View ijsrd journal's profile on LinkedIn
Showing posts with label e- Journal. Show all posts
Showing posts with label e- Journal. Show all posts

Tuesday, September 20, 2016

National Conference on ‘Advances in Computing and Communications | #NCACC-2016 | IJSRD E - Journal

National Conference on ‘Advances in Computing and Communications’ 

NCACC-2016

A Conference Organized by Guru Nanak Dev Engineering College, Bidar National Conference on ‘Advances in Computing and Communications’ NCACC-2016 in collaboration with International Journal of Scientific Research and Development (#IJSRD) on 22nd and 23rd October-2016. The aim of NCACC-2016 is to provide a platform for researchers and practitioners, in all areas of evolutionary computing and communication engineering to discuss the full spectrum of current theoretical developments, emerging technologies, and innovative applications of computing and communications in solving complex real life problems.

Best Paper Award: Outstanding papers presented at NCACC-2016 will be awarded with certificate and cash prize.

SUGGESTED TOPICS (NOT EXHAUSTIVE):
1. Communications
2. Electromagnetic Engineering
3. Computing
4. Systems and Security
5. Signal Processing
6. VLSI end embedded systems

All accepted papers from NCACC-2016 will be published in International Journal for Scientific Research & Development (#IJSRD). Impact Factor of IJSRD is 2.39.

Last date of submission: 22nd September 2016.

For more Infomation about NCACC-2016 Visit us @ IJSRD


Organized by

Guru Nanak Dev Engineering College, Bidar, Karnataka

Mailoor Road, Bidar - 585 403

Karnataka, India 
Phone: 08482 - 226949, 235214 
Email: gndecbadmin@gndecb.org

Publication Partner


IJSRD | International Journal for Scientific Research & Development

Website : www.ijsrd.com


Tuesday, December 15, 2015

Problems in Getting Ambulatory Blood Pressure Monitoring using Infrared PPG


Problems in Getting Ambulatory Blood Pressure Monitoring using Infrared PPG


Author(s):

Shailaja Vedpathak , K.B.P.College of engg satara; Dr.B.B.Godbole, K.B.P.College of engg satara

Keywords:

Infrared Light; Photoplethysmograph (PPG), Pulse Rate; Reflectance; Transmittance

Abstract

In the current study, a non-invasive technique for blood pressure (BP) measurement based on the detection of Photoplethysmographic (PPG) pulses during pressure-cuff deflation was compared to sphygmomanometry—the Korotkoff sounds technique. The PPG Senor used to measure blood pressure using the technique of correlation of volume and pressure. The performance of portable and wearable biosensorsis highly influenced by motion artifact, artery stiffness, measurement sites, light wavelength, sensor pressure, A novel real time system is proposed for accurate motion-tolerant extraction of heart rate (HR) and pulse oximeter oxygen saturation (SpO2) from wearable Photoplethysmographic (PPG) biosensors. Recently, monitoring of blood pressure fluctuation in the daily life is focused on in the hypertension care area to predict the risk of cardiovascular and cerebrovascular disease events. The main problem is using with digital BP monitoring machine is Doctors are not believe on digital machines they believe with only sphygmomanometer. In this paper, in order to propose an alternative system to the existed ambulatory blood pressure monitoring (ABPM) sphygmomanometer, to sort out the problems using small wearable device consisting of photoplethysmograph (PPG) sensors. Recent advances in optical technology have facilitated the use of high-intensity green LEDs for PPG, increasing the adoption of this measurement technique. In this paper, we briefly present the problems of PPG sensor and recent developments in wearable pulse rate sensors with green LEDs.

Click here for full length article :

Saturday, September 5, 2015

IJSRD LEADING E-JOURNAL CALL FOR PAPER IN DATA MINING

Dear Researchers/Authors,

IJSRD is promoting a new field of this Digital Generation-“Data Mining”. 

In accordance to it IJSRD is inviting research Papers from you on subject of Data Mining. This is under special Issue Publication by IJSRD. In addition to this authors will have a chance to win the Best Paper Award under this category.

To submit your research paper on Data Mining Click here


 IJSRD

What is Data Mining..?

Data mining (the analysis step of the "Knowledge Discovery in Databases" process. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use.

The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown, interesting patterns such as groups of data records, unusual records and dependencies.The Knowledge Discovery in Databases (KDD) process is commonly defined with the stages:

(1) Selection
(2) Pre-processing
(3) Transformation
(4) Data Mining
(5) Interpretation/Evaluation.

To know more…….

Data mining involves six common classes of tasks:

Anomaly detection (Outlier/change/deviation detection) – The identification of unusual data records, that might be interesting or data errors that require further investigation.

Association rule learning (Dependency modelling) – Searches for relationships between variables. For example, a supermarket might gather data on customer purchasing habits. Using association rule learning, the supermarket can determine which products are frequently bought together and use this information for marketing purposes. This is sometimes referred to as market basket analysis.

Clustering – is the task of discovering groups and structures in the data that are in some way or another "similar", without using known structures in the data.

Classification – is the task of generalizing known structure to apply to new data. For example, an e-mail program might attempt to classify an e-mail as "legitimate" or as "spam".

Regression – attempts to find a function which models the data with the least error.

Summarization – providing a more compact representation of the data set, including visualization and report generation.

Application Areas….


Games

            They are used to store human strategies into databases and based on that new tactics are designed by Computer ( in association with Machine Learning, Artificial Intelligence)

Business

            Businesses employing data mining may see a return on investment. In situations where a large number of models need to be maintained, some businesses turn to more automated data mining methodologies.In business, data mining is the analysis of historical business activities, stored as static data in data warehouse databases. The goal is to reveal hidden patterns and trends. Data mining software uses advanced pattern recognition algorithms to sift through large amounts of data to assist in discovering previously unknown strategic business information. Examples of what businesses use data mining for include performing market analysis to identify new product bundles, finding the root cause of manufacturing problems, to prevent customer attrition and acquire new customers, cross-selling to existing customers, and profiling customers with more accuracy.

Science and engineering

            In recent years, data mining has been used widely in the areas of science and engineering, such as bioinformatics, genetics, medicine, education and electrical power engineering.

Human rights

            Data mining of government records – especially records of the justice system (i.e., courts, prisons) – empowers the revelation of systemic human rights infringement in association with era and publication of invalid or deceitful lawful records by different government organizations

Medical data mining

            Some machine learning algorithms can be applied in medical field as second-opinion diagnostic tools and as tools for the knowledge extraction phase in the process of knowledge discovery in databases.

Spatial data mining

            Spatial data mining is the application of data mining methods to spatial data. The end objective of spatial data mining is to find patterns in data with respect to geography. So far, data mining and Geographic Information Systems (GIS) have existed as two separate technologies, each with its own methods, traditions, and approaches to visualization and data analysis. Data mining offers great potential benefits for GIS-based applied decision-making.

Temporal data mining

            Data may contain attributes generated and recorded at different times. In this case finding meaningful relationships in the data may require considering the temporal order of the attributes.

Sensor data mining

            By measuring the spatial correlation between data sampled by different sensors, a wide class of specialized algorithms can be developed to develop more efficient spatial data mining algorithms.

Visual data mining

            During the time spent transforming from analogical into computerized, vast datasets have been created, gathered, and stored finding measurable patterns, trends and information which is covered up in real data, with a specific end goal to manufacture prescient formations(patterns).


Tuesday, July 21, 2015

#IJSRD.COM

A lot of us feel the same way but end up doing nothing to change it. Just because you have never done anything exceptional does not mean you don't have it in you.

Not all of us did well in school. Honestly, it doesn't matter because school is not the only education. Here are people who dropped out to do what they did and were really good at it.


#IJSRD JOURNAL

Friday, October 17, 2014

#IJSRD | Wireless Phone Charger: the uniqueness and the features

Wowhoo Wireless Phone Charger: the uniqueness and the features
blog#IJSRD | Research Lets Do it… #call for paper
Major wireless phone carriers have all been adapting the Qi wireless technology. Additionally many car manufactures are adding them to their 2014-2015 models. Manufactures include but are not limited to the following: Jeep, Toyota, Prius Harrier, Mercedes Benz, BMW, Volkswagen, Audi aswell as Porsche.
Due to the new and improved design and usability our initial launch date has been revised from Jan 7th to March 1st. we added approximately 8mm to our diameter to allow a better internal design.  The small revision to the Wowhoo charger allow us to get that quicker charge which is most important. The 10% is a big jump in charging speed.
for more details click here

Friday, August 15, 2014

#IJSRD advanced persistent threat (APT)


Advanced Persistent Threats (APTs) are a cybercrime category directed at business and political targets. APTs require a high degree of stealithiness over a prolonged duration of operation in order to be successful. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com

#IJSRD MOBILE PROTECTION VICTIMISATION VOICE VERIFICATION


Cellular communication business has developed leaps and bounds to become the core of day to day science. Mobile phones is that the spirit of cellular business. the quantity of mobile phones users is rising exponentially. however the privacy of user and security of mobile phones leftovers a difficult question. Theft of mobile phones has become the attention catching business for offender. There ought to be a reliable methodology of protective the instrument from thief. My paper proposes a brand new innovative, reliable, trick proof precautions for mobile phones victimization VOICE VERIFICATION. Voice verification is that the identification of a personal identity victimization speech because the spotting quality. The voice of the user is processed employing a digital gesture processor that is that the prime a part of a mobile. we have a tendency to are programming this DSP to implement this safety technique. For most a resourceful voice record of the user is formed. This record is hold on within the Flash read-only storage that is out there within the mobile. Then whenever the user speaks through the mobile phones a part of the speech sample is taken and hold on. This processed voice of the user is compared with the first folder to examine the identity of the user. If the user is allowed, he’s allowed to continue his speak. If not the transmission is cut unexpectedly by creating the DSP in inactive state. Therefore the mobile is being shielded from any extralegal user. Not with standing the mobile phones was purloined or lost it won’t be helpful for the other individual. The programmability of DSP and generality of Voice based mostly classification has given our methodology a twin advantage. Our set up demands neither external hardware nor additional price. The on top of methodology cause no hardship for the user not like this safety systems. This methodology may be adopted universally altogether models of Mobile phones and mobile phones for cover.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on www.ijsrd.com

Wednesday, August 13, 2014

#IJSRD Cost effective and innovative housing technology


Shelter is amongst the three basic human needs but now-a-days, about two-third of the total Indian population does not have their own shelter. This two-third population belongs to the middle and lower income class. These people find it difficult to construct their houses at an affordable cost by using conventional construction technology. It is found in many cases that people serve their whole life constructing their own house, but fail. The mission and dream of these people can be achieved by appropriate use of cost effective and innovative construction technology. As a whole, the housing shortage of the country can be overcome within lesser FUNDS, without compromising with the quality control and structural stability of the structure.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on www.ijsrd.com