologies for data mining are Fayaad knowledge discovery in Database Process (KDD) model, Predictive Model Markup Language (PMML)and Sample, Explore, Modify, Model and Assess (SEMMA) process model are the most prominent (Piatetsky-Shapiro, 2014) [9] [10]. Figure 1. Data mining as a function of applied field of Clinical examination in the real-time Environment Figure 1 describes the data mining flow of the clinical examination of the data in the realtime environment in the treatment of patients in the hospitals. A. KDD process model by Fayaad's.' A review of KDD prevailing data discovery method models and available data processing (DM) standards provided by Fayaad et al.,1996. A Fayaad's summarized process model includes nine steps. Step1: Fayaad's process model in which is to understand the application domain: The first step for the process involves relevant prior knowledge of the objectives in the application of the KDD process model by Fayaad s. [13] Step2: Constructing a target dataset The construction of the target dataset is the second step consists of selecting the dataset or focus on a separating up of samples of data upon which the decision has made. Step3: Data clean-up and pre-processing The data clean up and pre-processing, is the third step which have the basic working selection, such as outliers. If necessary, collecting the required information to the description for noise, future on a verdict on strategies for treating not their data fields, and accounting for the time succession information and changes known, as well as making a decision on Data Base Management System (DBMS) [14] challenges, like the schema, data types and mapping of values editor@iaeme.com

3 Mathematical Analysis of Real Time Data Mining Model for the Medical and Health Care Application Step4: Data trimming and projection Data trimming and prediction [15] consists of getting detection features to symbolize the data, relying on the drive of the job, and using transformation techniques decrease to decline the adequate number of variables which are organism measured, or to obtain invariant depiction for the data. Step5: Selecting the functions Data Mining Choosing the function involves selection of the purpose of the model resulted from the process of Data Mining. Step6: Selecting the Data Mining algorithm Selecting the data mining algorithm is involved in picking the procedure to be enabled for probing for patterns [16] in the data set. Selecting parameters and models may be appropriate and matching a specific Data Mining technique with the general measures of the KDD procedure. Step 7: Technique for Data mining Data mining contains a for patterns of attention in a specific portrayal arrangement or a set of sequential representations, adding regression [17], tress or classification rules, dependency, clustering, line analysis and sequence modeling. Step 8 Interpretations: Interpretations involve understanding the bring into being patterns [17] and perhaps frequent to any of the preceding steps, in addition to the conceivable picturing of the designs extricated, expelling the unessential or pointless designs and deciphering the valuable ones in footings comprehensible by clients. Step 9 Utilizing discovered knowledge Utilizing the found information includes joining this information hooked on the system s execution, taking behaviour based on the information, or only archiving it and treat it to the attentive parties, as well as reviewing and settling possible clashes with already assumed (or extricated) information. In any case, this handle demonstrates one of the foremost referenced and utilized for common Knowledge Dataset Discovery [18] purposes, and it got to be the base demonstrate for other more point by point models. B. Cross Industrial Specific Process - MDM It suggests an iterative prepare stream, with leniently characterized circles in between stages, and a by and large iterative patterned nature of the MDM venture itself. The five stages of CRISP- MDM are given underneath and are as takes after: Phase 1: Medical understanding The primary stage places of intrigued the astute of the destinations of the restorative information investigation and the interpretation of these necessities, from the viewpoint of the subject range, and the issue defined into a definition of the Restorative Data Mining issue. In this stage, the starting arrangement of achievement of objectives is decided, noteworthy the victory model. Phase 2: Data preparations The second phase begins with the congregation of first phase data and admittance to the dataset. The process is the preparation of data, and the phase extend over all the activities that are inexpensive. Issues of information fidelity must be recognized and the introductory presumptions of which datasets might be of mindfulness for advance phases. The exercises of the information arrangement stage enormously depend on the highlights and the quality of the initial crude editor@iaeme.com

4 J Samson Immanuel and G. Manoj, Shajin Prince information. A few of the personal errands of information arrangement include choosing the tables, qualities projections, and records, and traits change. Phase 3: Modeling of the data set In this third case, a suitable selection made for modeling techniques, algorithms, or combinations. Usually, for the same task, there are a few possible modeling methods available. Thus, this step performed repeatedly in an iterative implies until the select demonstrate prominence criteria accomplished. Few routines have precise data standard limitations or data types. The modeling quality of the dataset assessed to arrange, to assess the value of the model, there are standard of measurements used which are significant in Data Mining and statistics: Precisions The proportion of properly classified objects. Specificity Adverse results suitably classified as such in the results set, e.g., sensitivity, accuracy, specificity, ROC curve, and cumulative gain chart. Sensitivity - The relationship between sensitivity and specificity evaluated using a ROC curve (Receiver Operating Characteristic) or a mathematical expression of the area below the curve (AUC)[19]. Cumulative Gain charts display the value of constructive retorts related by the models against the percentage of the populace. Phase 4: Evaluating of Dataset he assessment stage as of now contains aactually high-quality demonstration on a few models. Earlier to the ultimate stage of of the assessment of information set out the demonstrate, it is fundamental to evaluate it carefully, to survey the development steps, and make beyond any doubt that commerce goals accomplished appropriately. The ultimate result of the stage the possibility of whether the Data Mining comes about May down to utilized earth settings. Phase 5: Deployment of the dataset The ultimate stage, i.e., the arrangement stage stipulates the effective use of the comes about of MDM. Model inception isn t the ultimate step of the MDM extend. In spite of the cases where obtained information ought to be organized and displayed to the conclusion client in reasonable shape. Determining the set of necessities, arrangement stage may include, for the best case, a statement or sending of a rehashed Data mining prepare. Regularly, it'll be the conclusion client, instead of the information examiner who will carry out the sending exercises. It is imperative that the conclusion the client expects the activities required to be carried out in arrange to induce the viable benefits of the produced MDM to demonstrate. Figure 2 The design flow of the Medical data mining using R software editor@iaeme.com

5 Mathematical Analysis of Real Time Data Mining Model for the Medical and Health Care Application 4. DESCRIPTIVE MEDICAL DATA MINING MODELLING The experimental trial is conducted using the medical data of the echocardiography data analysis and additional claim of the analytical data mining methods, is done using the software. The software used for the development of image processing procedures and predictive modelling is realised in the R environment., = Where the value of simt given as in equation 2 $ " = # # ( (!, (!! $ " ' = # # (() ) (!,() ) (!! $ " * = # # +, - (!,, - (!. The formula of similarity value is sensible to assign the weighted value of the fine-tuned of weighed parameter wt, wu and wv have performed. In the experiment both the statistical and the weighted are relative to the number of the tuples of the related entity. / =,/ 0 =,/ 1 = (1) (2) (3) (4) (5) A. Applying publication meta-analysis clustering The meta-analysis clustering applied to Table 1 for medical data mining in the system using the CRISP model's scoring points for two strategies applied in the system considered the test. The phase classified into four phase of medical data (MD) understanding, and the preparation of the system is very significant. Phase TABLE I. Requirements for the SCORING CRISP_MDM Number of Activity Strategy 1 Strategy 2 Evaluating points Evaluating points MD Understanding MD preparation MD Evaluation MD Deployment Various methods do the accuracy of the different tools used to retrieve the medical data mining in the real-time analysis of the clinical data has given as follows in Table II the experimental analysis of the various Medical data mining accuracy as given below. Table II. Experimental accuracy of various tools for Medical Data Accuracy S.No. Tools Experiment Accuracy 1 WEKA Decision Table % 2 WEKA Decision Tree % 3 WEKA Naïve Bayes % 4 Discover*E Decision Tree % 5 Discover*E Dependence Tree % 6 Discover*E Rule-based Classifier % 7 Linear Vector Quantization % editor@iaeme.com

6 J Samson Immanuel and G. Manoj, Shajin Prince The accuracy of the data obtained over a while through the different tool, as shown in figure 3. The accuracy of the data obtained over the different tool over a period as shown in figure 3. The lowest rate of accuracy as given in the pie chart below shows the performance metrics of the modified algorithm. Figure 3. Incremental accuracy of medical data mining of various tools. 5. CONCLUSION A comparative study for medical databases. Set (MDS) concerning the psychological health patients have done. The MDS-MH is a typical assessment means for assessing patients with issues allied to psychological health. CRISP medical data mining has been successfully mathematically modeled, and the accuracy models of the various techniques have done in the medical domains. Applying CRISP-Medical Data Mining with the proposed echocardiography image preprocessing techniques proved that the resultant precision is adequate for real-world decision making. Furthermore, the resulting models which currently installed in the healthcare facility; therefore, the Deployment phase of the data diagnostics. REFERENCES [1] W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp [2] P. Baylis, "Better Health Care with Data Mining," SPSS White Paper, UK, 1999 [3] Bellazzi, R., Zupan, B. (2008, Feb). Predictive data mining in clinical medicine: current issues and guidelines. Int J Med Inform, 77(2), [4] H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4. [5] E. H. Miller, "A note on reflector arrays (Periodical style Accepted for publication)," IEEE Trans. Antennas Propagat., to be published. [6] J. Wang, "Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style Submitted for publication)," IEEE J. Quantum Electron., submitted for publication. [7] M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, [8] J. U. Duncombe, "Infrared navigation Part I: An assessment of feasibility (Periodical style)," IEEE Trans. Electron Devices, vol. ED-11, pp , Jan [Online]. Available: editor@iaeme.com

7 Mathematical Analysis of Real Time Data Mining Model for the Medical and Health Care Application [9] S. Chen, B. Mulgrew, and P. M. Grant, "A clustering technique for digital communications channel equalization using radial basis function networks," IEEE Trans. Neural Networks, vol. 4, pp , Jul [10] R. W. Lucky, "Automatic equalization for digital communication," Bell Syst. Tech. J., vol. 44, no. 4, pp , Apr [11] S. P. Bingulac, "On the compatibility of adaptive controllers (Published Conference Proceedings style)," in Proc. 4th Annu. Allerton Conf. Circuits and Systems Theory, New York, 1994, pp [12] G. R. Faulhaber, "Design of service systems with priority reservation," in Conf. Rec IEEE Int. Conf. Communications, pp [13] Waljee, A. K. H. P. D. &. S. A. G., A primer on predictive models. Clinical and translational gastroenterology, 5(1), p. e44. [14] Wehlou, M., Rethinking the Electronic Healthcare Record. S.l.: MITM - Man In The Middle AB. [15] Thomson Reuters Web of Science, Thomson Reuters Web of Science. [Online]. Available at: [Accessed ]. [16] Tibco, Inc., TIBCO Spotfire Miner 8.2 User s Guide. [Accessed ] [17] Yeh, J.Y., Wu, T.-H. & Tsao, C.-W., Using data mining techniques to predict hospitalization of hemodialysis patients. Decision Support Systems, 50(2), pp [18] Yoo, I. et al., Data mining in healthcare and biomedicine: a survey of the literature. Journal of medical systems, 36(4), pp editor@iaeme.com

Shunt Harmonic Compensator Design for Using Fuzzy Logic Controller

Shunt Harmonic Compensator Design for Using Fuzzy Logic Controller Shunt Harmonic Compensator Design for Using Fuzzy Logic Controller Y. Shiva Prasad M.Tech (PE) Student Avanthi Engineering College, Visakhapatnam, India. Abstract Active Power Filters (APFs) are one of

More information

INTELLIGENT APRIORI ALGORITHM FOR COMPLEX ACTIVITY MINING IN SUPERMARKET APPLICATIONS

INTELLIGENT APRIORI ALGORITHM FOR COMPLEX ACTIVITY MINING IN SUPERMARKET APPLICATIONS Journal of Computer Science, 9 (4): 433-438, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.433.438 Published Online 9 (4) 2013 (http://www.thescipub.com/jcs.toc) INTELLIGENT APRIORI ALGORITHM FOR COMPLEX

More information

IBM SPSS Neural Networks

IBM SPSS Neural Networks IBM Software IBM SPSS Neural Networks 20 IBM SPSS Neural Networks New tools for building predictive models Highlights Explore subtle or hidden patterns in your data. Build better-performing models No programming

More information

INTELLIGENT SOFTWARE QUALITY MODEL: THE THEORETICAL FRAMEWORK

INTELLIGENT SOFTWARE QUALITY MODEL: THE THEORETICAL FRAMEWORK INTELLIGENT SOFTWARE QUALITY MODEL: THE THEORETICAL FRAMEWORK Jamaiah Yahaya 1, Aziz Deraman 2, Siti Sakira Kamaruddin 3, Ruzita Ahmad 4 1 Universiti Utara Malaysia, Malaysia, jamaiah@uum.edu.my 2 Universiti

More information

PREDICTING ASSEMBLY QUALITY OF COMPLEX STRUCTURES USING DATA MINING Predicting with Decision Tree Algorithm

PREDICTING ASSEMBLY QUALITY OF COMPLEX STRUCTURES USING DATA MINING Predicting with Decision Tree Algorithm PREDICTING ASSEMBLY QUALITY OF COMPLEX STRUCTURES USING DATA MINING Predicting with Decision Tree Algorithm Ekaterina S. Ponomareva, Kesheng Wang, Terje K. Lien Department of Production and Quality Engieering,

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

Image Extraction using Image Mining Technique

Image Extraction using Image Mining Technique IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,

More information

Machine Learning, Data Mining, and Knowledge Discovery: An Introduction

Machine Learning, Data Mining, and Knowledge Discovery: An Introduction Machine Learning, Data Mining, and Kwledge Discovery: An Introduction Outline Data Mining Application Examples Data Mining & Kwledge Discovery Data Mining with Weka AHPCRC Workshop - 8/16/11 - Dr. Martin

More information

Combining scientometrics with patentmetrics for CTI service in R&D decisionmakings

Combining scientometrics with patentmetrics for CTI service in R&D decisionmakings Combining scientometrics with patentmetrics for CTI service in R&D decisionmakings ---- Practices and case study of National Science Library of CAS (NSLC) By: Xiwen Liu P. Jia, Y. Sun, H. Xu, S. Wang,

More information

Software as a Medical Device (SaMD)

Software as a Medical Device (SaMD) Software as a Medical Device () Working Group Status Application of Clinical Evaluation Working Group Chair: Bakul Patel Center for Devices and Radiological Health US Food and Drug Administration NWIE

More information

A Case Study on the Use of Unstructured Data in Healthcare Analytics. Analysis of Images for Diabetic Retinopathy

A Case Study on the Use of Unstructured Data in Healthcare Analytics. Analysis of Images for Diabetic Retinopathy A Case Study on the Use of Unstructured Data in Healthcare Analytics Analysis of Images for Diabetic Retinopathy A Case Study on the Use of Unstructured Data in Healthcare Analytics: Analysis of Images

More information

Contents. List of Figures List of Tables. Structure of the Book How to Use this Book Online Resources Acknowledgements

Contents. List of Figures List of Tables. Structure of the Book How to Use this Book Online Resources Acknowledgements Contents List of Figures List of Tables Preface Notation Structure of the Book How to Use this Book Online Resources Acknowledgements Notational Conventions Notational Conventions for Probabilities xiii

More information

A Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects

A Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects 2011 International Conference on Modeling, Simulation and Control IPCSIT vol.10 (2011) (2011) IACSIT Press, Singapore A Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects

More information

To be published by IGI Global: For release in the Advances in Computational Intelligence and Robotics (ACIR) Book Series

To be published by IGI Global:  For release in the Advances in Computational Intelligence and Robotics (ACIR) Book Series CALL FOR CHAPTER PROPOSALS Proposal Submission Deadline: September 15, 2014 Emerging Technologies in Intelligent Applications for Image and Video Processing A book edited by Dr. V. Santhi (VIT University,

More information

CC4.5: cost-sensitive decision tree pruning

CC4.5: cost-sensitive decision tree pruning Data Mining VI 239 CC4.5: cost-sensitive decision tree pruning J. Cai 1,J.Durkin 1 &Q.Cai 2 1 Department of Electrical and Computer Engineering, University of Akron, U.S.A. 2 Department of Electrical Engineering

More information

Classification Experiments for Number Plate Recognition Data Set Using Weka

Classification Experiments for Number Plate Recognition Data Set Using Weka Classification Experiments for Number Plate Recognition Data Set Using Weka Atul Kumar 1, Sunila Godara 2 1 Department of Computer Science and Engineering Guru Jambheshwar University of Science and Technology

More information

College of Information Science and Technology

College of Information Science and Technology College of Information Science and Technology Drexel E-Repository and Archive (idea) http://idea.library.drexel.edu/ Drexel University Libraries www.library.drexel.edu The following item is made available

More information

DC Motor Speed Control: A Case between PID Controller and Fuzzy Logic Controller

DC Motor Speed Control: A Case between PID Controller and Fuzzy Logic Controller DC Motor Speed Control: A Case between PID Controller and Fuzzy Logic Controller Philip A. Adewuyi Mechatronics Engineering Option, Department of Mechanical and Biomedical Engineering, Bells University

More information

COMPARISON OF MACHINE LEARNING ALGORITHMS IN WEKA

COMPARISON OF MACHINE LEARNING ALGORITHMS IN WEKA COMPARISON OF MACHINE LEARNING ALGORITHMS IN WEKA Clive Almeida 1, Mevito Gonsalves 2 & Manimozhi R 3 International Journal of Latest Trends in Engineering and Technology Special Issue SACAIM 2017, pp.

More information

Patent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis

Patent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis Patent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis by Chih-Ping Wei ( 魏志平 ), PhD Institute of Service Science and Institute of Technology Management National Tsing Hua

More information

Introduction to Computational Intelligence in Healthcare

Introduction to Computational Intelligence in Healthcare 1 Introduction to Computational Intelligence in Healthcare H. Yoshida, S. Vaidya, and L.C. Jain Abstract. This chapter presents introductory remarks on computational intelligence in healthcare practice,

More information

Quality Measure of Multicamera Image for Geometric Distortion

Quality Measure of Multicamera Image for Geometric Distortion Quality Measure of Multicamera for Geometric Distortion Mahesh G. Chinchole 1, Prof. Sanjeev.N.Jain 2 M.E. II nd Year student 1, Professor 2, Department of Electronics Engineering, SSVPSBSD College of

More information

Quantitative Reasoning: It s Not Just for Scientists & Economists Anymore

Quantitative Reasoning: It s Not Just for Scientists & Economists Anymore Quantitative Reasoning: It s Not Just for Scientists & Economists Anymore Corri Taylor Quantitative Reasoning Program Wellesley College ctaylor1@wellesley.edu In today s world awash in numbers, strong

More information

Generating Groove: Predicting Jazz Harmonization

Generating Groove: Predicting Jazz Harmonization Generating Groove: Predicting Jazz Harmonization Nicholas Bien (nbien@stanford.edu) Lincoln Valdez (lincolnv@stanford.edu) December 15, 2017 1 Background We aim to generate an appropriate jazz chord progression

More information

Spatial-Temporal Data Mining in Traffic Incident Detection

Spatial-Temporal Data Mining in Traffic Incident Detection Spatial-Temporal Data Mining in Traffic Incident Detection Ying Jin, Jing Dai, Chang-Tien Lu Department of Computer Science, Virginia Polytechnic Institute and State University {jiny, daij, ctlu}@vt.edu

More information

Image Finder Mobile Application Based on Neural Networks

Image Finder Mobile Application Based on Neural Networks Image Finder Mobile Application Based on Neural Networks Nabil M. Hewahi Department of Computer Science, College of Information Technology, University of Bahrain, Sakheer P.O. Box 32038, Kingdom of Bahrain

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE

More information

Optimal Adaptive Filtering Technique for Tamil Speech Enhancement

Optimal Adaptive Filtering Technique for Tamil Speech Enhancement Optimal Adaptive Filtering Technique for Tamil Speech Enhancement Vimala.C Project Fellow, Department of Computer Science Avinashilingam Institute for Home Science and Higher Education and Women Coimbatore,

More information

Disruption Classification at JET with Neural Techniques

Disruption Classification at JET with Neural Techniques EFDA JET CP(03)01-65 M. K. Zedda, T. Bolzonella, B. Cannas, A. Fanni, D. Howell, M. F. Johnson, P. Sonato and JET EFDA Contributors Disruption Classification at JET with Neural Techniques . Disruption

More information

Structural Analysis of Agent Oriented Methodologies

Structural Analysis of Agent Oriented Methodologies International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 6 (2014), pp. 613-618 International Research Publications House http://www. irphouse.com Structural Analysis

More information

Empirical Mode Decomposition: Theory & Applications

Empirical Mode Decomposition: Theory & Applications International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 873-878 International Research Publication House http://www.irphouse.com Empirical Mode Decomposition:

More information

Data and Knowledge as Infrastructure. Chaitan Baru Senior Advisor for Data Science CISE Directorate National Science Foundation

Data and Knowledge as Infrastructure. Chaitan Baru Senior Advisor for Data Science CISE Directorate National Science Foundation Data and Knowledge as Infrastructure Chaitan Baru Senior Advisor for Data Science CISE Directorate National Science Foundation 1 Motivation Easy access to data The Hello World problem (courtesy: R.V. Guha)

More information

International Journal of Computer Techniques - Volume 2 Issue 5, Sep Oct 2015

International Journal of Computer Techniques - Volume 2 Issue 5, Sep Oct 2015 RESEARCH ARTICLE Prediction of Heart Disease Using Enhanced Association Rule Based Algorithm Karandeep Kaur*, Ms. Poonamdeep Kaur**, Ms. Lovepreet Kaur*** *(Student (Computer Science & Engineering), Guru

More information

Views from a patent attorney What to consider and where to protect AI inventions?

Views from a patent attorney What to consider and where to protect AI inventions? Views from a patent attorney What to consider and where to protect AI inventions? Folke Johansson 5.2.2019 Director, Patent Department European Patent Attorney Contents AI and application of AI Patentability

More information

Revisiting the USPTO Concordance Between the U.S. Patent Classification and the Standard Industrial Classification Systems

Revisiting the USPTO Concordance Between the U.S. Patent Classification and the Standard Industrial Classification Systems Revisiting the USPTO Concordance Between the U.S. Patent Classification and the Standard Industrial Classification Systems Jim Hirabayashi, U.S. Patent and Trademark Office The United States Patent and

More information

A Novel Fuzzy Neural Network Based Distance Relaying Scheme

A Novel Fuzzy Neural Network Based Distance Relaying Scheme 902 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 15, NO. 3, JULY 2000 A Novel Fuzzy Neural Network Based Distance Relaying Scheme P. K. Dash, A. K. Pradhan, and G. Panda Abstract This paper presents a new

More information

Using Agent-Based Methodologies in Healthcare Information Systems

Using Agent-Based Methodologies in Healthcare Information Systems BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 2 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0033 Using Agent-Based Methodologies

More information

Life Cycle Management of Station Equipment & Apparatus Interest Group (LCMSEA) Getting Started with an Asset Management Program (Continued)

Life Cycle Management of Station Equipment & Apparatus Interest Group (LCMSEA) Getting Started with an Asset Management Program (Continued) Life Cycle Management of Station Equipment & Apparatus Interest Group (LCMSEA) Getting Started with an Asset Management Program (Continued) Projects sorted and classified as: 1. Overarching AM Program

More information

Multiagent System for Home Automation

Multiagent System for Home Automation Multiagent System for Home Automation M. B. I. REAZ, AWSS ASSIM, F. CHOONG, M. S. HUSSAIN, F. MOHD-YASIN Faculty of Engineering Multimedia University 63100 Cyberjaya, Selangor Malaysia Abstract: - Smart-home

More information

The compliance of Iranian library and information science journals with Thomson Reuters basic standards

The compliance of Iranian library and information science journals with Thomson Reuters basic standards Original Article: The compliance of Iranian library and information science journals with Thomson Reuters basic standards Saeideh Valizadeh-Haghi 1, Ronak Hamzehei 2, 3 * 1 Department of Medical Library

More information

Workshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF

Workshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF Workshop on anonymization Berlin, March 19, 2015 Basic Knowledge Terms, Definitions and general techniques Murat Sariyar TMF Workshop Anonymisation, March 19, 2015 Outline Background Aims of Anonymization

More information

MATRIX SAMPLING DESIGNS FOR THE YEAR2000 CENSUS. Alfredo Navarro and Richard A. Griffin l Alfredo Navarro, Bureau of the Census, Washington DC 20233

MATRIX SAMPLING DESIGNS FOR THE YEAR2000 CENSUS. Alfredo Navarro and Richard A. Griffin l Alfredo Navarro, Bureau of the Census, Washington DC 20233 MATRIX SAMPLING DESIGNS FOR THE YEAR2000 CENSUS Alfredo Navarro and Richard A. Griffin l Alfredo Navarro, Bureau of the Census, Washington DC 20233 I. Introduction and Background Over the past fifty years,

More information

PETROLEUM ENGINEERING LEARNING PROVOCATION

PETROLEUM ENGINEERING LEARNING PROVOCATION International Journal of Production Technology and Management (IJPTM) Volume 6, Issue 2, July-Dec 2015, pp. 16-20, Article ID: IJPTM_06_02_003 Available online at http://www.iaeme.com/ijptm/issues.asp?jtype=ijptm&vtype=6&itype=2

More information

An Improved Path Planning Method Based on Artificial Potential Field for a Mobile Robot

An Improved Path Planning Method Based on Artificial Potential Field for a Mobile Robot BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No Sofia 015 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-015-0037 An Improved Path Planning Method Based

More information

Information Infrastructure II (Data Mining) I211

Information Infrastructure II (Data Mining) I211 Information Infrastructure II (Data Mining) I211 Spring 2010 Basic Information Class meets: Time: MW 9:30am 10:45am Place: I2 130 Instructor: Predrag Radivojac Office: Informatics 219 Email: predrag@indiana.edu

More information

Resource Review. In press 2018, the Journal of the Medical Library Association

Resource Review. In press 2018, the Journal of the Medical Library Association 1 Resource Review. In press 2018, the Journal of the Medical Library Association Cabell's Scholarly Analytics, Cabell Publishing, Inc., Beaumont, Texas, http://cabells.com/, institutional licensing only,

More information

A Study On Preprocessing A Mammogram Image Using Adaptive Median Filter

A Study On Preprocessing A Mammogram Image Using Adaptive Median Filter A Study On Preprocessing A Mammogram Image Using Adaptive Median Filter Dr.K.Meenakshi Sundaram 1, D.Sasikala 2, P.Aarthi Rani 3 Associate Professor, Department of Computer Science, Erode Arts and Science

More information

(ii) Methodologies employed for evaluating the inventive step

(ii) Methodologies employed for evaluating the inventive step 1. Inventive Step (i) The definition of a person skilled in the art A person skilled in the art to which the invention pertains (referred to as a person skilled in the art ) refers to a hypothetical person

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter Extraction and Recognition of Text From Digital English Comic Image Using Median Filter S.Ranjini 1 Research Scholar,Department of Information technology Bharathiar University Coimbatore,India ranjinisengottaiyan@gmail.com

More information

Privacy preserving data mining multiplicative perturbation techniques

Privacy preserving data mining multiplicative perturbation techniques Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity Outline Review and critique of randomization approaches (additive noise) Multiplicative data

More information

Measuring and Analyzing the Scholarly Impact of Experimental Evaluation Initiatives

Measuring and Analyzing the Scholarly Impact of Experimental Evaluation Initiatives Measuring and Analyzing the Scholarly Impact of Experimental Evaluation Initiatives Marco Angelini 1, Nicola Ferro 2, Birger Larsen 3, Henning Müller 4, Giuseppe Santucci 1, Gianmaria Silvello 2, and Theodora

More information

Tuning Of Conventional Pid And Fuzzy Logic Controller Using Different Defuzzification Techniques

Tuning Of Conventional Pid And Fuzzy Logic Controller Using Different Defuzzification Techniques Tuning Of Conventional Pid And Fuzzy Logic Controller Using Different Defuzzification Techniques Afshan Ilyas, Shagufta Jahan, Mohammad Ayyub Abstract:- This paper presents a method for tuning of conventional

More information

http://www.diva-portal.org This is the published version of a paper presented at SAI Annual Conference on Areas of Intelligent Systems and Artificial Intelligence and their Applications to the Real World

More information

Scalable systems for early fault detection in wind turbines: A data driven approach

Scalable systems for early fault detection in wind turbines: A data driven approach Scalable systems for early fault detection in wind turbines: A data driven approach Martin Bach-Andersen 1,2, Bo Rømer-Odgaard 1, and Ole Winther 2 1 Siemens Diagnostic Center, Denmark 2 Cognitive Systems,

More information

Techniques for Sentiment Analysis survey

Techniques for Sentiment Analysis survey I J C T A, 9(41), 2016, pp. 355-360 International Science Press ISSN: 0974-5572 Techniques for Sentiment Analysis survey Anu Sharma* and Savleen Kaur** ABSTRACT A Sentiment analysis is a technique to analyze

More information

An Exploratory Study of Design Processes

An Exploratory Study of Design Processes International Journal of Arts and Commerce Vol. 3 No. 1 January, 2014 An Exploratory Study of Design Processes Lin, Chung-Hung Department of Creative Product Design I-Shou University No.1, Sec. 1, Syuecheng

More information

A Metric-Based Machine Learning Approach to Genealogical Record Linkage

A Metric-Based Machine Learning Approach to Genealogical Record Linkage A Metric-Based Machine Learning Approach to Genealogical Record Linkage S. Ivie, G. Henry, H. Gatrell and C. Giraud-Carrier Department of Computer Science, Brigham Young University Abstract Genealogical

More information

DESIGN OF HIGH PERFORMANCE MODIFIED RADIX8 BOOTH MULTIPLIER

DESIGN OF HIGH PERFORMANCE MODIFIED RADIX8 BOOTH MULTIPLIER International Journal of Mechanical Engineering and Technology (IJMET) Volume 8, Issue 8, August 27, pp. 376 382, Article ID: IJMET_8_8_4 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=8&itype=8

More information

The exponentially weighted moving average applied to the control and monitoring of varying sample sizes

The exponentially weighted moving average applied to the control and monitoring of varying sample sizes Computational Methods and Experimental Measurements XV 3 The exponentially weighted moving average applied to the control and monitoring of varying sample sizes J. E. Everett Centre for Exploration Targeting,

More information

Biomedical Equipment Technician

Biomedical Equipment Technician Biomedical Equipment Technician Occupational Skill Stards Texas Skill Stards Board Recognized Critical Work Function 1. Install Biomedical Equipment 1.1 Receive, inspect inventory upon delivery 1.2 Deliver

More information

Application of Hilbert-Huang Transform in the Field of Power Quality Events Analysis Manish Kumar Saini 1 and Komal Dhamija 2 1,2

Application of Hilbert-Huang Transform in the Field of Power Quality Events Analysis Manish Kumar Saini 1 and Komal Dhamija 2 1,2 Application of Hilbert-Huang Transform in the Field of Power Quality Events Analysis Manish Kumar Saini 1 and Komal Dhamija 2 1,2 Department of Electrical Engineering, Deenbandhu Chhotu Ram University

More information

Knowledge discovery & data mining Classification & fraud detection

Knowledge discovery & data mining Classification & fraud detection Knowledge discovery & data mining Classification & fraud detection Knowledge discovery & data mining Classification & fraud detection 5/24/00 Click here to start Table of Contents Author: Dino Pedreschi

More information

Preference-based Organization Interfaces: Aiding User Critiques in Recommender Systems

Preference-based Organization Interfaces: Aiding User Critiques in Recommender Systems Preference-based Organization Interfaces: Aiding User Critiques in Recommender Systems Li Chen and Pearl Pu Human Computer Interaction Group, School of Computer and Communication Sciences Swiss Federal

More information

Energy modeling/simulation Using the BIM technology in the Curriculum of Architectural and Construction Engineering and Management

Energy modeling/simulation Using the BIM technology in the Curriculum of Architectural and Construction Engineering and Management Paper ID #7196 Energy modeling/simulation Using the BIM technology in the Curriculum of Architectural and Construction Engineering and Management Dr. Hyunjoo Kim, The University of North Carolina at Charlotte

More information

L(p) 0 p 1. Lorenz Curve (LC) is defined as

L(p) 0 p 1. Lorenz Curve (LC) is defined as A Novel Concept of Partial Lorenz Curve and Partial Gini Index Sudesh Pundir and Rajeswari Seshadri Department of Statistics Pondicherry University, Puducherry 605014, INDIA Department of Mathematics,

More information

Low Power Approach for Fir Filter Using Modified Booth Multiprecision Multiplier

Low Power Approach for Fir Filter Using Modified Booth Multiprecision Multiplier Low Power Approach for Fir Filter Using Modified Booth Multiprecision Multiplier Gowridevi.B 1, Swamynathan.S.M 2, Gangadevi.B 3 1,2 Department of ECE, Kathir College of Engineering 3 Department of ECE,

More information

I. INTRODUCTION II. LITERATURE SURVEY. International Journal of Advanced Networking & Applications (IJANA) ISSN:

I. INTRODUCTION II. LITERATURE SURVEY. International Journal of Advanced Networking & Applications (IJANA) ISSN: A Friend Recommendation System based on Similarity Metric and Social Graphs Rashmi. J, Dr. Asha. T Department of Computer Science Bangalore Institute of Technology, Bangalore, Karnataka, India rash003.j@gmail.com,

More information

Social Events in a Time-Varying Mobile Phone Graph

Social Events in a Time-Varying Mobile Phone Graph Social Events in a Time-Varying Mobile Phone Graph Carlos Sarraute 1, Jorge Brea 1, Javier Burroni 1, Klaus Wehmuth 2, Artur Ziviani 2, and J.I. Alvarez-Hamelin 3 1 Grandata Labs, Argentina 2 LNCC, Brazil

More information

COMPARATIVE ANALYSIS OF ACCURACY ON MISSING DATA USING MLP AND RBF METHOD V.B. Kamble 1, S.N. Deshmukh 2 1

COMPARATIVE ANALYSIS OF ACCURACY ON MISSING DATA USING MLP AND RBF METHOD V.B. Kamble 1, S.N. Deshmukh 2 1 COMPARATIVE ANALYSIS OF ACCURACY ON MISSING DATA USING MLP AND RBF METHOD V.B. Kamble 1, S.N. Deshmukh 2 1 P.E.S. College of Engineering, Aurangabad. (M.S.) India. 2 Dr. Babasaheb Ambedkar Marathwada University,

More information

Ministry of Justice: Call for Evidence on EU Data Protection Proposals

Ministry of Justice: Call for Evidence on EU Data Protection Proposals Ministry of Justice: Call for Evidence on EU Data Protection Proposals Response by the Wellcome Trust KEY POINTS It is essential that Article 83 and associated derogations are maintained as the Regulation

More information

A No Reference Image Blur Detection using CPBD Metric and Deblurring of Gaussian Blurred Images using Lucy-Richardson Algorithm

A No Reference Image Blur Detection using CPBD Metric and Deblurring of Gaussian Blurred Images using Lucy-Richardson Algorithm A No Reference Image Blur Detection using CPBD Metric and Deblurring of Gaussian Blurred Images using Lucy-Richardson Algorithm Suresh S. Zadage, G. U. Kharat Abstract This paper addresses sharpness of

More information

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University

More information

Implementation of Block based Mean and Median Filter for Removal of Salt and Pepper Noise

Implementation of Block based Mean and Median Filter for Removal of Salt and Pepper Noise International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 4, Jul - Aug 2016 RESEARCH ARTICLE OPEN ACCESS Implementation of Block based Mean and Median Filter for Removal of

More information

Technology Roadmap using Patent Keyword

Technology Roadmap using Patent Keyword Technology Roadmap using Patent Keyword Jongchan Kim 1, Jiho Kang 1, Joonhyuck Lee 1, Sunghae Jun 3, Sangsung Park 2, Dongsik Jang 1 1 Department of Industrial Management Engineering, Korea University

More information

Andalusian Agency for Health Technology Assessment (AETSA)

Andalusian Agency for Health Technology Assessment (AETSA) Andalusian Agency for Health Technology Assessment (AETSA) Seville, 22 nd of July, 2016 Comments on the concept paper Facilitating the translation of advanced therapies to patients in Europe 1 Introduction

More information

Modelling Critical Context in Software Engineering Experience Repository: A Conceptual Schema

Modelling Critical Context in Software Engineering Experience Repository: A Conceptual Schema Modelling Critical Context in Software Engineering Experience Repository: A Conceptual Schema Neeraj Sharma Associate Professor Department of Computer Science Punjabi University, Patiala (India) ABSTRACT

More information

Lossy Compression of Permutations

Lossy Compression of Permutations 204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Predicting Content Virality in Social Cascade

Predicting Content Virality in Social Cascade Predicting Content Virality in Social Cascade Ming Cheung, James She, Lei Cao HKUST-NIE Social Media Lab Department of Electronic and Computer Engineering Hong Kong University of Science and Technology,

More information

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Biomedical Research 2017; Special Issue: S315-S320 ISSN 0970-938X www.biomedres.info Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Deepa R 1*, Sutha J

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

HTA Position Paper. The International Network of Agencies for Health Technology Assessment (INAHTA) defines HTA as:

HTA Position Paper. The International Network of Agencies for Health Technology Assessment (INAHTA) defines HTA as: HTA Position Paper The Global Medical Technology Alliance (GMTA) represents medical technology associations whose members supply over 85 percent of the medical devices and diagnostics purchased annually

More information

Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine

Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine Journal of Clean Energy Technologies, Vol. 4, No. 3, May 2016 Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine Hanim Ismail, Zuhaina Zakaria, and Noraliza Hamzah

More information

Design and Implementation of Gaussian, Impulse, and Mixed Noise Removal filtering techniques for MR Brain Imaging under Clustering Environment

Design and Implementation of Gaussian, Impulse, and Mixed Noise Removal filtering techniques for MR Brain Imaging under Clustering Environment Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 12, Number 1 (2016), pp. 265-272 Research India Publications http://www.ripublication.com Design and Implementation of Gaussian, Impulse,

More information

Application of Data Mining Techniques for Tourism Knowledge Discovery

Application of Data Mining Techniques for Tourism Knowledge Discovery Application of Data Mining Techniques for Tourism Knowledge Discovery Teklu Urgessa, Wookjae Maeng, Joong Seek Lee Abstract Application of five implementations of three data mining classification techniques

More information

Location Services with Riverbed Xirrus APPLICATION NOTE

Location Services with Riverbed Xirrus APPLICATION NOTE Location Services with Riverbed Xirrus APPLICATION NOTE Introduction Indoor location tracking systems using Wi-Fi, as well as other shorter range wireless technologies, have seen a significant increase

More information

This list supersedes the one published in the November 2002 issue of CR.

This list supersedes the one published in the November 2002 issue of CR. PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.

More information

Biometrics Final Project Report

Biometrics Final Project Report Andres Uribe au2158 Introduction Biometrics Final Project Report Coin Counter The main objective for the project was to build a program that could count the coins money value in a picture. The work was

More information

Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm

Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm A.T. Rajamanickam, N.P.Subiramaniyam, A.Balamurugan*,

More information

Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern

Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern Chisako Muramatsu 1, Min Zhang 1, Takeshi Hara 1, Tokiko Endo 2,3, and Hiroshi Fujita 1 1 Department of Intelligent

More information

Software Maintenance Cycles with the RUP

Software Maintenance Cycles with the RUP Software Maintenance Cycles with the RUP by Philippe Kruchten Rational Fellow Rational Software Canada The Rational Unified Process (RUP ) has no concept of a "maintenance phase." Some people claim that

More information

Resolution Enhancement and Frequency Compounding Techniques in Ultrasound.

Resolution Enhancement and Frequency Compounding Techniques in Ultrasound. Resolution Enhancement and Frequency Compounding Techniques in Ultrasound. Proposal Type: Innovative Student PI Name: Kunal Vaidya PI Department: Chester F. Carlson Center for Imaging Science Position:

More information

Exploring the New Trends of Chinese Tourists in Switzerland

Exploring the New Trends of Chinese Tourists in Switzerland Exploring the New Trends of Chinese Tourists in Switzerland Zhan Liu, HES-SO Valais-Wallis Anne Le Calvé, HES-SO Valais-Wallis Nicole Glassey Balet, HES-SO Valais-Wallis Address of corresponding author:

More information

Harmonic Distortion Levels Measured at The Enmax Substations

Harmonic Distortion Levels Measured at The Enmax Substations Harmonic Distortion Levels Measured at The Enmax Substations This report documents the findings on the harmonic voltage and current levels at ENMAX Power Corporation (EPC) substations. ENMAX is concerned

More information

Reflector A Dynamic Manifestation of Turing Machines with Time and Space Complexity Analysis

Reflector A Dynamic Manifestation of Turing Machines with Time and Space Complexity Analysis Reflector A Dynamic Manifestation of Turing Machines with Time and Space Complexity Analysis Behroz Mirza MS Computing, Shaheed Zulfikar Ali Bhutto Institute of Science and Technology 90 and 100 Clifton

More information

& Medical Tourism. DIHTF - Dubai 20 th -21 st Feb 2018 V S Venkatesh -India

& Medical Tourism. DIHTF - Dubai 20 th -21 st Feb 2018 V S Venkatesh -India & Medical Tourism DIHTF - Dubai 20 th -21 st Feb 2018 V S Venkatesh -India The human brain is an amazing work of art, it has very complex neural circuits and the way it registers, stores, processes and

More information

LIST OF PUBLICATIONS

LIST OF PUBLICATIONS Dr.Shomona Gracia Jacob Associate Professor CSE SSN College of Engineering, Kalavakkam, Chennai. LIST OF PUBLICATIONS International Journals (SCI Thomson Reuters Indexed) 1. Ramani RG, Jacob SG, HIV1-Human

More information

Design of Self-Tuning Fuzzy PI controller in LABVIEW for Control of a Real Time Process

Design of Self-Tuning Fuzzy PI controller in LABVIEW for Control of a Real Time Process International Journal of Electronics and Computer Science Engineering 538 Available Online at www.ijecse.org ISSN- 2277-1956 Design of Self-Tuning Fuzzy PI controller in LABVIEW for Control of a Real Time

More information