...CHAPTER 2 LITERATURE SURVEY CHAPTER 2 : LITRETURE SURVEY 2.1 SURVEY IN MEDICAL DIAGNOSIS USING ARTIFICIAL INTELLIGENCE TECHNIQUES : - Many intelligent systems have been developed for the purpose of enhancing health-care and provide better health care facilities, reduce cost and etc. 2.2 OVERALL ARCHITECTURE OF MEDICAL DIAGNOSIS USING ARTIFICIAL INTELLIGENCE TECHNIQUES:- The Centralized databases and www (World Wide Web) shares the patient data among the different cities used by doctor /practitioners for diagnosis. Single database system was only accessible to that city but the centralized database is accessed by all the cities. Fig2 shows the sharing knowledge between different cities where...
Words: 2581 - Pages: 11
...Gene Recognition A project report submitted to M S Ramaiah Institute of Technology An Autonomous Institute, Affiliated to Visvesvaraya Technological University, Belgaum in partial fulfillment for the award of the degree of Bachelor of Engineering in Computer Science & Engineering Submitted by Mudra Hegde 1MS07CS052 Nakul G V 1MS07CS053 Under the guidance of Veena G S Assistant Professor Computer Science and Engineering M S Ramaiah Institute of Technology [pic] DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING M.S.RAMAIAH INSTITUTE OF TECHNOLOGY (Autonomous Institute, Affiliated to VTU) BANGALORE-560054 www.msrit.edu May 2011 Gene Recognition A project report submitted to M. S. Ramaiah Institute of Technology An Autonomous Institute, Affiliated to Visvesvaraya Technological University, Belgaum in partial fulfillment for the award of the degree of Bachelor of Engineering in Computer Science & Engineering Submitted by Mudra Hegde 1MS07CS052 Nakul G V 1MS07CS053 Under the guidance of Veena G S Assistant Professor Computer Science and Engineering M S Ramaiah Institute of Technology [pic] DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING M. S. RAMAIAH INSTITUTE OF TECHNOLOGY (Autonomous Institute, Affiliated to VTU) BANGALORE-560054 www.msrit.edu May 2011 Department of Computer Science...
Words: 8197 - Pages: 33
...©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 17 Routing Approaches in Delay Tolerant Networks: A Survey R. J. D'Souza National Institute of Technology Karnataka, Surathkal, India Johny Jose National Institute of Technology Karnataka, Surathkal, India ABSTRACT Delay Tolerant Networks (DTNs) have evolved from Mobile Ad Hoc Networks (MANET). It is a network, where contemporaneous connectivity among all nodes doesn’t exist. This leads to the problem of how to route a packet from one node to another, in such a network. This problem becomes more complex, when the node mobility also is considered. The researchers have attempted to address this issue for over a decade. They have found that communication is possible in such a challenged network. The design of routing protocol for such networks is an important issue. This work surveys the literature and classifies the various routing approaches. discontinuity in the network. There are also methods that have employed additional mobile nodes, to provide better message delivery. Researchers are even exploring how the social interaction of humans can be utilized for routing in a DTN. This survey has made an extensive study of the various routing strategies taken by the researchers in the past few years. We have classified them based on the type of knowledge used for routing. 2. FLOODING BASED APPROACHES Knowledge about the network helps in deciding the best next hop. It can happen that the...
Words: 6818 - Pages: 28
...Steganography: A Review of Information Security Research and Development in Muslim World Abstract Conveying secret information and establishing hidden relationship has been a great interest since long time ago. Therefore, there are a lot of methods that have been widely used since long past. This paper reviewed one of the methods for establishing hidden communication in information security and has gained attraction in recent years that is Steganography. Steganography is the art and science of hiding a secret message in a cover media such as image, text, signals or sound in such a way that no one, except the intended recipient knows the existence of the data. In this paper, the research and development of steganography from three years back starting from 2010 until recently, 2013 in Muslim world are reviewed. The future research in the field of Steganography is briefly discussed. Keywords Cover Image, Stego Image, Cryptography, Steganography, Information Hiding, Information Security, Muslim World 1 Introduction In today’s information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raised concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information [5,...
Words: 3746 - Pages: 15
...POWER ALLOCATION FOR THE NETWORK CODED COGNITIVE COOPERATIVE NETWORK by Major Awal Uddin Ahmed (ID: 1003) Major Md Shariful Islam(ID: 1004) Major K M Hasnut Zamil (ID: 1006) A Project Report submitted to the department of Electrical Electronic and Communication Engineering in partial fulfillment of the requirements for the degree of Bachelor of Engineering in Electrical Electronic and Communication Engineering Advisor: M. Shamim Kaiser Military Institute of Science and Technology Mirpur Cantonment, Dhaka December 2010 To Our Beloved Parents ii DECLARATION This thesis is a presentation of my original research work. Wherever contributions of others are involved, every effort is made to indicate this clearly, with due reference to the literature, and acknowledgement of collaborative research and discussions. The work was done under the guidance of Dr. M. Shamim Kaiser, at the Mililary Institute of Science and Technology (MIST), Mirpur Cantonment, Dhaka. (Major Awal Uddin Ahmed (ID: 1003)) (Major Md Shariful Islam(ID: 1004)) (Major K M Hasnut Zamil (ID: 1006)) iii CERTIFICATE This is to certify that the thesis entitled POWER ALLOCATION FOR THE NETWORK CODED COGNITIVE COOPERATIVE NETWORK and submitted by Major Awal Uddin Ahmed (ID: 1003), Major Md Shariful Islam(ID: 1004), Major K M Hasnut Zamil (ID: 1006) for the degree of Bachelor of Engineering in Electrical Electronics and Communication Engineering. They embody original work under my supervision...
Words: 9257 - Pages: 38
...------------------------------------------------- Data compression From Wikipedia, the free encyclopedia (Redirected from Video compression) "Source coding" redirects here. For the term in computer programming, see Source code. In digital signal processing, data compression, source coding,[1] or bit-rate reduction involves encoding information using fewer bits than the original representation.[2]Compression can be either lossy or lossless. Lossless compression reduces bits by identifying and eliminating statistical redundancy. No information is lost in lossless compression. Lossy compression reduces bits by identifying unnecessary information and removing it.[3] The process of reducing the size of a data file is referred to as data compression. In the context of data transmission, it is called source coding (encoding done at the source of the data before it is stored or transmitted) in opposition to channel coding.[4] Compression is useful because it helps reduce resource usage, such as data storage space or transmission capacity. Because compressed data must be decompressed to use, this extra processing imposes computational or other costs through decompression; this situation is far from being a free lunch. Data compression is subject to a space–time complexity trade-off. For instance, a compression scheme for video may require expensive hardware for the video to be decompressed fast enough to be viewed as it is being decompressed, and the option to decompress the video...
Words: 12347 - Pages: 50
...Tushar Suresh Bhavsar 2/305, Rakshak Nagar-2, Date of Birth: 23rd May, 1983 Kharadi, Pune 411038. Mobile: 91-9503162041 Email:tusharbhavasar@gmail.com Professional Synopsis ← 7 years of total experience with 2 years of software project management exposure. ← On-site coordination experience from client site based in San Francisco USA. ← Requirement understanding and project initiation activities at on-site location based in New York, Cincinnati and San Francisco, USA. ← Proven abilities in leading complete SDLC entitling analysis, design, development, testing, planning, estimations and delivery. ← An effective communicator with excellent relationship management skills. Strong analytical, problem solving & analytical abilities. Possess a flexible & detail oriented attitude. ← Leading and managing team of size 20+. ← Consistently top performer. Skills Set Technical Operating System : Windows NT/2K/XP/2K3/2K8/Vista/7. Microsoft Tech. : .NET Framework, Visual C# .Net, VB .NET, ASP .Net, ADO .Net, framework 1.0, 1.1, 2.0, 3.5, web services, Windows services, Remoting, Entity framework, Linq, Share point – WSS exposure, Sales Force integration, Dial up USA. Ajax toolkit extender, Enterprise library, Crystal reports, Membership providers,In-home install api, Google api integration API integration : IBM SPSS, Google api federated login and white listing, Lumi , in-home install, Trumpia SMS. Database : RDBMS...
Words: 2307 - Pages: 10
...Video Compression: An Examination of the Concepts, Standards, Benefits, and Economics ITEC620 April 14, 2008 To accommodate the increased demand for digital video content, compression technology must be used. This paper examines the most commonly used compression formats, the MPEG-1, MPEG-2 and MPEG-4 video compression formats, their relative benefits and differences, the delivery methods available for digital video content and the economics of video content delivery. Every time a digital video disc is played, a video is watched on YouTube, an NFL clip is viewed on a Sprint-based cellular phone, or a movie is ordered through an on-demand cable television video service, the viewer is watching data that is not in the state it which it originated. Video in an unmodified state is comprised of vast quantities of data (Apostopoulos & Wee, 2000). In order to make effective and efficient usage of video data, some method of reducing the quantity of data is necessary. Apostopoulos and Wee, in their 2000 paper, “Video Compression Standards” explain this succinctly and well, “For example, consider the problem of video transmission within high-definition television (HDTV). A popular HDTV video format is progressively scanned 720x1280 pixels/frame, 60 frames/s video signal, with 24-bits/pixel (8 bits for red, green, and blue), which corresponds to a raw data rate of about 1.3 Gbits/sec. Modern digital communication systems can only...
Words: 5707 - Pages: 23
...Seed dependency pattern is used for extracting candidate features. These seed patterns along with the prior sentiment knowledge are applied to extract candidate features, and in turn these features can generate new dependency patterns. Clustering algorithm is used to retain more infrequent features and form a more compact aspect structure .For a candidate feature , its most similar feature is found and grouped them together if their similarities larger than a threshold .In order to remove false features, weighting algorithm is used and the cluster with light ones is removed. They used positive-like adjectives (PAs) and negative-like adjectives(NA-s) for disambiguating sentiment orientations. Finally, clause sentiment analysis is performed to get the...
Words: 1725 - Pages: 7
...International Journal of Machine Learning and Computing, Vol. 2, No. 3, June 2012 A Survey of OCR Applications Amarjot Singh, Ketan Bacchuwar, and Akshay Bhasin Abstract—Optical Character Recognition or OCR is the electronic translation of handwritten, typewritten or printed text into machine translated images. It is widely used to recognize and search text from electronic documents or to publish the text on a website. The paper presents a survey of applications of OCR in different fields and further presents the experimentation for three important applications such as Captcha, Institutional Repository and Optical Music Character Recognition. We make use of an enhanced image segmentation algorithm based on histogram equalization using genetic algorithms for optical character recognition. The paper will act as a good literature survey for researchers starting to work in the field of optical character recognition. Index Terms— Genetic algorithm, bimodal images, Captcha, institutional repositories and digital libraries, optical music recognition, optical character recognition. I. INTRODUCTION Highlight in 1950’s [1], applied throughout the spectrum of industries resulting into revolutionizing the document management process. Optical Character Recognition or OCR has enabled scanned documents to become more than just image files, turning into fully searchable documents with text content recognized by computers. Optical Character Recognition extracts the relevant information...
Words: 3379 - Pages: 14
...UNIVERSITY OF KERALA B. TECH. DEGREE COURSE 2008 ADMISSION REGULATIONS and I VIII SEMESTERS SCHEME AND SYLLABUS of COMPUTER SCIENCE AND ENGINEERING B.Tech Comp. Sc. & Engg., University of Kerala 2 UNIVERSITY OF KERALA B.Tech Degree Course – 2008 Scheme REGULATIONS 1. Conditions for Admission Candidates for admission to the B.Tech degree course shall be required to have passed the Higher Secondary Examination, Kerala or 12th Standard V.H.S.E., C.B.S.E., I.S.C. or any examination accepted by the university as equivalent thereto obtaining not less than 50% in Mathematics and 50% in Mathematics, Physics and Chemistry/ Bio- technology/ Computer Science/ Biology put together, or a diploma in Engineering awarded by the Board of Technical Education, Kerala or an examination recognized as equivalent thereto after undergoing an institutional course of at least three years securing a minimum of 50 % marks in the final diploma examination subject to the usual concessions allowed for backward classes and other communities as specified from time to time. 2. Duration of the course i) The course for the B.Tech Degree shall extend over a period of four academic years comprising of eight semesters. The first and second semester shall be combined and each semester from third semester onwards shall cover the groups of subjects as given in the curriculum and scheme of examination ii) Each semester shall ordinarily comprise of not less than 400 working periods each of 60 minutes duration...
Words: 34195 - Pages: 137
...incompatible, but rather on constructing new extensible symmetries (Hoopoo). Of course, this is not always the case. Table of Contents 1) Introduction 2) Related Work 3) Architecture 4) Implementation 5) Results 5.1) Hardware and Software Configuration 5.2) Experimental Results 6) Conclusion 1 Introduction Many systems engineers would agree that, had it not been for online algorithms, the visualization of Scheme might never have occurred. The usual methods for the synthesis of SCSI disks do not apply in this area. A technical question in cryptoanalysis is the deployment of suffix trees. The private unification of link-level acknowledgements and the Turing machine would minimally degrade autonomous communication. It might seem counterintuitive but has ample historical precedence. Contrarily, hierarchical databases might not be the panacea that system administrators expected. We emphasize that our framework runs in Θ( logn ) time. For example, many methodologies visualize pseudorandom archetypes. Combined with semantic symmetries, this explores an analysis of erasure coding. To our knowledge, our work here marks the first method investigated specifically for the evaluation of XML. we emphasize that our method observes forward-error correction. The basic tenet of this solution is the construction of the producer-consumer problem. Thusly, we see no reason not to use the evaluation of the...
Words: 2316 - Pages: 10
...and animation systems can categorize a mix of systems that were never evaluated into three; positive results that are not statistically significant, positive with significant results and those that did not yield positive results (Sorva et al., 2013). 25. About half the evaluations of visualization were only about usability; and a third of the evaluations were informal, “with little contribution to future improvements” according to a survey (Urquiza-Fuentes e al., 2009). 26. Study found that animation was no more effective than text explanation for learning the semantics of C++ pointers based from the evaluation of Specialized visualization systems that were built for specific programming constructs (Kumar,2009). 27. When learning expression evaluation, a study found that graphic visualization alone is worse than graphic visualization with text explanation (Kumar,2005). 28. It is proven that step-by-step explanation of the correct answer are really help students learn as they gave a feedback with more correct answers. (Kumar,2006). 29. Dual coding theory recommended the simultaneous presentation of the same information in text and visual forms but graphic visualization only clarifies the order of evaluation of operators but not concepts such as coercion and errors. (Paivio,...
Words: 991 - Pages: 4
...Computer science From Wikipedia, the free encyclopedia Jump to: navigation, search Computer science or computing science (abbreviated CS) is the study of the theoretical foundations of information and computation and of practical techniques for their implementation and application in computer systems.[1][2] Computer scientists invent algorithmic processes that create, describe, and transform information and formulate suitable abstractions to model complex systems. Computer science has many sub-fields; some, such as computational complexity theory, study the fundamental properties of computational problems, while others, such as computer graphics, emphasize the computation of specific results. Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to describe computations, while computer programming applies specific programming languages to solve specific computational problems, and human-computer interaction focuses on the challenges in making computers and computations useful, usable, and universally accessible to humans. The general public sometimes confuses computer science with careers that deal with computers (such as information technology), or think that it relates to their own experience of computers, which typically involves activities such as gaming, web-browsing, and word-processing. However, the focus of computer science is more on understanding the properties of the programs used to implement...
Words: 5655 - Pages: 23
...This test is a nonparametric test, the results allows one to conclude whether what is observed would have in fact be what is expected to occur by chance. For example, the responses on the ATSBI are in categories resembling a Likert scale, the score represents the level of burnout/stress the student feels at the time of completing the survey; the expected outcome would be that during higher stress times for the students the scores would reflect higher stress. The null hypothesis would be rejected by determining the degrees of freedom and the significance level of the particular study. Statistical significance will be set at p≤.05 to prove statistical significance. The questions at hand would include: Stress interventions are not associated with a lower level of stress and burnout; One of the interventions is associated with a lower level of stress and burnout; What relationship if any exists, if at all, between stress and burnout and a stress application?; Does a stress application have a relationship with stress and burnout levels? Nominal variables would include the four or...
Words: 1651 - Pages: 7