Special Issue No. – 2, August, 2019

National Conference on Advancement in Engineering, Science & Technology

Bharath Institute of Higher Education and Research, Chennai, Tamil Nadu, India

Analyzing Healthcare Data Using Bigdata Analytics in WAN

Authors:

S. Pothumani,A.R.Arunachalam,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00021

Abstract:

Late mechanical advances in sensors, low-quality included circuits, and wi-fi comications have enabled the configuration of negligible exertion, littler than anticipated, light-weight, and smart physiological sensor centers. These center points, prepared for distinguishing, getting ready, and talking at least one critical fundamental symptoms, may be impeccably included into wi-fi individual or packaging frameworks (WPANs or WBANs) for wellbeing following. These systems guarantee to alter human services by methods for allowing reasonable, nonobtrusive, constant, walking wellness following almost continuous updates of logical actualities through the Internet. In spite of the fact that various continuous examinations endeavors are that have some expertise in different specialized, money related, and social issues, numerous specialized obstacles by and by need to be settled with the aim to have bendy, reliable, quiet, and vitality green WBANs fitting for therapeutic bundles. The paper presents contraption structure and hardware and programming business, similarly as the makers' reactions for time synchronization, control the officials, and on-chip banner getting ready.

Keywords:

Sensors,Wi-Fi comications,Intensity Power,Time synchronization,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha R., Nedunchelian R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S. Sriram, M. Sridhar, J. Arul Selvan G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N., Sridhar, J.Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya N., Sridhar J., Sriram M., “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

Iris Recognition Using Hough Transform

Authors:

C. Rajabhushanam,Swati D. Shirke,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00022

Abstract:

In most iris identification systems, the complete image acquires constraints are understood. These constraints include near-infrared (NIR) illumination to release the co-occurrences of texture measures in the mirror plane of human iris, as well as proximity in the scan lines of a device. In recent advances to different illumination technologies introduced in images captured in the environment. This environment includes a visible wavelength (VW) light source at-a-distance over the close distance from the capturing device. For accurate Iris identification at-a-distance, eye images require improvement of effective strategies, while setting the light source at a distance from the planar view of the iris. Effectively performing feature extraction technique for Near-Infrared and Visible wavelength images, that were collected in an uncontrolled stage. The identification of iris accuracy on the publicly available databases was then measured. This paper presents a preprocessing of Iris Recognition using Hough Transform (HT) for Iris Area of interest (AOI) and rubbersheeting the model captured using linear stretching and rotation for normalization. The HT is used to filter and contrast stretch the iris regions from multispectral iris images. A basic purpose of this research is to envelop a design and implement IRISrecognition at a distance (IAAD) by adopting a frequency and wavelength-based Hough transform for accurate feature selection. The proposed method is described as follows: Initially, the input iris image will be subjected to pre-processing while extracting features with differences from local extrema and maxima conditions, using a regular shape filling Hough transform. The iris localization and detection consist of a hill climbing segmentation approach that is based on geometric shape Hough measure. Proposed in comparison to the contemporary.

Keywords:

Hough Transform (HT),Iris Segmentation,Iris Normalization,Enhancement,

Refference:

I. Anuradha. C, Khanna. V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha. C, Khanna. V, “A novel gsm based control for e-devices”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N., Sridhar J., Sriram, M., “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

Activity Pattern Mining from Social Media for Healthcare Monitoring on Big data

Authors:

S. Sadagopan,G.Michael,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00023

Abstract:

Big data applications introduce novel openings for establishinginnovative information and produce differentadvanced methods to improve the worth of healthcare.In this paper, a novel activity pattern mining from social media for healthcare to examine big data applications in different biomedical multi-disciplines such as bioinformatics, medical imaging and community healthcare applications.Big data analytical tools perform the key part in their task for extracting hidden behavioural and expressive patterns frompersonal messages and their tweets. The behavioural patterns of the users can realizetheir additional informations about their concealed feelings and sentiments. Further, the neural network is modelled to predict the psychological informations, such as nervousness, depression, behavioural disorder and mental stress.This is also shows that integrating variety of sources of data enables medical practitioner to show a novel investigation of patient care processes, improvements in new mobile healthcare technological developments aid real-time data collection, archiving and analysis of data in distributed environments.

Keywords:

Healthcare,Big data,Activity Patterns Likelihood,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N. Sridhar, J.Sriram, M., “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

Development of a Cloud Based Alert Notification for Analyzing the Banking Security

Authors:

S. Sangeetha,R. Kavitha,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00024

Abstract:

For the Banking security we can utilize Aadhar card is a Unique Identification that gathers biometric information of the occupants. It's helmed by Unique Identification Authority of India (UIDAI), a main office of Indian Government. Aadhar based distinguishing proof records the biometrics of an individual with interestingly related 12-digit numerical. This bit of disengaged singular information might be undermined whenever dealt with something else. This stands as a major threat going frontward with the Aadhar card. To stay away from the above said issues we present a cloud-based informing framework for the individual protection. The paper is planning to build up an electronic web based financial framework utilizing Short Message Service (SMS) just as email warning innovation including Aadhar card confirmation procedure will improve greater security for client. In this technique if any others attempting to abuse client accounts the message notice will send to client by SMS or Mail and including bank following framework. For access the private subtleties and confirm of banking status just as we has an arrangement of following the TPA area through GPS

Keywords:

Cloud Storage,Identity Management System,TPA,GPS,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N., SridharJ., Sriram M., “Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download

Efficient Traceable Authorization Security

Authors:

S. Sangeetha, S. R. Srividhya,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00025

Abstract:

This task manages the safe looking, stockpiling and recovery of client information in the cloud framework. Different administrations of cloud, security issues and security prerequisites of cloud information are talked about. Amid the transfer procedure, get to arrangement of the proprietor ought to be determined. To keep up information privacy and for secure capacity, different sorts of encryption calculation are utilized for shielding data from unapproved divulgence. Notwithstanding, looking over scrambled information was hard to accomplish. In this way, watchword based looking has been presented where the ideal document is recovered in the wake of scanning for it by giving the relating catchphrase. In this manner, following and denying the pernicious client who misuses mystery key should be fathomed quickly. On the off chance that any client attempts to give wrong key, he will be considered as a malevolent client, so framework consequently deny the client. This Project for the most part centers around confirmation of the client to improve the security framework and shield touchy client's information from unapproved divulgence.

Keywords:

PEKS,KGC,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”, Journal of Chemical and Pharmaceutical Sciences (JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9,Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N. Sridhar J., Sriram M., “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

A Methodology to Detect Fraud Apps Using Sentiment Analysis

Authors:

S. R. Srividhya,Sangeetha. S,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00026

Abstract:

In Today’s world, smart phone are very important in our daily life. In today,s Scenario everyone is using smart phone. Nowadays, there are numerous applications out there on web due to that user cannot continuously get correct or true reviews concerning the merchandise on web. There are so many fraud applications on the internet.The growth of apps was increased by 1.6 million at App Store and Go ogle Play. There are many apps fromwhich any app can be fraud, so the identificatio n of true app is needed.Our fraud app detection application will help user to identify which application is true. Our main target is todetect fraud app because there are hu ge no of mobile apps. By analyzing admin declare app fraud app and alsobased on us er comment evidence we give rating.

Keywords:

Mobile Apps,Google Play,Fraud apps,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”. Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha R. Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani S., Sriram M., Sridhar, J., Arul Selvan G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N.,Sr idhar J., Sriram M., “Vehicular cloud computing security issues and
solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

Audit of Serious Games: By Decision Making And Machine Learning

Authors:

S. R. SriVidhya,A. R.Arunachalam,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00027

Abstract:

The computer games market has turned into a built up and regularly developing worldwide industry. The soundness of the video and PC diversions industry, together with the assortment of classifications and innovations accessible, imply that video game concepts and projects are being connected in various orders. One of these is the field known as serious amusements. The primary objective of this article is to gather all the significant articles distributed during the last decade and make a pattern examination about the utilization of certain computerized reasoning calculations identified with basic leadership and learning in the field of genuine recreations. An arrangement system was structured and laid out to characterize the 129 papers that met the consideration criteria. The creators utilized this order structure for reaching a few determinations in regards to the real utilization of savvy genuine diversions. The creators think about that over ongoing years enough knowledge has been assembled to make new insightful genuine diversions to consider the last point as well as the technologies and strategies used to furnish players with an almost genuine encounter. Be that as it may, specialists may need to improve their testing strategy for created genuine recreations, in order to guarantee they meet their last purposes.

Keywords:

serious amusements,testing strategy,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N., Sridhar J., Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

Analyzing and Exploring Anamoly for Wireless Sensor Networks

Authors:

S. Theivasigamani,D.Jeyapriya,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00028

Abstract:

Observing individual areas with a possibly untrusted server presents protection dangers to the checked people. To this end, we propose a security protecting area observing framework for remote sensor systems. In our framework, we plan two in system area anonymization calculations, to be specific, asset and quality-mindful calculations, that intend to empower the framework to give top notch area checking administrations for framework clients, while protecting individual area security Both calculations depend on the settled k-obscurity security idea, that is, an individual is undefined among k people, to empower believed sensor hubs to give the total area data of observed people for our framework. The asset mindful calculation plans to limit correspondence and computational expense, while the quality-mindful calculation expects to augment the precision of the total areas by limiting their checked territories. To use the total area data to give area observing administrations, we utilize a spatial histogram approach that gauges the dissemination of the checked people dependent on the assembled total area data. The usage procedure, proposed frameworks and different perspectives are plainly talked about in proposed frameworks.

Keywords:

WSN,in-network aggregation,IDM,IDSs,SMM,Authentication,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”. Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET”, 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N., Sridhar J., Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

Detection of Severity of Chronic Cough in Elders and Children using Machine Learning

Authors:

R.Velvizhi,P.Nandhini,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00029

Abstract:

Hack is a typical indication of numerous respiratory ailments. The assessment of its power and recurrence of event could give important clinical data in the appraisal of patients with endless cough. The MEMS vibration sensor is put in neck either as clumps or robes. The band-like sensor fix put on patient's body. Sensor is fueled by batteries which empowers versatility of the patient and is associated with a cell phone gadget. Cell phone transmits information to a cloud-based wellbeing stage which further conveys information and cautions restorative staff. The AI calculations gather and investigate the sound of the hacks to customize it to the client dependent on its pitch and sound profile, which is one of a kind to every individual dependent on the size and limit of his or her lungs. When hacking shows an approaching assault, the gadget transmits a message to the committed cloud-based programming through the closest cell interchanges tower. An instant message is then consequently dispatched to the cell phones of at least one guardians, cautioning them that the patient is hinting at early an assault. On the off chance that there are numerous overseers present, the first to react can utilize the cell phone to send an answer instant message to the majority of the others, informing them that the person is with or while in transit to the patient. The specialists could utilize chronicles of hacking to help analyze an ailment. [II][I]

Keywords:

IoT,Machine Learning,Bio patches,Classification and Regression Tree,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N., Sridhar J., Sriram M., “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download

Energy conservation in smart phones using Hadoop technology

Authors:

R. Velvizhi,R.Kavitha,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00030

Abstract:

In this day and age there is an expansion sought after of advanced mobile phones and its applications like whatsapp, face book, twitter, yippee and a few amusements application expend parcel of vitality and assets, in this manner to discover the arrangement on this issues is troublesome. To discover the answer for limiting the vitality utilization of the advanced mobile phones and makes an accessible for proficient use. Telephones are associated with the batteries that are restricted in size and limit so that overseeing vitality well is vital in advanced mobile phones. In this advanced cell the procedure is acquaint a dynamic backdrop illumination with upgrading for PDA application so utilizing this method we can decrease the vitality utilization. In this model compute SSIM record by looking at the two casings from video. The SSIM list use to take care of the battery issue and demonstrate the optimality as far as vitality investment funds. At last, in light of the SSIM record.

Keywords:

Smart phones,energy conservation,SSIM index (structural similarity index metric) index,dynamic backlight,minimize the energy,

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N., Sridhar, J. Sriram M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download