A Survey on Despeckling Of Synthetic Aperture Radar Images
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.608-612, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.608612
Abstract
Synthetic Aperture Radar (SAR) is a technology used for producing satellite images with high resolution. Since few decades SAR imagery has been the most famous and prominent thing in the context of earth’s observation because of its capability of penetrating through the soils and clouds. Also, SAR imagery has a good ability to operate at any condition type of weather during days and nights. In Remote Sensing technology it is playing a vital role because of this capability and ability. But the presence of undesirable data influences the actual details of the SAR image. This undesirable data is called as noise. This specific noise is also called as “Speckle”. The SAR images are corrupted by the presence of this strong noise. Over few years many techniques have been used to remove the noise from SAR imagery. This process of removing the speckles or noise from SAR imagery is called as Despeckling. In this paper, different methods which are used for removing the noise are discussed.
Key-Words / Index Term
Synthetic Aperture Radar, Speckle, Despeckling
References
[1] Yaser Arianpour, Hamidreza Aminavar, James A. ritcey, “Gradient based SAR image despeckling and super resolution usimg Zernike moments and boostrapping”, in the proceedings of the 2017 IEEE Radar Conference, USA, 2017.
[2] Gao Chen, Gang Li, Yu Liu, Xiao-Ping Zhang, Li Zhang, “SAR image despeckling by combination of fractional-order total variation and non-local low rank regularization”, in the proceedings of the 2017 IEEE International Conference on Image Processing, Beijing, China, 2017.
[3] G. Chierchia, D.Cozzolino, G.Poggi, L.Verdoliva, “Sar image despeckling through convolutional neural networks”, IEEE Signal Processing Letters, Vol.24, Issue.12, pp.1763-1767, 2017.
[4] Qingjun Zhang, Tengfei Li, Yu Zhu, ZhengLv, “Sar image despeckling based on a novel total variation regularization model and gf-3 data”, in the proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, Beijing, China, 2018.
[5] Jie Geng, Jianchao Fan, Xiaorui Ma, Hongyu Wang, Ke Cao, “An iterative low-rank representation for sar image Despeckling”, in the proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, Beijing, China, 2016.
[6] FengGu, Hong Zhang, Chao Wang, Bo Zhang, “Residual encoder-decoder network introduced for multisource sar image Despeckling”, IEEE publisher, Beijing, China 2017.
[7] Weiping Ni and Xinbo Gao, “Despeckling of SAR Image Using Generalized Guided Filter With Bayesian Nonlocal Means”, IEEE Transactions On Geoscience And Remote Sensing, Vol.54, Issue.1, 2016.
[8] Zhenchuan Pang, Guanghi Zhao, Guangng Shi, Fangfang Shen, “SAR Image Despeckling with Adaptive Sparse Representation”, in the proceedings of the 2015 2nd IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, Fuzhou, China, 2015.
[9] Yao Zhao, Jianguo Liu, Bingchen Zhang, Wen Hong, Yirong Wu, “An adaptive total variation regularization method for sar image Despeckling”, in the proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, Melbourne, VIC, Australia, 2014.
[10] Aiyeola Sikiru Yommy, Rongke Liu, Spencer Ojogba Onuh and Ani Cosmas Ikechukwu, “SAR Image Despeckling and Compression Using K-Nearest Neighbour Based Lee Filter and Wavelet”, in the proceedings of 8th International Congress on Image and Signal Processing, Shenyang, China, 2016.
[11] NageswaraRao Sirisala and C.Shoba Bindu, “A Novel QoS Trust Computation in MANETs Using Fuzzy Petri Nets, International Journal of Intelligent Engineering and Systems”, Vol.10, No.2, (2017), pp 116-125
[12] NageswaraRao Sirisala and C.Shoba Bindu, “Uncertain Rule Based Fuzzy Logic QoS Trust Model in MANETs, International Conference on Advanced Computing and Communications –ADCOM”, (IITM PhD forum), (2015), pp.55-60.1
Citation
V.B.Pravalika, S. Nageswararoa, B. Seetharamulu, "A Survey on Despeckling Of Synthetic Aperture Radar Images," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.608-612, 2019.
Blockchain- a Disruptive Technology for Existing Enterprises
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.613-615, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.613615
Abstract
Every online transaction is at a great risk of attacks by hackers who attempt to steal bank details provided online by the customers. These digital money transactions have lead to the invention of various crypto-currencies. These crypto-currencies work on the principles of blockchain technology. Blockchain acts as public ledger for all such crypto-currency transactions in a de-centralized manner. It verifies all the online transactions using peer-to-peer network of computers without any third party interventions. Blockchain database contains the complete history of all the transactions done in the past. It is shifting the entire financial industry from trusting people to trusting math and may be a disruptive technology for existing enterprises by changing the existing business models. This paper discusses about blockchain and its disruptive capabilities for today’s society and industries.
Key-Words / Index Term
Blockchain, security, trust, business model, digital currency, financial industry
References
[1]. C. Shuyan, C. Yanan, W. Xiaoyu and L. Yanqiao, "A Review of Researches on Blockchain" .WHICEB 2017 Proceedings. 57, 2017.
[2]. H. Halpin, M. Piekarska, “Introduction to security and privacy on the Blockchain”, In: European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 1–3 IEEE (2017)
[3]. S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M Voelker, and S. Savage. “A fistful of bitcoins: characterizing payments among men with no names”. In Proceedings of the 2013 conference on Internet measurement conference, pages 127–140. ACM, 2013.
[4]. D. A. Tapscott, “Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World”, 2016, ISBN:1101980133 9781101980132
[5]. Z. Zheng, S Xie, H. Dai, H. Wang, “Blockchain Challenges and Opportunities: A Survey”. Work Pap, 2016
[6]. https://www.investopedia.com/terms/b/blockchain.asp
[7]. https://blockgeeks.com/guides/what-is-blockchain-technology/
[8]. M. Nofer, P. Gomber, O Hinz, D. Schiereck “Blockchain”, Bus Inf. Syst Eng 59(3):183–187, 2017.
[9]. M. Atzori, “Blockchain technology and decentralized governance: Is the state still necessary?”, Work Pap, 2015.
Citation
Pratibha Maurya, "Blockchain- a Disruptive Technology for Existing Enterprises," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.613-615, 2019.
Survey on Predicting Diseases of Employees under Work Pressure Using Data Mining Techniques
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.616-620, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.616620
Abstract
Employees working in various professions & occupations are prone to face varieties of health problems due to work pressure. The level of increasing work pressure as assessed by the perception of having little control but lots of demands have been demonstrated to be associated with increased rate of health issues such as hypertension, back pain, feeling fatigued, headaches, disorders and sometimes heart attack. Work pressure also causes accidents, diminished productivity, medical, legal and financial costs. In healthcare industry, data mining plays an essential role for predicting diseases of employees under work pressure. High volume of data that can be generated for the prediction of diseases of employees is analyzed traditionally and is too complicated along with voluminous to be processed. Data Mining provides the methods and techniques for transformation of the data into useful information for decision making. These techniques can make process fast and take less time to predict the diseases of employees under work pressure with more accuracy to improve their health in advance.
Key-Words / Index Term
Data Mining, Predicting Disease, Work Pressure, Healthcare, Decision Making
References
[1] Qasem A. Al-Radaideh , Eman Al Nagi ,” Using Data MiningTechniques to Build a Classification Model for Predicting Employees Performance“, International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 3, No.2,2012 .
[2] Feixiang Huang, Shengyong Wang and Chien-Chung Chan,” Predicting Disease By Using Data Mining Based on Healthcare Information System”, IEEE International Conference on Granular Computing,2012.
[3] E.Deepak Chowdary, K.Anusha Devi , D.Mounika , K.V.KrishnaKishore and S.Venkatramaphanikumar ,” Ensemble Classification technique to detect stress in IT-Professionals ”, IEEE 2016.
[4] Pinky Saikia Dutta, Sunayana Dutta, Tridisha Das, Sweety Buragohain, SusmitaSarma,” A Survey on Smart Health Care Using Data Mining”, International Journal of Computer Sciences and Engineering, Volume-4, Special Issue-7, Dec 2016, ISSN: 2347-2693
[5] P.Manivannan, “Dengue Fever Prediction Using K-means Clustering Algorithm” ,IEEE International Conference of Intelligent Techniques in Control, Optimization and Signal Processing – Year 2017.
[6] Umanandhini.D, Kalpana.G “Survey on stress types using data mining algorithms”, IJIRAE-International journal of innovative research in advanced Engineering, April 2017 ISSN:2349-2163.
[7] Divya Sharma, Anand Sharma, Vibhakar Mansotra,” A Literature Survey on Data Mining Techniques to Predict Lifestyle Diseases”, International Journal for Research in Applied Science & Engineering Technology (IJRASET), , June 2017,Volume 5 Issue VI, ISSN: 2321-9653
[8] Huijie Lin, Jia Jia, Jiezhong Qiu, Yongfeng Zhang, Guangyao Shen,Lexing Xie,Jie Tang, Ling Feng, and Tat-Seng Chua, “ Detecting Stress Based on Social Interactions in Social Networks ” in IEEE 2017.
[9] Durga Kinge, S. K. Gaikwad, “Survey on data mining techniques for disease prediction”, International Research Journal of Engineering and Technology (IRJET), Volume: 05 Issue: 01 , p-ISSN: 2395-0072, Jan 2018.
[10] J. S. Kanchana, H. Thaqneem Fathima, R. Surya, R. Sandhiya, “Stress Detection Using Classification Algorithm”, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181,Vol.7 Issue 04, April-2018 .
[11] Xue-Hui Meng , Yi-Xiang Huang , Dong-Ping Rao , Qiu Zhang , Qing Liu,” Comparison of three data mining models for predicting diabetes or prediabetes by risk factors”, Kaohsiung Journal of Medical Sciences (2013).
[12] Kevin Daimi, Shadi Banitaan,” Using Data Mining to Predict Possible Future Depression Cases”, International Journal of Public Health Science (IJPHS), ISSN: 2252-8806, Vol.3, No.4, December 2014.
[13] Manimaran.R and Vanitha.M (2017) “Prediction of Diabetes Disease Using Classification Data Mining Techniques”, International Journal of Engineering And Technology(IJET), Volume 9, Issue 5, Nov 2017, PP: 3610-3614.
[14] Silviya D’monte, Dakshata Panchal,” Data Mining Approach for Diagnose of Anxiety Disorder”, International Conference on Computing, Communication and Automation (ICCCA2015), ISBN:978-1-4799-8890-7, 2015 IEEE.
[15] Ms.Mehdi Khundmir, Prof. Vikas Maral,” A Survey on Usage of Data Mining Techniques for Prediction of Heart Disease ”, IOSR Journal of Computer Engineering, e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, May-June 2017.
[16] S.Neelamegam, Dr.E.Ramaraj, “Classification algorithm in Data Mining:An Overview “, published on Sep-2013, International Journal of P2P Network Trends and Technology , Vol 3 Issue 5.
[17] E.Gokulakannan and Dr.K.V.Venkatachalapathy, “Comparison Study of Severaldata Mining Algorithms to Predict Employee Stress”,published in Advances in Natural and Applied Sciences, 2015.
[18] M.A.Nishara Banu, B.Gomathy, “Disease Predicting System Using Data Mining Techniques”, published in International Journal of Technical Research And Applications, Volume 1,Issue 5, Nov 2013,PP41-45.
[19] Alexandra F.DA.S.Cordeiro, Irenilza De A.Naas, Stanley R.DE.M.Oliveira,Fabio Violaro, Andreia C.M.DE. Almeida, “ Efficiency of Distinct Data Mining Algorithms for Classifying Stress Level in Piglets from other Vocalization”, V 32,p.208-216 Apr 2012.
[20] Shubpreet Kaur and Dr.R.K.Bawa, “ Future Trends of Data Mining in Predicting the various Diseases in Medical Healthcare System”, published in International Journal of Enrgy,Information and Communications, Vol.6Issue 4, 2015. pp.17-34.
[21] K.Gomathi, Dr.D.Shanmuga Priyaa, “Multi Disease Prediction using Data Mining Techniques”, published online at http://www.publishinginda.com, sep 2017.
Citation
S. Anitha, M. Vanitha, "Survey on Predicting Diseases of Employees under Work Pressure Using Data Mining Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.616-620, 2019.
Study & Implementation of Navigation of Destination Based on Alarm System in Mobile
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.621-623, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.621623
Abstract
It is a Location based alarm with Tasks is an attempt to add an alarm facility for mobiles, based on the location of the device using GPS. The location based alarm will give you alert when you reach your desired destination. Location based alarm is a GPS based alarm, If you set an alarm, it will make a sound and notification once it`s detected you are within the user defined range from the destination. The user needs to save the Start location using longitude and latitude, the alarm will ring when the user is near to the Destination Point. This location based alarm is useful for the travelling sales persons and persons who are travelling in any Mode of transportation. The travelling sales person needs to do different kind of works in different places. It is difficult to remember all the places for him. So by using this application he can set an alarm to the places, where he need to go. The GPRS settings must be enabled on a mobile device to use this application .we are using a SHA1 signature to generate a key Google map API key and Google play service API for displaying the map in mobile device.
Key-Words / Index Term
Component, Formatting, Style, Styling, Insert (key words)
References
[1] Indraneel B. , Namrata S. , Sana P. , Shalini , Sneha A. , Vitasta T., "Vehicle Tracking and Locking System Using PS and GSM" , International Advanced Research Journal Science, Engineering and Technology, IARJSET, ISSN (Online) 2393-8021 ISSN (Print) 2394-1588, Vol. 4, Issue 2, February 2017.
[2]Mashood M., "GPS based Advanced Vehicle Tracking and Vehicle Control System", I.J.Intelligent Systems and Applications, Published Online February 2015 in MECS, 2015.
[3] “Study and implementation of mobile GPS Navigation System Based on Google Maps”, He Li, Lai Zhijian, 2011.
[4] Android developers < http://developer.android.com>
[5] [Online]www.designerandroid.com
[6] Amit Kushwaha1 , Vineet Kushwaha2 1Department of Electronics & Communication Engineering IIMT Engineering College, Meerut-250001, India ‘’Location Based Services using Android Mobile Operating System’’, published online march 2011.
Citation
Priyansh Dixit, Ayush Gupta, Amit Kumar, "Study & Implementation of Navigation of Destination Based on Alarm System in Mobile," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.621-623, 2019.
Literature Survey : Routing techniques in IOT
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.624-628, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.624628
Abstract
The Internet of things is term basically composed of two word “Internet” and “Things” .The first word describes interconnecting every possible computing device in the world and second word describe everything that is addressable and communicable will be connected. Many issues in IoT include privacy, security, reliability, link failures, routing, heterogeneity etc. In this paper main focus on Routing. It is one of most important service in IoT. Routing is necessary to exchange the information in things and many protocols are designed and developed for optimum path selection. It depends on residual energy, delay and number of forwarding nodes in the path. In IOT continuous movement of nodes, frequently changing topology and limited resources it’s become great challenge for the researcher in routing field. The paper provides literature survey on IoT with past research and discussion about applicability towards the IoT and routing challenges with comparison of different routing protocols using different parameters.
Key-Words / Index Term
Routing, Protocols, IoT
References
[1] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, "Internet of things: Vision,applications and research challenges," Ad Hoc Networks, vol. 10, pp. 1497-1516, 2012.
[2] L. Coetzee and J. Eksteen, "The Internet of Things-promise for the future? Anintroduction," in IST-Africa Conference Proceedings, 2011, 2011, pp. 1-9.
[3] L. Atzori, A. Iera, and G. Morabito, "Understanding the Internet of Things: definition,potentials, and societal role of a fast evolving paradigm," Ad Hoc Networks, vol. 56,pp. 122-140, 2017.
[4] K. Ashton, “That, ‘Internet of Things’ Thing In The Real World, Things Matter More Than Ideas”, RFID Journal, June 2009, http://www.rfidjournal.com/article/print/4986
[5] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A Survey,” Computer Networks, vol. 54, no. 15, pp. 2787 – 2805, 2010
[6] A Dhumane, R Prasad, J Prasad. Routing Issues in Internet of Things: A Survey. InProceedings of the International MultiConference of Engineers and Computer Scientists. 2016; Vol. 1, 16-18.
[7] S. Basagni, C. Petrioli, R. Petroccia, and D. Spaccini, “CARP: achannel-aware routing protocol for underwater acoustic wireless networks,” Ad Hoc Networks, vol. 34, no. supplementC, pp. 92–104, 2015, Advances in Underwater Communications and Networks.
[8] A. Aijaz and A. H. Aghvami, “Cognitive machine-to-machine communications for internet-of-things: a protocol stack perspective,” IEEE Internet of Things Journal, vol. 2, no. 2, pp. 103– 112, 2015.
[9] Yicong Tian, Rui HOU,“An Improved AOMDV Routing Protocol for Internet of Things”, International Conference on Computational Intelligence and Software Engineering (CiSE), 2010, pp. 1-4.
[10] Michael Frey, Friedrich Grose, Mesut Gunes, “Energy-aware Ant Routing in Wireless Multi-hop Networks”, IEEE International Conference on Communications (ICC), pp. 190-196, 2014.
[11] K´assio Machado 1;?, Denis Ros´ario 2;3, Eduardo Cerqueira 2 “A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications” ISSN 1424-8220, www.mdpi.com/journal/sensors,2013
[12] Hyung-Sin Kim, JeongGil Ko, David E. Culler, and Jeongyeup Paek “Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey” IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 2017
[13] Oana Iova, Fabrice Theoleyre, Thomas Noel, “Using MultiparentRouting in RPL to Increase The Stability and The Lifetime of TheNetwork”, Ad Hoc Networks, Elsevier 2015, pp. 45-62
[14] JV Sobral, JJ Rodrigues, K Saleem, J Al-Muhtadi. Performance
evaluation of LOADng routing protocol in IoT P2P and MP2P
applications. InComputer and Energy Science (SpliTech), International Multidisciplinary Conference. 2016; 1-6.
Citation
Reena Pingale, S.N. Shinde, "Literature Survey : Routing techniques in IOT," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.624-628, 2019.
Visualisation and Analysis of Big Data through Business Intelligence
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.629-636, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.629636
Abstract
Business knowledge instruments are basically information driven Decision Support Systems (DSS). These instruments can give verifiable, current, and prescient point of view of business activities, frequently utilizing information that has been accumulated into an information distribution center or an information shop and sometimes working from operational in-formation. Programming components bolster detailing, intelligent "cut up" rotate table investigations, representation and factu-al information mining and Predictive examination. This paper centers around imaginative examination in enormous infor-mation and business insight is intended to give us an upper hand in the advanced, quickly developing business space. The ex-amination gives the more profound information, propelled aptitudes and understanding that will enable us to add to the ad-vancement and structure of huge information frameworks just as dispersed web empowered choice help application program-ming frameworks, utilizing innovations like information investigation, business knowledge, information mining, information warehousing, conveyed information the board and advances.
Key-Words / Index Term
Business intelligence,Big data,Data analysis, Power BI
References
[1] Lim, E.P., Chen, H. and Chen, G., 2013. Business intelligence and analytics: Research directions. ACM Transactions on Management Information Systems (TMIS), 3(4), p.17.
[2] Turban, E., King, D., Lee, J.K., Liang, T.P. and Turban, D.C., 2015. Electronic commerce: A managerial and social networks perspective. Springer.
[3] Breese, J.S., Heckerman, D. and Kadie, C., 1998, July. Empirical analysis of predictive algorithms for collaborative filtering. In Pro-ceedings of the Fourteenth conference on Uncertainty in artificial intelligence (pp. 43-52). Morgan Kaufmann Publishers Inc..
[4] B.M. Sarwar, G. Karypis, J.A. Konstan, and J. Riedl, “Analysis of Recommendation Algorithms for e-commerce.” Proceedings of ACM Conference on Electronic Commerce, 2000, pp. 158-167 date accessed:25 december2018.
[5] Moss, L.T. and Atre, S., 2003. Business intelligence roadmap: the complete project lifecycle for decision-support applications. Addi-son-Wesley Professional.
[6] Gartner Group, “How secure is your business intelligence environ- ment,” pp. 1–6, 2002. [Online]. Available: http://www.gartner.com/ id=367264,date accessed :12 January 2019.
[7] Apte, U., Karmarkar, U. and Nath, H., 2012. The US information economy: Value, employment, industry structure, and trade. Foundations and Trends® in Technology, Information and Operations Management, 6(1), pp.1-87.
[8] Sun, Y., Su, J. and Yang, J., 2016. Universal artifacts: a new ap-proach to business process management (BPM) systems. ACM Transactions on Management Information Systems (TMIS), 7(1), p.3.
[9] Pruden, A., Larsson, D.J., Amézquita, A., Collignon, P., Brandt, K.K., Graham, D.W., Lazorchak, J.M., Suzuki, S., Silley, P., Snape, J.R. and Topp, E., 2013. Management options for reducing the release of antibiotics and antibiotic resistance genes to the environment. Environmental health perspectives, 121(8), pp.878-885.
[10] .Jianwen Su and Yan Tang,Business Intelligence Revisited ,2017 Fifth International Conference on Advanc,date accessed:20 jan 2019.
[11] Raj, R., Wong, S.H.S. and Beaumont, A.J., 2016, November. Business Intelligence Solution for an SME: A Case Study. In KMIS (pp. 41-50).
[12] Sun, Z., Zou, H. and Strang, K., 2015, October. Big data analytics as a service for business intelligence. In Conference on e-Business, e-Services and e-Society (pp. 200-211). Springer, Cham.
[13] Xu, L.D. and Duan, L., 2019. Big data for cyber physical systems in industry 4.0: A survey. Enterprise Information Systems, 13(2), pp.148-169.
[14] T.-P. Liang, Y.-H. Liu/Expert Systems With Applications 111 (2018) 201 9
[15] Su, J. and Tang, Y., 2017, August. Business intelligence revisited. In 2017 Fifth International Conference on Advanced Cloud and Big Data (CBD) (pp. 1-6). IEEE.
[16] David Loshin David Loshin,Business Intelligence 1st Edition,The Savvy Manager`s Guide date accessed:24 jan 2019.
[17] Bell, T.B., Landsman, W.R. and Shackelford, D.A., 2001. Audi-tors` perceived business risk and audit fees: Analysis and evidence. Journal of Accounting research, 39(1), pp.35-43.
[18] Kindleberger, C.P., 1969. American Business Abroad. The International Executive, 11 (2), 11–12.
[19] Chung, W.K. and Hamilton, G.G., 2001. Social logic as business logic: Guanxi, trustworthiness, and the embeddedness of Chinese business practices. Rules and networks: The legal culture of global business transactions, 7, p.325.
[20] Grace, D. and Cohen, S., 1998. Business ethics: Australian prob-lems and cases (pp. 35-6). Melbourne: Oxford University Press.
[21] Etzkowitz, H. and Leydesdorff, L., 2000. The dynamics of innovation: from National Systems and “Mode 2” to a Triple Helix of university–industry–government relations. Research policy, 29(2), pp.109-123.
[22] José Nelson Figueiredo, Business Intelligence,2018,date ac-cessed:12th jan2019.
[23] Howe, B.J. and Brennan, M.A., 2013. The Sisters of St. Joseph in Wheeling, West Virginia, during the Civil War. US Catholic Histo-rian, 31(1), pp.21-49.
[24] ManelBrichni,SophieDupuy-Chessa,A continuous evaluation system for Business Intelligence systems,29 January 2017, date accessed:26th nov2018.
[25] ManelBrichni,SophieDupuy-Chessa,A continuous evaluation system for Business Intelligence systems,15 June 2017,date ac-cessed:21st nov2018.
[26] Arnott, D. and Pervan, G., 2005. A critical analysis of decision support systems research. Journal of information technology, 20(2), pp.67-87.
[27] Arnott, D. and Pervan, G., 2016. A critical analysis of decision support systems research revisited: the rise of design science. In Enacting Research Methods in Information Systems (pp. 43-103). Palgrave Macmillan, Cham.
Citation
Nasreen fatma, Sapna jain, M. Afshar alam, "Visualisation and Analysis of Big Data through Business Intelligence," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.629-636, 2019.
Commutative Monoid of Pythagorean Fuzzy Matrices
Research Paper | Journal Paper
Vol.7 , Issue.4 , pp.637-643, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.637643
Abstract
In this paper, we prove the set of all Pythagorean fuzzy matrices form a commutative monoid with respect to algebraic sum and algebraic product. Also, the De Morgan`s laws and Distributive laws are provided and we define the @ operations on Pythagorean fuzzy matrices and analyze its algebraic properties. Further, some results prove equalities and inequalities of Pythagorean fuzzy matrices.
Key-Words / Index Term
Intuitionistic fuzzy matrix, Pythagorean fuzzy set, Pythagorean fuzzy matrix, Algebraic sum and Algebraic product
References
[1] E. G. Emam and M. A. Fndh, Some results associated wiith the max-min and min-max compositions of bifuzzy matrices, Journal of the Egyption Mathematical Society, Vol. 24, Issue.4, pp. 515-521. 2016.
[2] Y.B.Im, E.B.Lee and S.W.Park, The determinant of square intuitionistic fuzzy matrices, Far East Journal of Mathematical Sciences, Vol.3, Issue.5 pp.789-796. 2001.
[3] Y.B.Im, E.B.Lee and S.W.Park, The adjoint of square intuitionistic fuzzy matrices, Int.Appl.math. computing(series A) Vol.11,Issue.1-2,pp.401-412.2003.
[4] M.Pal, S.K.Khan and A.K.Shyamal., Intuitionistic Fuzzy Matrices, Notes on Intuitionistic Fuzzy Sets, Vol.8, Issue.2, pp.51-62. 2002.
[5] S. K. Khan and M. Pal, Some operations on Intuitionistic Fuzzy Matrices, Acta Ciencia Indica, Vol.32, pp.515-524.2006.
[6] S.Mondal and M.Pal, Similarity relations, invertibility and eigenvalues of IFM, Fuzzy Information and Engg, Vol.5, Issue.4, pp.431-443. 2013.
[7] P.Murugadas, S.Sriram, T.Muthuraji, Modal operators in intuitionistic fuzzy matrices, International Journal of Computer Application, Vol.90, Issue.17, pp.1-4. 2014.
[8] T.Muthuraji, S.Sriram and P.Murugadas, Decomposition of intuitionistic fuzzy matrices, Fuzzy Information and Engineering,Vol. 8 , pp. 345-354. 2016.
[9] T. Muthuraji, S. Sriram, Reduction of an intuitionistic fuzzy matrix to fuzzy matrix with some algebraic properties, Annals of Fuzzy Mathematics and Informatics, Vol.13, Issue.4, pp.475-483. 2017.
[10] T.Muthuraji, S. Sriram, Representation and Decomposition of an Intuitionistic fuzzy matrix using some cuts, Applications and Applied Mathematics ,Vol.12, Issue.1, pp. 241-258. 2017.
[11] M.Pal, Intuitionistic fuzzy determinant, V.U.J. Physical Sciences, Vol.7, pp.87-93. 2001.
[12] A.K.Shyamal and M.Pal, Distances between intuitionistic fuzzy matrices, V.U.J. Physical Sciences, Vol.8, pp.81-91.2002.
[13] I.Silambarasan and S.Sriram, Bounded Sum and Bounded Product of Fuzzy Matrices,Annals of Pure and Applied Mathematics,Vol.14, Issue.3, pp. 513-523. 2017.
[14] I.Silambarasan and S.Sriram, Hamacher Sum and Hamacher Product of Fuzzy Matrices, Intern.J.Fuzzy Mathematical Archive, Vol.13, Issue.2, pp. 191-198. 2017.
[15] I.Silambarasan and S.Sriram, Hamacher Operations of Intuitionistic Fuzzy Matrices, Annals of Pure and Applied Mathematics, Vol.16, Issue.1, pp. 81-90. 2018.
[16] I.Silambarasan and S.Sriram, Algebraic operations on Pythagorean fuzzy matrices, Mathematical Sciences International Research Journal, Vol.7, Issue.2, pp.406-414. 2018.
[17] S.Sriram,J.Boobalan, Arithmetic operations on Intuitionistic fuzzy matrices,Proceedings of International Conference on Mathematical Sciences-(Published by Elsevier) organized by Sathyabama university, Chennai, pp.484-487. 2014.
[18] S. Sriram, J. Boobalan, Monoids of intuitionistic fuzzy matrices, Annals of fuzzy Mathematics and Informatics, Vol.11, Issue.3, pp.505-510. 2016.
[19] M.G.Thomason, Convergence of powers of fuzzy matrix, J. Mathematical Analysis and Applications, Vol.57, pp.476-480.1977.
[20] R. R. Yager, Pythagorean fuzzy subsets, In:Proc Joint IFSA World Congress and NAFIPS Annual Meeting, Edmonton, Canada, pp.57-61. 2013.
[21] R.R.Yager, Pythagorean membership grades in multi-criteria decision making, IEEE Transactions on Fuzzy Systems, Vol.22, pp.958-965. 2014.
[22] R.R.Yager and A.M.Abbasov, Pythagorean membership grades, complex numbers, and decision making, Int. J.of Intelligent Systems, Vol.28, pp.436-452. 2013.
[23] Zeshui xu and Ronald R.Yagar, Some aggregation operators based on IFS, International journal of general system, Vol.35, Issue.4, pp.417-433. 2006.
[24] Zhang. Xu., A new method for ranking intuitionistic fuzzy values and its application in multi attribute decision making, Fuzzy optimal decision making , Vol .11, pp.135-146. 2012.
[25] X.L.Zhang and Z.S.Xu, Extension of TOPSIS to multiple criteria decision making with Pythagorean fuzzy sets, Int. J.of Intelligent Systems, Vol.29 , pp. 1061-1078. 2014.
[26] Shrija Madhu, “An approach to analyze suicidal tendency in blogs and tweets using Sentiment Analysis”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.4, pp.34-36, 2018.
Citation
I. Silambarasan, S. Sriram, "Commutative Monoid of Pythagorean Fuzzy Matrices," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.637-643, 2019.
Data Object Routing Algorithms for Data Aware Networking
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.644-646, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.644646
Abstract
In the era of new generation networking systems, Next generation networks, software defined networking, data aware networkings are prominent areas for researchers to develop various architectures and systems, and the concept of data aware networking was initially coined by ITU-T. Various types of data are treated as data objects and are identified either by name or identification number and the same are used for sharing of data in the World Wide Web. The request response mechanism of client and servers happens with the name of identification number of data object duly hiding the URL way of accessing the data items. This paper proposes routing algorithms for data object routing in World Wide Web.
Key-Words / Index Term
Data aware networking, Data Objects, World Wide Web, data sharing, Future Networks
References
[1] Zhuo Li, Yaping Xu, Beichuan Zhang, “Packet forwarding in Named data Networking Requirements and Survey of Solutions”, IEEE , Vol.X, 2018.
[2] M Ravi Kumar, V Sujatha Lakshmi, Y K Sundara Krishna, “A Novel structure for the data objects in the Data Aware Networking”, International Journal of Engineering Research in Computer Science and Engineering, Vol.5 Issue.4, April 2018.
[3] V Sujatha Lakshmi, Prof Y K Sundara Krishna, “Contextual framework of Data Object in Data Aware Networking”, Internation Journal of Applied Engineering Research Vol.13 No.23 2018
[4] ITU-T , “Data Aware Networking(Information Centric Networking) – Requirements and Capabilities”, ITU-T Series No. Y.3071 (03/2017).
[5] ITU-T , “Framework of data aware networking for future networks”, ITU-T series No.Y.3033(01/2014).
[6] Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, Borje Ohlman, “A Survey of Information Centric Networking”, IEEE Communications Magazine Vol.50, Issue :7, July 2012
[7] Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–2021,https://www.cisco.com/c/en/us/solutions/colla teral/servie-provider/visual-networking- index-vni/mobile-whitepaper-c11-520862.html
[8] Y.FNDAN: Framework of Data Aware Networking for Future Networks https://www.ietf.org/mailarchive/web/icnrg/ current/pdfGnVVHBatKd.pdf
Citation
O.Koteswara Rao, Y K Sundara Krishna, G K Mohan Devarakonda, "Data Object Routing Algorithms for Data Aware Networking," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.644-646, 2019.
Evolution of Internet of Things Enabling Technologies in the Field of Healthcare Service
Survey Paper | Journal Paper
Vol.7 , Issue.4 , pp.647-652, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.647652
Abstract
Internet of Things (IoT) is a word used to designate an atmosphere where billions of objects are connected to the internet and are interacting independently. IoT is an innovative prototype providing novel set of services for the future technological inventions. Applications of IoT are unlimited with continuous addition of the cyber-world with the physical world. Smart healthcare system advancement and dissemination has become possible by the convergence of various IoT architectures. In specific, the IoT has been extensively useful to interconnect medical resources and deliver reliable, effective and smart healthcare services to the elderly and patients with a chronic illness. IoT changes the manner in which the facilities are conveyed to the healthcare industry. This paper presents major technologies in IoT-based smart healthcare services. It starts with introduction, definition of IoT, IoT enabling technologies in smart healthcare and IoT challenges in smart healthcare.
Key-Words / Index Term
IoT (Internet of Things); Medical resources; Smart Healthcare; Challenges
References
[1] Hanan Elazhary, Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions, Journal of Network and Computer Applications, Vol. 128, pp. 105-140, 2019.
[2] A. Khanna, S. Kaur, Evolution of Internet of Things (IoT) and its significant impact in the field of Precision Agriculture, Computers and Electronics in Agriculture, Vol. 157, pp. 218-231, 2019.
[3] Alem Čolaković, Mesud Hadžialić, Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues, Computer Networks, Vol. 144, pp. 17-39, 2018.
[4] Mrinai M. Dhanvijay, Shailaja C. Patil, Internet of Things: A survey of enabling technologies in healthcare and its applications, Computer Networks, Vol. 153, pp. 113-131, 2019,
[5] M. Muthuselvi, M.A. Abi, V.A. Arthi, M.S. Deivanayagi, "An Intelligent Bus System Based on Internet of Things for Urban Environments", International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.12-18, 2019.
[6] R. R. Londhe, Development of Internet of Things (IoT) and its Substantial Impact in the Field of Smart Cities, International Journal of Research in Electronics and Computer Engineering, Vol. 7 issue 1 pp.752-757, 2019.
[7] M. Muthuselvi, O. Fathima Thesneem, D. Grace Angeline Hepzibha, M. Indu, "An Internet of Things Based Fire Detection and Fire Alert System", International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.33-38, 2019.
[8] Ilhem Souissi, Nadia Ben Azzouna, Lamjed Ben Said, A multi-level study of information trust models in WSN-assisted IoT, Computer Networks, Vol. 151, pp. 12-30, 2019.
[9] Prosanta Gope, Ruhul Amin, S. K. Hafizul Islam, Neeraj Kumar, Vinod Kumar Bhalla, Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment, Future Generation Computer Systems, Vol. 83, pp. 629-637, 2018.
[10] I. L. Ruiz, M. Á. Gómez-Nieto, Combining of NFC, BLE and Physical Web Technologies for Objects Authentication on IoT Scenarios, Procedia Comp. Science, Vol. 109, pp. 265-272, 2017.
[11] Matthew D. Steinberg, Christine Slottved Kimbriel, Lieve S. d`Hont, Autonomous near-field communication (NFC) sensors for long-term preventive care of fine art objects, Sensors and Actuators A: Physical, Vol. 285, pp. 456-467, 2019.
[12] Gongguo Zhang, Chaofei Yao, Xiaolin Li, Research on joint planning method of NB-IoT and LTE, Procedia Computer Science, Vol. 131, pp. 985-991, 2018.
[13] M. K. Giluka, T. V. Pasca, T. Priyadarshi, Bheemarjuna Reddy Tamma, Enhanced class based dynamic priority scheduling to support uplink IoT traffic in LTE-A networks, Journal of Network and Computer Applications, Vol. 107, pp. 93-112, 2018.
[14] S. Madakam, R. Ramaswamy, S. Tripathi, Internet of Things (IoT): A Literature Review, Journal of Computer and Communications, Vol. 3, pp. 164-173, 2015.
[15] Kevin Ashton, That ‘internet of things’ thing, RFiD J., Vol. 22, pp. 97–114, 2009.
[16] S. Huckle, R. Bhattacharya, M. White, N. Beloff, “Internet of Things, Block chain and Shared Economy Applications”, Procedia Computer Science, Vol. 98, pp. 461-466, (2016).
[17] https://medium.com/mqtt-buddy/brief-history-of-the-internet-of-things-f00043ae17b5
[18] https://www.linkedin.com/pulse/brief-history-internet-things-hassan-shahzad
[19] https://www.postscapes.com/internet-of-things-history/
[20] https://www.imsindia.com/bank-exam/blog/internet-of-things-worlds-biggest-bot/
[21] B. Afzal, M. Umair, G. A. Shah, E. Ahmed, Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges, Future Gen. Comp. Sys., Vol. 92, pp. 718-731, 2019.
[22] Mohab Aly, Foutse Khomh, Mohamed Haoues, Alejandro Quintero, Soumaya Yacout, Enforcing security in Internet of Things frameworks: A Systematic Literature Review, Internet of Things, Vol. 6, Article 100050, 2019.
[23] Parvaneh Asghari, Amir Masoud Rahmani, Hamid Haj Seyyed Javadi, Internet of Things applications: A systematic review, Computer Networks, Vol. 148, pp. 241-261, 2019.
[24] Mohamed Abdel-Basset, Mai Mohamed, A novel and powerful framework based on neutrosophic sets to aid patients with cancer, Future Generation Computer Systems, Vol. 98, pp. 144-153, 2019.
[25] Azadeh Zamanifar, Eslam Nazemi, An approach for predicting health status in IoT health care, Journal of Network and Computer Applications, Vol. 134, pp. 100-113, 2019.
[26] Thomas McGhin, Kim-Kwang Raymond Choo, Charles Zhechao Liu, Debiao He, Blockchain in healthcare applications: Research challenges and opportunities, Journal of Network and Computer Applications, Vol. 135, pp. 62-75, 2019.
[27] M. N. Dang Tuan, N. N. Thanh, L. L. Tuan, Applying a mindfulness-based reliability strategy to the Internet of Things in healthcare–A business model in the Vietnamese market, Techn. Forecasting and Soc. Change, Vol. 140, pp. 54-68, 2019.
[28] ITU work on Internet of things, ICTP workshop, (2015) [last accessed on 01 April 2019]
[29] L. Atzori, A. Iera, G. Morabito, The Internet of Things: a survey, Computer Networks, Vol. 54, pp. 2787–2805, 2010.
[30] Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, Marimuthu Palaniswami, Internet of Things (IoT): A vision, architectural elements, and future directions, Future Generation Computer Systems, Vol. 29, pp. 1645-1660, 2013.
[31] Rishika Mehta, Jyoti Sahni, Kavita Khanna, Internet of Things: Vision, Applications and Challenges, Procedia Computer Science, Vol. 132, pp. 1263–1269, 2018.
[32] https://iot-analytics.com/iot-2018-in-review/ last accessed on 01 April 2019.
[33] Hodjat Hamidi, An approach to develop the smart health using Internet of Things and authentication based on biometric technology, Future Generation Computer Systems, Vol. 91, pp. 434-449, 2019.
[34] https://www.statista.com/statistics/735810/healthcare-iot-installations-global-estimate/
[35] Sunder Ali Khowaja, Aria Ghora Prabono, Feri Setiawan, Bernardo Nugroho Yahya, Seok-Lyong Lee, Contextual activity based Healthcare Internet of Things, Services, and People (HIoTSP): An architectural framework for healthcare monitoring using wearable sensors, Computer Networks, Vol. 145, pp. 190-206, 2018.
[36] Eva Martínez-Caro, Juan Gabriel Cegarra-Navarro, Alexeis García-Pérez, Monica Fait, Healthcare service evolution towards the Internet of Things: An end-user perspective, Technological Forecasting and Social Change, Vol. 136, pp.268-276, 2018.
[37] Cong Zhang, Chin-Feng Lai, Ying-Hsun Lai, Zhen-Wei Wu, Han-Chieh Chao, An inferential real-time falling posture reconstruction for Internet of healthcare things, Journal of Network and Computer Applications, Vol. 89, pp.86-95, 2017.
[38] Pedro H. Vilela, Joel J.P.C. Rodrigues, Petar Solic, Kashif Saleem, Vasco Furtado, Performance evaluation of a Fog-assisted IoT solution for e-Health applications, Future Generation Computer Systems, Vol. 97, pp. 379-386, 2019.
[39] P. Panchatcharam, S. Vivekanandan, Internet of things (IoT) in healthcare - Smart health and surveillance, architectures, security analysis and data transfer: A review, International Journal of Software Innovation, Vol. 7, pp. 21-40, 2019.
[40] Blanka Klímová, Kamil Kuča, Internet of things in the assessment, diagnostics and treatment of Parkinson’s disease, Health and Technology, Vol. 9, Issue 2, pp 87–91, 2019.
[41] Sivakumar Krishnan, S. Lokesh, M. Ramya Devic, An efficient Elman neural network classifier with cloud supported internet of things structure for health monitoring system, Computer Networks, Vol. 151, pp. 201-210, 2019.
[42] Yang Yang, Xianghan Zheng, Wenzhong Guo, Ximeng Liu, Victor Change, Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system, Information Sciences, Vol. 479, pp.567-592, 2019.
[43] Javaid A. Kaw, Nazir A. Loan, Shabir A. Parah, K. Muhammad, Javaid A. Sheikh, G.M. Bhat, A reversible and secure patient information hiding system for IoT driven e-health, International Journal of Information Management, Vol. 45, pp. 262-275, 2019.
[44] K. Saini, S. Sharma, "Review on the Heart Disease Detection Using IoT Framework", International Journal of Computer Sciences and Engineering, Vol.7, Issue. 3, pp.669-674, 2019.
Citation
Renuka R. Londhe, "Evolution of Internet of Things Enabling Technologies in the Field of Healthcare Service," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.647-652, 2019.
Review Paper: Devanagari and Gurumukhi Character Recognition
Review Paper | Journal Paper
Vol.7 , Issue.4 , pp.653-657, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.653657
Abstract
Development of OCRs for Indian script is an interesting area of research today. Indian scripts present great challenges to an OCR researcher due to the large number of letters in the alphabet, the sophisticated ways in which they combine, and the complicated graphemes they result in. The trouble is compounded by the unstructured manner in which popular fonts are designed. There is a many common structure in the different Indian scripts.This paper present brief review on online and offline character recognition of Devanagari and Gurumukhi script.India is a multi-lingual country consisting of eleven different scripts such as Gurmukhi, Tibetan ,Oriya, Urdu , Tamil Telgu etc. Devnagari is third most widely used script, used for several major languages such as Marathi, Hindi, Sanskrit, and Nepali, and is used by more than 500 million people. Punjabi belongs to Gurumukhi script which is an Indo-Aryan language spoken by approximate 130 million people mainly in West Punjab in Pakistan and in East Punjab in India. There are also substantial numbers of Punjabi speakers in the UK, Canada, the UAE, the USA, Saudi Arabia and Australia.
Key-Words / Index Term
Handwritten Devnagari and Gurmukhi Character Recognition, Off-line Handwriting Character Recognition, pre-processing Segmentation, Feature Extraction, and classification
References
[1] H. Swethalakshmi et al. “Online Handwritten Character Recognition of Devanagari and TeluguCharacters using Support Vector Machines” https://www.researchgate.net/publication/228382550 oct 2016
[2] KrishnamachariJayanthitet. al. “Devanagari Character Recognition Using Structure Analysis” CH2766 - 4/89/0000 - 0363 0 1989 IEEE
[3] Dharamveer Sharma et. al. “Recognition of Isolated Handwritten Characters in Gurmukhi Script” International Journal of Computer Applications August 2010 Volume 4– No.8, 0975 – 8887)
[4] Jayadevanet. al. “Offline Recognition of Devanagari Script: A Survey” IEEE Transactions on systems, man, and Cybernetics—part c: applications And reviews, november 2011 vol. 41, no. 6,
[5] Deepu Kumar et. al. “Review On Optical Character Recognition for Off-line Devanagari Handwritten Characters & Challenges” International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT | Volume 3 | Issue 3 | ISSN : 2456-3307 2018
[6] Ms.Smita Ashok rao Bhopi department Of Computer Science, IET “Review on Optical Character Recognition of Devanagari Script Using Neural network” International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454- 4248 Volume: 4 Issue: 3 415 – 420.
[7] PrasantaPratimBairagi “Optical Character Recognition for Hindi”International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 05 www.irjet.net p-ISSN: 2395-0072. May-2018
[8] SonalKhareet. al. present paper on “Handwritten Devanagari Character Recognition System: A Review”International Journal of Computer Applications (0975 – 8887) Volume 121 – No.9, July 2015
[9] Dharamveer Sharma et. al. “Recognition of Isolated Handwritten Charactersin Gurmukhi Script” International Journal of Computer Applications (0975 – 8887)Volume 4– No.8, August 2010
[10] M. K. Jindal et. al “Segmentation of Horizontally Overlapping lines inPrinted Gurmukhi Script” 1-4244-0716-8/06 IEEE 2006.
[11] Dharamveer Sharma et. al. “Recognition of Isolated Handwritten Characters of Gurumukhi Script using Neocognitron”International Journal of Computer Applications (0975 – 8887) Volume 10– No.8, November 2010.
[12] SonalKhareet. al. “Handwritten Devanaga ri Character Recognition System: A Review” International Journal of Computer Applications (0975 – 8887) Volume 121 – No.9, July 2015.
Citation
Gita Sinha, Shailja Sharma, Ashif Habibi, "Review Paper: Devanagari and Gurumukhi Character Recognition," International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.653-657, 2019.