IJCST Logo










 

International Journal of Computer Science and Technology
IJCST Vol 11 Issue 2 (April-June 2020)

S.No. Research Topic Paper ID Download
01

Diabetic Prognosis using Apriori Algorithm

Kanav Sharma, Sabreena Jan

Abstract

Data mining has successfully converted raw data into useful information in medical data. This information is extracted through various data mining techniques and algorithms such as classification, clustering, association and pattern recognition is of great use to the medical experts. Diabetes Mellitus has become a serious and common health problem nowadays, which affects people and leads to various disablements like cardio vascular disease, visual impairments and renal failure if diagnosis is not done at the right time. According to the World Health Organization, 346 million people are suffering from diabetes worldwide. The International Diabetes Federation has estimated an alarming rise in the number of diabetics by the year 2030. Diabetes has affected millions across the globe, most of the affected still rely on clinical treatment for diabetes. Globally diabetic patients resort to clinical solution primarily because they come to know about the diseases only after they are affected by it. In this paper, we have analyzed diabetic data in order to determine attributes which are most likely to cause diabetes which in turn can be used to predict diabetes well in advance using technology, thus helping millions of people globally.
Full Paper

IJCST/112/1/A-0981
02

Modeling of MEMS Pressure Sensor for Cardiovascular Diagnostics using COMSOL Multiphysics

Tazeen Anjum, Narayanaswamy G., Dr. Bindu A. Thomas

Abstract

The model is designed forimplantable blood pressure monitoring system through simulations in COMSOL Multiphysics. The model employs an elastic sensing cuff, wrapped around the artery section, made of silicone filled with bio-compatible fluid with an immersed MEMS pressure sensor.With this factor it is possible to adjust the measurement system for different medical applications.
Full Paper

IJCST/112/1/A-0982
03

Treatment for Liver Cancer based on Microwave Coaxial Slot Antenna using Comsol

Preethi K.P, Prof. Narayanaswamy G., Dr. Bindu A. Thomas

Abstract

The purpose of this paper is to illustrate the Microwave Coagulation Therapy (MCT) that can be used mainly for the treatment of hepatocellular carcinoma. Surgical resection is not always feasible in patients with hepatocellular carcinoma. Microwave Coagulation Therapy (MCT) has been used as an alternative to resection, and its efficiency has been evaluated in tissue microwave irradiation from a dipole antenna causes water molecules in the dielectric substance to vibrate dramatically at a frequency of 2.45GHz. MCT has the advantage over other thermal ablation technique in that ablation is rapid and the area of ablation is immediately hypoechic on real time ultrasound monitoring and therefore completeness of ablation can be easily monitored.in this treatment Invasive technique is used in which thin microwave coaxial antenna is inserted into the tumour to produce the coaguted region including the cancer cells. Finite element method is an technique used for performing analysis of complex structures.
Full Paper

IJCST/112/1/A-0983
04

Study and Implementation of MEMS Piezoresistive Pressure Sensors using COMSOL Multiphysics

Tazeen Anjum, Prof. Narayanaswamy G., Dr. Bindu A. Thomas

Abstract

Piezoresistive pressure sensors were some of the first MEMS devices to be commercialized.This example considers the design of the MPX100 series pressure sensors originally produced by the semiconductor products division of Motorola Inc. (now Free scale Semiconductor Inc.).Applied pressure range is varied from 0 to 100 kPa. To gain the optimum output, different combination ofmaterial for diaphragm & piezoresistor have been studied and corresponding displacement change, shear stress distribution and output voltage have been shown. Impact of doping concentration on output voltage for both diaphragm & piezoresistor material has also been studied.
Full Paper

IJCST/112/1/A-0984
05

Design and Implementation of the Dipole Antenna using COMSOL Multiphysics

Preethi K P, Narayanaswamy G., Dr. Bindu A. Thomas

Abstract

A dipole antenna is the simplest type of radio antenna, consisting of a two conductive wire rod that is half the length of the maximum wavelength the antenna is to generate. The dipole antenna is one of the moststraightforward antenna configurations. It can be realized with two thin metallic rods that have a sinusoidal voltage difference applied between them. In this paper this model approaches the analytic solution for dipole antenna and which will be designed using COMSOL Multiphysics. Radio frequency voltages are applied to dipole antennas at the center, between the two conductors.The magnitude of the electric field antenna is designed for a frequency of 0.074948GHz.
Full Paper

IJCST/112/1/A-0985
06

Monitoring and Controlling of Smart Equipments towards Manufacturing Industries using IoT

Naveen N, Lakshmi M A, Gajendra M, Naveen N

Abstract

Numerous corporations and start-up ventures have latched onto the Internet of Things concept looking to take advantage of whatever business opportunities are available. IoT assumes that the underlying network equipment and related technology can operate semi-intelligently and often automatically. Simply keeping mobile devices connected to the Internet can be difficult enough much less trying to make them smarter. People have diverse needs that require an IoT system to adapt or be configurable for many different situations and preferences. The “Monitoring and Controlling of Smart Equipment’s towards Manufacturing Industries using IoT” which is an Industrial automation projects keep you safe, manage energy consumption, and provide entertainment. Solutions for your industry or business are available for every income level and lifestyle. Simply choose the automation, energy management, and convenience features you desire. Industrial automation systems may be installed in new or existing structures and may be accessed and controlled via your smart phone or tablet. It is automation of the industrial, housework or household activity. Industrial automation may include centralized control of lighting, HVAC (heating, ventilation and air conditioning), appliances, security locks of gates and doors and other systems, to provide improved convenience, comfort, energy efficiency and security.
Full Paper

IJCST/112/1/A-0986
07

Traffic Sign Detection Using Convolutional Neural Networks

Pasem Harshitha, Perumalla Manasa, Ravupalli Saipriya, Medisetty Joshna, Jajula Himabindu

Abstract

Traffic Sign Detection and Recognition (TSDR) plays a crucial role here by detecting and recognizing a symbol, thus notifying the driving force of any upcoming signs. this may not only ensure road safety but also allows the driving force to be a little more ease while driving on tricky or new roads. With the assistance of this Traffic Sign Detection System (TSDR), drivers will not face the problem of understanding what the sign says. Because after performing the method of classification of a traffic sign, that output is transferred within the sort of speech. in this system, we propose a way for Traffic Sign Detection and Recognition using image processing for the detection of a symbol and an ensemble of Convolutional Neural Networks (CNN) for the recognition of the sign. Since CNN has a high recognition rate, it’s used for implementing various computer vision tasks. For the implementation of CNN, we generally use Tensor Flow.
Full Paper

IJCST/112/1/A-0987
08

Redundancy Control Data -Driven Approach for Cluster-Based Wireless Sensor Networks

Raju Imandi, Pendyala Veena Vaibhavi, PolimeraGunaVarshini, PotnuruAnkitha, Penmatsa Lavanya

Abstract

Wireless Sensor Networks (WSN) is the spatially conveyed sensors utilized for checking climatic conditions. One of the major challenges in energy consumption. This paper proposes a new data aggregation technique called REDA. Redundancy Elimination Data Aggregation is a methodology used to wipe out repetitive information during all levels. The main objective to propose this algorithm is to reduce energy utilization by lesseningthe number of transmissions and increasing the efficiency of the bandwidth occupancy. REDAuses the pattern code generation approach to remove the redundancy. Thus, the transmission of redundant data within the sensor nodes as well as within the same cluster is eliminated during all iterations.
Full Paper

IJCST/112/1/A-0988
09

Effective Working Activities on Artificial Intelligence in Healthcare System: Past, Present and Future

Dharnasi Prasad, Dr. G.Apparao Naidu

Abstract

Artificial Intelligence (AI) aims to mimic human cognitive functions. It is bringing a paradigm shift to healthcare, powered by increasing availability of healthcare data and rapid progress of analytics techniques.We survey the current status of AI applications in healthcare and discuss its future. AI can be applied to various types of healthcare data (structured and unstructured). Popular AI techniques include machine learning methods for structured data, such as the classical support vector machine and neural network, and the modern deep learning, as well as natural language processing for unstructured data. Major disease areas that use AI tools include cancer, neurology and cardiology. We then review in more details the AI applications in stroke, in the three major areas of early detection and diagnosis, treatment, as well as outcome prediction and prognosis evaluation. We conclude with discussion about pioneer AI systems, such as IBM Watson, and hurdles for real-life deployment of AI.
Full Paper

IJCST/112/1/A-0989
10

Challenging of Implementing Moodle as a Platform Application Case of PAAET Kuwait

Amani M. ALMadahekah, Humoud A. Alqattan

Abstract

E-Learning environments may contribute to the teaching and learning process if the integration is done within the framework of proper instruction.
E-learning provides the opportunity for teachers to interact electronically with each other as well as with their students. This interaction can be via e-mail or in chat rooms or on discussion board.
Though recognizing that the world at large will persist to use the online interactions for a variety of kinds that take place between students and teachers.
There are many software systems available that provide online platform systems. This software is in both forms, commercial and open source software (OSS). Moodle(Modular Object-Oriented Dynamic Learning Environment) is one of the systems that have been increasingly gaining worldwide popularity in e-learning system. This paper is focused on implementing Moodle in Public Authority of Applied Education and Training (PAAET). Moodle has been adopted by many people and organizations around the world because it offers a tightly integrated set of tools. Moodle has been developed under the general public license and many of its components were developed without a specific design documentation including its security services.

In this paper researcher present an overview of the feedback of implanting Moodle platform as an E-learning environments. These environments include interactive activities based on three main dimensions from PAAET teachers prospective.
One main advantage of this questionnaire to know the opinion of applying the Moodle and to give more training and supporting for the staff and students. We will also show how effect of communication and technical support on flow of information and knowledge. PAAET have to support teachers with many interesting tools that can be used to improve the teaching– learning process, and the students to reinforce their abilities and knowledge.
Full Paper

IJCST/112/1/A-0990
11

Optimum Utilization of Data Mining Techniques for Detecting Distributed Denial of Service (DDoS) Attacks

G.Prabhakar Raju, Dr. G.Apparao Naidu

Abstract

Users and organizations find it continuously challenging to deal with distributed denial of service (DDoS) attacks. The security engineer works to keep a service available at all times by dealing with intruder attacks. The intrusion-detection system (IDS) is one of the solutions to detecting and classifying any anomalous behavior. The IDS system should always be updated with the latest intruder attack deterrents to preserve the confidentiality, integrity and availability of the service. In this paper, a new dataset is collected because there were no common data sets that contain modern DDoS attacks in different network layers, such as (SIDDoS, HTTP Flood). This work incorporates three well-known classification techniques: Multilayer Perceptron (MLP), Naïve Bayes and Random Forest. The experimental results show that MLP achieved the highest accuracy rate (98.63%).
Full Paper

IJCST/112/1/A-0991
12

A Survey on Various Wireless Indoor Localization Techniques and Technologies

Priya Darshini, Suchitra V

Abstract

Wireless indoor positioning systems have become very popular in recent years. IPS have been designed to provide location information of persons and devices. These systems have been used in many applications such as asset tracking and inventory management. IPS uses sensors and communication technologies to locate objects in indoor environment. IPS are attracting scientific and enterprise interest because there is a big market opportunity for applying their technologies. This paper provides an overview of existing indoor positioning techniques such as Angle of Arrival (AoA, Time of Flight ),Time of Arrival (ToA), Time Difference of Arrival (TDOA), Round-trip time of Flight (RTOF), Received Signal Strength (RSS), based on technologies such as WiFi, Radio Frequency Identification Device (RFID), Ultra-Wideband (UWB), Bluetooth and systems.
Full Paper

IJCST/112/1/A-0992
13

Implementation of Cloning in MANETS

Vandana, Suchitra V

Abstract

A mobile Adhoc network (MANET) is formed by a group of autonomous mobile nodes connected by wireless link without centralized control or established infrastructure. To clone protocol we need to modify different C++ and TCL files. Even if one component is modified then the entire Network Simulator-2 (NS-2) suite must be reconfigured. Cloning the protocol manually takes a lot of time and prone to error. Our objective is to ease the work of developers and researchers by showing the procedure to clone the AODV protocol automatically using a script. Methodology: In this study, a shell script is developed that will clone the AODV protocol by modifying 18 C++ and TCL files. The comparision of cloned and uncloned AODV protocol is done and the result generated are exactly the same for both the protocols. Proposed script is clone the protocol much faster and it will save the time and help the developers or research to focus more on their study on the protocol.
Full Paper

IJCST/112/1/A-0993