JECET : Journal of Environmental Science, Computer Science and Engineering & Technology. E-ISSN : 2278-179X

      JECET : Journal of Environmental Science, Computer Science and Engineering & Technology

Research Papers in Comp Science

Investigation of Challenges in Existing Debugging Mechanisms for Conventional Software

Manas Kumar Yogi, Mr. G. Vijay Kumar

Debugging is a methodical process of   determining   and reducing the number of bugs, or defects, in a software or hardware, thus making it behave as expected. Debugging becomes   harder when various subsystems are tightly coupled, as changes in one may cause bugs to emerge in another. Debugging is difficult due to various reasons like time constraints and other organizational or environmental constraints imposed on the debugger. In this paper we explore the basic techniques including both manual and automated tools for debugging. We look into the current hindrances faced by the software debuggers and propose few ideas to reduce the effect of challenges posed by the constraints while debugging software.

Extraction of Wound Measurement Process for Healing the Wound Using Color Images in Digital Analysis

Dr. K Sundeep Kumar, M Mallesha, Dr. P.Hariprabakaran, R.V. Prakash

The wide use of digital cameras and free hand wound imaging are adopted at present in the area of clinical settings. However, there is still a great demand for precise, user friendly techniques to carry out the wound measurements to access the dimensions, healing and tissue clarification of a wound. The wound healing is an accurate measure to deal with the different wound images efficiently and effectively. The quantification process is implemented to retrieve wound healing by considering the tissue zones and the complete area measurements. The basic research goals are explained in detail in this paper to assess the metrics dealing with wound images throughout the actual area of the wound, the measurement of wound volume and also the outline of the wound to retrieve accurate results using color images in digital analysis. There is a need to use an innovative tool to retrieve accurate results of wound assessment and measurement though it is critical.">

EEG Signal for Epilepsy Detection: A Review

Madhurima Banerjee, Ranjita Chowdhury, and Samir Kumar Bandyopadhyay

EEG (electroencephalogram) is used for capturing the impulses following through the brain. The signals are recorded to check any abnormalities in working of the brain. The impulses so recorded can be contaminated with noise which needs to be filtered to get the actual brain signal. Normal brain signals differ much from abnormal brain signals. The cleansed signal so obtain can check for various brain disorders, epilepsy being one of them. The paper is an overview of how EEG works and the filtering process and reviews few algorithms that are being used to detect epilepsy 

Face Authentication Based on Surf Features

Anindita Sinha, Mainak Nath, Nisha Sarkar, Sumit Bajaj, Prof. Samir k. bandyopadhyay

Face matching is an important application of Image processing that has wide usage in security management. It can be used to match a given face with any other face and to take the decision that the two persons are same or not. This can help to identify people from a database of faces, or can be used in live video stream to identify a particular person. Given images of a given object, feature detection and matching algorithms try to repeatedly detect the same point of interest in every image, regardless of the scale and orientation of the object, and match each point of interest from one image with the corresponding point in another image. This paper presents face matching algorithm based on image intensity.

A Study of Web Mining and Knowledge Discovery

Anil Kumar Sinha1, Nidhi Raj, Ritesh Kumar and N.K.Singh

Web mining refers to the overall process of discovering potentially useful and previously unknown information or knowledge from the Web data.”  With the large amount of information available online, the Web is a fertile area for data mining and knowledge discovery. Data mining has become so many key features for detecting fraud, assessing risk, and product retailing, In Web mining, data can be collected at the server-side, client-side, proxy servers, or obtained from an organization's consolidated web data. web mining can be categorized into three areas Web Content Mining, Web Structure Mining and Web Usage Mining. Web mining is the application of data mining techniques to extract knowledge from web data, where at least one of structure (hyperlink) or usage (web log) data is used in the mining process (with or without other types of web data)

Processing and Analysis of Experimental Data for the Impact Residual Strain (εresidual) of the Steel Quality Using Design Expert Software

Malush Mjaku

Object of this study is the steel quality J55 API 5CT and the process of pipe forming Ø139.7×7.72[mm], Ø244.5×8.94[mm], and Ø323.9×7.10[mm], with longitudinal seam pipes-ERW Aim of this paper is to study the impact of plastic deformation degree in the cold of residual strain in the cross section area of steel quality pipes J55 API 5CT1. For the realization of this study we have used the planning method of the experiment with one-factor. We have built the mathematical model for the experiment with one index (residual strain) and with one factor (deformation degree in the cold) and with three deformation levels. The results obtained in an experimental method are shown in the table and are processed in an analytical way while implementing the one factored experiments2.

Survey Paper: Amplifying the Persistency of Wireless Sensor Network Using Implicit Backbone Scheduling

Amoolya P

Wireless Sensor Networks (WSNs) are vital in various applications which involve long life, low cost maintenance and actuating. In such applications, battery act as the sole energy source. Therefore, energy regularization will be critical. It is observed that in most of the WSN applications redundant sensor nodes are used to achieve fault tolerance and Quality of Service in sensing. Whenever there is light traffic and fewer loads, then there is no need of creating redundant sensor nodes. In this paper, we have done a survey on methods of reducing the power consumption in wireless sensor networks and present a software design technique for sleep scheduling called Implicit Backbone Scheduling (IBS). IBS is designed in WSNs which has redundant sensor nodes. IBS forms multiple overlapped backbones which work alternatively to increase the network persistency. In IBS, the original nodes will be inactive with battery turned off and traffic will be forwarded by backbone sensor nodes. The backbone nodes rotate and makes sure the energy consumption is regularized and fully utilized in the network.

Journal Indexing


International Scientific Indexing (ISI).




Social Links

Facebook

Share