7,233 research outputs found
Predicting Heart disease using Machine Learning
in recent years a spike is seen in mortality linked to heart disease. In developed countries mortality linked to heart diseases have seen a gradual decrease due to the availability of better medical facilities and public awareness but on the other hand in developing countries like India and other south Asian countries alarming increment of mortality linked to heart disease has been seen in recent years. According to a research published in Indian heart journal India has seen a 4 fold increment in mortality linked to heart disease in past 40 years [1]. Abundant amount of data is collected by various medical institutions in past a decade. The data is available on various open source platforms like UCI, KAGGLE, and other Government websites.in this paper we will review all the techniques of data mining, machine learning and deep learning used by the researches previously on these open source datasets. So that we can propose a better technique for early prediction of heart disease using machine learning and deep learning models
An Assessment on Driving Behaviourism of Goods Vehicle Drivers in Kerala
Road Safety has become a serious issue in this era as the population in terms of both people as well as vehicles has increased to a large extend. The behaviour of drivers is influenced by several factors, which include their socio-economic – demographic factors and vehicle characteristics. Accidents comprising of goods vehicles have been on the surge in Kerala over the years. Even though the numbers of heavy vehicles plying on Kerala roads are less compared to two wheelers and cars, the proportion of crashes involving heavy vehicles is a cause of concern. Fallacious driving behaviourism is generally considered as the leading root of such accidents. The present study intends to investigate the elements involved in the Driver Behaviour Questionnaire (DBQ), then to explore the relationships between the elements of the DBQ and accident involvement. The data were interpreted using percentage analysis. The analysis showed the level of violations, errors, lapses committed by drivers on the basis of driving behaviourism and non –driving behaviourism of the goods vehicle driver
The MHD flow of liquid film in the presence of dissipation and thermal radiation through an unsteady stretching sheet by HAM
This paper examines the impact of magnetohydrodynamic (MHD) over a thin film of an unsteady stretching sheet. Prandtl number model of dynamic viscosity and thermal conductivity is examined using Homotopy analysis method. By Makinguse of appropriate self-similar conversion, the system of model partial differential equations (PDEs) with strong nonlinearity is converted into a non-dimensional set of couple ODEs (Ordinary Differential Equations). Consequently, the system of these transformed equations is analytically explained by implementing Homotopy Analysis Method (HAM). The effects of embedded parameters such as magnetic parameter (M), radiation parameter Nrand Eckert number (Ec) on involved distributions are interpreted graphically to examine the heat transport features for both sorts of unsteadiness parameters S=0.8 and S=1.2. Moreover, the (Cf) skin friction along with the (Nu) heat transport rate (Nusselt number) is formulated for different values of relevant variables
An approach for Secured Image Transmission: A High Capacitive and Confidentiality based Image Steganography using Private Stego-Key
In the proposed paper an approach for image transmission with security and also improvement of the gray-scale (8-bit image) image flexible stenographic system using LSB approach. In this process a secret key of 80 bits is applied while embedding the message into the cover image. To provide high security and also confidentiality of the data a key stego-key is applied. The proposed method the information bits are embedded adaptively into the cover-image pixels. With this method a high embedding capacity in terms of hiding the data is provided and also better imperceptibility is also achieved. The major advantage of this method verifies by the Security method of Digital Signature. It is to be verified whether the attacker has made a trials to change the Secret information in the present inside the stego-image which is intended to be kept secret throughout the communication process. In this technique the embedding process to hide the message data present in the transformed spatial domain of the cover image and makes use of a simple Exclusive-OR operation based on Security checking method of verifying the signature digitally by using key size value of 140 bits is used to check the integrity from the stego-image. The confidential data which is embedded can be retrieved from stego-images. The security level is enhanced by using the stego key and by adaptive steganography data inconspicuousness is improved
Advanced Controllers Implementation for Speed Control Analysis of Two Mass Drive System
The speed control of two mass drive systems is presented in this paper. For the purpose of analysis, PI, Linear Matrix Inequality controller and Internal Model Controller are chosen. Tuning of PI controller is achieved by Zeigler Nichols method, whereas the LMI and IMC are adapted with the conventional method of tuning. The various simulations are carried out in order to analyze the performance index of these controllers and to fix the best controller, and the results are compare
Fabrication and characterization of nano structured honeycomb absorbers and thermal analyses on solar air heating collector
Fabrication of nano structured absorber is mandatory for reaping the enhanced thermal performance of solar collectors. In this connection, the nano carbon and aluminium composite was coated on aluminium substrate, which was similar to the hexagon shaped honey comb, and the solar absorber was developed. It was characterized through X-ray Diffractometer (XRD), Fourier Transform Infrared (FTIR) spectrometer and UV–Visible spectrophotometer (UV). It was also thermally analyzed not only in outdoor conditions but also in stagnant conditions in solar air heating collector. The research results pertaining to characterization of solar absorber showed that the crystallite size was in nano ranges and the nano particles had face-centre cubic structure. The research results pertaining to characterization of solar absorber also showed that the nano composite had excellent absorption in UV and visible region. The research result related to thermal analysis in outdoor environment revealed that the enhancements of temperature on solar absorbers coated with carbon and aluminium nano composite in the mass ratio of 60:40, 70:30 and 80:20 were 23.5oC, 25.1oC and 24.4oC respectively. The research result related to thermal analysis in stagnation environment also revealed that the enhancements of temperature on glass cover, carbon and aluminium nano composite coated absorber and working fluid were 69.4oC, 110.6oC and 99.0oC respectively. On the basis of research outcomes, it could be concluded that nano carbon and aluminium composite coated solar absorber would be used for photo thermal applications due to their desirable optical and thermal properties. It could also be concluded that nano carbon and aluminium composite coated solar absorbers would be used in photo thermal appliances due to their positive impact on thermal performances
Design and Development of Bionic Eye for Visually Challenged People using Raspberry Pi Processor
Bionic Eye will play a major role in the future development of visually challenged people. This research focuses on design and development of Bionic Eye to detect the hurdles for visually challenged people. This intelligence system uses the shape and movement of an object for detection and tracking. The object recognition rate is improved with the help of Stochastic Decent Gradient algorithm. Raspberry Pi is the processor used for the Bionic Eye as it gives out command on the object detection and the data from the camera is collected and then transmitted to the system. The distance and object movement is obtained by ultrasonic sensor. The range of the ultrasonic sensor is set and the distance is measured. A camera is used for capturing the object. A voice output saying “there is an object in front of you” is heard after an object is detected. The accuracy of the object detection is obtained by the deep learning algorithm. Increasing the recognition rate is the main advantage over object detection system
Face Bimagic Labeling On Some Graphs
The existence of face bimagic labeling of types (1,0,1), (1,1,0) and (0,1,1) for double duplication of all vertices by edges of a ladder graph is proved. Also if G is (1, 0, 1) face bimagic, except for three sided faces then double duplication of all vertices by edges of G is face bimagic
A Fuzzy Approach To Predict The Thermal Performance Of Spiral Solar Thermal Collector
In the recent scenario, the solar energy play a vital role for domestic usages since it is being one of the renewable forms of energy. The spiral solar thermal collector is used to harvest the solar energy. In the present work, the spiral solar thermal collector with specified dimensions was fabricated and the readings were taken. A Rule Based Mamdani Type Fuzzy (RBMTF) model was developed to predict the output temperature of the spiral solar thermal collector, using the mass flow rate of water, time as input parameters and outlet temperature as an output parameter with an aid of MATLAB fuzzy logic toolbox. The rate of flow is varied between 0.014 and 0.0755 for the time range of 600 minutes to 960 minutes. Six phonological variables were considered for each combination and the R2 value for the testing data were about 96.9%. The predicted results were found to be in concurrence with the experimental results which confirm reliability of the proposed RBMTF model
Double Pseudonym-Based Privacy Preservation Scheme for securing sensitive information in the SaaS cloud environment
In the modern world, cloud computing is considered as the essential entity of diversified number of organization for assisting them towards the utilization of demand resources. In this context, cloud providers need to adhere to the privacy and security mechanisms in order to attain confident and secure exchange of user sensitive data in cloud environment. Thus, the data exchanged by the users in the cloud scenario need to be secured enough to resists the possible kinds of attacks that could be launched by the attackers. In this paper, Double Pseudonym-Based Privacy Preservation Scheme (DPBPPS) is proposed for securing sensitive data shared on the cloud. This DPBPPS includes a significant authentication scheme that inherited the benefits of the double pseudonym method for preventing the real identity of the cloud users by periodically updating the information (such as member secret, authentication key, internal pseudo-identity). This DPBPPS prevents the inclusion of bilinear pairing for yielding better performance in terms of computation overhead and communication overhead, and is more suitable to be applied independent to the number of users and sensitive data shared over the clouds
- …