G: Interdisciplinary

G: Interdisciplinary (62)

GJCST: G

When the scientific need to model geochemical elements in soil, is using geostatistical methodologies, for instance krigings, but we can use a new possibility with Bayesian Inference. The models for the analysis were specified by the authors and estimated using Bayesian inference for Gaussian Markov Random Field (GMRF) through the Integrated Nested Laplace Approximation (INLA) algorithm....
Paper Information
Authors Sergio Meseguer, Pablo Juan, Ana B. Vicente, Carlos Du00c3u00adaz-Avalos
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 47

This work describes an intelligent framework that enables the derivation of stems from inflected words. Word stemming is one of the most important factors affecting the performance of many language applications including parsing, syntactic analysis, speech recognition, retrieval systems, medical systems, tutoring systems, biological systems,…, and translation systems. Compu...
Paper Information
Authors AbidThyab Al Ajeeli
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 38

In many study the data are taken different period of time and the information about them is gathered relating to an event of concern at different time periods. The data are taken different time period are correlated. Regression analysis based on the Generalized Estimating Equation (GEE) is an increasing important method of such data. The Generalized Estimating Equation is an important an...
Paper Information
Authors Md. Soyebur Rahman, Shayla Naznin, Gowranga Kumar Paul
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 22

Human face, facial feature detection and Segmentation have attracted a lot of attention because of their wide applications. In computer-human interaction, face recognition, video surveillance, security system and so many application use automatic face detection. This paper is about a study of detecting human faces within images and segmenting the face into numbered regions which are the ...
Paper Information
Authors Tania Akter Setu, Dr. Mijanur Rahman
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

Steganography is the art of covered or hidden writing. It is used for criminal activities applications environment. In this paper we focus on implementation of effective detection technique is an essential task in digital images. Previously many number of detection techniques are available for steganography images. After implementation of all approaches also again some challenges are ava...
Paper Information
Authors Rajendraprasad K, Dr. V. B. Narasimha
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 17

Wireless Sensor Networks (WSNs) consists of large number of energy constrained sensor nodes that are randomly deployed. Sensor nodes have the ability to sense and send data towards the base station (BS). Sensor nodes require large amount of energy for data transmission. So while transmission, some nodes die because of energy depletion. In this case, chance of data loss increases. In orde...
Paper Information
Authors Ms. Balwinder Kaur Dhir
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 13

Health monitoring, nowadays become very crucial to tackle huge populations health hazards as technological development is ever upbringing that gives opportunity to help people catering for many health risks in easy way. Nowadays health monitoring is a very crucial research field to address huge population health hazards in effective ways using technologies because availability of human h...
Paper Information
Authors Md. Shahiduzzaman
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

The earlier defect prediction and fault removal can play a vital role in ensuring software reliability and quality of service. In this paper Hybrid Evolutionary computing based Neural Network (HENN) based software defect prediction model has been developed. For HENN an adaptive genetic algorithm (A-GA) has been developed that alleviates the key existing limitations like local minima and ...
Paper Information
Authors Racharla Suresh Kumar, Prof. Bachala Sathyanarayana
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 38

The need for adequate attention to security of lives and properties cannot be over-emphasised. Existing approaches to security management by various agencies and sectors have focused on the use of possession (card, token) and knowledge (password, username)-based strategies which are susceptible to forgetfulness, damage, loss, theft, forgery and other activities of fraudsters. The surest ...
Paper Information
Authors Iwasokun G. B. , Udoh S. S., Akinyokun O. K.
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 28

Presently, sentiment analysis algorithms are widely used to extract positive or negative feedback scores of various objects on the basis of the text/reviews. But, an individual may have a certain degree of biasness towards a certain product/company and hence may not objectively review the object. We try to combat this biasness problem by incorporating the positive and negative bias compo...
Paper Information
Authors Kalpana Yadav, Sumit K. Yadav, Swati Gupta
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

Page 1 of 5