1*Computer science and engineering, Chittagong Independent University, Chittagong, Bangladesh ,2 :Department of Technical Education, I.E.T., Lucknow, India 3 : M.M.M University of Technology, Gorakhpur, India
Brain cancer has rapidly occurred in many medical arenas. The tumour pandemic dangerously infects the health and well-being of the natural population. In this proposed pathway, Fuzzification with the Picture enhancement approach has acted. The clicked Picture contains noises of brain cancer that cannot directly proceed for diagnosis. The clicked Picture includes a sound of dizzy and blurred Pictures. However, the objective of this paper to overcome this problem and to get a high-level picture from aggregated panoramic with image processing methodology. For extracting Pictures, the division has acted to split up the clicked values to samples. Fuzzification targets the infected areas of brain cells for better classification. But, before dividing, extraction has to performed to remove out the noises of Picture. It has performed with train data set and a highly accurate Picture. It has performed using a neighbour equality algorithm classifier. This methodology helps clinical doctors to get the best prediction. The motive of this system is to put improvisation of the effectivity of the classifier and also the efficiency. According to this method can reduce the (N.R.) negative right rate. The findings of the paper are that now clinical doctors can get some help about detection, and also we have improved the image processing system with straightforward methodology.
Sritha Zith Dey Babu,Digvijay Pandey,Vipul Narayan."Computer succoured prognosis of Brain knob spotting and histogram enhancement using Fuzzification ". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.7, Issue 07,pp.1-5, July - 2020, URL :http://ijcert.org/ems/ijcert_papers/V7I701.pdf,
 Kut C, Chaichana KL, Xi J, Raza SM, Ye X, McVeigh ER, Rodriguez FJ, Quińones-Hinojosa A, Li X. Detection of human brain cancer infiltration ex vivo and in vivo using quantitative optical coherence tomography. Science translational medicine. 2015 Jun 17;7(292):292ra100-.
 Jermyn M, Mok K, Mercier J, Desroches J, Pichette J, Saint-Arnaud K, Bernstein L, Guiot MC, Petrecca K, Leblond F. Intraoperative brain cancer detection with Raman spectroscopy in humans. Science translational medicine. 2015 Feb 11;7(274):274ra19-.
 Yuan W, Kut C, Liang W, Li X. Robust and fast characterization of OCT-based optical attenuation using a novel frequency-domain algorithm for brain cancer detection. Scientific reports. 2017 Mar 22;7:44909.
 Jermyn M, Desroches J, Mercier J, Tremblay MA, St-Arnaud K, Guiot MC, Petrecca K, Leblond F. Neural networks improve brain cancer detection with Raman spectroscopy in the presence of operating room light artifacts. Journal of biomedical optics. 2016 Sep;21(9):094002.
 Lazcano R, Madrońal D, Salvador R, Desnos K, Pelcat M, Guerra R, Fabelo H, Ortega S, López S, Callicó GM, Juarez E. Porting a PCA-based hyperspectral image dimensionality reduction algorithm for brain cancer detection on a manycore architecture. Journal of Systems Architecture. 2017 Jun 1;77:101-11.
 Fabelo H, Ortega S, Kabwama S, Callico GM, Bulters D, Szolna A, Pineiro JF, Sarmiento R. HELICoiD project: A new use of hyperspectral imaging for brain cancer detection in real-time during neurosurgical operations. InHyperspectral Imaging Sensors: Innovative Applications and Sensor Standards 2016 2016 May 10 (Vol. 9860, p. 986002). International Society for Optics and Photonics.
 Franchino F, Rudŕ R, Soffietti R. Mechanisms and therapy for cancer metastasis to the Brain. Frontiers in oncology. 2018 May 24;8:161.
 Koo YE, Reddy GR, Bhojani M, Schneider R, Philbert MA, Rehemtulla A, Ross BD, Kopelman R. Brain cancer diagnosis and therapy with nanoplatforms. Advanced drug delivery reviews. 2006 Dec 1;58(14):1556-77.
 Fabelo H, Ortega S, Ravi D, Kiran BR, Sosa C, Bulters D, Callicó GM, Bulstrode H, Szolna A, Pińeiro JF, Kabwama S. Spatio-spectral classification of hyperspectral images for brain cancer detection during surgical operations. PLoS One. 2018 Mar 19;13(3):e0193721.
 Kateb B, Ryan MA, Homer ML, Lara LM, Yin Y, Higa K, Chen MY. Sniffing out Cancer using the J.P.L. electronic nose: A pilot study of a novel approach to detection and differentiation of brain cancer. NeuroImage. 2009 Aug 1;47:T5-9.
1*Student, Dept. Of CSE, Shri Dharmasthala Manjunatheshwara College of Engineering, Dharwad, India. 2: Associate Professor, Dept. Of CSE, Shri Dharmasthala Manjunatheshwara College of Engineering, Dharwad, India.
Background: Guaranteeing food profitability is a significant issue for creating nations like India, where more than 33% of the individuals is live in neediness. To estimate cost, there is no system in place to advise farmers what crops to grow. Hence, this paper explains the attempt to predict crop price that a farmer can obtain from his land by analyzing patterns in past data.
Methods/Statistical analysis: This method makes use of several data such as rainfall, temperature, market prices, and past yield of a crop. The supervised machine learning algorithm, namely, the Decision tree algorithm and analyse the data and predict for the new set of data, is implemented. It also predicts the price and the gain for the next twelve months over the past twelve months and gives the time series analysis of the same.
Findings: The proposed model is developed to help farmers make better decisions concerning which crop is most suitable during his desired time of sowing and the location. This System predicts the yield and price of the crop of choice, giving the farmer useful information well before starting the process of cultivation.
Improvements: The System can introduce and make available climate-aware cognitive farming techniques and identifying systems of crop monitoring, early warning on pest/disease outbreak based on advanced AI innovation.
Crop-yield, Supervised Machine learning in Agriculture, Decision tree, Forecasting, Analysis.
Chaitra Kotnikall, Jayateerth Vadavi."Dynamic Crop-yield and Price Forecasting using Machine Learning ". International Journal of Computer Engineering In Research Trends (IJCERT) , ISSN:2349-7084, Vol.7, Issue 06,pp.46-51, June - 2020, URL:http://ijcert.org/ems/ijcert_papers/V7I607.pdf,
 S. Kulkarni, S. N. Mandal, G. S. Sharma, M. R. Mundada and Meeradevi, "Predictive Analysis to Improve Crop Yield Using a Neural Network Model," 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, 2018, pp. 74-79.
 S. V. Bhosale, R. A. Thombare, P. G. Dhemey and A. N. Chaudhari, "Crop Yield Prediction Using Data Analytics and Hybrid Approach," 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India, 2018, pp. 1-5.
 T. Siddique, D. Barua, Z. Ferdous and A. Chakrabarty, "Automated farming prediction," 2017 Intelligent Systems Conference (IntelliSys), London, 2017, pp. 757-763.
 S. Bhanumathi, M. Vineeth and N. Rohit, "Crop Yield Prediction and Efficient use of Fertilizers," 2019 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 2019, pp. 0769-0773.
 P. Bose, N. K. Kasabov, L. Bruzzone and R. N. Hartono, "Spiking Neural Networks for Crop Yield Estimation Based on Spatiotemporal Analysis of Image Time Series," in IEEE Transactions on Geoscience and Remote Sensing, vol. 54, no. 11, pp. 6563-6573, Nov. 2016.
 N. Hemageetha and G. M. Nasira, "Radial Basis Function Model for Vegetable Price Prediction", International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 424-428, 2013
 Yung-Hsing Peng, Chin-shun Hsu, and Po-Chuang Huang, "An investigation of Spatial approaches for crop price forecasting in different Taiwan markets",2015.
 Prof A K Mariappah and J Austin Ben Das, "A Paradigm for rice yield prediction in Tamil Nadu", IEEE International Conference on Technological Innovations in ICT For Agriculture and Rural Development (TIAR), pp. 18-21, 2017.
 J. Hartigan, Clustering Algorithms, John Wiles & Sons, New York, 1975.
 Fagerlund S Bird species recognition using Support Vector Machines. EURASIP J Adv Signal Processing, Article ID 38637, p 8, 2007.
 Holmgren P, Thuresson T Satellite remote sensing for forestry planning: a review. Scand J for Res 13(1):90– 110, 1998.
 Das KC, Evans MD Detecting fertility of hatching eggs using machine vision II: Neural Network classifiers. Trans ASAE 35(6):2035–2041, 1992.
1*Student, Dept. Of CSE, Shri Dharmasthala Manjunatheshwara College of Engineering, Dharwad, India. 2: Professor, Dept. Of CSE, Shri Dharmasthala Manjunatheshwara College of Engineering, Dharwad, India.
Background: In this age of technology, online business is playing a vital role in the growth of the economy of the business. Hence, people need feedback on various products, technologies, businesses, etc. Since their opinions are the input for an individual to evaluate and adapt them. Therefore, the Review system is playing a vital role in decision making. So there arises a necessity to evaluate the reviews as well since the business units are trying to generate fake reviews to identify more clients for their products.
Methods/ Statistical Analysis: In this paper, we implement two machine learning algorithms SVM and Naďve Bayes algorithm and analyse the data and predict for the new set of data. We also compare the performance of both algorithms.
Findings: In this paper, we are trying to develop a Machine learning model which analyses the reviews on various factors and obtain the necessary features and classify the reviews as a fake or non-fake review. This helps in identifying fraudulent reviews and predicts the trustworthiness of the reviews in the future.
Improvements: The system can introduce and make available Machine learning techniques and identifying fake reviews at the earliest stage.
Anjali S Dilliwala, Raghavendra G S."Semantic & Behavioral Feature analysis for Detecting Fake Reviews using Machine Learning". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.7, Issue 06,pp.40-45, June - 2020, URL:https://ijcert.org/ems/ijcert_papers/V7I606.pdf,
 Esposito, Gennaro. LP-type methods for Optimal Transductive SVMs. Vol. 3. Gennaro Esposito, PhD, 2014.
 N. Jindal and B. Liu, "Review spam detection", Proceedings of the 16th international conference on World Wide Web - WWW 07 (2007), ACM, pp. 1189–1190, 2007
 Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey T. Hancock. Finding deceptive opinion spam by any stretch of the imagination. Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1, HLT, 2011.
 S. Xie, G. Wang, S. Lin, and P. S. Yu, "Review spam detection via temporal pattern discovery," p. 823, 2012.
 W. Etaiwi,G.Naymat, "The impact of applying pre-processing steps on review spam detection", The 8th international conference on emerging ubiquitous system and pervasion networks, Elsevier, pp. 273-279, 2017.
 P.Rosso, D.Cabrera, M. Gomez, "Detecting positive and negative deceptive opinions using PU-learning", Elsevier, pp.1-11, 2014.
 S. Feng, L. Xing, A Gogar and Y. Choi, "Distributional footprints of deceptive product reviews". In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media (ICWSM), pp. 98- 105, 2012.
 M. I. Ahsan, T. Nahian, A. A. Kafi, M. I. Hossain, and F. M. Shah, "Review spam detection using active learning," 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2016.
 M. Singh, L. Kumar, and S. Sinha, "Model for Detecting Fake or Spam Reviews," Advances in Intelligent Systems and Computing ICT Based Innovations, pp. 213–217, Jan. 2017.
1*,2: Department Of Civil Engineering , Matu Ram Institute Of Engineering and Management, Rohtak(Hr), India Affiliated by Maharishi Dayanand University, Rohtak.
This research work is completed to embrace the project work on rehabilitation and retrofitting of fireside damaged concrete buildings. This study explains the rehab process of fireside damaged concrete buildings in three basic categories; condition evaluation, higher cognitive process, rehabilitation & retrofitting. Evaluation method of damaged building has been based upon understanding of fabric properties at elevated temperatures, condition survey and condition assessment. Condition survey includes visual inspection, hammering and chiselling techniques whereas condition assessment includes both non-destructive and destructive tests that are selected upon the premise of efficiency, economy, and performance. Feasibility study is required to form right decisions for the rehab of fireside damaged building. Such a feasibility study should include all important aspects which will have a control within the future, therefore must be considered in higher cognitive process. The method and testing procedures can be used to evaluate the level of damage and feasibility of repair needed. The evaluation can be used to whether to repair or to demolish the structure
Arun, Hardik Dhull."Repair and Rehabilitation of Fireside Damaged Concrete Structure ". International Journal of Computer Engineering In Research Trends (IJCERT) , ISSN:2349-7084, Vol.7, Issue 06,pp.34-39, June- 2020, URL:http://ijcert.org/ems/ijcert_papers/V7I605.pdf,
 "Handbook On repair and Rehabilitation of RCC Buildings", Published by Director General (Works), General Public Works Department, Government of India, 2002.
 H.U. Zaman, "Retrofitting and Rehabilitation of High Rise Fire Damaged Concrete Building", Master Thesis, Study Course Construction and Real Estate Management ,September 2014
 CPWD, India: Handbook of repair and rehabilitation of R.C.C buildings. 2002,
 Concrete Society: Assessment, Design and Repair of Fire-damaged Concrete Structures. Technical Report No. 68. 2008
 Introduction to the fire safety engineering of structures.2007
 Reinforced concrete jacketing of existing structures. 1992.
1 & 2: Civil department, Matu Ram Institute of Engineering and Management, MDU, Rohtak, Haryana, INDIA
The Increase in the level of pollution, global warming, and the effect of greenhouse gases resulted in an urgent need of sustainable green building technology. The methodology adopted is to spread awareness among the entity about green buildings and save cost for them for a long term. In this various case studies are thoroughly studied along with which a site is selected, than the overall quantity estimation is done, than from the market studies cost analysis is prepared and we compare a new green building with the traditional building. We found that the developed nations like U.S.A, U.K, and Russia had already made certain rules and regulations regarding eco-friendly development and the developing nations like India, Pakistan, and Bangladesh are trying to achieve a sustainable development. This paper shows the need of green building as a sustainable development all over the globe especially in developing countries. This case study selects a residential house which is constructed as per the green structure norms in the state of Haryana in India. As India is the second largest populated nation in the world with its 68.84% of total population living in villages (according to 2011 census of India).This paper helps villagers of India to construct and implement simple, sustainable and economic techniques for construction of their residential houses which also results in developing India rapidly.
Green Rating for Integrated Habitat Assessment (GRIHA); Indoor Environmental Quality, LEED
Mukul Attri, Nitu."Review Analysis & Enlightening Entity about Green Buildings ". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.7, Issue 06,pp.29-33, June- 2020, URL:http://ijcert.org/ems/ijcert_papers/V7I604.pdf,
 “The economic benefits of green building-year book” 2009-10, Australia Bureau of statics, Canberra, Australia; 2010
 T.Ramesh, Ravi Prakash, KK Shukla, “Life cycle energy analysis of buildings”
 US energy information administration, “Life cycle assessment of the building materials outlook 2010”
 of integrated analysis and forecasting, US Department of Energy, Washington, DC 20585; 2010
 JianZuo and Zhen Yu Zhao, “Renewable and sustainable energy reviews-ELSEVIER” (2013)
 Ignacio Zabalza Bribian, Antonio Valero Capilla, “Life cycle assessment of building materials”
 Omer Tatari; Murat Kucukvar, “Cost premium prediction of certified green building”
 Berkeley program on housing and urban policy; Eichholtz, piet: Maastricht University
 Guy R, Newsham, Sandra Mancini, Do LEED-certified buildings save energy? Yes, but…
Faculty of Applied Studies, King Abdulaziz University, Jeddah- Saudi Arabia,
Background: paper intends to explore students’ perceptions of virtual learning amidst COVID-19. It also elicits information about an alternative e-learning strategy which is perhaps the only option left after an official call for social distancing. The research was initially undertaken to find out the pedagogic relevance of virtual learning as a novel teaching strategy. Hence it is essential to mention that King Abdul-Aziz university-Jeddah has been utilizing technology and e-learning/blended learning technique for around 11 years.
Method of the study
The study is qualitative-descriptive. Data collected through an adapted questionnaire was qualitatively analysed to achieve the research objectives. The sample was taken from a government university in Saudi Arabia.
Findings & Conclusions
The results show that many students think distance or e-learning was a good experience. However, they felt a lot other personal, pedagogic and technical issues. All of them agreed that distance learning as a mode of education could be both useful and innovative, yet it poses many challenges during successful implementation for achievement of objectives.
Based on the findings the researcher recommends that distance learning can be made more relevant, effective and quality - oriented if teachers are well trained, students are motivated and administration is supportive.
COVID-19, virtual learning, e-learning, distance learning, perception, social distancing
Dr Intakhab Alam Khan."Learners’ Perception of Virtual Learning Amidst COVID-19 ". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.7, Issue 06,pp.19-28, June - 2020, URL:http://ijcert.org/ems/ijcert_papers/V7I603.pdf,
Adler, R. W., Milne, M. J. & Stablein, R. Situated motivation: An empirical test in an accounting class. Canadian Journal of Administrative Sciences, 18(2), 101-116,2001. Al-Asmari, A.R. Evaluating the Prospects of Integrating Technology in Pre-service EFL Teacher Training. Arab World English Journal. 2(2)133–166.2011
Al-Qahtani AAY, Higgins SE. Effects of traditional, blended and e-learning on students_ achievement in higher education. Journal of Computer Assisted Learning. 29(3)220–234,2013
Al-Shehri AM. E-learning in Saudi Arabia: To E or not to E, that is the question. J Family Community Med. 17(3)147–150,2010
Allo, M.D.G. Is the online learning good in the midst of Covid-19 Pandemic? The case of EFL learners, Jurnal Sinestesia, Vol. 10(1), 2020
Benbunan-Fich, R. & Starr, R. H. Mediators of the effectiveness of online courses. IEEE Transactions on Professional Communication, 46(4), 296-312,2003.
Brass, K. Pushing E-learning. Sales and Marketing Management, 154(3), 56,2002.
Burke, L. A. & Moore, J. E. A perennial dilemma in OB education: Engaging the traditional student. Academy of Management Learning & Education, 2(1), 37-53,2003. Buzzetto-More N. A. Student perceptions of various e-learning components.
Interdisciplinary Journal of E-Learning and Learning Objects, Vol. 4.,2008. Retrieved November 9, 2015 from www.ijello.org/Volume4/IJELLOv4p113-135Buzzetto413.pdf
Buzzetto-More, N. Student attitudes towards the integration of youtube in online, hybrid, and web-assisted courses: An examination of the impact of course modality on
perception. MERLOT Journal of Online Learning and Teaching Vol. 11(1)2015. Retrieved November 10, 2015 from http://jolt.merlot.org/vol11no1/Buzzetto-
Geiger, M. A. & Cooper, E. A. Using expectancy theory to assess student motivation. Issues in Accounting Education, 11(1), 113-125,1996.
Golladay, R., Prybutok, V. & Huff, R. Critical success factors for the online learner. Journal of Computer Information Systems, 40(4), 69-71,2000.
Khan, I.A. Effectiveness of E-learning for the Teaching of English: A Study of Comparative Strategies. Advances in Language and Literary Studies, 7(3): 126-27,2016 Khan, I.A. Electronic Learning Management System: Relevance, Challenges and Preparedness, JETIR, Volume 7(5)p471, 2020
Kocur, D., & Kosc, P. E-learning Implementation in Higher Education.
Acta_Electrotechnica et Informatica, Vol. 9, No. 1, pp20-26,2009.
Mamattah, R.S. Students’ Perceptions of E-Learning. Master dissertation, Linköping University , Department of Behavioural Sciences and Learning, LIU-IBL/IMPALGC-A—16/005-SE, 2016.
Masrom, M. Technology acceptance model and e-learning. In: 12th International
Conference on Education, 21-24, May 2007, Sultan Hassanal Bolkiah Institute of
Education, Universiti Brunei Darussalam
McDonald, D. Improved training methods through the use of multimedia
technology. Journal of Computer Information Systems, 40(2), 17-20,1999-2000
McEwen, T. Communication training in corporate settings: Lessons and opportunities for the academe. Mid-American Journal of Business, 12(1), 49-58, 1997.
McKeachie, W. McKeachie’s Teaching Tips: Strategies, Research, and Theory for College and University Teachers (11th ed.). Boston, MA: Houghton Mifflin.p.19,2002. Mirza A.A. Is E-Learning finally gaining legitimacy in Saudi Arabia? Applied Computing and Informatics. 6(2),2008.
Rubin, B and Fernandes, R. “The teacher as leader: effect of teaching behaviors on class community and agreement,” International Review of Research in Open and Online Learning, vol. 14(5), 2013, http://www.irrodl.org/index.php/irrodl/article/view/1510/2707.
Serwatka, J. Assessment in on-line CIS courses. Journal of Computer Information Systems, 43(3), 16-20,2003
Smart, K. L., & Cappel, J. J. Students’ perceptions of online learning: A comparative study. Journal of Information Technology Education, Volume 5, 2006. Retrieved
November 9, 2015 from http://jite.org/documents/Vol5/v5p201-219Smart54.pdf
1 & 2: Dept. Management, Maharishi Markandeshwar (Deemed to be University), Mullana, India
Background/Objectives: In this paper, we examination include relatives from a distributed and unpublished investigation from around the globe to survey associates of apparent work environment sexual orientation segregation that have critical ramifications for representatives.
Methods/Statistical analysis: In this paper Quota sampling technique to be used. In this paper, three variables should be used to meet the objectives. These are controlled variables, dependent variables and Independent variables define in this paper. Sample size should be taken 120. Questionnaires will be divided into three segments mentally stress, family conflict and job satisfaction for estimation of dependent variables to be used appropriate statistical tools.
Findings: Our finding of this paper mentally stresses factors remembered to study about include mental indications and judgements of psychological conditions, sickness, what’s more, aliments estimated utilizing different clinical lists and wellbeing markers. We characterize the physical wellbeing as one’s capacity to genuinely work and perform workday today exercises without limitations.
Improvements/Applications: Seen sexual orientations separations is related to sparse representatives occupations perspectives, physical wellbeing results and practices
Gender inequality, Woman, Mentally health of women on workplace, working environment
Deepa Sharma, Dr. C. Venkateswaran."Workplace Sex Bias and Employees Opinion: A Study about India Perspective". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.7, Issue 06,pp.13-18, June - 2020, URL:http://ijcert.org/ems/ijcert_papers/V7I602.pdf,
 Heilman E. Madeline, 2012, Gender stereotypes and workplace bias, www.sciencedirect.com, Research in Organizational Behavior 32 (2012) 113–135.
 Buchanan, N. T. 2002. Examining the impact of racial harassment on sexually harassed African American women, Doctoral dissertation. Retrieved from Proudest Dissertations and Theses database. (UMI No. 3070268).
 Lake, S. T., & Taylor, S. E. (1991). Social cognition (2nd Ed.). New York, NY/England: McGraw Hill Book Company.
 Fudge, K., Beignet, M., Haines, E., & Daub, K. (2004). Mothers and fathers in the workplace: How gender and parental status influence judgments of job-related competence. Journal of Social Issues, 60(4), 737–754.
 Gauche, D (2011). Evidence that gendered wording in job advertisements exists and sustains gender inequality. Journal of Personality and Social Psychology, 101, 109–128.
 Erich, C. G., & Crawford, M. S. (1998). Sex stereotyping in the executive suite: ‘‘Much ado about something’’. Journal of Social Behavior and Personality, 13, 127–138.
 Matschiner, M., & Mermen, S. K. (1999). Hyper femininity and influence. Psychology of Women Quarterly, 23, 342–631.
 N. P., & Motowidlo, S. J. (1995). Effects of rater accountability on the accuracy and the favorability of performance ratings. Journal of Applied Psychology, 80, 524–527.
 Anna, A. L. (2003). Effects of accountability on rating behavior and rater accuracy. Journal of Applied Social Psychology, 33, 2493–2514.
 Reusing, C. A., Peen, J. E., & Rudman, L. A. (2010). When men break the gender rules: Status incongruity and backlash against modest men, Psychology of Men and Masculinity, 11, 140–151.
1 &2 : Computer Science, Faculty of Physical Sciences, University of Benin, Benin City, Nigeria
Chronic Obstructive Pulmonary Disease (COPD) is a death-defying respiratory tract ailment that causes trouble in breathing which deteriorates after some time. COPD is an umbrella term used to order the amalgamation of Chronic Bronchitis and Emphysema. The manifestations of this infection are frequent coughing, fatigue, sweating, breathlessness, tiredness, weight loss, wheezing, fast heart rate, fast breathing and chest tightness just to name not many. This malady is pervasive with individuals whose age ranges from 30 or more and afterward arrives at its top in patients over 50. Because of the covering manifestations this malady imparts to other respiratory tract illnesses; it is in some cases under-analyzed and misdiagnosed a circumstance which is much uncontrolled in Sub-Sahara Africa. In time past, COPD has caused a large number of deaths overall yearly because of absence of early determination of the illness. In ongoing past, a few frameworks have been created to analyze this non-transmittable malady, yet they produced a ton of bogus negative during testing and couldn't identify COPD because of its covering side effects it imparts to other respiratory tract illnesses. Consequently, in this paper, we proposed and developed a model to foresee COPD utilizing an AI procedure called Bayesian Belief Network. The model was structured utilizing Bayes Server and tested with data gathered from COPD medical repository. The model had a general expectation precision of 99.98%; 99.79%, 95.91% and 98.39% sensitivity of COPD, Chronic Bronchitis and Emphysema in that order.
Alile Solomon.O,Bello Moses.E."Diagnosing Chronic Obstructive Pulmonary Disease (COPD) Using Bayesian Belief Network". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.7, Issue 06,pp.1-12, June - 2020, URL :https://ijcert.org/ems/ijcert_papers/V7I601.pdf,
 M.A. Zoroddu, J. Aashet, G. Crisponi, S. Medici, M. Peana and V.M. Nurchi, “The Essentials Metals for Humans: A Brief Overview”. Journal of Inorganic Biochemistry. 195:.DOI:10.1016/j.jinorgbio. 2019. pp.120-129.
 GOLD Executive Committee, “Global Initiative for Chronic Obstructive Lung Disease (GOLD): Global Strategy for the Diagnosis, Management and Prevention of Chronic Obstructive Pulmonary Disease”. 2006 MCR Vision. Inc. pp. 1-15.
 American Thoracic Society A. (2016): “Chronic Obstructive Pulmonary Disease (COPD)”. American Journal of Respiratory and Critical Care Medicine Vol.199 (1), pp. 1-2, 2019.
 M. Varmaghani, M. Dehghani, E. Heidari, F. Sharifi, S.S. Moghaddam and F.Farzadfar,“Global Prevelence of Chronic Obstructive Pulmonary Disease: Systematic Review and Meta-Analysis”. Eastern Mediterranean Health Journal, Vol.25 (1), 2019.
 World Health Organization, “Global Status Report Status Report on Non-Communicable Diseases 2010: Description of the Global Burden of NCDs, Their Risk Factors and Determinants”, April, 2011, ISBN: 978-92-4-156422-9, pp. 1-176.
 S. Salvi, (2017): “The Silent Epidemic of COPD in Africa”. Lancet Global Health, Doi: 10.1016/S2214-109X(14)70359-6, 2015; 3(1), pp. e6-e7.
 FIRS, “Respiratory Diseases in the World: Realities Today-Opportunities for Tomorrow”. 2013, ISBN: 978-1-84984-057-6, pp. 1-35.
 D.A. Grant, P.J. Van Harrison, R., Othman, A., Roark, S.E., Han, M.K., Remington, T.L. (2017): “Chronic Obstructive Pulmonary Disease”. University of Michigan Hospitals and Health Centres, COPD Guideline, November 2017, pp. 1-28.
 J.C. Hogg, F. Chu, , S. Utokaparch, W.M. Elliot, , L. Buzatu, , R.M. Cherniack, F.C. Sciurba, H.O, Coxson and P.D, Pare, “The Nature of Small Airway Obstruction in Chronic Obstructive Pulmonary Disease”. New England Journal of Medicine 2004; Vol. 350, pp. 2645–2653.
 M. Zolnoori, M.H.F. Zarandi and M. Moin, "Fuzzy Rule-Base Expert System for Evaluation Possibility of Fatal Asthma". Journal of Health Informatics in Developing Countries, 2010, pp: 171-184.
 I.C. Mary and J. Preethi, "A Survey on Computerized Detection, Quantification and Classification of Lung Disease". IJAICT Vol. 1(7), November 2014, Doi:01.0401/ijaict.2014.07.25, ISSN 2348–9928. pp. 631-634.
 D. Sanchez-Morillo, M.A. Fernandez-Granero and A. Leon-Jimenez, “Use of Predictive Algorithms in-Home Monitoring of Chronic Obstructive Pulmonary Disease and Asthma: A Systematic Review”. Chronic Respiratory Disease 2016, Vol. 13(3), pp. 264–283. DOI: 10.1177/1479972316642365.
 G. Gonzalez, S.Y. Ash, , G. Vegas-Sanchez-Ferrero, J.O. Onieva, F.N. Rahaghi, J.C. Ross, A. D?az, R.S.J. Estepar and G.R. Washko, “Disease Staging and Prognosis in Smokers Using Deep Learning in Chest Computed Tomography”. American Journal of Respiratory Critical Care Medicine, Vol. 197(2), Jan 15, 2018, pp. 193–203. DOI: 10.1164/rccm.201705-0860OC.
 P. ShubhaDeepti, S.V.N.N. Rao, V.N. Kumar and Y.P. Sai, “Expert System using Artificial Neural Network for Chronic Respiratory Diseases”. ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, 2017, Vol.4 (9), pp. 6-14.
 A. Badnjevic, L. Gurbeta and E. Custovic, “An Expert Diagnostic System to Automatically Identify Asthma and Chronic Obstructive Pulmonary Disease in Clinical Settings”. 8:11645 | DOI:10.1038/s41598-018-30116-2. 2018, pp. 1-9.
 F. Braido, P. Santus, A.G. Corsico, F. Di Marco, G. Melioli, , N. Scichilone and P. Solidoro, “Chronic Obstructive Lung Disease “Expert System”: Validation of A Predictive Tool for Assisting Diagnosis”. International Journal of COPD, Vol.2018 (13), pp. 1747–1753.
 R.H. Abiyev and M.K.S. Ma’aitah, “Deep Convolutional Neural Networks for Chest Diseases Detection”. Hindawi Journal of Healthcare Engineering Vol. 2018(4168538), pp.1-11.
 S. Sathiya, G.Priyanka and S. Jeyanthi, “Detection of Chronic Obstructive Pulmonary Disease in Computer Aided Diagnosis System with CNN Classification”. International Journal of Pure and Applied Mathematics Vol. 119(12), 2018, pp. 13815-13822, Special Issue, ISSN: 1314-3395.
 I. Ben-Gal, F. Ruggeri, F. Faltin, R. Kenett, “Bayesian Networks”. Encyclopedia of Statistics in Quality and Reliability. John Wiley and Sons, Ltd, 2007, pp. 1-6.
 V. Cheplygina, I.P. Peńa, J.H. Pedersen, D.A. Lynch, L. Sřrensen and M. De Bruijne, “Transfer Learning for Multi-Center Classification of Chronic Obstructive Pulmonary Disease” International Journal of Biomedical and Health Informatics Vol. 22(5), 2018 pp. 1486-1496. DOI 10.1109/JBHI.2017.2769800.
Information Technology, St. John College of Engineering and Management, Mumbai University, India
In today's world, security is the most significant concern. We produce tons of data that must be unbroken secure. Be it our data or data associated with a transnational company. The data can be protected with the usage of authentication and authorization. Authentication and authorization help to verify and validate a user's identification. Applications in today's society are swaying towards IoT concepts as this delivers them agility, competency, conventionality, and future-proof. However, this winds up into a higher security risk. The projected system proposes a multi-factor authentication methodology or, in simple terms, presents a 3-way authentication. This constitutes the well-known authentication levels that are the password and OTP but mainly focuses on the third step signifying the most protected method of authentication that's the challenge-response pair mechanism. The generated challenge is exclusive to each user, and therefore, the gadget.
Secure Authentication Mechanism in IoT Based Healthcare System
Anita Chaudhari, Janice Rodrigues, Aparna Vattamparambil, Revati Warang, Vidya More."Secure Authentication Mechanism in IoT Based Healthcare System". International Journal of Computer Engineering In Research Trends (IJCERT) , ISSN:2349-7084, Vol.7, Issue 05,pp.13-18, May - 2020, URL:https://ijcert.org/ems/ijcert_papers/V7I503.pdf,
1. Two Factor Authentication Using Mobile Phones" by Fadi Aloul, Syed Zahidi, Wassim El-Hajj, IEEE, 2016.
2. "A Security-Enhanced Authentication and Key Distribution Protocol for Wireless Networks" by Chao Lv, Maode Ma, Hui Li, and Jianfeng Ma, IEEE, 2010.
3. "Token Based Authentication using Mobile Phone" by Parekh Tanvi, Gawshinde Sonal, Sharma Mayank Kumar, IEEE, 2011.
4. "A survey on Biometric Based Authentication in cloud computing" by P. Padma and Dr. S. Srinivasan, IEEE, 2016.
5. "Password Security system with 2-way authentication" by Subhradeep Biswas and Sudipa Biswas, IEEE, 2017.
6. "Secure Authentication with Dynamic Password" by Zubayr Khalid, Pritam Paul, Soummyo Priyo Chattopadhyay, Anik Naha Biswas, IEEE, 2016.
7. "Overview of PUF - Based Hardware Security Solutions for Internet of Things" by Basel Halak, Mark Zwolinski and M. Syafiq Mispan, IEEE, 2016.
8. "Performance Evaluation of Cryptographic Ciphers on IoT Devices" by Kedar Deshpande and Praneet Singh.
9. “Secure Medical Data Transmission Model for IoT-based Healthcare Systems” by Mohamed Elhoseny, Gustavo Ramírez-González, Osama M. Abu-Elnasr, Shihab A. Shawkat, Arunkumar N, Ahmed Farouk, IEEE, 2018.
10. "A PHY-Aided Secure IoT Healthcare System With Collaboration of Social Networks" by Peng Hao and Xianbin Wang, IEEE, 2017.
11. "Device Authentication Mechanism for IoT Enabled Healthcare System" by Shantha Mary Joshitta. R and Arockiam L.
12. "Design of a secure medical data sharing system via an authorized mechanism" by Chin-Ling Chen, Jin-Xin Hu, Chun-Long Fan and Kun-hao Wang, IEEE, 2016.
13. "A Comprehensive Survey of Security Mechanisms in Healthcare Applications" by Mr. D. Stalin David and Dr. A. Jeyachandran.
14. "A Robust Physical Unclonable Function with Enhanced Challenge-Response Set" by Abhranil Maiti, Inyoung Kim, and Patrick Schaumont, IEEE, 2012.
15. "Authenticating IoT Devices with Physically Unclonable Functions Models" by Mario Barbareschi, Pierpaolo Bagnasco, Antonino Mazzeo, IEEE, 2015.
16. "Lightweight PUF-Based Authentication Protocol for IoT Devices" by Yildiran Yilmaz, Steve R. Gunn, Basel Halak, IEEE, 2018.
17. "E-Healthcare: Remote Monitoring, Privacy, and Security" by Olga Boric-Lubecke, Xiaomeng Gao, Ehsan Yavari, Mehran Baboli, Aditya Singh, and Victor M Lubecke, IEEE, 2014.
18. "System Level Design of a Secure Healthcare Smart Card System" by Merve Oksar and Berna Ors and Gokay Saldamli, IEEE, 2011.
19. "Monitoring Patients Via A Secure And Mobile Healthcare System" By Yonglin Ren, Richard Werner Nelem Pazzi, And Azzedine Boukerche, Ieee, 2010.
20. "Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey" by YINGNAN SUN , FRANK P.-W. LO , AND BENNY LO, IEEE, 2019
1-Management, Maharishi Markandeshwar Institute of Management, Maharishi Markandeshwar (Deemed to be University) Mullana, Ambala, India ; 2- Management, Maharishi Markandeshwar Institute of Management, Maharishi Markandeshwar (Deemed to be University) Mullana, Ambala, India
Background/Objectives: This paper presents how to maintain family responsibilities and their careers successfully. Working women in daily life faced many challenges. To identify the problems among family responsibilities and their careers.
Methods/Statistical analysis: In this paper sample data is 120 to be used to get the appropriate results. SPSS tools used to convert the information in statics data. Demographic of respondents and Descriptive statistics used to reach the results. And the study of all factors impacts on respondents to maintain a balance between family responsibility and their careers. Correlation shows between family responsibility and growth in careers. Collection of data respondents are working in the academic sector.
Findings: In this paper, we found its fact a working woman faced many problems to maintain the balance between their professions and care for their families. So in this paper, all issues describe how to female managed the family responsibilities and job stability with growth. It's very critical situations handled by them. Many problems and challenges suffered by female faculty in the education sector. That's why behind the reason some time women quit their jobs. The workplace is seen as men's space and engaging of women is taken as lack of regard. Regardless, this technique is rapidly advancing now, and cash related similarity as other social components have not quite recently extended the number of working women in all circles of life, yet what's more, have improved the value of their non-conventional duty towards society. Sometimes women faced unhealthy jokes on women at the workplace. The main reason of behind these issues as unformulated manners unhelpful concepts in the effective atmosphere, nonappearance of beliefs, deception group effort, is deficient in leaning along with the consumption of an assortment of dialects, stringent ethnicity and convictions etc.
Improvements/Applications: In future perspectives study the male also faces these types' problems in their lives. Family responsibilities also make a barrier in their career growth. Male and female has the same family responsibilities, problems and issues faced in their lives.
Family responsibility, Career, Women, Education sector
Mrs.Deepa Sharma, Dr. C. Venkateswaran."Family Responsibilities Make a Barrier in the Career of Female Faculty". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.7, Issue 05,pp.9-12, May - 2020, URL:http://ijcert.org/ems/ijcert_papers/V7I502.pdf,
1. Moreno E., Work-family Conflicts and the Organizational Work Culture as Barriers to women educational managers, Gender, Work & Organization, https://doi.org/10.1111/j.1468-0432.2009.00463.x, Volume 17, issue 2, Page no.219-239, 2010.
2. Turnbull Sarah, Barriers to women leaders in academia: tales from science and technology, 41, issue 3,https://doi.org/10.1080/03075079.2014.929102,Volume Pages 415-428, 2014. |
3. Youngs. Diane, career decisions and experiences of social work faculty: a gender comparison, volume 41, issue 2, journal of social work education, https://doi.org/10.5175/jswe.2005.200303115, pages 297-313, 2013.
4. Nguyen Huong LAN Thi, Barriers to and facilitators of female Deans’ career advancement in higher education: an exploratory study in Vietnam, https://link.springer.com/article/10.1007/s10734-012-9594-4, Education volume 66, pages123–138(2013).
5. Corbin M. Campbell, 2011, Faculty Sense of Agency in Decisions about Work and Family, review of higher education,https://muse.jhu.edu/article/420728,2011.
6. Watson Pamela, Understanding the experiences of female doctoral students, https://doi.org/10.1080/0309877X.2010.484056, volume 34, issue 3. Pages 385-404, 2010.
7. MD Carr Phyllis, Race, Disadvantage and Faculty Experiences in Academic Medicine, https://link.springer.com/article/10.1007/s11606-010-1478-7Journal of General Internal Medicine Volume 25, pages1363–1369 (2010)
8. Jogulu Uma, Women managers' career progression: an Asia Pacific perspective, https://www.emerald.com/insight/content/doi/10.1108/17542411111183893/full/html, volume 8, issue 2, Gender in Management journal, 2011.
9. Morley Louise, Lost leaders: women in the global academy, Journal of https://doi.org/10.1080/07294360.2013.864611, |Higher education research & development, volume 33, Pages 114-128, 2014.
Digvijay Pandey ,Srith ZithDey Babu,Birhanu Ayenew, Binay Kumar Pandey,Dr NidhiVerma,Wegayehu Enbeyle, Tajamul Islam,Edeh Michael Onyema ,Moisés Filiberto Mora Murillo, Jonathan James O. Canete,P Madhusudana Patra,Lalgoulen Khongsai,
1*Department of Technical Education, IET, Lucknow, India. 2-Chittagong independent university, Chittagong, Bangladesh;3-Nursing department, health Science College, Assosa University, Assosa, Ethiopia. 4-Dept of IT, GovindBallabh Pant University of Agriculture and Technolog, U.K, India. 5-Government P.G College for Women, Rohtak, India. 6-MSc in Biostatistics, Mizan-Tepi University, Tepi,Ethiopia; 7-University of Kashmir ,Hazratbal Srinagar ;8-University,KSA,Coal City University,Nigeria; 9-Instituto Superior TecnológicoTsa'chila; 10-De La Salle University, Manila Philippines; 11-SRM DBT Facility, SRM Institute of science and technology, Chennai, India-603203, 12-Department of Commerce, Manipur University
The developing country is facing this unprecedented disease called COVID-19. Ever since its conception in the area of Wuhan, it is rapidly spreading and creating respiratory disorders not only to humans but also to other species as well, resulting in common colds to further critical conditions, for instance, MERS (Middle-Eastern-Respiratory Syndrome) and SARS (Severe-Acute-Respiratory-Syndrome). Among the identified measures, regular hand-washing, and maintaining social (physical) distance consistent with expert recommendations, the most straightforward available choice to manage the extend of COVID-19. Currently, developing countries have a low health care workforce. Crowded uses of public transportation, lack of sanitation, hiding suspected cases, lack of personal protective equipment for health care providers, and immune-compromised presence make a significant impact.
Coronavirus, COVID-19, 2019-nCoV, pandemic, public health emergency, Middle-Eastern-Respiratory Syndrome (MERS), Severe-Acute-Respiratory-Syndrome (SARS)
Digvijay Pandey ,Srith ZithDey Babu,Birhanu Ayenew,Binay Kumar Pandey,Dr NidhiVerma,Wegayehu Enbeyle,Tajamul Islam,Edeh Michael Onyema ,Moisés Filiberto Mora Murillo,Jonathan James O. Canete,P Madhusudana Patra,Lalgoulen Khongsai."Infectivity, Preclusion, and Control (IPC) of Pandemic Novel COVID-19". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.7, Issue 05,pp.1-8, May - 2020, URL :https://ijcert.org/ems/ijcert_papers/V7I501.pdf,
1. World Health Organization. Coronavirus. World Health Organization, cited January 19, 2020. Available: https://www.who.int/health-topics/coronavirus.
2. Zhou P, Yang XL, Wang XG, Hu B, Zhang L, Zhang W, et al. “A pneumonia outbreak associated with a new coronavirus of probable bat origin. Nature”.https://doi.org/10.1038/s41586-020-2012-7, 2020.
3. Li Q, Guan X, Wu P, Wang X, Zhou L, Tong Y, et al. “Early transmission dynamics in Wuhan, China, of novel coronavirus-infected pneumonia” N Engl J Med. https://doi.org/10.1056/NEJMoa2001316, 2020.
4. Huang C, Wang Y, Li X, Ren L, Zhao J, Hu Y, et al. “Clinical features of patients infected with 2019 novel coronavirus in Wuhan, China”. Lancet. https://doi.org/10.1016/S0140-6736(20)30183-5, 2020.
5. Abere, O. J.,“Survival Analysis of Novel Corona Virus (2019-Ncov) Using Nelson Aalen Survival Estimate. International Journal 0f Business Education And Management Studies” Vol. 3'. Issue 1. P30-40,2020.
6. Bhola J, Venkateswaran VR, Koul M. “Corona Epidemic in Indian context: Predictive Mathematical Modelling”. medRxiv. 2020 Jan 1.
7. Bloukh SH, Shaikh AA, Pathan HM, Edis Z. “Prevalence of COVID-19” A Look behind the Scenes.
8. Nseobot IR, Hamid D, Elyassami D, Effiong AI, Ette U, Ahmed Soomro M. COVID-19 City Locked Down: Implications on Human Welfare in Developing Countries
9. Khin, M. M., Nair, A. S., Babu, V. J., Murugan, R., and Ramakrishna, S. (2012). “A review on nanomaterials for environmental remediation. Energy Environ”. Sci. 5, 8075–8109. doi: 10.1039/c2ee21818, 2012
10. Khot, L. R., Sankaran, S., Maja, J. M., Ehsani, R., and Schuster, E. W. (2012). “Applications of nanomaterials in agricultural production and crop protection: a review”. Crop Prot. 35, 64–70. doi: 10.1016/j.cropro.2012.01.007,2012
12. Ayenew B. and Digvijay Pandey “Challenges and opportunities to tackle COVID-19 spread in Ethiopia”. Journal of Peer Scientist. 2020;2(2):e1000014, 2020.
13. Sharma L. “Dietary management to build adaptive immunity against COVID-19”. Journal of Peer Scientist. ; 2(2):e1000016, 2020.
14. World Health Organization. Coronavirus disease (COVID-19): situation report, 72. 2019.
15. Shukman D. Social distancing and Coronavirus: The science behind the two-metre rule: BBC News Services; 2020 [updated 3 May 2020. Available from: https://www.bbc.com/news/science-environment-52522460.
16. Wu Z, McGoogan JM. “Characteristics of and important lessons from the coronavirus disease 2019 (COVID-19) outbreak in China: summary of a report of 72 314 cases from the Chinese Center for Disease Control and Prevention”. Apr 7; 323(13):1239-42, 2020.
17. Cohen J, Kupferschmidt K. Strategies shift as coronavirus pandemic looms.
18. Siegel FR. “Mitigation of dangers from natural and anthropogenic hazards: Prediction, prevention, and preparedness”. Springer; 2016 Jun 23.
19. World Health Organization Surveillance case definitions for (nCov) infection with novel coronavirus human interim guidance v1, January 2020. World Health Organization 2020.
20. Peng X, Xu X, Li Y, Cheng L, Zhou X, Ren B. “Transmission routes of 2019-nCoV and controls in dental practice. International Journal of Oral Science”. Mar 3;12(1):1-6, 2020.
21. Stoecklin SB, Rolland P, Silue Y, Mailles A, Campese C, Simondon A, Mechain M, Meurice L, Nguyen M, Bassi C, Yamani E. “First cases of coronavirus disease 2019 (COVID-19) in France: surveillance, investigations and control measures”,Eurosurveillance. Feb 13;25(6):2000094, 2020.
22. Srithazith, DeyBabu , Digvijay Pandey , "web-act of detecting covid 19", ijiert- International Journal of Innovations in Engineering Research and Technology, Volume 7, Issue 5, ISSN : 2394-3696, Page No. 21-30, 2020.
23. YItayew M, Ayenew B, Pandey D, Pandey B. “Indigenous Conflict Resolution Systems and Practices: Implications for Social Relation Ship Developmen”: The Case of Debre Markos Town, 2019. Alq J Med App Sci. ;3(1)53-60, 2020.
24. SrithaZithDeyBabu , Digvijay Pandey , Ismail Sheik , "an overview of a crime detection system using the art of data mining",ijiert- International Journal of Innovations in Engineering Research and Technology, Volume 7, Issue 5, ISSN : 2394-3696, Page No. 125-128, 2020.
This paper proposes a method for the surveillance in the vicinity of the armed forces where there is exposure to intruders/prosecutor throughout. The Video Surveillance Robot is designed in such a way using the IoT (Internet of Things) it can give an overview of the operations all over. The armed forces require 24×7 vigilance, which is not feasible for human because of invasion of the intruders, which is extensive at times. In earlier days, the robots were composed with an unreliable approach that it had several limitations comparably of expenditure, magnitude, confidentiality, connection and manual surveillance. So, the wireless Video Surveillance Robot plays an essential role in armed forces and becomes a helping hand to the military personnel. The Video Surveillance Robot provides continuous live video streaming of the area on a Webpage or mobile phone with the help of a web camera. And the pi camera captures the images of circumstances and simultaneously uploads them on the Cloud. The ultrasonic sensors detect the obstacle in the lead and find the most extended pathway for continuous supervision. The exclusive Video Surveillance system is implemented on Raspberry Pi3, which includes the Raspbian Operating System, and it operates with the language Python to write a program for numerous segments for the robotic system.
Raspberry Pi 3, Power battery, L293D, Ultrasonic sensor, Video surveillance, Web camera, Pi camera, Server motor, Webpage.
Vikram Jain, Kritika Poojari, Anita Chaudhari."Prototype for Design and Development of Video Surveillance Robot". International Journal of Computer Engineering In Research Trends (IJCERT) , ISSN:2349-7084, Vol.7, Issue 04,pp.28-34, April - 2020, URL :http://ijcert.org/ems/ijcert_papers/V7I406.pdf,
 P.Ajaykumar, P.Ramesh babu, Joshila Grace "A Intelligent Unmanned Secure Robot using IoT" International Journal of Pure and Applied Mathematics, Volume 118 No. 20, 2018.
 Ben Kehoe, Sachin Patil, Pieter Abbeel, Ken Goldberg Fellow "A Survey of Research on Cloud Robotics and Automation" IEEE Transactions on Automation Science and Engineering,2014.
 Wen-Tsuen Chen, Po-Yu Chen, Wei-Shun Lee, Chi-Fu Huang "Design and Implementation of a Real Time Video Surveillance System with Wireless Sensor Networks" 2008 IEEE.
 K. Damodhar, B. Vanathi, K.Shanmugam "A Surveillance Robot For Real Time Monitoring And Capturing Controlled Using Android Mobile" Middle-East Journal of Scientific Research, 2016.
 Huu-Quoc Nguyen, Ton Thi Kim Loan, Bui Dinh Mao, Eui-Nam Huh "Low Cost Real-Time System Monitoring Using Raspberry Pi" 2015 IEEE.
 Widodo Budiharto " Design of Tracked Robot with Remote Control for Surveillance" 2014 IEEE.
 Nazirah Ahmad Zaini, NorlizaZaini, Mohd Fuad Abdul Latip, Nabilah Hamzah " Remote Monitoring System based on a Wi-Fi Controlled Car Using Raspberry Pi" Conference on Systems, Process and Control, 2016 IEEE.
 Shahajada Mahmudul Hasan, Syed Mamun R Rasid, Avijit Mallik, Md. Rokunuzzaman “Development of a Wireless Surveillance Robot for Controlling from Long Distance”, International Journal of Engineering Research And Management (IJERM), Volume-05, Issue-09, September 2018.
 SouvikSaha, Murshed Nawaz Kamal, SayakPramanik, Arko Singh, Soumya Dutta, Angshuman Khan, Palash Bera, UttamGorian, Surajit Sur “GPS Based Smart Spy Surveillance Robotic System Using Raspberry Pi for Security Application and Remote Sensing”, 2017 IEEE.
 Ketan Dumbre, Ajinkya Dhekne, SnehalGaneshkar “Robotic Vehicle Control using the Internet via Webpage and Keyboard”, International Journal of Computer Applications, Volume 114 – No. 17, March 2015.
 MrAnanthapadmanabhan J, MsAnnu Mariam Abraham, MrLibin M George, MsVineetha Anna Saji, Prof. Anil A R “Smart Robotic Assistant Using IoT”, International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 06 June -2017.
 Mr.T.Saravanakumar, D.Keerthana, D.Santhiya, J.Sneka, D.Sowmiya " Surveillance Robot Using Raspberry Pi-IoT"International Journal of Electronics, Electrical and Computational System , ISSN 2348-117X Volume 7, 2018.
 S.Kavitha, S.R.KamaliVarshini, Mrs.P.Vijayalakshmi “Military Based Security System Using Raspberry Pi”, International Journal Of Engineering And Computer Science, Volume 7 Issue 3 March 2018.
 VaibhaviWanjari, Chandrashekhar Kamargaonkar “A Review Paper on IoT based Cognitive Robot for Military Surveillance”, International Research Journal of Engineering and Technology (IRJET), Volume: 06 Issue: 11 Nov 2019 .
 R.Venkatasubramanium, N.Adithiyan, R. Jagadesh, V. Deepak Ramanan “Surveillance Robot based on Raspberry Pi-3”, International Research Journal of Engineering and Technology (IRJET), Volume: 06 Issue: 02 Feb 2019.
 Ghanem Osman Elhaj Abdalla, T. Veeramanikandasamy “Implementation of Spy Robot for A Surveillance System using Internet Protocol of Raspberry Pi”, 2nd IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017.
Electronics & Telecommunication, Bharat College Of Engineering, University Of Mumbai
The IoT Technology provided in this paper is a good option for surveillance the weather data at a particular region and make the data visible anywhere in the world. The idea behind this is Electronic sensors connected to the Public Internet by using IoT technology. The data fetched from the embedded system can be accessible over the Internet from anywhere in the world. In some area, it will be challenging to check and monitor the vital weather parameter through wires and analogue devices during some weather hazards. To resolve this problem here, electronic sensors are used to review and monitor the weather parameters.
Suryakant Acharekar ,Prashant Dawnade,Binay Kumar Dubey,Prof. Prabhakar Mhadse."IoT Based Weather Monitoring System". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.7, Issue 04,pp.20-22, April - 2020, URL :http://ijcert.org/ems/ijcert_papers/V7I404.pdf,
 A Study on IoT Approach for Monitoring Water Quality Using MQTT Algorithm, Alfiya Abubaker1, Kavya C R2, Tilju Thomas3, Nikhil Joseph4, Shifana Begum5, 1,2,3,4 Final Year UG Students, Dept. of CSE, Srinivas School Of Engineering, Mangalore
 IoT Based Water Quality Monitoring System, Mourvika Shirode, Monika Adaling, Jyoti Biradar, Trupti Mate, Department of Electronics & Telecommunication Keystone School of Engineering, Pune, Maharashtra, India
 Girija C Department of Electronics and Communication, NIEIT, Andreanna Grace ShiresDepartment of Electronics and Communication, NIEIT, Mysuru Internet of Things (IoT) based Weather, International Journal of Engineering Research & Technology (IJERT)
 Mobile APP & IoT Based Station Weather Station. AUTHOR: K. N. V. SATYANARAYANA, S. R. N. REDDY, K. N. V. SURESH VARMA & P. KANAKA RAJU
 Arduino Based Weather Monitoring System. AUTHOR: Karthik Krishnamurthi, Suraj Thapa, Lokesh Kothari, Arun Prakash
 Internet of Things (IoT) Based Weather Monitoring system, Bulipe Srinivas Rao1, Prof. Dr K. Srinivasa Rao2, Mr N. Ome3, international Journal of Advanced Research in Computer and Communication Engineering, ISO 3297:2007 Certified, Vol. 5, Issue 9, September 2016
1&2 . Dept. of Computer Science and Engineering, Maharaja Institute of Technology Mysore, Karnataka, India.
This paper introduces an iterative technique to segmentation of indoor floor from a single 2-D camera connected to a mobile robot. The segmentation of the floor is an essential function for efficient mobile robot navigation, unlike previous approaches which rely on geometric indications, edges etc. Mobile robot mounted with the 2-D camera can capture floors images over long indoor sequences. Both floor and non-floor regions are all of a similar color when the conditions of illumination vary over a single image. The texture of the floor varies over a single image, and features may be lost as lighting changes. As mobile robot rotates, lot of information may be lost in the presence of small obstacles. Some floor areas are very shining under the artificial light condition. The radiant floor gives the wrong segmentation output. In the proposed approach does not require multiple images. The floor patterns are dynamically selected in the proposed research, and segmentation is performed based on the chosen designs. Camera calibration is not required in the proposed approach for floor segmentation. Also, edge cues and geometric cues are not necessary. The extensive experiment is conducted on a broad set of real indoor corridor floor image set.
segmentation, pattern, floor, structuring element, standard deviation.
Honnaraju B, S Murali."Real-Time Indoor Floor Detection for Mobile Robots using Iterative Approach". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.7, Issue 04,pp.23-27, April - 2020, URL:http://ijcert.org/ems/ijcert_papers/V7I405.pdf,
Dr. M. R. Arun, Prof. M. R. Sheeba, Prof. F. Shabina Fred Rishma, ,
Associate Professor, ECE, PBR Visvodaya Institute of Technology and Science , Nellore, India , 2. Assistant Professor& RS, CSE, Manonmaniam Sundaranar University, Tirunelveli, India, 3. Assistant Professor, CSE, Cape Institute of Technology, Levinjipuram, India
With the rapid advancement in technological innovation, block Chain has become one of the hottest transformative techniques in the internet domain in recent times. As considered to be a decentralized, distributed and highly encrypted technology in data transfer, the blockchain has restored the trust for secured business transactions by the sophisticated cryptographic algorithm. Here the protocol validates that all nodes are merely synchronized with one another, thus providing security, anonymity, and data integrity without the requirement of any other third party intrusion. Block chain technology which is also known as DLT (Distributed Ledger Technology) that is a great platform for non-physical money transaction such as bitcoin and other online crypto currencies. It is seen as emerging foundational security-based technology having enormous potential across different sectors. Blockchain as a decentralized mode useful for a peer-to-peer network without the essential of any central or controlling authority server. This will, in general, reduce transaction costs, improved security, and execute the financial transaction in real-time. Block chain is significant and not the same as of now existing techniques. Since it empowers disseminated, independent decreases grating in business exchanges with safety and shares decentralized records, this paper gives a discussion on the comparative analysis of block chain technology with other existing technologies.
Dr. M. R. Arun,Prof. M. R. Sheeba,Prof. F. Shabina Fred Rishma."Comparing BlockChain with other Cryptographic Technologies (DAG, Hashgraph, Holochain)". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.7, Issue 04,pp.13-19, April- 2020, URL :http://ijcert.org/ems/ijcert_papers/V7I403.pdf,
 F. Tschorsch and B. Scheuermann, “Bitcoin and beyond: A technical survey on decentralized digital currencies”, IEEE Communications Survey Tutorials, vol. 18, no. 3, pp. 2084–2123, 2016.
trade-maersk-ibm/ last accessed on Sept 15, 2018
 L. Lamport, R. Shostak, and M. Pease, “The byzantine generals problem”, ACM Transactions on Programming Languages and Systems, vol. 4, no. 3, pp. 382–401, 1982
 D. Kraft, “Dif?culty control for block chain-based consensus systems”, Peer-to-Peer Networking and Applications, vol. 9, no. 2, pp. 397–413, 2016
 Yuee, X., Wang, H., Jin, D., Li, M., & Jiang, W., “Healthcare data gateways: found healthcare intelligence on block chain with novel privacy risk control”, Journal of medical systems, vol. 40, no. 10, pp. 218, 2016.
 P. K. Sharma, S. Singh, Y.-S. Jeong, and J. H. Park, “Dist Block Net: A Distributed Block chains-Based Secure SDN Architecture for IoT Networks,” IEEE Communication Magazine, vol. 55, no. 9, pp. 78–85, 2017.
 K. Fan, Y. Ren, Y.Wang, H. Li, and Y. Yang, “Block chain-based efficient privacy preserving and data sharing scheme of content-centric networking 5G,” IET Communication, vol. 12, no. 5, pp. 527–532, Mar. 2018.
 G. Karame, S. Capkun, "Block chain security and privacy", IEEE Security Privacy, vol. 16, no. 4, pp. 11-12, Jul. 2018.
 B. Wang, M. Dabbaghjamanesh, A. Kavousi-Fard, S. Mehraeen, " Cyber security enhancement of power trading within the networked micro grids based on block chain and directed acyclic graph approach", IEEE Transaction Industrial Application, vol. 55, no. 6, pp. 7300-7309, Nov. 2019.
 F. M. Beni, I. Podnar Arko, "Distributed Ledger Technology: Block chain Compared to Directed Acyclic Graph", 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 1569-1570, 2018
 T. T. Kuo, H. E. Kim, L. Ohno-Machado, "Block chain distributed ledger technologies for biomedical and health care applications", Journal of the American Medical Informatics Association, vol. 24, no. 6, pp. 1211-1220, 2017.
 C. Fan, H. Khazaei, Y. Chen, P. Musilek, "Towards a scalable DAG-based distributed ledger for smart communities", Proc. IEEE 5th World Forum Internet Things (WF-IoT), pp. 177-182, Apr. 2019.
 B. Lee and J.-H. Lee, “Block chain-based secure firmware update for embedded devices in an Internet of Things environment,” Journal Supercomputing, vol. 73, no. 3, pp. 1152–1167, Mar 2017.
 O. Novo, “Block chain Meets IoT: An Architecture for Scalable Access Management in IoT,” IEEE Internet Things Journal, vol. 5, no. 2, pp. 1184– 1195, Apr. 2018.
 C. Yang, X. Chen, and Y. Xiang, “Block chain-based publicly verifiable data deletion scheme for cloud storage,” Journal Network Computing Application, vol. 103, pp. 185–193, Feb 2018.
 N. Kshetri, “Block chain’s roles in strengthening cyber security and protecting privacy,” Telecommunications Policy, vol. 41, no. 10, pp. 1027–1038, Nov. 2017.
 J. Wang, M. Li, Y. He, H. Li, K. Xiao, and C. Wang, “A Block chain Based Privacy-Preserving Incentive Mechanism in Crowd sensing Applications,” IEEE Access, vol. 6, pp. 17 545–17 556, 2018.
 A. Lei, H. Cruickshank, Y. Cao, P. Asuquo, C. P. A. Ogah, and Z. Sun, “Block chain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems,” IEEE Internet Things Journal, vol. 4, no. 6, pp. 1832–1843, Dec 2017.
 A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak, “BlockChain: A Distributed Solution to Automotive Security and Privacy,” IEEE Communication Magazine, vol. 55, no. 12, pp. 119–125, Dec 2017.
 D. Puthal, N. Malik, S. P. Mohanty, E. Kougianos, and G. Das, “Everything you wanted to know about the block chain: Its promise, components, processes, and problems,” IEEE Consumer Electronics Magazine, vol. 7, no. 4, pp. 6–14, July 2018.
1. Department of West Asian and North African studies (Economics), Aligarh Muslim University, UP-202001, India
International trade has been considered as an engine of economic growth since very long. India has also been involved in trading terms with the world in fact in order to enhance its trading terms, India has adopted economic reforms in 1991 in the form of liberalization, Globalization and Privatization .India’s major trading partners are China, USA, UAE, Germany, Saudi Arabia, Kuwait, Oman .But here we are confined to the study of trade between India and UAE. India is having good trading terms with UAE since 1972 that is from the establishment of UAE.UAE has remained important source for India not only for imports and exports but for remittances also. In this study we have tried to analyze trade intensity index for India with respect to UAE. Study period has been taken from 2001 to 2016.We have found that India’s export intensity index (wrt) UAE, was highest in 2001 estimated as 12.5 while lowest in the year 2010.Then import intensity index highest in 2010 and lowest in 2002.Besides that we have also discussed the composition of trade between the two countries.
International trade, Economic growth, Remittances, Trade intensity index.
Saima Farhat, Khalid Ul Islam Rather."A TRADE INTENSITY ANALYSIS BETWEEN INDIA AND UAE SINCE 2001". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.7, Issue 04,pp.6-12, April - 2020, URL:https://ijcert.org/ems/ijcert_papers/V7I402.pdf,
World Trade Organization, 2008. “Trade in a globalized World”, World Trade Report.
UN Comrade Statistics database.
World Trade Organization, 2011. RTA Gateway, 2011 Annual report 2016-17, ministry of commerce.
2. K.A. Goyal & A. Vajid 2017, “Revealed Comparative Advantage of India's Rice Export with selected countries
3. K.A. Goyal & A. Vajid 2016, “An Analysis of Bilateral Trade between India and UAE”, Pacific Business Review
4. Sundar Raj P & Ambrose B 2014, “A Brief Analysis of India-Japan Bilateral Trade: A Trade Intensity Approach”,
5. Beretta, S. and R. T. Lenti. 2012. 'India and China: Trading with the World and Each Other', Economic &
Political?Weekly,?Vol.?47,?No.?44,?35–Federation of Indian Chambers of Commerce and Industry. (2013). India-UAE Economic Relations, Retrieved from Federation of Indian Chambers of Commerce and Industry, New Delhi website: http://www.ficci.com/international/75185
Samir Ranjan. “India’s Export Potential to the Gulf Cooperation Council (GCC) Countries: A Gravity Model Analysis.” IUP Journal of Applied Economics (UNESCA), 2006: 48-71.
Krishna, A, Goyal and Abdul Vajid “An analysis of India’s trade with UAE” journal of commerce and trade, April 2018,UGC approved,journal number 48687.
Muhammad Azhar, Economic Cooperation between India and United Arab Emirates in the 1990’s, journal of Middle Eastern studies. Volume 40, 2004, issue 5.
Alok.k.Yadav and Umesh.K.Yadav “Ananalysis of India Bahrain trade relations” IOSR journal of economics and finance.e-ISSN: 2321-5933, p-ISSN: 2321-5925.Volume 8, Issue 1 Ver. I (Jan-Feb. 2017), PP 73-82.
Rishabh, Kumar, and Rajiv Ranjan. “Evolution of Indo-GCC Trade Relations: The Last Two Decades.” International Journal of Economics, Commerce and Research, 2012: 1-8.
Civil department, Matu Ram Institute of Engineering and Management, MDU University, Rothak, Haryana, INDIA
The paper elucidates about the proper utilization of plastic materials in civil construction projects. The volume of plastic waste is increased, which results in creating unbalance in the environment by polluting land, air as well as water. According to CPCB (central pollution control board), India generates almost 26,000tonnes of plastic per day. From 26,000tonnes near about 10,000 tonnes a day, the plastic waste remains uncollected, and that plastic ends up in the natural environment mostly in seas. A vast amount of plastic waste is brought from tourist attraction regions, which further burnt and finally leads to toxic gasses that are harmful to even living beings. To outcome from this problem, the use of plastic should be controlled, and plastic waste should be utilized properly so that it does not create pollution. Nowadays, such waste material utilized in a different type of road construction and in other civil construction, which shows the hope of tackling this issue. In brick blocks, carry bags, disposable, PET, HDPE, and PE are used with sand to obtain high strength. These days, plastic waste used as a modifier, which further helps in a reduction in the volume of cement and results as a decrease in the overall cost required to complete the construction work. The plastic helps to raise the melting point for bitumen. Even moisture will not seep from brick due to the presence of plastic, which increases the working periods before any repairs of the building.
Mr. Abhay Singh Chahal, Ms. Neetu Balhara."Utilization of Plastic Waste Materials in Manufacturing of Bricks & Paver Blocks". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.7, Issue 04,pp.1-5, April - 2020, URL:http://ijcert.org/ems/ijcert_papers/V7I401.pdf,
 Aeslina Abdul Kadir, Noor Amira Sarani, “An Overview of Wastes Recycling in Fired Clay Bricks” International Journal of Integrated Engineering, Vol. 4 No. 2 (2012) p. 53-69.
 AmitGawande, G. Zamare., V.C Renge., SaurabhTayde, G. Bharsakale.. (2012) “An overview on waste plastic utilization in asphalting of roads”, Journal of Engineering Research and Studies (JERS), Vol.III, Issue II, pp 01-05.
 Ganesh Tapkire, Satish Parihar, PramodPatil, Hemraj R Kumavat, “Recycled Plastic used in Concrete Paver Block” International Journal of Research in Engineering and Technology eissn: 2319-1163, Vol: 03 special issue: 09, NCETCE-2014.
 P K Jain, Shanta Kumar & J B Sengupta, “Mitigation of rutting in bituminous roads by use of waste polymeric packaging materials” Indian Journal of Engineering & Materials Sciences Vol. 18, June 2011, pp. 233-238.
 V.Kasselouri-Rigopoulou, S. Gavela, S. Kolias“Use Of Polymeric Wastes in The Concrete Production” Polymers in concrete: a vision for the 21st century, Cement & Concrete Composites 21: (1999) 449-452.
 L.R Schroeder, “The Use of Recycled Materials in Highway construction”, Public Roads, Vol 58,Issue 2, 1994.
 Madan mohanreddy ,k,ajitha .B and bhavani.R(2012) “Melt- Densified Post-Consumer Recycled Plastic Bags Used as Light Weight Aggregate in Concrete”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 2, Issue, pp.1097-1101.
Dr.prahallada M.C and Dr.prakash K.B “strength and workability characteristics of waste plastic fibre reinforced concrete produced from recycled aggregates”international journal of engineering research and applications(IJERA) ISSN:2248-962.
Dept. of Computer Science and Engineering, Maharaja Institute of Technology Mysore, Karnataka, India.
The creation of a 3-D model of indoor environments is increasingly gaining more importance due to the wide variety of applications. Applications are the representation of building, indoor facilities information representation, etc. This paper represents an approach to create visually persuasive 3-D models of indoor corridor based on the mobile robot that is connected to a single 2-D camera. The sequence of images acquired from the 2-D camera and distance between surrounding and the robot is determined. In this paper, the new approach for distance estimation between the wall and the robot is proposed. Distance estimation is achieved using skirting height as a reference. The panoramic stitching of images generates the walls of the indoor corridor. Doors in the corridor are identified using an edge-based approach. The proposed approach is tested for real datasets and getting visually effective results. The proposed approach is intended to address navigation in complex buildings.
distance, panoramic stitching, skirting, 3-D modelling, segmentation, door detection
Mr. Honnaraju B, Dr. Murali S."Reproduction of 3-D Model of Indoor Environment by Moveable Robot with Single 2-D camera for Navigation". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.7, Issue 03,pp.6-12, March - 2020, URL:https://ijcert.org/ems/ijcert_papers/V7I303.pdf,
1. Biber P. Andreasson H., Duckett T. and Schilling A: 3D Modeling of Indoor Environments by a Mobile Robot with a Laser Scanner and Panoramic Camerať. Proc. IEEE/RSJ Int. Conf. on Intelligent Robots and Systems (IROS), 2004.
2. Fleck S, Busch F, Biber P, Andreasson H, and Straer W. Omni-Direction 3D modeling on a Mobile Robot using Graph Cuts.â€ť Proc. IEEE Int. Conf. on Robotics and Automation (ICRA) 2005.
3. Biber P, Fleck S, Busch F, Wand M, Duckett T and Stranger W. 3D Modeling of Indoor Environments by a Mobile Platform with Laser Scanner and Panoramic Camera.ť Proc. 13th Europen Signal Processing Conference (EUSIPCO) 2005.
4. Thrun .S, et al, " A Real-Time Expectation-Maximization Algorithm for Acquiring Multi-Planar Maps of Indoor Environments with Mobile Robots.", IEEE Trans. On Robotics and Automation, 20(3), pp. 433-442, 2003.
5. Christian Weiss and Andreas Zell, Automatic Generation of Indoor VR-Models by a Mobile Robot with a Laser Range Finder and a Color Camera. 2011
6. Lucia Diaz-Vilarino, Kourosh Khoshelham, Joaquin Martinez-Sanchez, and Pedro Arias, "3D Modeling of Building Indoor Spaces and Closed Door from Imagery and Point Clouds.", Sensors in 2015.
Govindraj Chittapur, S. Murali, Basavaraj S. Anami , ,
Department of Computer Applications, Basaveshwar Engineering College, Bagalkot India
In the modern world, people are beliving videos as part of social communication; as camera editing techniques are advanced, video doctoring is a technique for editing and recreating new details in the footage. Identifying these doctored videos poses a problem for the media source, the court of law, and the framework of evidence service. The research on video forensics, and specifically on the automatic recognition of object-based detection of video forgery, is still in its infancy. The approach proposed in this paper uses noise properties, extracted from each frame of the video using Wavelet Transform and nonlinear thresholding such as optimal SURE shrinkage. Gaussian Mixture Density (GMD) uses this as a Gaussian classifier, and the Expectation-Maxima algorithm sets the GMD parameter. Results of the output matrix show that we get excellent precision 99.36 percent recall 99.80 and precision 97.34 percent respectively for object removal and frame duplication detection compared to subsisting methods. The proposed approach effectively detects traces in the forensic video dataset and recognizes these.
Govindraj Chittapur, S. Murali, Basavaraj S. Anami."Forensic Approach For Object Elimination and Frame Replication Detection Using Noise Based Gaussian Classifier". International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.7, Issue 03,pp.1-5, March - 2020, URL:http://ijcert.org/ems/ijcert_papers/V7I301.pdf
2012). Surrey University Library for Forensic Analysis (SULFA) of video content. 1-6. 10.1049/cp.2012.0422.
 S. Chen, S. Tan, B. Li, and J. Huang, "Automatic Detection of Object-Based Forgery in Advanced Video," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, no. 11, pp. 2138-2151, Nov. 2016.
 Czyzewski, A., Kostek, B., Bratoszewski, P. et al. An audio-visual corpus for multimodal automatic speech recognition. J Intell Inf Syst 49, 167–192 (2017). https://doi.org/10.1007/s10844-016-0438-z
 Pandey, Ramesh C., Singh, Sanjay K., and Shukla, K.K. ‘A Passive Forensic Method for Video: Exposing Dynamic Object Removal and Frame Duplication in the Digital Video Using Sensor Noise Features’. Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3339-3353, 2017.
 R. Chen, G. Yang, N. Zhu, "Detection of object-based manipulation by the statistical features of object contour," Forensic Science International, vol. 236, pp. 164-169, 2014.
 S. Murali, B. S. Anami and G. B. Chittapur, "Detection of Copy-Create Image Forgery Using Luminance Level Techniques," 2011 Third National Conference on Computer Vision, Pattern Recognition, Image Processing, and Graphics, Hubli, Karnataka, 2011, pp. 215-218
 S. Tan, S. Chen, and B. Li, "GOP based automatic detection of object-based forgery in the advanced video," 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Hong Kong, 2015, pp. 719-722.
 Govindraj Chittapur, S. Murali, and Basavaraj Anami “Video Forgery Detection Using Motion Extractor By Referring Block Matching Algorithm” International Journal of Scientific and Technology Research, Volume 8, Issue 10 2019, PP 3240-3243. http://www.ijstr.org/final-print/oct2019/Video-Forgery-Detection-Using-Motion-Extractor-By-Referring-Block-Matching-Algorithm.pdf
 Chittapur G.B., Murali S., Prabhakara H.S., Anami B.S. (2014) Exposing Digital Forgery in Video by Mean Frame Comparison Techniques. In: Sridhar V., Sheshadri H., Padma M. (eds) Emerging Research in Electronics, Computer Science and Technology. Lecture Notes in Electrical Engineering, vol 248. Springer, New Delhi
 Chittapur G.B., Murali S., Prabhakara H.S., Anami B.S. (2019) “Forensic Approach for detecting the region of Copy-Create Video Forgery By applying frame similarity approach” volume7 issue 2, 2019.,pp 12-17 http://www.isca.me/COM_IT_SCI/Archive/v7/i2/3.ISCA-RJCITS-2019-006.pdf
 Govindraj Chittapur, S. Murali, Basavaraj S. Anami."Copy Create Video Forgery Detection Techniques Using Frame Correlation Difference by Referring SVM Classifier"., International Journal of Computer Engineering In Research Trends (IJCERT), ISSN:2349-7084, Vol.6, Issue 12,pp.4-8, December- 2019.
Lecturer, Department of Mechanical and Manufacturing Engineering, University of Nairobi
The overall objective of this research was to determine the feasibility of wellhead power plants for a sustainable supply of geothermal electricity. Technical, financial and environmental sustainability and feasibility were investigated. A profitability assessment model showed that the payback period based on profit after Tax is 4.4 and 3.4 years without corporate tax which demonstrates financial feasibility. Environmental challenges encountered include corrosive geothermal fluid contamination and emissions of no condensable gases. Technically, it was found out that wellhead plants have lower power plant availability and capacity factor but still acceptable since it is over 70% compared to over 95% for central power plants. Lack of reinjection wells, however, raise concerns over sustainability of resource use in the long term. The study concluded that the Eburru and Olkaria wellhead power plants in Kenya are technically, financially and environmentally sustainable and feasible. Financial viability can be enhanced by tax rebates and holidays while re-injection of geothermal fluid can enhance resource sustainability. The research showed that wellhead power plants make an investment in geothermal less risky and ensure quick returns though technically the central power plants are superior.
Geothermal resources; types of geothermal power plants; feasibility of wellhead power plants; geothermal power plant performance; geothermal electricity generation; Generation capacity.
Moses Jeremiah Barasa Kabeyi."Feasibility of Wellhead Technology Power Plants for Electricity Generation". International Journal of Computer Engineering In Research Trends (IJCERT) , ISSN:2349-7084, Vol.7, Issue 01,pp.1-16, February - 2020, URL :https://ijcert.org/ems/ijcert_papers/V7I201.pdf,
 Alshareef, A.S. (2017).Technology Assessment Model of Developing Geothermal Energy Resources for Supporting Electrical System: the Case for Oregon" (2017). Dissertations and Theses. Paper 3515. Retrieved from . BP (2012): statistical review of world energy, 2012. Retrieved from https://www.laohamutuk.org/DVD/docs/BPWER2012report.pdf.
 ESMAP (2012). Geothermal handbook: Planning and financing power generation. Energy Sector Assistance Management Program. Retrieved from https://www.esmap.org/sites/esmap.org/files/DocumentLibrary/FINAL_Geothermal%20 Handbook_TR002-2_Reduced.pdf.
 ESMAP (2018). Opportunities and challenges for scaling up geothermal development in lac. Energy sector Assistance Management Program.Retrieved from http://documents.worldbank.org/curated/en/173681539626591426/pdf/128045-ESMAP- REVISED-PUBLIC.pdf
 European Commission (1999). Blue book on geothermal resources. European Commission http://www.geoelec.eu/wp-content/uploads/2012/04/EU-Blue-Book-Geothermal-2000.pdf.
 Geothermal Energy Association (2014). Geothermal energy. Retrieved from http://geo-energy.org/basics.aspx.
 Gitogo, W. (2019, July). Kenya ranked 8th largest geothermal power producer in the world. The Kenyan Wall Street. https://kenyanwallstreet.com/kenya-ranked-8th-largest-geothermal-power-producer-in- the-world/.
 Johnson, W.J. & Ogeya, M. (2018). Risky business: developing geothermal power in Kenya Stockholm Environment Institute https://www.sei.org/wp-content/uploads/2018/10/181025b-gill-johnson-keny a-geothermal-transrisk-db-1810g-1.pdf.
 Kabeyi, M.J.B (2019). Geothermal electricity generation, challenges, opportunities and recommendations. International Journal of Advances in Scientific Research and Engineering, 5(8), 53-95. doi: 10.31695/IJASRE.2019.33408 Retrieved from https://ijasre.net/uploads/2/4019_pdf.pdf.
 Karytsas, C. & Mendrinos, D. (2013, June). Global Geothermal Power Market. European Geothermal Congress, Pisa Italy. Retrieved from https://www.researchgate.net/publication/258926033_ Global_Geothermal_Power_Market.
 Kenya Electricity Generating Company (2020). Olkaria Wellhead Generation Plants. https://www.kengen.co.ke/index.php/business/power-generation/geothermal.html
 Kiptanui,S. & Kipyego,E. (2016). Viability of wellhead power plants in accelerating geothermal development in Kenya: case of Menengai. Proceedings, 6th African Rift Geothermal Conference Addis Ababa, Ethiopia, 2nd – 4th November 2016. Retrieved from http://theargeo.org/fullpapers/FEASIBILITY%20OF%20USING%20WELLHEAD%.
 Kruszewski, M., Wittig, V.(2018). Review of failure modes in supercritical geothermal drilling projects. Geothermal Energy 6, 28. doi: 10.1186/s40517-018-0113-4.
 Liu XM, Wei M, Yang LN, Wang X. (2017). Thermo-economic analysis and optimization selection of ORC system configurations for low temperature binary-cycle geothermal plant. Appl Therm Eng. 125,153–64. https://doi.org/10.1016/j.applthermaleng.2017.07.016.
 Lund, J.W. (2007, June).Characteristics, development and utilization of geothermal resources. GHC Bulletin. Retrieved from https://pdfs.semanticscholar.org/084d/ecf2a958f35fa125251181253401600a5708.pdf
 Lundin,J., Lundin,U.& Leijon,M.( 2014). EUSUSTEL-WP3 report- Geothermal power production. Retrieved from https://www.academia.edu/30759059/1_EUSUSTEL_WP3_Report_Geothermal_power.
 Mwagomba, T. (2015). Opportunities and challenges of developing geothermal in developing countries. Proceedings World Geothermal Congress 2015Melbourne, Australia, 19-25April 2015. Retrieved from https://pangea.stanford.edu/ERE/db/WGC/papers/WGC/2015/03016.pdf.
 Saitet, D. & Kwambai, C. (2017). Wellhead Generating Plants: KenGen Experience. Proceedings World Geothermal Congress 2015, Melbourne, Australia, 19-25 April 2015 https://pangea.stanford.edu/ERE/db/WGC/papers/WGC/2015/08016.pdf.
 Stober and K. Bucher(2013). History Of Geothermal Energy Use, Berlin Heldelberg: Springer-Verlag,
 Simiyu, S. (2010). Status of Geothermal Exploration in Kenya and Future Plans for Its Development. Retrieved from https://orkustofnun.is/gogn/unu-gtp-30-ann/UNU-GTP-30.
 Imaidi, D.L. (2017). Analysis of maintenance methods and developing strategies for optimal maintenance of wellhead power plants at olkaria geothermal field in Kenya. Retrieved from https://orkustofnun.is/gogn/unu-gtp-report/UNU-GTP-2017-12.pdf.
 Kombe, E.Y. & Muguthu, J. (2018). Geothermal energy development in East Africa: Barriers and Strategies. Journal of Energy Research Reviews. 2(1), 1-6. Doi: 10.9734/JENRR/2019/45278.
 Loksha, M. Gehringer and V. Loksha, (2012). Geothermal handbook; Planning and Financing power generation," ESMAP/ World bank Group, Washington DC, 2012.
 Ogola, P.F.A. (2015). KenGen geothermal energy carbon credit projects: status, benefits, challenges, lessons learnt and post-2012 plans. Proceedings World Geothermal Congress 2015 Melbourne, Australia, 19-25 April 2015 Retrieved from https://pangea.stanford.edu/ERE/db/WGC/papers/WGC/2015/36001.pdf.
 Quick, H., Mechael,J., Huber,H. & Arslan,U. (2010). History of international geothermal power plants and geothermal projects in Germany. Proceedings World Geothermal Congress 2010 Bali, Indonesia, 25-29 April 2010. Retrieved from https://www.geothermal-energy.org/pdf/IGAstandard/WGC/2010/0605.pdf.
 Tubei, G. (2019, July). Kenya beats Iceland to be ranked 8th globally in world’s largest geothermal Powerhouses. Business Insider. Retrieved from https://www.pulselive.co.ke/bi/finance/kenya-ranked-8th-globally-in-worlds-largest- geothermal-powerhouses/442penz Ugochukwu, A.A. (2013). Geothermal energy resources. https://www.academia.edu/5358353/GEOTHERMAL_ENERGY_RESOURCES
 Micale, V., Trabacchi, C., & Boni, L.(2015). Using Public Finance to Attract Private Investment in Geothermal: Olkaria III Case Study, Kenya. https://climatepolicyinitiative.org/publication/using-public-finance-to-attract- private-investment-in-geothermal-olkaria-iii-case-study-kenya/.
Assistant professor, Department of Computer Science and Engineering. Shri Ram Murti Smarak College of Engg & Tech, Bareilly AKTU, Luck now, India
In today's world advancement of data transmission over the unsecured channel and data is not secure. In this scenario, data should be in encrypted form and that data transmitted over the network. In cryptography, have two methods to encrypt data are substitution and Transposition. Transposition is referring to changing the position of a character in the given text. On the other hand, Substitution is referring to replacing the character with another character in the given text. Play fair cipher is based on polyalphabetic substitution cipher; classical play fair cipher has a 5*5 matrix. To increase the security of play fair cipher, this paper presents a new approach to introducing double encryption in the sender side and double decryption in the receiver side approach by vigenere cipher, play fair cipher, and linear congruently method.
play fair cipher, vigenere cipher, and linear congruential method
Sarita Singh."A Novel Technique for Enhancement of the Security of Playfair Cipher". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084, Vol.7, Issue 01,pp.8-12, January - 2020, URL :https://ijcert.org/ems/ijcert_papers/V7I102.pdf
Bhowmick, Anirban, Anand Vardhan Lal, and Nitish Ranjan. "Enhanced 6x6 Playfair Cipher using Double Myszkowski Transposition."International Journal of Engineering Research and Technology. Vol. 4. No. 07, July-2015. IJERT, 2015.
 Negi, Ashish, et al. "Cryptography Playfair Cipher using Linear Feedback Shift Register."IOSR Journal of Engineering 2.5 (2012): 1212-1216.
 Kumar, Vinod, et al. "Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept'."International Journal of Innovative Technology and Exploring Engineering (IJITEE) 3 (2013).
 Bhattacharyya, Subhajit, Nisarga Chand, and Subham Chakraborty. "A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps."
 Dhenakaran, S. S., and M. Ilayaraja. "Extension of Playfair Cipher using 16X16 Matrix."International Journal of Computer Applications 48.7 (2012).  Basu, Sanjay, and Utpal Kumar Ray. "Modified Playfair Cipher using Rectangular Matrix."IJCA (0975-8887) Volume (2012)
. Alam, A. Aftab, B. Shah Khalid, and C. Muhammad Salam. "A Modified Version of Playfair Cipher Using 7? 4 Matrix."International Journal of Computer Theory and Engineering 5.4 (2013): 626.
 Kaur, Amandeep, Harsh Kumar Verma, and Ravindra Kumar Singh. "6 X 6 Playfair Cipher using LFSR based Unique Random Number Generator."International Journal of Computer Applications 51.2 (2012).
 Murali, Packirisamy, and Gandhidoss Senthilkumar. "Modified version of Playfair cipher using a linear feedback shift register."Information Management and Engineering, 2009. ICIME'09. International Conference on. IEEE, 2009.
 Srivastava, Shiv Shakti, and Nitin Gupta. "Security Aspects of the Extended Playfair cipher."Communication Systems and Network Technologies (CSNT), 2011 International Conference on. IEEE, 2011.
 William, Stallings. Cryptography and Network Security: For VTU. Pearson Education, India, 2006.
Khin Moe Aung, Aye Aye Lwin, Haung Naw, Nan Cho Nwe Mon, Hnin Ohmar Soe ,Myitzu Tin Oung,Nilar Wynn, Ne Win
*1 Department of Medical Research (Pyin Oo Lwin Branch) 2 Department of Medical Research 3 University of Medicine (Mandalay) 4 Myanmar Academy of Medical Science
Beta thalassemia is one of the most common genetic disorders worldwide with a defect in haemoglobin synthesis including Myanmar. This study was conducted to determine the proportion of high school students who have heterozygous ?-thalassaemia including Hb E and different types of common beta globin gene mutations by multiplex polymerase chain reaction. This community-based cross-sectional descriptive study was done in Myanmar adolescents in 2017. A total 290 apparently healthy high school students in which male 140 (48.3%) and female 150 (51.7%) studying in Basic Education High School, Anisakhan, Pyin Oo Lwin Township, Mandalay District, Myanmar were involved. Thalassaemia screening tests were done by combined NESTROFT/DCIP precipitation and confirmed test was done by Isoelectric Focusing (IEF). PCR- based genetic confirmatory by using mutant genes IVS 1-1, CD 41/42, IVS 1-5, CD 17, and nt-28. Total 131 cases (131/290, 45.2%) were positive with either of the two screening tests. These cases were considered as thalassaemia trait (carrier) and/or haemoglobin E carrier. Isoelectric focusing was done to find Hb E by which 45 cases (45/131, 34.3%) were found to have Hb E carrier. Remaining 86 cases were further run multiplex- PCR to detect beta thalassaemia carrier. Total 44 out of 86 cases were ?-thalassaemia traits (25 CD 41/42 (-TCTT), 13 IVS 1-5 (G-C), 1 IVS 1-1 (G-T); 5 compound heterozygous (IVS 1-5(G-C) /CD 41/42 (-TCTT)). CD 17 (A-T) and nt 28 (A-G) mutations were not detected in this study. NESTROFT screening test has 87% sensitivity and 82% sensitivity for the detection of Hb E carrier and ?-thalassaemia carrier respectively. DCIP screening test has 67.1% sensitivity and 68% sensitivity for the Hb E carrier and ?-thalassaemia carriers respectively. Combined both screening tests have 100% sensitivity for the detection of Hb E and ?-thalassaemia carriers. This study has highlighted that both screening tests should be used for population screening of thalassaemia and haemoglobinopathies in Myanmar.
beta thalassaemia, beta globin gene, haemoglobin E, high school students
Khin Moe Aung,Aye Aye Lwin,Haung Naw,Nan Cho Nwe Mon,Hnin Ohmar Soe ,Myitzu Tin Oung,Nilar Wynn, Ne Win."Detection of Common Beta Globin Gene Mutations on Heterozygous Beta Thalassemia Including Haemoglobin E among High School Students". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.7, Issue 01,pp.1-7,January - 2020, URL :https://ijcert.org/ems/ijcert_papers/V7I101.pdf,
1. Origa, R, ‘Beta Thalassaemia, In: Pagon RA, Adam MP, Ardinger HH, et al., editors. Gene Reviews® [Internet]. Seattle (WA): University of Washington, Seattle; 1993-2016, Retrieved 2016 August 18. Retrieved 2016August10, 2014. http://www.ncbi.nlm.nih.gov/books/NBK1426/
2. Galanello, R & Origa, R, ‘Beta-thalassaemia’, Orphanet Journal of Rare Diseases, vol. 5, pp. 1-15, 2010.
3. TIF Guidelines (Thalassaemia International Federation Guidelines), ‘Guideline for the Management of Transfusion Dependent Thalassaemia’, 3rd ed, pp. 12-17, 2012.
4. Origa, R, Galanello, R, Ganz, T, Giagu, N, Maccioni, L, Faa, G & Nemeth, E, ‘Liver Iron Concentrations and Urinary Hepcidin in Beta-Thalassaemia’, Haematologica, vol. 92, pp. 583–588, 2007.
5. Winichagoon, P, Thitivichianlert, A, Lebnak, T, Piankijagum, A & Fucharoen, S, , ‘Screening for the Carriers of Thalassemias and Abnormal Hemoglobins at the Community Level Southeast Asian’ , J Trop Med Public Health, vol. 33, pp. 145-150, 2002.
6. Fucharoen, G, Sanchaisuraiya, K, Sae-ung, N, Dangwibul, S & Fucharoen, S, ‘A Simplified screening Stragey for Thalassaemias and Haemoglobin E in Rual Communities in Southeast Asia’, Bull World Health Organ, vol. 82, pp. 364-372, 2004.
7. Old, J, Harteveld, CL, Traeger-Synodinos, J, Petron, M, Angastiniotis, M & Galanello, R, ‘Prevention of Thalassaemias and Other Haemoglobin Disorders’: Volume 2: Laboratory Protocols [Internet]. 2nd ed. Nicosia, Cyprus: Thalassaemia International Federation;2012.Retrieved2016August9, 2012 https://www.ncbi.nlm.nih.gov/books/NBK190576/
8. Aung-Than-Batu, Khin-Kyi-Nyunt & Hla-Pe, ‘The Thalassaemia in Burma’, Union of Burma, J life Sciences, vol. 1, pp. 241-247, 1968.
9. Harano, K, Ne-Win & Harano, T, ‘Molecular Aspects of Transfusion Dependent Thalassaemic Children in Myanmar: Analysis of Common - Thalassaemia in Myanmar by Amplification Refractory Mutation System (ARMS) ’, Kawasaki Med J, vol. 26, pp. 161-164, 2000.
10. Yi-Yi-Tin, ‘Phenotypic and Genotypic Heterogeneity of Beta-Thalassaemia Intermedia in Myanmar’, Ph. D (Pathology) Thesis, University of Medicine (2), Yangon, Republic of the Union of Myanmar, Retrieved 2016 August 18, from University of Medicine, Mandalay Digital Thesis, 2004.
11. Sein-Win, ‘Clinical Spectrum and Genetic Heterogeneity of E-? Thalassaemia Intermedia in Myanmar Adults at Yangon General Hospital’, Ph.D. (Clincal Hematology) Thesis; University of Medicine (I), Yangon, Republic of the Union of Myanmar, Retrieved 2016 August 18, from University of Medicine, Mandalay Digital Thesis, 2010.
12. Brown, JM, Thein, SL, Weatherall, DJ & Khin-Mar-Mar, ‘The Spectrum of ?- Thalassaemia in Burma’, Br J Haematol, vol. 81, pp. 574-578, 1992.
13. Ne-Win, Harano, T., Harano, K., Thein-Thein-Myint, Rai-Mra, Okada, S., Shimono K. & Aye-Aye-Myint, ‘A Wider Molecular Spectrum of ?-Thalassaemia in Myanmar’, Br J Haematol, vol. 117, pp. 988-992, 2002.
14. Ne Win.. ‘Clinical and Molecular Heterogeneity of Hemoglobine E-Beta Thalassemia and Beta-Thalassemia Major in Myanmar’, Thesis for the degree of Doctor of Philosophy (PhD) Pathology, University of Medicine I, Yangon, Republic of the Union of Myanmar, Retrieved 2016 August 12, from University of Medicine, Mandalay Digital Thesis, 2002.
15. Hassan, S, Ahmad, R, Zakaria, Z, Zulkafli, Z & Abdullah, WZ, ‘Detection of ?-Globin Gene Mutations Among ?-thalassaemia Carriers and Patients in Malaysia: Application of Multiplex Amplification Refractory Mutation System–Polymerase Chain Reaction’, Malays J Med Sci., vol. 20, pp. 13-20, 2013.
16. Boonyawat, B., Monsereenusorn, C. & Traivaree, C. Molecular Analysis of Beta Globin Gene Mutations among Thai Beta-Thalassaemia Children: Results from a Single Center Study. The Application of Clinical Genetics. 7, 253–258, 2014.
17. Tongprasert, F., Sirichotiyakul, S., Piyamongkol, W., Tongsong, T. Sesitivity and Specificity of Erythrocyte Osmotic Fragility Test for Screening of ?-Thalassaemia-1 and ?-Thalassaemia in Pregnant Women. Gynaecol Obstet Invest, 69, 217- 20, 2010.
18. Viroj, W. Osmotic Fragility Test for Screening for Thalassaemia in Thai Pregnant Subjects: A Re-evaluation. J Haema. 7(2), 205-7, 2004.
19. Mamtani, M., Das, K. & Jawahirani A. Is NESTROFT sufficient for mass screening for ?-thalassemia trait? J Med Screen. 14, 169–73, 2007.
20. Singh, SP. & Gupta, SC. Effectiveness of red cell osmotic fragility test with varying degrees of saline concentration in detecting ?-thalassaemia trait. Singapore Med J. 49(10), 823-6, 2008.
21. Yazdani, SM., Ahmed, S. & Abbas F. One Tube Osmotic Fragility Test: A Screening Test for Microcytic Red Cells. Pak Armed Forces Med J. 58(1), 45-50, 2008.
22. Chakrabarti, I., Sinha, SK., Ghosh, N. & Goswami, BK. Beta-Thalassemia Carrier Detection by NESTROFT: An Answer in Rural Scenario? Iranian Journal of Pathology. 7 (1), 19 – 26, 2012.
23. Bobhate, S., Gaikwad, S. & Bhaledrao, T. NESTROFT as a Screening Test for Detection of ?-Thalassemia Trait. Indian J Pathol Microbiol. 45 (3), 265-7, 2002.
24. Sangkitporn, S., Sangnoi, A., Supangwiput, O., Tanphaichitr, VS. Validation of Osmotic Fragility and Dichlorophenol Indophenol Precipitation Test for Screening of Thalassaemia and Hb E. South East Asian J Trop Med Public Health. 36(3), 1538-42, 2005.
25. Jopang Y., Thinkhamrop, B., Puangpruk R. & Netnee, P. False positive rates of thalassaemia screening in rural clinical setting: 10- year experience in Thailand. South East Asian J Trop Med Public Health. 40(3), 576-580, 2009.
26. Sanchaisuriya, K., Fucharoen, S., Fucharoen G., et al. A Reliable Screening Protocol for Thalassemia and Hemoglobinopathies in Pregnancy: an Alternative Approach to Electronic Blood Cell Counting. Am J Clin Pathol. 123, 113-8, 2005.
27. Weatherall, DJ. & Clegg, JB. The Thalassaemia Syndromes’, Oxford: Blackwell Scientific Publications, 4th Ed, 770-80, 2001.
28. Insiripong, S., Yingsitsiri, W., Boondumrongsagul, J. & Noiwatanakul, J. Prevalence of Thalassaemia Traits in People without Anaemia or Microcytosis. J haematol Transfus Med. 24, 25-9, 2014.
29. Ambekar, SS., Phadke, MA., Balpande, DN., Mokashi, GD., Khedkar, VA., Bankar, MP., Gambhir, PS., Bulakh, PM. & Basutkar, DG. The Prevalence and Heterogeneity of Beta Thalassemia Mutations in the Western Maharashtra Population: A Hospital Based Study. International Journal of Human Genetic.1 (3), 219-223, 2001.
30. Huisman, THJ., Carver, MFH. & Baysl, E. A Syllabus of Thalassa Mutations. The Augusta, GA: Sickle Cell Anaemia Foundation. (http://globin.cse.psu.edu)., 1997.
Currently there are no Refbacks
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.