GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Material
Language
Subjects(RVK)
  • 1
    In: International Journal of Engineering and Advanced Technology, Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP, Vol. 9, No. 4 ( 2020-4-30), p. 204-208
    Abstract: The river sand is the natural sort of fine aggregate material which is employed within the concrete and mortar. It’s usually obtained from the river bed and mining has disastrous environment consequences. Rather than the river sand we are using M-sand as fine aggregate within the concrete. The event of acrylic concrete marks a crucial milestone in improving the merchandise quality and efficiency of the concrete. Usage of acrylic within the concrete will increase the strength and durability of the concrete. It enhances the performance of the concrete and increase energy absorption compared with plain concrete. Within the present work we are getting to analysis the strength properties of fiber reinforced M-sand concrete like compressive strength, flexural strength, split tensile strength, and bond strength.
    Type of Medium: Online Resource
    ISSN: 2249-8958
    URL: Issue
    Language: Unknown
    Publisher: Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    Publication Date: 2020
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    In: International Journal of Recent Technology and Engineering (IJRTE), Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP, Vol. 8, No. 5 ( 2020-01-30), p. 472-476
    Abstract: With the increase in the usage of mobile technology, the rate of information is duplicated as a huge volume. Due to the volume duplication of message, the identification of spam messages leads to challenging task. The growth of mobile usage leads to instant communication only through messages. This drastically leads to hackers and unauthorized users to the spread and misuse of sending spam messages. The identification of spam messages is a research oriented problem for the mobile service providers in order to raise the number of customers and to retain them. With this overview, this paper focuses on identifying and prediction of spam and ham messages. The SMS Spam Message Detection dataset from KAGGLE machine learning Repository is used for prediction analysis. The identification of spam and ham messages is done in the following ways. Firstly, the levels of spread of target variable namely spam or ham is identified and they are depicted as a graph. Secondly, the essential tokens that are responsible for the spam and ham messages are identified and they are found by using the hashing Vectorizer and it is portrayed in the form of spam and Ham messages word cloud. Thirdly, the hash vectorized SMS Spam Message detection dataset is fitted to various classifiers like Ada Boost Classifier, Extra Tree classifier, KNN classifier, Random Forest classifier, Linear SVM classifier, Kernel SVM classifier, Logistic Regression classifier, Gaussian Naive Bayes classifier, Decision Tree classifier, Gradient Boosting classifier and Multinomial Naive Bayes classifier. The evaluation of the classifier models are done by analyzing the Performance analysis metrics like Accuracy, Recall, FScore, Precision and Recall. The implementation is done by python in Anaconda Spyder Navigator. Experimental Results shows that the Linear Support Vector Machine classifier have achieved the effective performance indicators with the precision of 0.98, recall of 0.98, FScore of 0.98 , and Accuracy of 98.71%.
    Type of Medium: Online Resource
    ISSN: 2277-3878
    Language: Unknown
    Publisher: Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    Publication Date: 2020
    detail.hit.zdb_id: 2722057-6
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    In: Computational Intelligence and Neuroscience, Hindawi Limited, Vol. 2022 ( 2022-9-26), p. 1-9
    Abstract: Skin cancer is the uncontrolled growth of irregular cancer cells in the human-skin's outer layer. Skin cells commonly grow in an uneven pattern on exposed skin surfaces. The majority of melanomas, aside from this variety, form in areas that are rarely exposed to sunlight. Harmful sunlight, which results in a mutation in the DNA and irreparable DNA damage, is the primary cause of skin cancer. This demonstrates a close connection between skin cancer and molecular biology and genetics. Males and females both experience the same incidence rate. Avoiding revelation to ultraviolet (UV) emissions can lower the risk rate. This needed to be known about in order to be prevented from happening. To identify skin cancer, an improved image analysis technique was put forth in this work. The skin alterations are routinely monitored by this proposed skin cancer categorization approach. Therefore, early detection of suspicious skin changes can aid in the early discovery of skin cancer, increasing the likelihood of a favourable outcome. Due to the blessing of diagnostic technology and recent advancements in cancer treatment, the survival rate of patients with skin cancer has grown. The strategy for detecting skin cancer using image processing technologies is presented in this paper. The system receives the image of the skin lesion as an input and analyses it using cutting-edge image processing methods to determine whether skin cancer is present. The Lesion Image Analysis Tools use texture, size, and shape assessment for image segmentation and feature phases to check for various cancer criteria including asymmetries, borders, pigment, and diameter. The image is classified as Normal skin and a lesion caused by skin cancer using the derived feature parameters.
    Type of Medium: Online Resource
    ISSN: 1687-5273 , 1687-5265
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2388208-6
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    IOP Publishing ; 2021
    In:  IOP Conference Series: Materials Science and Engineering Vol. 1074, No. 1 ( 2021-02-01), p. 012025-
    In: IOP Conference Series: Materials Science and Engineering, IOP Publishing, Vol. 1074, No. 1 ( 2021-02-01), p. 012025-
    Abstract: Skin cancer is very important notable disease and it is probable to everyone nowadays, it flourishes on the area of body where it exposed to ultraviolet rays. It leads anomalous gain in skin cells. It initiate on various parts of body like face, hand and bottoms of the feet as cautious hole or spot. The initial investigation of anomalous gain is essence to cure the disease at early stage, and it still remains a feasible challenge in the scientific improvements. From the analysis, this paper endeavour to inspect the category of disease with the following improvements. Initially, the skin dataset from ISIC machine archive is utilized for image processing. Secondly, the values of dataset images are normalized by dividing all the RGB values by 255. Thirdly, keras sequential API is used to add one layer at a time, initiating from the input. The CNN can extract the features that are useful for classifying the image, by using the kernel filter matrix. MaxPool reduce the computational cost by down-sampling the image, and the relu activation function is implemented to provide non linearity to the network. The flatten layer is utilized to remodel the final feature maps into 1D vector. CNN model provides accuracy of 94.83% with 3297 images and ResNet 50 model has attained accuracy of 90.78% due to less number of images used for classification. AlexNet model has attained accuracy of 81.8% with 1300 images and GoogleNet V3 inception has attained accuracy of 96% with 3374 images. Finally Vgg16 model has attained accuracy of 97.3% with 5636 samples.
    Type of Medium: Online Resource
    ISSN: 1757-8981 , 1757-899X
    Language: Unknown
    Publisher: IOP Publishing
    Publication Date: 2021
    detail.hit.zdb_id: 2506501-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    IOP Publishing ; 2021
    In:  IOP Conference Series: Materials Science and Engineering Vol. 1074, No. 1 ( 2021-02-01), p. 012034-
    In: IOP Conference Series: Materials Science and Engineering, IOP Publishing, Vol. 1074, No. 1 ( 2021-02-01), p. 012034-
    Abstract: Facial identification plays a vital role in this digital era. Recent advancements in technology provide various filtering effects while capturing the images. Extracting the facial features from the filter modified image becomes challenging. To identify the important facial attribute values from those images, special features extraction techniques needs to be applied. Facial points are the key factors to recognize the face. When these factors are altered, facial detection becomes crucial. Initially apply the image pre-processing techniques to reduce the noise level in the images then perform feature selection. To overcome the curse of dimensionality, Occam’s razor approach is followed to limit the selection of attributes. In different stages the features are going to be filtered by replacing the weaker attributes. Later Pearson Correlation, a filter based correlation technique is applied to evaluate the deviated numerical value from the target. The deviated features can be treated with Lasso effect to suppress the poor weighted features. Finally through recursive feature elimination, highest influencing attribute factor can be identified. In this approach some of the facial feature which is used in training the neural network can be discarded based on the deviation rates. In terms of accuracy the proposed system can recognize the dataset with 70% of accuracy with filter effected images.
    Type of Medium: Online Resource
    ISSN: 1757-8981 , 1757-899X
    Language: Unknown
    Publisher: IOP Publishing
    Publication Date: 2021
    detail.hit.zdb_id: 2506501-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    IOP Publishing ; 2021
    In:  Journal of Physics: Conference Series Vol. 1767, No. 1 ( 2021-02-01), p. 012030-
    In: Journal of Physics: Conference Series, IOP Publishing, Vol. 1767, No. 1 ( 2021-02-01), p. 012030-
    Abstract: With the tremendous technological growth, the world is shifted to adapt the different food and life style by the people that results in the improper working of the body organs. The change in the food habits leads to a major problems that we face in the current scenario is the presence of hypothyroid in the body. The likelihood of hypothyroid still ruins as a challenging issue due to the uncertainty of proper symptoms. With this background, the machine learning can be used towards health care scenarios for the prediction of disease based on the patients past history. This paper focus on predicting the existence of hypothyroid with respect to the patients’ medical parameters. The hypothyroid patient dataset is taken from the UCI Metadata repository with 24 columns and 3163 unique patient’s records is used for the experimentation of hypothyroid with the following contributions. Firstly, the hypothyroid dataset from UCI machine repository is subjected with the data processing and exploratory analysis of the dataset. Secondly, the unrefined data set is fixed with different classifier algorithm to find the presence of hypothyroid and to examine the efficiency metrics before and after feature scaling. Thirdly, the data is processed to PCA with various combination of components as 5, 7 and 10 and is fixed with different classifier algorithm to examine the efficiency metrics before and after feature scaling. Fourth, the data is processed to LDA with various combination of components as 5, 7 and 10 and is fixed with different classifier algorithm to examine the efficiency metrics before and after feature scaling. Experimental results show that the Kernel Support Vector Machine classifier is found to have the accuracy of 99.52% for all the 10, 7, 5 component reduced PCA dataset. Similarly, the Logistic Regression, Kernel Support Vector Machine and Gaussian Naïve Bayes classifier is found to have the accuracy of 99.52% for all the 10, 7, 5 component reduced LDA dataset.
    Type of Medium: Online Resource
    ISSN: 1742-6588 , 1742-6596
    Language: Unknown
    Publisher: IOP Publishing
    Publication Date: 2021
    detail.hit.zdb_id: 2166409-2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    EJournal Publishing ; 2014
    In:  International Journal of Machine Learning and Computing Vol. 4, No. 4 ( 2014), p. 376-382
    In: International Journal of Machine Learning and Computing, EJournal Publishing, Vol. 4, No. 4 ( 2014), p. 376-382
    Type of Medium: Online Resource
    ISSN: 2010-3700
    Uniform Title: Enhanced Dynamic Whole File De-Duplication (DWFD) for Space Optimization in Private Cloud Storage Backup
    Language: Unknown
    Publisher: EJournal Publishing
    Publication Date: 2014
    detail.hit.zdb_id: 2718875-9
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Science Publishing Corporation ; 2018
    In:  International Journal of Engineering & Technology Vol. 7, No. 2.31 ( 2018-05-29), p. 161-
    In: International Journal of Engineering & Technology, Science Publishing Corporation, Vol. 7, No. 2.31 ( 2018-05-29), p. 161-
    Abstract: In wireless sensor networks, Sensor nodes are arranged randomly in unkind physical surroundings to collect data and distribute the data to the remote base station. However the sensor nodes have to preserve the power source that has restricted estimation competence. The sensed information is difficult to be transmitted over the sensor network for a long period of time in an energy efficient manner.  In this paper, it finds the problem of communication data between sink nodes and remote data sources via intermediate nodes in sensor field. So this paper proposes a score based data gathering algorithm in wireless sensor networks. The high-level contribution of this study is the enhancement of a score- based data gathering algorithm and the impact of energy entity for Wireless Sensor Networks.  Then the energy and delay of data gathering are evaluated. Unlike PEGASIS and LEACH, the delay for every process of data gathering is considerably lower when SBDG is employed.  The energy consumed per round of data gathering for both SBDG and EE-SBDG is less than half of that incurred with PEGASIS and LEACH. Compared with LEACH and PEGASIS, SBDG and EE-SBDG are fair with node usage because of the scoring system and residual energy respectively.  Overall, the Score-based data gathering algorithm provides a significant solution to maximize the network lifetime as well as minimum delay per round of data gathering.
    Type of Medium: Online Resource
    ISSN: 2227-524X
    URL: Issue
    Language: Unknown
    Publisher: Science Publishing Corporation
    Publication Date: 2018
    detail.hit.zdb_id: 2661563-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Science Publishing Corporation ; 2017
    In:  International Journal of Engineering & Technology Vol. 7, No. 1.1 ( 2017-12-21), p. 594-
    In: International Journal of Engineering & Technology, Science Publishing Corporation, Vol. 7, No. 1.1 ( 2017-12-21), p. 594-
    Abstract: At present scenario, sensor devices are used in various fields for gathering information so all those data should be secured safely. Securing data is an important role in Wireless Sensor Networks (WSN). WSN is extremely essential for the purpose of reducing the complete redundancy and energy consumption during gathering data among sensor nodes. Optimized data aggregation is needed at cluster head and Base Station (BS) for secured data transmission. Data aggregation is performed in all routers while forwarding data from source to destination node. The complete life time of sensor networks is reducing because of using energy inefficient nodes for the purpose of aggregation. So this paper introduces the optimized methods for securing data (OMSD) which is trust based weights and also completely about the attacks and some methods for secured data transmission. 
    Type of Medium: Online Resource
    ISSN: 2227-524X
    URL: Issue
    Language: Unknown
    Publisher: Science Publishing Corporation
    Publication Date: 2017
    detail.hit.zdb_id: 2661563-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    American Scientific Publishers ; 2020
    In:  Journal of Computational and Theoretical Nanoscience Vol. 17, No. 1 ( 2020-01-01), p. 519-525
    In: Journal of Computational and Theoretical Nanoscience, American Scientific Publishers, Vol. 17, No. 1 ( 2020-01-01), p. 519-525
    Abstract: Scaling is the major operation performed in Transformation of images. The Scaling is an important operation for resizing and reshaping the images that are in digital form. Various operations can be performed with digital images out of which the shrinking and zooming are the most widely operations by any type of users in the world. The other name for shrinking is sub sampling and the zooming operation is also named as Oversampling. The purpose of zooming operation is to extend or enlarge the image in order to have a clear and efficient view. Zooming operations are mostly performed in our mobile for viewing the images in our gallery and this operation is the most frequently performed operation by the mobile users. By considering all these factors, graphical images are the most widely agent to convey any information to the transmitter in order to know the position, size of an object. With this in concern, we try to focus on graphical image zooming as it is very important process in image processing. In this paper, we have used Fractional Replication for Image Zooming that is processed by copying and replicating the pixels from the base image based on the inexact spatial correspondence between the base image and zoom image. And also, the pixel address of the zoom image is calculated fractionally from the pixel address of the base image. We have implemented all the zooming operations like Zoom out in subject of Y -Axis, Zoom out in subject of X -Axis, Zoom in subject of Y Axis, Zoom in subject of X Axis, Left Side Panning, Right Side Panning, Top Zoom Panning and Bottom Zoom Panning for a graphical image using C programming language. Here we attempt to process the various Zooming operation analysis of the graphical image.
    Type of Medium: Online Resource
    ISSN: 1546-1955
    Language: English
    Publisher: American Scientific Publishers
    Publication Date: 2020
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...