bookmarks  1

  • ⟨⟨
  • 1
  • ⟩⟩

publications  58  

  •  

    . International Journal of Innovative Research in Information Security, 09 (2): 50-54 (May 2023)1. Muhlenbach, F. and Rakotomalala, R. (2015), “Discretization of Continuous Attributes,” In: Wang, J., Ed., Encyclopedia of Data Warehousing and Mining, Idea Group Reference, 397-402. https://doi.org/10.4018/978-1-59140-557-3.ch076 2. M. Liu, D. Zhang, and D. Shen, “Relationship induced multi- 52 template learning for diagnosis of alzheimer’s disease and mild cognitive impairment,” IEEE transactions on medical imaging, vol. 35, no. 6, p. 1463—1474, (2016). https://doi.org/10.1109/tmi.2016.2515021 3. Abdullah Caliskan, Hasan Badem, A. Baştürk, M.E. Yüksel, “Diagnosis Of The Parkinson Disease By Using Deep Neural Network Classifier”, Journal Of Electrical And Electronics Engineering, (2017):3311-3318 4. M. Abdar and M. Zomorodi-Moghadam, “Impact of Patients’ Gender on Parkinson’s disease using Classification Algorithms” Journal of AI and Data Mining, vol. 6, (2018). 5. Sleigh, J.W.; Olofsen, E.; Dahan, A.; de Goede, J.; Steyn-Ross, A. Entropies of the EEG: The effects of general anaesthesia. In Proceedings of the 5th International Conference on Memory, Awareness and Consciousness, New York, NY, USA, 1–3 June (2019) 6. Tsuda, M., Asano, S., Kato, Y., Murai, K., and Miyazaki, M. (2020). Differential diagnosis of multiple system atrophy with predominant parkinsonism and Parkinson's disease using neural networks. J. Neurol. Sci. 401, 19–26. https://doi.org/10.1016/j.jns.2019.04.014 7. Tysnes, O.-B., and Storstein, A. (2021). Epidemiology of Parkinson's disease. J. Neural Trans. 124, 901–905. https://doi:10.1007/s00702-017-1686-y 8. Parkinson J. An Essay on the Shaking Palsy. London: Sherwood, Neely, and Jones; 1817. pp. 1–16. Google Scholar 9. Twelves D, Perkins KS, Counsell C. Systematic review of incidence studies of Parkinson’s disease. Mov Disord. 2003;18:19–31. PubMed Google Scholar 10. National Institute for Health and Care Excellence (NICE) Parkinson’s disease: diagnosis and management in primary and secondary care. NICE clinical guidelines 35. Jun, 2006. Available https://doi.org/10.1136/heartjnl-2022-321095 http://www.nice.org.uk/guidance/cg35/resources/guidance-parkinsons-disease-pdf. Accessed April 28, 2015. 11. Schrag A, Horsfall L, Walters K, et al. Prediagnostic presentations of Parkinson’s disease in primary care: a case-control study. Lancet Neurol. 2015; PubMed Google Scholar https://doi.org/10.1016/s1474-4422(14)70287-x 12. Parkinson’s Disease Foundation Statistics on Parkinson’s. Available at: www.pdf.org.en/parkinson_statistics Accessed June 19, 2014. 13. Driver JA, Logroscino G, Gaziano JM, et al. Incidence and remaining lifetime risk of Parkinson disease in advanced age. Neurology. 2009;72:32–38. PMC free article PubMed Google Scholar https://doi.org/10.1212/01.wnl.0000341769.50075.bb 14. De Lau LM, Breteler MM. Epidemiology of Parkinson’s disease. Lancet Neurol. 2006;5:525–535. PubMed Google Scholar 15. Miller IN, Cronin-Golomb A. Gender differences in Parkinson’s disease: clinical characteristics and cognition. Mov Disord. 2010;25:2695–2703. PMC free article PubMed Google Scholar https://doi.org/10.1002/mds.23388 16. Rumayor MA, Arrieta O, Sotelo J, et al. Female gender but not cigarette smoking delays the onset of Parkinson’s disease. Clin Neurol Neurosurg. 2009;PubMed Google Scholar https://doi.org/10.1016/j.clineuro.2009.07.012 17. Gómez-Esteban JC, Zarranz JJ, Lezcano E, et al. Influence of motor symptoms upon the quality of life of patients with Parkinson’s disease. Eur Neurol. 2007;57:161–165. PubMed Google Scholar https://doi.org/10.1159/000098468 18. Pennington S, Snell K, Lee M, et al. The cause of death in idiopathic Parkinson’s disease. Parkinsonism Relat Disord. 2010;16:434–437. PubMed Google Scholar https://doi.org/10.1016/j.parkreldis.2010.04.010 19. Jankovic J, Poewe W. Therapies in Parkinson’s disease. Curr Opin Neurol. 2012; PubMed Google Scholar 20. Smith Y, Wichmann T, Factor SA, DeLong MR. Parkinson’s disease therapeutics: new developments and challenges since the introduction of levodopa. Neuropsycho pharmacology. 2012;PMC free article PubMed Google Scholar https://doi.org/10.1038/npp.2011.212 21. Simonson W, Hauser RA, Schapira AHV. Role of the pharmacist in the effective management of wearing-off in Parkinson’s disease. Ann Pharmacother.2007; PubMed Google Scholar https://doi.org/10.1345/aph.1k348 22. Van der Marck MA, Bloem BR, Borm GF, et al. Effectiveness of multidisciplinary care for Parkinson’s disease: a randomized, controlled trial. Mov Disord. 2013;PubMed Google Scholar https://doi.org/10.1002/mds.25194 23. Zhou C, Huang Y, Przedborski S. Oxidative stress in Parkinson’s disease: a mechanism of pathogenic and therapeutic significance. Ann NY Acad Sci. 2008;1147:93–104. PMC free article PubMed Google Scholar https://doi.org/10.1196/annals.1427.023 24. Logroscino G. The role of early-life environmental risk factors in Parkinson disease: what is the evidence? Environ Health Perspect. 2005; PMC free article PubMed Google Scholar https://doi.org/10.1289/ehp.7573 25. Spatola M, Wider C. Genetics of Parkinson’s disease: the yield. Parkinsonism Relat Disord. 2014;20(suppl 1):S35–S38. PubMed Google Scholar https://doi.org/10.1016/s1353-8020(13)70011-7 26. Singleton AB, Farer MJ, Bonifati V. The genetics of Parkinson’s disease: progress and therapeutic implications. Mov Disord. 2013;28:14–23. PMC free article Pu bMed Google Scholar https://doi.org/10.1002/mds.25249 27. Santiago JA, Scherzer CR, Potashkin JA. Network analysis identifies SOD2 mRNA as a potential biomarker for Parkinson’s disease. PLoS One. 2014; PMC free article PubMed Google Scholar https://doi.org/10.1371/journal.pone.0109042 28. Liu R, Guo X, Park Y, et al. Caffeine intake, smoking, and risk of Parkinson disease in men and women. Am J Epidemiol. 2012; PMC free article PubMed Google Scholar https://doi.org/10.1093/aje/kwr451 29. Benmoyal-Segal L, Soreq H. Gene–environment interactions in sporadic Parkinson’s disease. J Neurochem. 2006;97:1740–1755. PubMed Google Scholar https://doi.org/10.1111/j.1471-4159.2006.03937.x 30. Van der Merwe C, Haylett W, Harvey J, et al. Factors influencing the development of early- or late-onset Parkinson’s disease in a cohort of South African patients. S Afr Med J. 2012;102:848–851. PubMed Google Scholar https://doi.org/10.7196/samj.5879 31. Wang G, Pan J, Chen SD. Kinases and kinase signaling pathways: potential therapeutic targets in Parkinson’s disease. Prog Neurobiol. 2012; PubMed Google Scholar https://doi.org/10.1016/j.pneurobio.2012.06.003 32. Gilgun-Sherki Y, Djaldetti R, Melamed E, Offen D. Polymorphism in candidate genes: implications for the risk and treatment of idiopathic Parkinson’s disease. Pharmacogenomics J. 2004;4:291–306. PubMed Google Scholar https://doi.org/10.1038/sj.tpj.6500260 33. Agúndez JA, García-Martín E, Alonso-Navarro H, et al. Anti-Parkinson’s disease drugs and pharmacogenetic considerations. Expert Opin Drug Metab Toxicol. 2013;9:859–874. PubMed Google Scholar https://doi.org/10.1517/17425255.2013.789018 34. Marras C, Goldman SM. Genetics meets environment: evaluating gene–environment interactions in neurologic diseases. Semin Neurol. 2011;31:553–561. PubMed Google Scholar https://doi.org/10.1055/s-0031-1299793 35. Soreq L, Ben-Shaul Y, Israel Z, et al. Meta-analysis of genetic and environmental Parkinson’s disease models reveals a common role of mitochondrial protection pathways. Neurobiol Dis. 2012;45:1018–1030. PubMed Google Scholar https://doi.org/10.1016/j.nbd.2011.12.021 36. Curtin K, Fleckenstein AE, Robison RJ, et al. Methamphetamine/amphetamine abuse and risk of Parkinson’s disease in Utah: a population-based assessment. Drug Alcohol Depend. 2015;146:30–38. PMC free article PubMed Google Scholar https://doi.org/10.1016/j.drugalcdep.2014.10.027 37. Chen JJ, Swope DM. Parkinson’s disease. In: DiPiro JT, Talbert RL, Yee GC, et al., editors. Pharmacotherapy: A Pathophysiologic Approach. 9th ed. New York, New York: McGraw-Hill; 2014. Google Scholar 38. Chade AR, Kasten M, Tanner CM. Nongenetic causes of Parkinson’s disease. J Neural Transm Suppl. 2006;70:147–151. PubMed Google Scholar https://doi.org/10.1007/978-3-211-45295-0_23.
    10 months ago by @ijiris
    (0)
     
     
  •  

    , , and . International Journal of Innovative Research in Information Security, 09 (2): 45-49 (May 2023)1 Muhammad Kamran, Muhammad Asif, Zeeshan Ahmed, and H.B. Kekre. Ä Secure and Reliable Face Recognition Based Attendance System Using Block chain." In IEEE International Conference on Computer, Communication and Control Technology (I4CT), pp.1-5.IEEE,2021. 2 P.K.Shukla, S.K.Srivastava, and A.K.Tiwari."Deep Learning Based Face Recognition System for Attendance Management." In IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp.466-470.IEEE,2021 https://doi.org/10.1109/rteict.2017.8256691 3 S.A. Hameed, Zeeshan Ahmed, and H.B. Kekre. "Privacy-Preserving Face Recognition for Attendance Systems." In IEEE International Conference on Computer, Communication and Control Technology (I4CT),pp.1-5.IEEE,2021. 4 Muhammad Asif, Zeeshan Ahmed, H.B. Kekre, and A.R. Naseer. Ä Survey of Face Recognition Techniques for Attendance System." In IEEE International Conference on Computer, Communication and Control Technology (I4CT),pp.1-5.IEEE,2020. 5 H.B.Kekre, S.R.Patil, and D.S. Dharaskar.Än Accurate and Efficient Face Recognition Based Attendance System." In IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI),pp.2265-2269.IEEE,2020. 6 E Varadharajan , R Dharani , S.Jeevitha, B Kavinmathi, S. Hemalatha “ Automatic Attendance Management system using face detection” at 2020 Department of InformationTechnology. https://doi.org/10.1109/get.2016.7916753 7 Shreyak Sawhney, Karan Kacker, Samayak Jain, Shailendra Narayan ,Rakesh Garg“Real Time Smart Attendance system using face recognition techniques “ in international conference on cloud computing data science and engineering 2019. https://doi.org/10.1109/confluence.2019.8776934.
    10 months ago by @ijiris
    (0)
     
     
  •  

    , , , and . International Journal of Innovative Research in Information Security, 09 (2): 39-44 (May 2023)1. Gas booking system using VB software, Microcontroller and Gas Leakage Detection with SMS by Dr.D.B.Kadam,Sumedha shashikanth patil, Akshay Ananda Kumbhar, Rohit Ankush Tandle. 2. Gas Leakage Detection based on IoT using Raspberry Pi by Deepthi Miriyampalli , Ponnuri Anil Kumar , Abdul Khadir Shaik , Ravichandra Vipparla , Komalphanindra Potineni. 3. LPG Gas Leakage Detection System with GSM Module by Alan M John , Bhavesh Purbia , Ankit Sharma , Mrs. A.S Udapurkar. 4. Gas Leakage Detection Using GSM Module & Arduino with SMS Alert by Mr. Sivaprasad Lebaka, M. Ganga Rami Reddy,K. Devi Priya, N.V. Charan, N.V. Charan. 5. Gas Leakage Detection, prediction & Alert System Using Raspberry Pi & cloud computing by Pranav Mani Tripathi, Saket Kumar, Saksham Kumar, Veeresh Bhalke , Prof. Vidyashree K. 6. IoT Gas Leakage Detector and Warning Generator by Bader Farhan Alshammari , Muhammad Tajammal Chughtai. 7. J.Ding, J.Wang, N.Yuan, and Q.Pan, “The Monitoring System of Leakage Accidents in Crude Oil Pipeline based on Zigbee Technology”, IEEE Changzhou University. https://doi.org/10.1109/mace.2011.5987303.
    10 months ago by @ijiris
    (0)
     
     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, 09 (2): 28-38 (May 2023)1 M. Fernando and J. Wijayanayaka, "Low cost approach for real time sign language recognition," 2013 IEEE 8th International Conference on Industrial and Information Systems, 2013, pp. 637-642, https://doi.org/10.1109/iciinfs.2013.6732059 2 M. Z. Islam, M. S. Hossain, R. ul Islam and K. Andersson, "Static Hand Gesture Recognition using Convolutional Neural Network with Data Augmentation," 2019 Joint 8th International Conference on Informatics, Electronics & Vision (ICIEV) and 2019 3rd International Conference on Imaging, Vision & Pattern Recognition (icIVPR), 2019, pp. 324-329, https://doi.org/10.1109/iciev.2019.8858563 3 E. Kaya and T. Kumbasar, "Hand Gesture Recognition Systems with the Wearable Myo Armband," 2018 6th International Conference on Control Engineering & Information Technology (CEIT), 2018, pp. 1-6, https://doi.org/10.1109/ceit.2018.8751927 4 Lesha Bhansali and Meera Narvekar. Gesture Recognition to Make Umpire Decisions. International Journal of Computer Applications 148(14):26-29, August 2016. https://doi.org/10.5120/ijca2016911312 5 Suvarna Nandyal and Suvarna Laxmikant Kattimani 2021 J. Phys.: Conf. Ser. 2070 012148 6 Y. Madhuri, G. Anitha. and M. Anburajan., "Vision- based sign language translation device," 2013 International Conference on Information Communication and Embedded Systems (ICICES), 2013, pp. 565-568, https://doi.org/10.1109/icices.2013.6508395 7 Nusirwan Anwar bin Abdul Rahman, Kit Chong Wei and John See Faculty of Information Technology, Multimedia University. 8 Moin, A., Zhou, A., Rahimi, A. et al. A wearable biosensing system with in-sensor adaptive machine learning for hand gesture recognition. Nat Electron 4, 54–63 (2021). https://doi.org/10.1038/s41928-020-00510-8 9 Ravi, H. Venugopal, S. Paul and H. R. Tizhoosh, Ä Dataset and Preliminary Results for Umpire Pose Detection Using SVM Classification of Deep Features," 2018 IEEE SymposiumSeries on Computational Intelligence (SSCI), 2018, pp. 1396-1402, https://doi.org/10.1109/ssci.2018.8628877 10 M. A. Shahjalal, Z. Ahmad, R. Rayan and L. Alam, Än approach to automate the scorecard in cricket with computer vision and machine learning," 2017 3rd International Conference on Electrical Information and Communication Technology (EICT), 2017, pp. 1-6, https://doi.org/10.1109/eict.2017.8275204.
    10 months ago by @ijiris
    (0)
     
     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, 09 (2): 21-27 (May 2023)1. Currency Recognition system using Image Processing. SANDEEP KUMAR CHAUBEY Andrew S. Morgan Kaufmann Publishers, 1995. 2. A Survey on Indian Currency Note Denomination Recognition System. Aruna Manpreet Bagga, Dr.Baljit Singh. 1995. 3. Dr. Baljith Singh, Aruna D H Indian currency note denomination system. 4. Ms. Monali Patil, Prof. Jayant Adhikari Detection of fake currency using digital image processing. 5. Arun Anoop M, Dr K.E. Kannammal Fake currency detection 6. Vidhi Roy and Sushanth Patil Fake Currency detection using image processing. 7. M. Deborah and Soniya Prathap Detection of Fake currency using edge detection. 8. Akash Rana, Avinash Kumar and Shivam Kumar Jha Detection of fake currency using machine learning technique. 9. Mayadevi, A. Gaikwad, Vaijinath, V. Bhosle and Vaibhav Currency note feature extraction. 10. Brinda M Object Detection using Haar-Like Feature Extraction..
    10 months ago by @ijiris
    (0)
     
     
  •  

    , , , and . International Journal of Innovative Research in Information Security, 9 (2): 15-20 (May 2023)1 D. Pavithra; Ranjith Balakrishnan, “IOT based monitoring and control system for home automation”, IEEE Explore, Communication Technologies (GCCT). https://doi.org/10.1109/gcct.2015.7342646 2 Dr. M. Suresh, A. Amulya, M. Hari Chandana, P. Amani, T. Lakshmi Prakasam. “Anti theft flooring system using raspberry pi using” in Compliance Engineering journal, vol 12, no. 7, pp. 306 – 317, 2021. 3 Sonali Das, Dr. Neelanarayan, “ IOT Based Anti Theft Flooring System” in IJESC , vol 10, no.4, pp. 25463-25466,2020. 4 Siddalingesha G.R, H. M. Shamita, “IOT Based Anti Theft System for home” in IRJET, vol 8, no. 10, pp. 509 – 513, 2021. 5 Sanjana Kute, Ruthvik Pimpalkar, Shivajirao S, “Theft Detection System” in IRE Journals, vol 4, no 10, 2456 – 2462, 2021. 6 Gaurav Sable, Gaurav Sharma, Manish Bhalerao, Yash Ramugade, “IOT Based Theft Detection using Raspberry Pi” in IJIRT, vol 11, no 12, 2356 – 2360, 2022. 7 Mohd Musab, Ms. Seema Kaloria, Ankit Chhipa, Anand Sharma, Fardeen Mansoori, “IOT Based Anti-Theft Security System” in IJRTI, vol 7, no 6, pp. 106 – 109, 2022. 8 Santosh Mahale, Shivam Gujrathi, Pratik Bramhecha, Kalyani Bedarkar, Rohini Shinde, Yashraj Patil, “Anti-Theft Detection System” in IJIRSET, vol 9, no 4, pp. 1889 – 1895, 2020. 9 Sharnil Pandya, Hemant Ghayvat, Ketan Kotecha, Mohammed Awais, Saeed Akbarzadeh, Prosanta Gope , Subhas Chandra Mukhopadhyay and Wei Chen, “Smart Home Anti-Theft System” in applied system innovation, vol 1, no 42, pp. 1-22, 2018 https://doi.org/10.3390/asi1040042 10 Mr. Vikrant A. Agaskar, “ IOT BASED IOT Based Theft Detection” in IJCRT, vol 6, no 2, pp. 231 – 234, 2018..
    10 months ago by @ijiris
    (0)
     
     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, 9 (2): 10-14 (May 2023)1. Adler, A.; Schuckers, S. Biometric vulnerabilities, overview. In Encyclopedia of Biometrics; Li, S.Z., Jain, A., Eds.; Springer: Boston, MA, USA, 2009. https://doi.org/10.1007/978-0-387-73003-5_65 2. Nguyen, H.T. Fingerprints Classification through Image Analysis and Machine Learning Method. Algorithms 2019, 12, 241. https://doi.org/10.3390/a12110241 3. Biometric Systems Lab—FVC2000: Fingerprint Verification Competition. Available online: FVC2000 (unibo.it)(accessed on 22 January 2021). 4. Tang, Y.; Gao, F.; Feng, J. Latent fingerprint minutia extraction using fully convolutional network. In Proceedings of the 2017 IEEE International Joint Conference on Biometrics, Denver, CO, USA, 1–4 October 2017; pp. 117–123. https://doi.org/10.1109/btas.2017.8272689 5. Huang, X.; Qian, P.; Liu, M. Latent fingerprint image enhancement based on progressive generative adversarial network. In Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, Seattle, WA, USA, 14–19 June 2020; pp. 3481–3489. https://doi.org/10.1109/cvprw50498.2020.00408 6. Neurotechnology Company—Sample Fingerprint Databases. Available online: Download biometric algorithm demo software, SDK trials, product brochures. (neurotechnology.com)(accessed on 22 January 2021). 7. Fingerprint Image identification for crime detection (2019) Fingerprint Image Identification for Crime Detection | IEEE Conference Publication | IEEE Xplore https://doi.org/10.1109/iccsp.2019.8698014.
    10 months ago by @ijiris
    (0)
     
     
  •  

    , , , and . International Journal of Innovative Research in Information Security, 9 (2): 07-09 (May 2023)1 Iqra Nissar; Waseem Ahmad Mir; Izharuddin; Tawseef Ayoub Shaikh.” Machine Learning Approaches for Detection and Diagnosis of Parkinson’s Disease”. 2021 IEEE. https://doi.org/10.1109/icaccs51430.2021.9441885 2 Pooja Raundale; Chetan Thosar; Shardul Rane.” Prediction of Parkinson’s disease and severity of the disease using Machine Learning and Deep Learning algorithm”.2021 IEEE. https://doi.org/10.1109/incet51464.2021.9456292 3 Son V T Dao “An Analysis of Vocal Features for Parkinson’s Disease Classification Using Evolutionary Algorithms” 2022. 4 Mohammed S Islam “Parkinson’s Disease Prediction Using Machine Learning” 2020..
    10 months ago by @ijiris
    (0)
     
     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, 10 (01): 01-06 (April 2023)1. A.Sairohan, Dr.K.V.Ranga Rao, V.Sridhar “Smart gloves for real time applications,” vol. 11, pp. (2021). 2. Girish Gajanan Mulye “Advance Glove for Blind,” IJSR, vol. pp (2020). 3. Somashekar V, Manohar R, Ashwini M S, Praveen V, Sushmitha M “Smart glove for blind using TensorFlow,” IRJET, vol. 7, pp. (2020) 4. Arsh.A.Ghate, Vishal.G.Chavan “Smart gloves for blind,” IRJET, vol. 4, pp. (2017). 5. Hiranya Peiris, Charitha Kulasekara, HashanWijesinghe, Basiru Kothalawala, Namalie Walgampaya, Dharshana Kasthurirathna “Eye Vista: An assistive wearable device for visually impaired sprint athletes,” IEEE vol* pp.,(2016).
    11 months ago by @ijiris
    (0)
     
     
  •  

    . International Journal of Innovative Research in Information Security, 7 (9): 99-104 (October 2020)1. Frase, H.S.F., et.al., “Comparing complex diagnoses a formative evolution of the heart disease program”, MIT Lab for Computer Science, Cambridge, MA(2001) 2. Salem, A.M. Raushdy, M and HodHod, R.A., “ A rule based expert system for diagnosis of Heart disease”, 8th International conference on soft Computing MENDEL, Brno, Czech Republic, June 5-7, PP 258-263(2002). 3. Shaikh Abdul Hannan, V. D. Bhagile, R. R. Manza, R. J. Ramteke, "Development of an Expert System for Diagnosis and appropriate Medical Prescription of Heart Disease Using Support Vector Machine and Radial Basis Function", International Journal of Computer Science and Information Security, (IJCSIS) August issue (Vol. 8 No. 5), 2010, Pages/record No.: 245-254. ISSN: 19475500. 4. I. Turkoglu, A. Arslan, E. Ilkay, “An expert system for diagnosis ofhe heart valve diseases”, Expert Systems with Applications vol.23,pp. 229–236, 2002. 5. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 6. Mrs. Bharati M. Ramageri, “Data Mining Techniques And Applications”,Bharati M. Ramageri / Indian Journal of Computer Science and Engineering Vol. 1 No. 4 pp 301-305. 7. Shaikh Abdul Hannan, R. R. Manza and R.J. Ramteke, “Association Rules for Filtering The Medicine To Avoid Side Effects Of Heart Patients”, on 16 -19 Dec 2009, at Advances in Computer Vision and Information Technology – 09, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad. 8. Rajeswari K, Vaithiyanathan V, P. Amirtharaj “Application of Decision Tree Classifiers in Diagnosing Heart Disease using Demographic Data” American Journal of Scientific research ISSN 2301-2005 pp. 77-82 EuroJournals Publishing, 2012. 9. Shaikh Abdul Hannan, Jameel Ahmed, Naveed Ahmed, Rizwan Alam Thakur, “Data Mining and Natural Language Processing Methods for Extracting Opinions from Customer Reviews”, International Journal of Computational Intelligence and Information Security, pp 52-58, Vol. 3, No. 6, July 2012. ( ISSN: 1837-7823). 10. Haque ME, Sudhakar KV. ANN back propagation prediction model for fracture toughness in microalloy steel. Int J Fatique 2002;24:1003–10. 11. Shaikh Abdul Hannan, "Heart Disease Diagnosis by using FFBP and GRNN algorithm of Neural Network", International Journal of Computer Science and Information Security, Vol 12, Number 6, June 2014, ISSN 1945-5500, United States of America. 12. Celikoglu HB. Application of radial basis function and eneralized regression neural networks in non-linear utility function specification for travel mode choice modelling. Math Comput Model 2006;44:640–58. 13. Mohammad Eid Alzaharani, Shaikh Abdul Hannan, “Diagnosis and Medical Prescription of Heart Disease Using FFBP, SVM and RBF”, Issue,1, Vol 5, , KKU Journal of Basic and Applied Sciences, Mar 2019 , Page 6-15. 14. Santosh Maher, Shaikh Abdul Hannan, Sumegh Tharewal, K. V. Kale " HRV based Human Heart Disease Prediction and Classification using Machine Learning " December 2019, (Vol. 17 No. 2 International Journal of Computer Science and Application (IJCA), New York, USA. 15. Kusuma.S1, Divya Udayan, “Machine Learning and Deep Learning Methods in Heart Disease (HD) Research, International Journal of Pure and Applied Mathematics, Volume 119 No. 18 2018, 1483-1496, ISSN: 1314-3395 (on-line version)url:http://www.acadpubl.eu/hub/Special Issue. 16. Akram Ablsubari, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, Rakesh Ramteke, "Composite Feature Extraction and Classification for Fusion of Palmprint and Iris Biometric Traits", Engineering Technology and Applied Science Research, (ETASR) Volume 9, No 1, Feb 2019, ISSN: 2241-4487, Greece. 17. Santosh K. Maher, Sumegh Tharewal, Abdul Hannan, “Review on HRV based Prediction and Detection of Heart Disease”, International Journal of Computer Applications (0975 – 8887), Pag 7-12, Volume 179 – No.46, June 2018. 18. Yogesh Rajput, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, D. Patil Ramesh Manza, Design and Development of New Algorithm for person identification Based on Iris statistical features and Retinal blood Vessels Bifurcation points” ” International Conference on Recent Trends in Image Processing & Pattern Recognition (RTIP2R), December 21-22, 2018, India. 19. Yogesh, Abdul Hannan, Rahul Sagar, Kishor Jave, Identification and Counting Trees from Oil Palm Plantations Using Digital Image Processing Techniques, International Journal of Engineering Research & Technology (IJERT), Vol. 6 Issue 05, May – 2017, ISSN: 2278-0181. 20. C.Sowmiya, Dr.P.Sumitra, “Analytical Study of Heart Disease Diagnosis Using Classification Techniques” 2017 IEEE International Conference On Intelligent Techniques In Control, Optimization And Signal Processing, 978-1-5090-4778-9/17/$31.00 ©2017 IEEE. 21. Santosh K. Maher, Sumegh Tharewal, Abdul Hannan, K. V. Kale “Review on HRV based Prediction and Detection of Heart Disease” International Journal of Computer Application(IJCA), Vol. 179, Number 46, June 2018, ISSN 0975-8887, USA. 22. Rifki Wijaya, Ary Setijadi Prihatmanto,et.al “Preliminary Design of Estimation Heart disease by using machine learning ANN within one year” , 2013 Joint International Conference on Rural Information & Communication Technology and Electric-Vehicle Technology (rICT & ICeV-T) November 26-28, 2013, Bandung-Bali, Indonesia, 978-1-4799-3365-5/13/$31.00 ©2013 IEEE. 23. Yogesh, Abdul Hannan, Rahul Sagar, Kishor Jave, Identification and Counting Trees from Oil Palm Plantations Using Digital Image Processing Techniques, International Journal of Engineering Research & Technology (IJERT), Vol. 6 Issue 05, May – 2017, ISSN: 2278-0181. 24. Mahammed Waseem, Naushad Ahmed Osmani, Shaikh Abdul Hannan, “A Survey on E-education of information and Communication ‘Technology”, European Journal of Computer Science and Information Technology (EJCSIT), Vol. 4, Issue 6, ISSN 2054-0965, October 2016. 25. H. Uguz, A. Arslan, I. Turkoglu, Ä biomedical system based on hidden Markov model for diagnosis of the heart valve diseases", Pattern Recognition Letters vol.28 pp.395–404, (2007). 26. Mr.Deepak.C.Dhanwani,et.al.,"Survey on Various Techniques of Brain Tumor Detection from MRIImages", International Journal of Computational Engineering Research Vol, 04,Issue, 1,January-2014. 27. Shaikh Abdul Hannan, Bharatratna P. Gaikwad, Ramesh Manza, "Brain Tumor from MRI Images : A Review". International Journal of Scientific and Engineering Research (IJSER), Volume 5, Issue 4, April-2014 ISSN 2229-5518, France. 28. Aqueel Ahmed, Shaikh Abdul Hannan, “Data Mining Techniques to Find Out Heart Diseases: An Overview”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), An ISO 9001:2008 Certified International Journal, Volume-1, Issue-4, September 2012, ISSN: 2278-3075, New Delhi, India. 29. M. J. Baheti, A. V. Mane, Shaikh Abdul Hannan, K. V. Kale, “Comparison of PCA and SVM for a west Indian Script- Gujarati”, CiiT Journal of Digital Image Processing, Vol. 3. No. 11, pp. 709-715, July 2011. 30. Karaolis, M.A. Moutiris, J.A. Hadjipanayi, D. Pattichis, C.S., “Assessment of the Risk Factors of Coronary Heart Events Based on Data Mining With Decision Trees” IEEE Transactions on Information Technology in Biomedicine, pp 559 -566, May 2010. 31. Nikhil Gawande , Alka Barhatte , Heart Diseases Classification using Convolutional Neural Network, Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES), IEEE, 2017. 32. Mir Arif Ali, Shaikh Abdul Hannan, Ä Review on Modern and Classical Encryption Techniques", International Journal of Engineering Trends and Technology, Volume 12, Number 4, June 2014, ISSN 2231-5381, India. 33. Aufzalina Mohd Yusof, Nor Azura Md. Ghani, Khairul Asri Mohd Ghani, Khairul Izan Mohd Ghani, A predictive model for prediction of heart surgery procedure, Indonesian Journal of Electrical Engineering and Computer Science Vol. 15, No. 3, September 2019. 34. Amin Ul Haq, Jian Ping Li, Muhammad Hammad Memon, Shah Nazir, Ruinan Sun, A Hybrid Intelligent System Framework for the Prediction of Heart Disease Using Machine Learning Algorithms, Hindawi Mobile Information Systems Volume 2018. 35. X. Li, J. Chen, G. Zhao and M. Pietikainen, “Remote Heart Rate Measurement from Face Videos under Realistic Situations”, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 4264- 4271, 2014. 36. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 37. Y. Pei, S. Zhao, X. Yang, J. Cao and Y. Gong, “Design Optimization of a SRM Motor by a Nature-Inspired Algorithm: Multi-Verse Optimizer”, Proceedings of IEEE International Conference on Industrial Electronics and Applications, pp. 1870-1875, 2018. 38. Shaikh Abdul Hannan, V.D. Bhagile, R. R. Manza and R.J. Ramteke, “Expert System for Diagnosis and Appropriate Medical Prescription of Heart Disease Using Radial Basis Function”, CiiT International Journal of Artificial Intelligent Systems and Machine Learning, Vol 2, No 8 (2010), pp 184-193, ISSN 0974–9667. 39. Durairaj M, Revathi V, “Prediction Of Heart Disease Using Back Propagation MLP Algorithm”, International Journal of Scientific and Technology Research, Volume 4, Issue 8, August 2015..
    a year ago by @ijiris
    (0)
     
     
  •  

    . International Journal of Innovative Research in Information Security, 8 (3): 27-33 (August 2021)1. Abdulkadir Sengur, “An expert system based on linear Discriminant analysis and adaptive neuro-fuzzy inference system to diagnosis heart valve diseases”, ELSEVIER, Expert Systems with Applications 35, 214-222, 12 June 2007. 2. Jain Yu, “General C-Means Clustering Model”, IEEE Transactions On Pattern Analysis And Machine Intelugence, VOL. 27, NO. 8, August 2005. 3. Meyer-Baese, O. Lange, A. wismueller, and M. K. Hurdal, “Analysis of Dynamic Susceptibility constrast MRI Time Series Based on Unsupervised Clustering Methods”, IEEE Transactions on Information Technology in Biomedicine, VOL. 11, NO. 5, September 2007. 4. Shaikh Abdul Hannan, "Heart Disease Diagnosis by using FFBP and GRNN algorithm of Neural Network", International Journal of Computer Science and Information Security, Vol 12, Number 6, June 2014, ISSN 1945-5500, United States of America. 5. Fraser, H.S.F., et al., “Differential diagnoses of the heart disease program have better sensitivity than Resident Physicians”, Tufts-New England Medical Center, Boston, MA(2001). 6. Mohammad Eid Alzaharani, Shaikh Abdul Hannan, “Diagnosis and Medical Prescription of Heart Disease Using FFBP, SVM and RBF”, Issue,1, Vol 5, , KKU Journal of Basic and Applied Sciences, Mar 2019 , Page 6-15. 7. Frawley and Piatetsky-Shapiro, 1996. Knowledge Discovery in Databases: An Overview. The AAAI/MIT Press, Menlo Park, C.A. 8. Aqueel Ahmed, Shaikh Abdul Hannan, “Data Mining Techniques to Find Out Heart Diseases: An Overview”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), An ISO 9001:2008 Certified International Journal, Volume-1, Issue-4, September 2012, ISSN: 2278-3075, New Delhi, India. 9. I. Turkoglu, A. Arslan, E. Ilkay, “An expert system for diagnosis of the heart valve diseases”, Expert Systems with Applications vol.23, pp. 229–236, 2002. 10. I. Turkoglu, A. Arslan, E. Ilkay, “An intelligent system for diagnosis of heart valve diseases with wavelet packet neural networks”, Computer in Biology and Medicine vol.33 pp.319–331, 2003. 11. Haque ME, Sudhakar KV. ANN back propagation prediction model for fracture toughness in microalloy steel. Int J Fatique 2002;24:1003–10. 12. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 13. P.I.J. Keeton, F.S. Schlindwein, Application of Wavelets in Doppler Ultrasound, vol. 17, number 1, MCB University Press, 1997, pp. 38–45. 14. I.A. Wright, N.A.J. Gough, F. Rakebrandt, M. Wahab, J.P. Woodcock, Neural network analysis of Doppler ultrasound blood low signals: a pilot study, Ultrasound in Medicine & Biology 23 (5) (1997) 683–690. 15. I. Guler, M.K. Kiymik, S. Kara, M.E. Yuksel, Application of autoregressive analysis to 20 MHz pulsed Doppler data in real time, International Journal Biomedical Computing 31 (3–4) (1992) 247–256. 16. Shaikh Abdul Hannan, "Heart Disease Diagnosis by using FFBP and GRNN algorithm of Neural Network", International Journal of Computer Science and Information Security, Vol 12, Number 6, June 2014, ISSN 1945-5500, United States of America. 17. Santosh K. Maher, Sumegh Tharewal, Abdul Hannan, “Review on HRV based Prediction and Detection of Heart Disease”, International Journal of Computer Applications (0975 – 8887), Pag 7-12, Volume 179 – No.46, June 2018. 18. https://www.who.int/en/news-room/fact sheets/detail/cardiovascular-diseases-(cvds) https://www.mayoclinic.org/diseases-conditions/stroke/symptoms-causes/syc-20350113. 19. Shaikh Abdul Hannan, “An Overview of Big Data and Hadoop”, International Journal of Computer Application”, Volume 154, Number 10, ISSN – 0975-887, November 2016, New York, USA. 20. Santosh Maher, Shaikh Abdul Hannan, Sumegh Tharewal, K. V. Kale " HRV based Human Heart Disease Prediction and Classification using Machine Learning " December 2019, (Vol. 17 No. 2 International Journal of Computer Science and Information SecApplicatiion (IJCA), New York, USA. 21. Akram Ablsubari, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, Rakesh Ramteke, "Composite Feature Extraction and Classification for Fusion of Palmprint and Iris Biometric Traits", Engineering Technology and Applied Science Research, (ETASR) Volume 9, No 1, Feb 2019, ISSN: 2241-4487, Greece. 22. Yogesh Rajput, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, D. Patil Ramesh Manza, Design and Development of New Algorithm for person identification Based on Iris statistical features and Retinal blood Vessels Bifurcation points” ” International Conference on Recent Trends in Image Processing & Pattern Recognition (RTIP2R), December 21-22, 2018, India. 23. Yogesh Rajput, Shaikh Abdul Hannan, “Design New Wavelet Filter for Detection and Grading of Non-proliferative Diabetic Retinopathy Lesions”, International Conference on Recent Trends in Image Processing and Pattern Recognition, Jan 2020, Springer, Singpore. 24. Y. M. Rajput, A. H. Hannan, M. E. Alzahrani, R. R. Manza, D. D. Patil, “EEG-Based Emotion Recognition Using Different Neural Network and Pattern Recognition Techniques–A Review”, International Journal of Computer Sciences and Engineering, Vol 6, Issue 9, Sep 2018. 25. Shaikh Abdul Hannan, Bharatratna P. Gaikwad, Ramesh Manza, "Brain Tumor from MRI Images : A Review". International Journal of Scientific and Engineering Research (IJSER), Volume 5, Issue 4, April-2014 ISSN 2229-5518, France. 26. Eliane Rich and KevinKnight – Artificial Intelligence – Secone Edition Mcgraw Hill , 1983. 27. Long, W., et.al., “Developing a program for Tracking Heart Failure”, MIT Lab for Computer Science, Cambridge, MA(2001). 28. Frase, H.S.F., et.al., “Comparing complex diagnoses a formative evalution of the heart disease program”, MIT Lab for Computer Science, Cambridge, MA(2001) 29. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 30. J. Galindo, P. Tamayo, Credit risk assessment using statistical and machine learning: basic methodology and risk modeling applications, Computational Economics 15 (1 – 2) (2000) 107–143 31. V. Vapnik, The Nature of Statistical Learning Theory, Springer- Verlag, New York, 1995. 32. M.A. Hearst, S.T. Dumais, E. Osman, J. Platt, B. Scho¨lkopf, Support vector machines, IEEE Intelligent Systems 13 (4) (1998) 18– 28. 33. Broomhead D., & Lowe, D., Multivariable functional interpolation and adaptive networks. Complex Systems, vol.2, pp.321-355, 1988. 34. Haralambos Sarimveis, Philip Doganis, Alex Alexandridis, “A classification technique based on radial basis function neural networks”, Advances in Engineering Software vol.37, pp.218–221, 2006. 35. Shaikh Abdul Hannan, Pravin Yannawar, R.R. Manza and R.J. Ramteke, “Expert System Data Collection Technique for Heart Disease” , in IT & Business Intelligence, on 06-08 Nov 2009, Organised By IMT, Nagpur, India. 36. Haralambos Sarimveis, Philip Doganis, Alex Alexandridis, “A classification technique based on radial basis function neural networks”, Advances in Engineering Software vol.37, pp.218–221, 2006. 37. Chauvin in, Y and D.E. Ruumehart Backpropagation : Theory, Architechtures and Applications, Erbaum Mahwah, NJ, ISBN : 080581258. PP 561, 1995. 38. Shaikh Abdul Hannan, V. D. Bhagile, R.R. Manza, R. J. Ramteke, “Heart Disease Diagnosis By Using FFBP algorithm of Artificial Neural Network”, International Conference on Communication, Computation, Control and Nanotechnology, ICN-2010 Organized by Rural Engineering College Bhalki-585328, during October 29-30, 2010. 39. Cigizoglu HK, Alp M. Generalized regression neural network in modelling river sediment yield. Adv Eng Software 2005;37:63–8. 40. Kim B, Lee DW, Parka KY, Choi SR, Choi S. Prediction of plasma etching using a randomized generalized regression neural network. Vacuum 2004;76:37–43 41. Jang JSR, Sun CT, Mizutani E. Neuro-fuzzy and soft computing: a computational approach to learning and machine intelligence, Prentice Hall, Upper Saddle River, New Jersey, USA; 1997 Chapter 9. 42. Shaikh Abdul Hannan, R. R. Manza and R.J. Ramteke, “Association Rules for Filtering The Medicine To Avoid Side Effects Of Heart Patients”, on 16 -19 Dec 2009, at Advances in Computer Vision and Information Technology – 09, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad. 43. Anupriya Kamble, Abdul Hannan, Yogesh, Dnyaneshwari, “Association detection of Regular Insulin and NPH Insulin Using Statistical Features”, Second International Conference on Cognitive Knowledge Engineering, 21-23 December 2016 (ICKE-2016), Aurangabad, Maharashtra, India, pp 59-62, ISBN 978-93-80876-89-4. 44. Shaikh Abdul Hannan, Pravin Yannawar, R. R. Manza and R.J. Ramteke, “Data Mining Technique for Detection of Cardiac Problems Using Symptoms Medicine and Its Side effects”, in IT & Business Intelligence -09 , in IT & Business Intelligence, on 06-08 Nov 2009, Organized By IMT, Nagpur, India. 45. Shaikh Abdul Hannan, Jameel Ahmed, Naveed Ahmed, Rizwan Alam Thakur, “Data Mining and Natural Language Processing Methods for Extracting Opinions from Customer Reviews”, International Journal of Computational Intelligence and Information Security, pp 52-58, Vol. 3, No. 6, July 2012. ( ISSN: 1837-7823). 46. Ordonez C,” Association rule discovery with the train and test approach for heart disease prediction”, IEEE Transactions on Information Technology in Biomedicine, P(334 – 343), April 2006 47. Aqueel Ahmed, Shaikh Abdul Hannan, “Data Mining Techniques to Find Out Heart Diseases: An Overview”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), An ISO 9001:2008 Certified International Journal, Volume-1, Issue-4, September 2012, ISSN: 2278-3075, New Delhi, India. 48. AbuKhousa, E “Predictive data mining to support clinical decisions: An overview of heart disease prediction systems”, IEEE Transaction on Innovations in Information Technology (IIT), pp(267 - 272) March 2012..
    a year ago by @ijiris
    (0)
     
     
  •  

    , , and . International Journal of Innovative Research in Information Security, VIII (II): 06-09 (July 2021)1. Door Unlock using Face Recognition (Abdul Azeem, Sathuluri Mallikarjun Rao,Kandula Rama Rao, Shaik Akbar Basha, Harsha Pedarla, Modela Gopi) 2. Facial Recognition Enabled Smart Door Using Microsoft Face API (Karan Maheshwari , Nalini N) 3 Automated door access control system using face recognition (Tejas Saraf, Ketan Shukla, Harish Balkhande, Ajinkya Deshmukh) 3. Facial recognition enabled smart door unlock system(M Vamsi Krishna, A Bhargav Reddy, V Sandeep) 4. Smart Door with Face UnlockApache2.0 (https://create.arduino.cc) (Divins Mathew) 5. Makers Pro Projects(Simple Door Lock Using Face recognition Solenoid Lock)(Muhammad Aqib).
    3 years ago by @ijiris
    (0)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue X): 99-103 (December 2020)1. Argyris, C., & Schon, D., (1978). Organizational Learning: A Theory of Action Perspective, Addison-Wesley, Reading, MA. 2. Argyris, C., Putman, R., and McLain Smith, D., (1985). Action Science, Concepts, Methods, and Skills for Research and Intervention, San Francisco, Jossey Bass 3. Bapuji, H., and Crossan, M. (2004). From Raising Questions to Providing Answers: Reviewing Organizational Learning Research, Management Learning, Vol. 35, No.4, PP. 397-417. 4. Bhattacherjee, A. (2012). Social Science Research: Principles, Methods, and Practices (2nd ed.). Textbooks Collection. Book 3. http://scholarcommons.usf.edu/oa_textbooks/3 5. C. Mausolff., (2004). Learning from feedback in performance measurement systems. Public Performance and Management Review, 28: 9-29 4. 6. C.M. Graham and F.M. Nafukho. (2007). Culture, organizational learning, and selected employee background variables in small size business enterprises. Journal of European Industrial Training, 31:127-144 6. 7. Chiva, R., Grandío, A., & Alegre, J., (2010). Adaptive and Generative Learning: Implications from Complexity Theories, International Journal of Management Reviews, Vol. 12, No. 2, PP. 114-129. 8. De Geus, A.p. (1988). Planning as learning Harvard Business Review,66(2),70-74. 9. Dimovski, V., (1994). Organizational Learning and Competitive Advantage, Ph.D. Thesis, Cleveland, Ohio 10. Farago, J., and Skyrme, D., (1995). The Learning Organization, (On-line), Available at http://www.skyrme.com/insight/3lrnorg.htm 11. Farago, J., and Skyrme, D., (1995). The Learning Organization, (On-line), Available at http://www.skyrme.com/insight/3lrnorg.htm. fifth edition (5th ed.). Edinburgh Gate, Harlow, Pearson Education Limited. 12. Finger, M., & Brand, S., (1999). The Concept of The Learning Organization, Applied To The Transformation of The Public Sector, In M. Easterby-Smith, L. Araujo and J. Burgoyne, Organizational Learning and The Learning Organization, London: Sage, P.2..
    3 years ago by @ijiris
    (0)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue IX): 89-98 (October 2020)1. Andrea Zanella, Lorenzo Vangelista, Nicola Bui, Angelo Castellani, Michele Zorzi ―”Internet of Things for Smart Cities”, IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 2. Salha M. Alzahrani ―”Sensing for the Internet of Things and Its Applications”, 978-1-5386-3281-9/17 $31.00 © 2017 IEEE DOI 10.1109/W-FiCloud.2017.33 3. H.Schaffers, N.Komninos, M.Pallot, B.Trousse, M.Nilsson, A.Oliveira, “Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation”, The Future Internet, Lecture Notes in Computer Science Volume 6656, pp. 431-446, 2011. 4. D.Cuff, M.Hansen, and J.Kang, “Urban sensing: out of the woods.” Communications of the ACM vol. 51, no. 3, pp. 24-33, Mar. 2008. 5. H.Arasteh, V.Hosseinnezhad, V.Loia, A.Tommasetti, O.Troisi, M.Shafie-khah, P. Siano ”Iot-based Smart Cities: a Survey”, 978-1-5090-2320-2/16/$31.00 ©2016 IEEE. 6. Arun Kumar Rana , Ram krishna , Sachin Dhwan3, Dr. Sharad Sharma, Dr. Rashmi Gupta ”Review on Artificial Intelligence with Internet of Things - Problems, Challenges and Opportunities”,978-1-7281-1793-5/19/$31.00 ©2019 IEEE 7. Husam Rajab, Tibor Cinkelr ” IoT based Smart Cities”, 978-1-5386-3779-1/18/$31.00 ©2018 IEEE. 8. B.Hammi, R.Khatoun, S.Zeadally, A.Fayad and L.Khoukhi, "IoT technologies for smart cities," in IET Networks, vol. 7, no. 1, pp. 1-13, 1 2018. 9. D.El-Baz and J.Bourgeois,“Smart cities in Europe and the alma logistics project,” ZTE Commun., vol. 13, no. 4, pp. 10–15, 2015 10. H.Arasteh, V.Hosseinnezhad, V.Loia, A.Tommasetti, O.Troisi, M.Shafie-khah, P.Siano” Iot-based Smart Cities: a Survey” , 978-1-5090-2320-2/16/$31.00 ©2016 IEEE 11. M.M.Rathore, A.Ahmad, A.Paul, S.Rho, “Urban planning and building smart cities based on the internet of things using big data analytics,” Comput. Netw., 2016, DOI: 10.1016/j.comnet.2015.12.023 12. N.Neyestani, M.Y.Damavandi, M.Shafie-khah and J.P.S.Catalão ― “Modeling the PEV traffic pattern in an urban environment with parking lots and charging stations,” PowerTech, 2015 IEEE Eindhoven, Eindhoven, 2015, pp. 1-6. 13. M.Yazdani-Damavandi, M.P.Moghaddam, M.R.Haghifam, M.Shafie-khah, J.P.S.Catalão, "Modeling Operational Behavior of Plug-in Electric Vehicles’ Parking Lot in Multienergy Systems," IEEE Trans. Smart Grid, vol. 7, pp. 124-135, 2016. 14. N.Neyestani, M.Y.Damavandi, M.Shafie-Khah, J.Contreras, and J.P.S.Catalão, Ällocation of plug-in vehicles' parking lots in distribution systems considering network-constrained objectives," IEEE Trans. Power Syst., vol. 30, pp. 2643-2656, 2015. 15. M.Shafie-khah, E.Heydarian-Forushani, M.E.H.Golshan, P. Siano, M.P. Moghaddam, M.K. Sheikh-El-Eslami, and J.P.S. Catalão, “Optimal trading of plug-in electric vehicle aggregation agents in a market environment for sustainability,” Appl. Energy, Volume 162, 15 January 2016, Pages 601-612 16. A.K.Evangelos, D.T.Nikolaos, and C.B.Anthony, “Integrating RFIDs and smart objects into a Unified Internet of Things architecture,” Advances in Internet of Things, vol. 1, pp. 5-12, 2011. 17. J.Gubbi, R.Buyya, S.Marusic, and M.Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions,” Future Gener. Comput. Syst., vol. 29, pp. 1645–1660, 2013. 18. A.Botta, W.de Donato, V.Persico, and A.Pescapé, ― “Integration of cloud computing and internet of things: a survey”, Future Gener. Comput. Syst., vol. 56, pp. 684–700, 2016. 19. R.Fielding,―“Representational state transfer,” Architectural Styles and the Design of Network-based Software Architecture, pp.76-85,2000. 20. A.P.Castellani, N.Bui, P.Casari, M.Rossi, Z.Shelby and M.Zorzi ― “Architecture and protocols for the Internet of Things: A case study,” 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 678–683, 2010 21. Z. Shelby, K. Hartke, C. Bormann, and B. Frank.―“Constrained Application Protocol (CoAP).” draft-ietf-core-coap-18. s.l. : IETF, 2013. 22. A.Castellani, S.Loreto, A.Rahman, T.Fossati and E.Dijk.―“Best Practices for HTTP-CoAP Mapping Implementation.” draft-castellanicore-http-mapping-07. s.l. : IETF, 2013..
    3 years ago by @ijiris
    (1)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue IX): 81-86 (September 2020)1. Noor, Sanjeevikumar Padmanaban , Lucian Mihet-Popa , Mohammad Nurunnabi Mollah and Eklas Hossain, “Components, Technologies, Challenges, Impacts, and Future Direction of Development”, Khulna University of Engineering and Technology, Khulna 9203, Bangladesh. 2. Mattia Ricco, et. al., “A Capacitor Voltage Balancing Approach Based on Mapping Strategy for MMC Applications” at University of Bologna, 40136 Bologna, 2019. 3. Miguel Moranchel, Francisco Huerta, Inés Sanz, Emilio Bueno and Francisco J. Rodríguez, “A Comparison of Modulation Techniques for Modular Multilevel Converters”, Universidad de Alcalá, Escuela Politécnica, 28805 Alcalá de Henares, Spain, 2016. 4. Xiaojie Shi, Zhiqiang Wang, Leon M. Tolbert and Fred Wang Center for Ultra-wide-area Resilient Electric Energy Transmission Networks (CURENT) “A Comparison of Phase Disposition and Phase Shift PWM Strategies for Modular Multilevel Converters” The University of Tennessee Knoxville, TN 37996-2250, USA-2013 5. Binbin Li, Shaoze Zhou, and Dianguo Xu, Stephen J. Finney, and Barry W. Williams “A Hybrid Modular Multilevel Converter for Medium-Voltage Variable-Speed Motor Drives” National Natural Science Foundation of China (51237002) and (51477034). 6. Mahran Quraan, Pietro Tricoli, Salvatore D’Arco, and Luigi Piegari, Senior,“Efficiency Assessment of Modular Multilevel Converters for Battery Electric Vehicles” University of Birmingham, Birmingham, March 2017. 7. Meiqin Mao , , Yong Ding, Liuchen Chang, Nikos D. Hatziargyriou, Fellow, Qiang Chen, Tinghuan Tao, and Yunwei Li, “Multi-Objective Power Management for EV Fleet With MMC-Based Integration Into Smart Grid” Ieee Transactions On Smart Grid, Vol. 10, No. 2, March 2019 8. Jahangeer Soomro, et. al., Comparative Analysis of Modular Multilevel Converter with Cascaded H Bridge Inverter using Five, Seven and Nine levels” International Journal of Recent Technology and Engineering, Vol. 7, Iss. 5S4, 2019 9. Elena Vergori ID, Francesco Mocera ID and Aurelio Somà ,I”Battery Modelling and Simulation Using a Programmable Testing Equipment”, 2018. 10. Yi Wang, et. al., “Nearest Level PWM Method for the MMC in DC Distribution Grids” North China Electric Power University, Baoding 071003, China. 11. Zhan Ma , Feng Gao , Xin Gu , Nan Li , Decun Niu “An Online SOH Testing Method of MMC Battery Energy Storage System” Jinan, China -2018. 12. Amrutvahini College of Engineering, Sangamner, India2,”Chandrakant Rahane, Vaibhav Varpe “Design and fabrication of regenerative braking system”, 2018. 13. Mattia Ricco, et. al., “FPGA-Based Implementation of MMC Control Based on Sorting Networks” at Cergy-Pontoise University, 95031 Cergy Pontoise, France; 2018. 14. Pratik Bhandari, et. al., Regenerative Braking Systems (RBS)” International Journal of Scientific & Engineering Research, University of Mumbai, India, 2017. 15. Sourabh Rathore, Mukesh Kumar Kirar and S. K Bhardwaj, “ H- Bridge Multilevel Inverter Using Pd, Pod, Apod Techniques”, Department of Electrical Engineering, MANIT, Bhopal, 2015..
    4 years ago by @ijiris
    (0)
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VIII): 76-80 (August 2020)1. Seenivasagam V, Velumani R, “A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud,” Computational and mathematical methods in medicine, 2013. 2. Parah S A , Sheikh J A , Ahad F , et al, “Information hiding in medical images: a robust medical image watermarking system for E-healthcare, “Multimedia Tools & Applications, vol. 76,no.8, pp.1-35.,2017 3. Aparna, Puvvadi , and P. V. V. Kishore , “Biometric-based efficient medical image watermarking in E-healthcare application,”IET Image Processing,vol .13,no.3 , pp.421-428,2019. 4. Aparna, Puvvadi , and P. V. V. Kishore , “An iris biometric-based dual encryption technique for medical image in e-healthcare application,” International Journal of Computational Vision and Robotics, vol.10,no.1,2020,:. 5. Raul R C, Claudia F U, Trinidad-Bias G J, “ Data Hiding Scheme for Medical Images,” Electronics, Communications and Computers, 2007. CONIELECOMP '07. 17th International Conference on. IEEE, pp.32-32,2007. 6. Singh A K, Kumar B, Dave M, et al , “Robust and imperceptible dual watermarking for telemedicine applications,” Wireless Personal Communications, vol.80,no.4, pp.1415-1433,2015 7. Aparna, Puvvadi , and P. V. V. Kishore , “A blind medical image watermarking for secure e-healthcare application using crypto-watermarking system,” Journal of Intelligent Systems ,2019. 8. Singh A K, Kumar B, Dave M, et al, “ Multiple watermarking on medical images using selective discrete wavelet transform coefficients,” Journal of Medical Imaging & Health Informatics, vol 5,no.3, pp.607-614,2015. 9. Ghouti, Lahouari , “ Robust perceptual color image hashing using randomized hypercomplex matrix factorizations,” Multimedia Tools and Applications ,vol77,no15,pp:19895-19929,2018 10. Cui, Yan , et al, “Supervised discrete discriminant hashing for image retrieval,” Pattern Recognition ,vol78,pp:79-90,2018.
    4 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VII): 69-75 (August 2020)1. Adepoju, S. A.&AlhassanS. (2010). Challenges of ATM use and fraud occurrences in Nigeria: A case study of selected banks in Minna metropolis. Journal of Online Banking and Business, 15 (2), 1-10. 2. Adeoye, O. (2012). Evaluate the performance of two-factor authentication solutions in the banking sector. International Journal of Computer Science, 9 (4), 457-462. 3. Alblawi, U. Moon I., Kim, J., Suh, S.C. & Lee, W. (2014). A hybrid classifier with classification a binning for network application identification. Journal of Integrated Design and Operations Science, 18 (3), 3-22, 4. Banerjee, U.,Vashishtha, A.&Saxena M. (2010). Wireshark function evaluation as an intrusion detection tool. International Journal of Computer Applications, 6 (7), 1-5. https://Doi:10.5120/1092-1427. 5. Brunner, A., Decressin, J., Hardy, D., &Kudela, B. (2004). The German Banking System of Three Pillars: The European Transnational Perspective. Washington, DC: International Monetary Fund. 6. Chavalone, S. (2012). Banking fraud and ATM security. Retrieved from (Accessed 10th August, 2020) http://resources.infosecinstitute.com/bank-fraud-atm-security/. 7. Cisco Networking Academy. (2017). Basics of steering and switching. Hoboken, New Jersey: Cisco Press, 2017. 8. Debnath, R. Agrawal, B.&Vishnav, C. (2014). DES, AES, and Triple DES: Symmetric Key Cryptography Algorithms. International Journal of Scientific, Engineering and Technical Research, 3 (3), 652-654 9. Firewall. (Nd) Oxford Life Dictionary of the English Language. Retrieved from (Accessed 10th August, 2020) https://en.oxforddictionaries.com/definition/firewall. 10. Hussain, M. S. Russell, A.H.&RobidasL.C. (2015). Review of ATM services in Dhaka City for an analysis of factors affecting customer satisfaction. Journal of Business and Management IOSR, 17 (11) 1, 68-75. 11. Khan, F. (2015). How does an ATM machine work? Retrieved fromwww.quora.com/How-does-an-ATM-machine-work-1 12. Modern Ghana. (2013). Federal prosecutors say hackers stole $ 45 million in ATM card fraud. Retrieved from www.modernghana.com/news/463043/1/hackers-steal-45-million-in-atm-card-scam-Federal.html 13. Regular old phone service. (No date). On Wikipedia. Retrieved from (Accessed 10th August, 2020). https://en.wikipedia.org/wiki/Plain_old_telephone_service 14. Prodromo, A. (2019). TLS Security 6: Examples of TLS Attacks and Attacks. (Accessed 10th August, 2020) Taken from https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-Part/143-153 15. Pymnts.com. (2017). Automated teller machines in the US have recently grown. Retrieved from https://www.pymnts.com/cash/2017/atmia-says-us-atms-finally-see-growth/(Accessed 10th August, 2020) 16. Robam, A., Verma, and A. And Singh A. (2013). A method for detecting beams using beam sniffing. International Journal of Computer Science and Engineering, 4 (3), 21-33. https://Doi:10.5121/ijcses.2013.4302. 17. Sidel, R. (2015). Debit card data theft from ATMs escalated. Retrieved from www.wsj.com/articles/theft-of-debit-card-data-from-atms-soars-1432078912(Accessed 10th August, 2020). 18. Payment Card Forensic Analysis: From Concept to Desktop and Mobile Analysis Tools. Digital Survey, 11 (3), 143-153. TechTarget Network. (Nada). What is Ethernet? Retrieved from. (Accessed 10th August, 2020). https://searchnetworking.techtarget.com/definition/Ethernet 19. TechTarget Network. (n.d). What is a local area network (LAN)? Retrieved from (Accessed 10th August, 2020)www.searchnetworking.techtarget.com/definition/local-area-network-LAN 20. Twum, F., Nti, IK, & Asante, M. (2016). Use multi-factor authentication to improve ATM security. International Journal of Science and Engineering Applications, 5 (3), 126-134. https://Doi:10.7753/ijsea0503.1003. 21. Wireshark. (No date). In Techopedia. Retrieved from www.techopedia.com/definition/25325/wireshark (Accessed 10th August, 2020) 22. Young, C. (2019). Introduce ZOMBIES POODLE and GOLDENDOODLE. Retrieved from https: (Accessed 10th August, 2020) //www.tripwire.com/zh-CN/state-of-security/vulnerability-management/zombie- 23. Zou Lin, Liao Ming, Yuan Cheng, Zhang Hai (2017). Use the expected packet size to detect low-speed DDoS attacks. Security and Communications Network, 2017 (1), 1-14. https://Doi:10.1155/2017/3691629.
    4 years ago by @ijiris
    (0)
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VII): 58-68 (July 2020)1. Adekola, O.G. (2013). New perspective to Nigeria’s foreign policy towards China, IOSR journal of humanities and social science, 6 (5), 01-06 2. Akeem, U.O. (2011), Performance evaluation of foreign trade and economic growth in nigeria, Journal of Finance and Accounting vol.2, No 2, 2222-2847 3. Alexandre Mercier, (2007).‘Commercial diplomacy in advanced industrial states’, Discussion Papers in Diplomacy, No. 108 (The Hague: Netherlands Institute of International Relations ‘Clingendael’, 4. Asongu, S. A., & Aminkeng, G. A. A., (2013). “The economic consequences of China-Africa relations: debunking myths in the debate”, Journal of Chinese Economic and Business Studies, 11(4), pp. 261-277. 5. Breinlich, H., Mion, G., Nolan, P. and D. Novy (2012), "Intellectual Property, Overseas Sales, and the Impact of UKTI Assistance in Entering New Overseas Markets", Report to UKTI. 6. Carmody, P., &Owusu, F., (2007). “Chinese vs. America geoeconomic strategies in Africa”,Political Geography, Political Geography, 26, pp. 504-524. 7. DayoAiyetan, (2010). “How China Fuels Deforestation In Nigeria, West Africa,” International Centre for Investigative Reporting (Nigeria), 8. Garten J., Zoellick R., Shinn J. (1998), Riding the Tigers: American Commercial Diplomacy in Asia, Columbia International Affairs online, Columbia University Press, 9. Harris R. and Li Q. (2005). Review of Literature: Review of the Literature: The Role of International Trade and Investment in Business Growth and Development, United Kingdom of Great Britain, Richard Harris & Q. Cher Li (copyright). 10. Helmers C., Rogers, M. and P. Schautschick (2011), “Intellectual Property at the Firm-Level in the UK”, Oxford University, Department of Economics Working Paper No. 546. 11. Kopp, Harry W., (2004), Commercial Diplomacy and the National Interest, Amercian Academy of Diplomacy/ Business Council for International Understanding 12. Kostecki M., Brossard H., Furrer O. Gramigna M. (1994) L’image des services suisses: Enjeux et proposition d’action, Die Unternehmung, Zurich, 1/94, 35-50. 13. Kotabe, M., and Czinkota, M. R. (1992). "State government promotion of manufacturing exports: A gap analysis", Journal of International Business Studies, 23(4), 637-658. 14. Maaike Okano-Heijmans(2010). ‘Hantering van het begrip economische diplomatie’, Internationale Spectator, Vol. 64, No. 5 pp. 73-74; Maaike Okano-Heijmans and Huub Ruel, ‘Commerciële diplomatie en internationaal ondernemen’, Internationale Spectator, Vol. 65, No. 9 (2011). 15. Michel Kostecki and Olivier Naray(2007). ‘Commercial diplomacy and international business’, Discussion Papers in Diplomacy, No. 107 (The Hague: Netherlands Institute of International Relations ‘Clingendael’, 16. Naray, O. (2008). Commercial Diplomacy: A Conceptual Overview." Conference paper for the 7th World Conference of TPOs – The Hague, The Netherlands. 17. Naray, O. (2010). What a good Commercial Diplomat has to know and be capable of",Exchange: The Magazine for International Business and Diplomacy, 2 (December 2010): 8-9. 18. Ogunkola, A. S. Bankole and A. Adewuyi,(2008), China-Nigeria economic relations: AERC scoping studies on China-Africa relations, a revised report submitted the Africa economic research consortium (AERC), University of Ibadan, Ibadan, Nigeria, 2008, 3-16 19. Reuvers, S. and Ruel, H. J. M., (2012)."Research on Commercial Diplomacy: Review and Implications" in Commercial Diplomacy and International Business: a conceptual and empirical exploration, Ruel, H. J. M., ed. (Advanced series in Management, Emerald, 20. Ruel, H. J. M. and Visser, R. (2012). Commercial Diplomats as corporate entrepreneurs: explaining role behavior from an institutional perspective", International Journal of Diplomacy and Economy. 21. Saner R. and Yiu L. (2003), International economic diplomacy: Mutations in post-modern times, Discussion Papers in Diplomacy,84, The Hague, Clingendael Institute. 22. Taylor, I., (2007). “Governance in Africa and Sino-Africa Relations: Contradictions or Confluence?”, Politics, 27(3), pp. 139-146. 23. Utomi, P. (2012). China and Nigeria, , retrieved from http://080603_utomi_nigeriachina, September 2013.
    4 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VI): 53-57 (June 2020)1. M. A. Rafique, W. Pedrycz, and M. Jeon, “Vehicle license plate detection using region-based convolutional neural networks,” Soft Computing,2018, Vol. 22, No. 19, pp. 6429-6440. 2. Y. N. Chen, C. C. Han, G. F. Ho, and K. C. Fan, “Facial/License Plate Detection Using a Two-level Cascade Classifier and a Single Convolutional Feature Map,” International Journal of Advanced Robotic Systems, 2015, Vol. 12, No. 12, pp. 183-198. 3. C. Gerber, and M. Chung, “Number Plate Detection with a Multi- Convolutional Neural Network Approach with Optical Character Recognition for Mobile Devices,” Journal of Information Processing Systems, 2016, Vol. 12, No. 1, pp. 100-108. 4. Y. Yuan, W. Zou, Y. Zhao, X. Wang, X. Hu, and N. Komodakis, “A Robust and Efficient Approach to License Plate Detection,” IEEE Transactions on Image Processing, 2017, Vol. 26, No. 3, pp. 1102-1114. 5. W. Zhou, H. Li, Y. Lu, and Q. Tian, “Principal Visual Word Discovery for Automatic License Plate Detection,” IEEE Transactions on Image Processing, 2012, Vol. 21, No. 9, pp. 4269-4279. 6. B. Li, B. Tian, Y. Li, and D. Wen, “Component-Based License Plate Detection Using Conditional Random Field Model,” IEEE Transactions on Intelligent Transportation Systems, 2013, vol. 14, no. 4, pp. 1690-1699. 7. R. F. Prates, G. C. Chavez, W. R. Schwartz, and D. Menotti, “Brazilian License Plate Detection Using Histogram of Oriented Gradients and Sliding Windows,” International Journal of Computer Science & Information Technology, 2013, Vol 5, No 6, pp. 39-52. 8. R. Wang, N. Sang, R. Huang, and Y. Wang, "License plate detection using gradient information and cascade detectors,” Optik, 2014, Vol. 125, No. 1, pp. 186-190. 9. A. M. Ghaili, S. Mashohor, A. R. Ramli, and A. Ismail, “Vertical-Edge-Based Car-License-Plate Detection Method,” IEEE Transactions on Vehicular Technology, 2013, vol. 62, no. 1, pp. 26-38. 10. J. Tian, G. Wang, J. Liu, and Y. Xia, “License plate detection in an open environment by density-based boundary clustering,” Journal of Electronic Imaging, 2017, Vol. 26. No. 3, PP. 330171-3301711. 11. Anagnostopoulos, C., Anagnostopoulos, I., Loumos, V., Kayafas, E.: License plate-recognition from still images and video sequences: A survey. IEEE Trans. Intell. Transp. Syst. 9(3), 377–391 (2008) 12. Jia, W., Zhang, H., He, X.: Region-based License Plate Detection. J. Network and comput. Applications 30(4), 1324–1333 (2007) 13. Wang, S., Lee, H.-J.: A cascade framework for a real-time statistical plate recognition system. IEEE Trans. Inf. Forensics Security 2(2), 267–282 (2007) 14. Anagnostopoulos, C., Anagnostopoulos, I., Loumos, V., Kayafas, E.: A License Plate-Recognition Algorithm for Intelligent Transportation System Applications. IEEE Trans. Intell. Transp. Syst. 7(3), 377–392 (2006) 15. Zheng, D., Zhao, Y., Wang, J.: An Efficient Method of License Plate Location. Pattern Recognit. Lett. 26(15), 2431–2438 (2005) 16. Chang, S., Chen, L.-S., Chung, Y.-C., Chen, S.-W.: Automatic License Plate Recognition. IEEE Trans. Intell. Transp. Syst. 5(1), 42–53 (2004) 17. Deb, K., Chae, H.-U., Jo, K.-H.: Parallelogram and Histogram based Vehicle License Plate Detection. In: IEEE ICSMA, pp. 349–353. IEEE Press, New York (2008).
    4 years ago by @ijiris
    (1)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue IV): 48-52. (June 2020)1. Be My Eyes: Android Voice Application for Visually Impaired People by RuchaDoiphode, MayuriGanore, AshwiniGarud, TejaswiniGhuge, Parminder Kaur (Guide) Department Of Computer Science Engineering Dr.Babasaheb Ambedkar Marathwada University, Jawaharlal Nehru Engineering College, Aurangabad, India 2. A new Android application for blind and visually impaired people by PiotrKardyś, Adam Dąbrowski Division of Signal Processing and Electronic Systems Poznan University of Technology, Poznan, Poland. 3. P.Kardyś,A.Dąbrowski,“Standard Bluetooth Natlebezprzewodowy chsystemów telekomunikacy jnychkrót kiegozasięgu w aplikacjach bio-itelemedycznych”, Elektronika 52 (5), 5/2011, pp. 56–59. 4. R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668 842, Sept. 16, 1997. (2002) The IEEE website. Online. Available: http://www.ieee.org/..
    4 years ago by @ijiris
    (0)