Volume-2 (International Conference on Advanced Information Technology and Applications 2K23)
- Citation
- Abstract
- Reference
- Full PDF
- Cover Paper
Paper Type | : | Research Paper |
Title | : | Advanced Technologies For Smart Farming Agriculture Using Iot-Aliterature Review |
Country | : | India |
Authors | : | N. Rajeswari || Dr.D.Kavitha |
Abstract: The Digitalization is the process which converts lower or analog data into digital form which can be accessed by the computer. The digitalization process mainly focused on the information and communication technology. This Technology used to develop and improve the performance in the agriculture which leads to Digitalization Agriculture or Smart Farming. The Device or Tools can be used to improve the Smart Framing through Internet of Things. This paper describes about the tools and technologies implemented in Smart Farming by the various research implemented their ideas or innovation in order to improve their growth of production in agriculture. It's also provides a feasibility survey on basic characteristics, major components, protocol and security issue in the digital agriculture. This paper also summarized the logical and physical resources utilization to estimate the availability using IoT which leads to an effective process.
Keywords - Digitalization Agriculture, Technologies, Protocol, IoT, Security, Tools, Devices.
[1]. Liu Dan, Wan Hongli, Zhang Mengya, and Xiang Jianqiu. "Intelligent Agriculture Greenhouse Environment Monitoring System Based on the Android Platform." In 2017 International Conference on Smart Grid and Electrical Automation (ICSGEA), pp. 358-361. IEEE, 2017.
[2]. Miguel A Zamora-Izquierdo, ., José Santa, Juan A. Martínez, Vicente Martínez, and Antonio F. Skarmeta. "Smart farming IoT platform based on edge and cloud computing." Biosystems engineering 177 (2019): 4-17.
[3]. Shenoy, Jeetendra, and YogeshPingle. "IOT in agriculture." In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1456-1458. IEEE, 2016.
[4]. Swati Dhingra, ,RajasekharaBabuMadda, Amir H. Gandomi, RizwanPatan, and Mahmoud Daneshmand. "Internet of Things mobile–air pollution monitoring system (IoT-Mobair)." IEEE Internet of Things Journal 6, no. 3 (2019): 5577-5584.
[5]. Divyansh Thakur,,Yugal Kumar, and Singh Vijendra. "Smart Irrigation and Intrusions Detection in Agricultural Fields Using IoT." Procedia Computer Science 167 (2020): 154-162.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Parametric and Non-Parametric Approach On Breast Malignancy Patients |
Country | : | India |
Authors | : | N. Paranjothi || A. Poongothai || G. Manimannan |
Abstract: This study examines the efficacy of appropriate use of parametric and nonparametric statistical methods in research regarding the Health Sciences. Data from such research often fails to meet one or more of the assumptions of traditional parametric tests, thus necessitating the use of nonparametric techniques. To this end, this study analyzed the effects of using both parametric and nonparametric survival methods on a dataset of 300 patients from a private hospital in Bangalore. The data collected included socio-demographic parameters, Systolic Blood Pressure (SBP), Diastolic Blood Pressure (DBP), Oxygen Saturation (SPo2), and other breast cancer clinical parameters.......
Keywords: Parametric and Non Parametric Tets, t-test, z-test, SurvivalStatistics: log rank Test, Cohran Mantel Haenszel Test and Gehan Wilcoxon test.
[1]. J W Gamel, R L Vogel, P Valagussa, G Bonadonna, Parametric survival analysis of adjuvant therapy for stage II breast cancer, National Library of Medicine, 1994 Nov 1;74(9):2483-90.
[2]. Sujatha.v, Parametric and non-parametric Approaches on Survival Analysis for Diabetic Retinpathy Data, Research Journal of Pharmacy and Technology (RJPT), Volume 9, issue 4, 2016.
[3]. WHO, Coronavirus disease 2019 (COVID-19) situation report-61 (2020) [4]. Gamel JW, Vogel RL, Valagussa P, BonadonnaG.Cancer. Parametric survival analysis of adjuvant therapy for stage II breast cancer.,1994 Nov 1;74(9):2483-90. 3.PMID: 7923004 [5]. Jianqing Fan and Jiancheng Jiang, Non and Semi Parametric Modeling in Survival Analysis, Research Gate, April 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Importance of Internet Equity in Tamil Language: A Survey |
Country | : | India |
Authors | : | V. Vasanthraj || Dr. K. Ravikumar |
Abstract: Internet equity is essential to treat everyone as equal. In the technical terms, internet equity is meant by the capacity of participation get much resources in the society. Whenever the technology grows often but it doesn't give equal benefits for all. If someone has more resource, they will get the internet so fast. But in the other side the resources from internet doesn't reach that level. The level of inequality gets worse in the modern technology. Likewise, the source for the search results in mother tongue has affect by this internet equity. The internet equity doesn't give full participation for their own mother tongue. Tamil language is the primary and basic language for all the many languages in the world.......
Keywords- Internet equity, Inequity in internet, Equity in Tamil, Language equity in internet, equity social languages, Barrier in equity internet.
[1]. Krueger, Brian S. "Assessing the potential of Internet political participation in the United States: A resource approach." American politics research 30.5 (2002): 476-498. [2]. Lakshmi, Seetha, and Jarina Peer. "Use of Tamil language and IT in Tamil language education." (2009). [3]. Eswar, Medicharla Dinesh Surya Sai, et al. "Hope Speech Detection in Tamil and English Language." 2022 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2022. [4]. Zajda, Joseph, and Donna Gibbs. "Comparative information technology: Languages, societies and the internet." Comparative Information Technology. Springer, Dordrecht, 2009. 1-10. [5]. Mihaila, George A., LouiqaRaschid, and Anthony Tomasic. "Equal time for data on the internet with websemantics." International Conference on Extending Database Technology. Springer, Berlin, Heidelberg, 1998.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Voice To Sign Language - A Review |
Country | : | India |
Authors | : | Mr.G.Santhanakrishnan || Dr.S.Kumaravel |
Abstract: Communication is essential thing for every human being in the world. People who struggle with issues like being deaf and dumb with able people are something we frequently come across. They have trouble speaking to both one other and everyday people. Unintelligent deaf persons find it challenging to communicate with regular people. Between hearing individuals and dumb deaf persons, sign language serves as a means of communication or a tool for improving communication. Communication between normal people and dumb deaf persons has grown challenging since a substantial portion of the general public lacks knowledge......
Keywords: sign language, audio to sign language, content delivery tool, NLP, Artificial Intelligence
[1]. M. Sobhan, M. Z. Chowdhury, I. Ahsan, H. Mahmud and M. K. Hasan, "A Communication Aid System for Deaf and Mute using Vibrotactile and Visual Feedback," 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), Semarang, Indonesia, 2019, pp. 184-190, doi: 10.1109/ISEMANTIC.2019.8884323. [2]. Kumaresan, G., Raj D. Venkat, and G. Yamini. "Audio to Sign Language Translation." i-manager's Journal on Pattern Recognition 8.1 (2021): 31. [3]. Yadav, Anju, et al. "Audio to Sign Language Translator Web Application." 2021 International Conference on Computational Performance Evaluation (ComPE). IEEE, 2021. [4]. Dixit, Aditi, et al. "Audio to Indian and American Sign Language Converter using Machine Translation and NLP Technique." 2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT). IEEE, 2022. [5]. Sharma, Purushottam, et al. "Indian Sign Language Generation using Natural Language Processing and Audio Speech." (2022).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Periodical of Machine Learning Algorithms for Cloud Security |
Country | : | India |
Authors | : | S.Hassan Abdul Cader || Dr. K. Nirmala |
Abstract: Cloud computing (CC) is the on-demand accessibility of network resources, especially datastorage and processing power, without special and direct management by the users. CC recentlyhas emerged as a set of public and private data centers that offers the client a single platform acrossthe Internet. Edge computing is an evolving computing paradigm that brings computation andinformation storage nearer to the end-users to improve response times and spare transmissioncapacity. Mobile CC (MCC) uses distributed computing to convey applications to cell phones.However, CC and edge computing have security challenges, including vulnerability for clients and...............
Keywords: loud computing; cloud security; security threats; cybersecurity; machine learning
[1]. Lim, S.Y.; Kiah, M.M.; Ang, T.F. Security Issues and Future Challenges of Cloud Service Authentication.Polytech. Hung. 2017, 14, 69–89.
[2]. Borylo, P.; Tornatore, M.; Jaglarz, P.; Shahriar, N.; Cholda, P.; Boutaba, R. Latency and energy-aware provisioning of network slices in cloud networks. Comput. Commun. 2020, 157, 1–19. [CrossRef]
[3]. Carmo, M.; Dantas Silva, F.S.; Neto, A.V.; Corujo, D.; Aguiar, R. Network-Cloud Slicing Definitions for Wi-Fi
[4]. Sharing Systems to Enhance 5G Ultra-Dense Network Capabilities. Wirel. Commun. Mob. Comput. 2019, 2019, 1–17. [CrossRef]
[5]. Dang, L.M.; Piran, M.; Han, D.; Min, K.; Moon, H. A Survey on Internet of Things and Cloud Computing for healthcare. Electronics 2019, 8, 768. [CrossRef].
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Novel to Preventing Black Hole Attack in Wireless Sensor Network Using Hidden Markov Model |
Country | : | India |
Authors | : | J. Kolangiappan || A. Senthilkumar |
Abstract: Secure routing is a difficult task because of the limited nature of wireless sensor network resources. This paper provides a Hidden Markov Model solution to identify malicious nodes in wireless sensor networks through prevention of black hole attack. Our proposed approach based on a new routing algorithm which analyses shortest path in order to avoid malicious node path. Our results demonstrate the success and the efficiency of our proposed routing algorithm.
Keywords: WSN; HMM; Black Hole; Malicious; Shortest path;
[1]. Filippini, Massimo, and Lester C. Hunt. (2011) "Energy demand and energy efficiency in the OECD countries: a stochastic demand frontier approach." Energy Journal32 (2): 59–80.
[2]. Sohraby, K., Minoli, D., and Znati, T. (2007) "Wireless sensor networks: technology, protocols, and applications." John Wiley and Sons.
[3]. Rawat, P., Singh, K. D., Chaouchi, H., and Bonnin, J. M.(2014)"Wireless sensor networks: a survey on recent developments and potential synergies." The Journal of supercomputing 68(1): 1–48.
[4]. Kalkha, H., Satori, H., and Satori, K.(2016) "Performance Evaluation of AODV and LEACH Routing Protocol." Advances in Information Technology: Theory and Application.
[5]. Kalkha, H., Satori, H., and Satori, K. (2017)"A Dynamic Clustering Approach for Maximizing Scalability in Wireless Sensor Network."
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security Alliance Framework based on Machine Learning to Develop Cloud |
Country | : | India |
Authors | : | M. M. Syed Sulaiman || Dr. K. Nirmala |
Abstract: The number of customers looking for a cloud service station that will guarantee the privacy and protection of their data is now on the rise. Multi-cloud solutions, which provide the chance to enhance data security while likewise lowering the expense of software development, have started to be integrated into a variety of exciting application domains in order to achieve this purpose. This new development is exciting. It is a difficult problem to solve, but it might be difficult to determine the best method for distributing a cloud application's components among resources offered by several providers. Each service provider has specific performance and protection requirements that must be met. This paper provides ain-depth approach for maintenance.
Keywords: Security Alliance, Machine Learning, Cloud Security
[1]. Kumar, R., &Goyal, R. (2021). Top threats to cloud: a three-dimensional model of cloud security assurance. In Computer Networks and Inventive Communication Technologies (pp. 683-705). Springer, Singapore.
[2]. Zhao, T., Gasiba, T. E., Lechner, U., & Pinto-Albuquerque, M. (2021). Exploring a Board Game to Improve Cloud Security Training in Industry (Short Paper). In Second International Computer Programming Education Conference (ICPEC 2021). SchlossDagstuhl-Leibniz-ZentrumfürInformatik.
[3]. Mohammad, A. S., & Pradhan, M. R. (2021). Machine learning with big data analytics for cloud security. Computers & Electrical Engineering, 96, 107527.
[4]. Shaikh, N. S., Yasin, A., & Fatima, R. (2022). Ontologies as Building Blocks of Cloud Security. International Journal of Information Technology and Computer Science (IJITCS), 14(3), 52-61.
[5]. Sangui, S., & Ghosh, S. K. (2021). Cloud Security Using Honeypot Network and Blockchain: A Review. Machine Learning Techniques and Analytics for Cloud Security, 213-237
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Block chain-Enabled Security for Connected Homes |
Country | : | India |
Authors | : | M.Rajpriya || R.Subhashini |
Abstract: The functions and roles of smart homes are continuously developing due to recent developments in Information and Communication Technology (ICT) and Internet of Things (IoT). In smart homes, various IoT devices are connected to each other, and these connections are centered on gateways. The role of gateways in smart homes is significant. However, their centralized structure presents multiple security vulnerabilities such as integrity, certification, and availability. To address these security vulnerabilities, in this paper, we propose a blockchain-based smart home gateway network that counters possible attacks on the gateway of smart homes......
Keywords: Smart home, Gateway, Blockchain, IoT, Security and integrity.
[1]. Park JH, Salim MM, Jo JH, Sicato JCS, Rathore S, Park JH (2019) CIoT-Net: a scalable cognitive IoT based smart city network architecture. Human Compu Inf Sci 9(1):1–29
[2]. Gu K, Yang L, Yin B (2018) Location data record privacy protection based on differential privacy mechanism. Inf Technol Control 47(4):639–654
[3]. Xiong B, Yang K, Zhao J, Li K (2017) Robust dynamic network traffic partitioning against malicious attacks. J Netw Comput Appl 87:20–31
[4]. Sharma PK, Rathore S, Park JH (2018) DistArch-SCNet: blockchain-based distributed architecture with li-fi communication for a scalable smart city network. IEEE Consum Electr Mag 7(4):55–64Return to ref 10 in article
[5]. X. Chen, Z. Wei, X. Jia, P. Zheng, M. Han and X. Yang, "Current Status and Prospects of Blockchain Security Standardization," 2022 IEEE 9th International Conference on Cyber Security and Cloud Computing (CSCloud)/2022 IEEE 8th International Conference on Edge Computing and Scalable Cloud (EdgeCom), Xi'an, China, 2022, pp. 24-29, doi: 10.1109/CSCloud-EdgeCom54986.2022.00014.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Comprehensive Study on OTT Platforms |
Country | : | India |
Authors | : | Nandhana. A || Kavya. S || G. Bala Subhadra || Deva Darshini. S.D |
Abstract: The acronym OTT stands for Over-the-Top. This convenient little term explains the new delivery method of film and TV content over the internet whenever we want, across many different devices, without the need for traditional broadcast. With the growth of technology and the rise of the digital age - OTT platforms - video, audio streaming and viewing applications began as content streaming channels. The immediate objective of this study was to know the motive for viewers shifting from traditional television to OTT platforms........
Keywords: OTT platform - its evolution, Choices of OTT, Production houses, Future of OTT, TV viewership, Factors considering OTT.
[1] https://www.ibef.org/industry/media-entertainment-india
[2] https://www.india.com/business [3] https://www.medianews4u.com/the-content-expectation-is-more-from-ott-platform-than-from-gec/
[4] https://byjus.com/current-affairs/ott-over-the-top-platform-india/
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Blockchain-Based Decentralised Identity Framework using Elliptic Curve Cryptography |
Country | : | India |
Authors | : | S.Suganthi || Dr.T.Sree Kala |
Abstract: The vast majority of authentication methods depend on the existence of TTP (Trusted Third Party), which might be in the authentication server or Certificate Authority form. The major objective of this study is to provide an independent mechanism through which users may safely retain credentials without needing to rely on TTPs. This can only be achieved via the usage of a decentralised network, where each user's individuality serves as their login ID. Our proposed framework is a decentralised identity management system in which users generate their own identities using Elliptic curve cryptography(ECC).
Keywords – Block Chain; Self generated identity; Elliptic Curve Cryptography; Self generated certificates; Cybersecurity;
[1]. E. Karaarslan and E. Adiguzel, ―Blockchain Based DNS and PKI So- lutions,‖ IEEE Communications Standards Magazine, vol. 2, no. 3, pp. 52–57, sep 2018.
[2]. E. Bandara, W. K. NG, K. De Soysa, N. Fernando, S. Tharaka, P. Mau- rakirinathan, and N. Jayasuriya, ―Mystiko—blockchain meets big data,‖ in 2018 IEEE International Conference on Big Data (Big Data), Dec 2018, pp. 3024–3032.
[3]. D. Maldonado-Ruiz, E. Loza-Aguirre, and J. Torres, ―A Proposal for an Improved Distributed Architecture for OpenPGP's Web of Trust,‖ in 2018 International Conference on Computational Science and Computational Intelligence (CSCI). Las Vegas, NV, USA: IEEE, dec 2018, pp. 77–81.
[4]. C. Xu, H. Yang, Q. Yu and Z. Li,―Trusted and flexible electronic certificate catalog sharing system based on consortium blockchain‖, In proceedings of 2019 IEEE 5th International Conference on Computer and Communications (ICCC), pp. 1237-1242, 2019.
[5]. Y. Hao, C. Piao, Y. Zhao and X. Jiang, ―Privacy preserving government data sharing based on hyperledger blockchain‖, In proceedings of International Conference on e-Business Engineering, pp. 373-388, 2019.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Upgraded Crossover Mental Radio Specially Appointed Organizations For Versatile Organization |
Country | : | India |
Authors | : | K. Jayalakshmi || Dr. M. Prabakaran |
Abstract: The most challenging of all activities, maintaining secure data transmission in sensor networks is largely dependent on the data. The base station (BS), cluster head (CH), and sensor nodes (SNs), which are hierarchical components of the sensor network, will each have three separate keys: public and private, cluster and master. Cognitive radio (CR) technology is designed to overcome the problems in wireless networks caused by the restricted range that is accessible and the wasteful use of spectrum through the opportunistic use of the currently available wireless spectrum. Cognitive radio networks will provide the most sophisticated spectrum-aware communication paradigm in wireless communications thanks to its built-in capabilities.
[1]. A.A. Hasan Al-Rawi, and Kok-Lim Alvin Yau, Routing in Distributed Cognitive Radio Networks: A Survey. Wireless Personal Communications (Springer), Pages 1-38, 2012.
[2]. A.Cacciapuoti, M.Caleffi, and L.Paura, "Reactive routing for mobile cognitive radio ad hoc networks," Ad Hoc Netw., vol. 10, no. 5, pp. 803–815, Jul. 2012.
[3]. A.Sampath, L.Yang, L.Cao, H.Zheng, and B.Zhao, "High throughput spectrum-aware routing for cognitive radio networks," in Proc.CROWNCOM, Singapore, May 2008, pp. 1–6.
[4]. Abagnale, A.; Cuomo, F., "Leveraging the Algebraic Connectivity of a Cognitive Network for Routing Design," in Mobile Computing, IEEE Transactions on, vol.11, no.7, pp.1163-1178, July 2012
[5]. Abdulghfoor, O.B.; Ismail, M.; Nordin, R., "Application of game theory to underlay ad-hoc cognitive radio networks: An overview," in Space Science and Communication (IconSpace), 2013 IEEE International Conference on , vol., no., pp.296-301, 1-3 July 2013
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Agriculture Field Using In Artificial Intelligence A Literature Survey |
Country | : | India |
Authors | : | N.Rajeswari |
Abstract: India ismajorly an agricultural country. Various and different crops are cultivated in entire India. It is strange by having different climatic conditions in the same period .No state is devoid of agricultural cultivation. So, it direly needs the introduction and application of techniques and modern developments to boost the agricultural producerto cope up with this population explosion. This paper explains Artificial Intelligence which is novel in engineering science analysis. Unlike the age old traditional methods and applications, it has taken into account the major problemarea in cultivation........
Keywords: Artificial Intelligence, Agriculture, Internet Of Things, Devices
[1]. E. Rich and Kevin Knight. "Artificial intelligence", New Delhi: McGraw-Hill, 1991.
[2]. D.N. Baker, J.R. Lambert, J.M. McKinion, ―GOSSYM: A simulator of cotton crop growth and yield,‖ Technical bulletin, Agricultural Experiment Station, South Carolina, USA, 1983.
[3]. P. Martiniello, "Development of a database computer management system for retrieval on varietal field evaluation and plant breeding information in agriculture," Computers and electronics in agriculture, vol. 2 no. 3,pp. 183-192, 1988
[4]. Badia Melis. R et al., 2016. "Artificial neural networks and thermal image for temperature prediction in apples," Food and Bioprocess Technology, vol. 9 no.7, pp. 1089-1099.
[5]. Balleda, K et al., 2014. "Agpest: An efficient rule-based expert system to prevent pest diseases of rice & wheat crops," in Proc. Intelligent Systems and Control (ISCO)-2014, IEEE.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Collision-Free Data Aggregation for Data Transmission |
Country | : | India |
Authors | : | Sree Latha |
Abstract: Over the past few decades, Wireless Sensor Networks (WSNs) have attracted much attention from academia and business and are now integrated into the Internet. The restricted energy of WSNs directly impacts the lifespan of WSNs. Data transfer from sensor nodes to the base station is a significant energy consumer. Therefore, every practical option that aims to cut down on data transmissions has been considered by researchers. Collision is one of the main problems with data aggregation that increases energy waste. A data aggregation collision issue causes aggregation latency and data loss......
[1]. Kamble, A. A., & Patil, B. M. (2021). Systematic analysis and review of path optimization techniques in WSN with mobile sink. Computer Science Review, 41, 100412. [2]. Quy, V. K., Nam, V. H., Linh, D. M., Ban, N. T., & Han, N. D. (2021). A survey of QoS-aware routing protocols for the MANET-WSN convergence scenarios in IoT networks. Wireless Personal Communications, 120(1), 49-62. [3]. Ullah, A., Azeem, M., Ashraf, H., Jhanjhi, N. Z., Nkenyereye, L., & Humayun, M. (2021). Secure Critical Data Reclamation Scheme for Isolated Clusters in IoT enabled WSN. IEEE Internet of Things Journal. [4]. Naeem, A., Javed, A. R., Rizwan, M., Abbas, S., Lin, J. C. W., & Gadekallu, T. R. (2021). DARE-SEP: A hybrid approach of distance aware residual energy-efficient SEP for WSN. IEEE transactions on green communications and networking, 5(2), 611-621. [5]. Chan, L., Chavez, K. G., Rudolph, H., & Hourani, A. (2020). Hierarchical routing protocols for wireless sensor network: A compressive survey. Wireless Networks, 26(5), 3291-3314.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | IoT based Smart and Pervasive ICU for Improving Intensive Health Care |
Country | : | India |
Authors | : | A.Karthick |
Abstract: Setting up a smart and pervasive environment is one of the current challenges being investigated in several research topics. Among the panoply of applications enabled by the Internet of Things (IoT), smart and connected health care is a particularly important one. Networked sensors, either worn on the body or embedded in our living environments, make possible the gathering of rich information indicative of our physical and mental health. Design a smart intensive care units is an original idea and a recent research topic which is tackled in this work. First, in this paper, we highlight the opportunities and challenges for IoT in realizing this vision of the future of health care and then.......
Keywords: Smart and Pervarsive Health System, Internet Of Things (IoT), Medical Sensors Netwoks, Patient monitoring in Intensive Care Unit (ICU).
[1]. Moeen Hassanalieragh et al., "Health Monitoring and Management Using Internet-of-Things (IoT) Sensing with Cloud-Based Processing: Opportunities and Challenges", IEEE International Conference on Services Computing, 285 – 292, June 27, 2015.
[2]. A. Pantelopoulos and N. Bourbakis, "A survey on wearable sensor- based systems for health monitoring and prognosis," IEEE Trans. Sys., Man, and Cybernetics, Part C: Applic. and Reviews, vol. 40, no. 1, pp. 1–12, Jan 2010.
[3]. Arnaud S. R. M. Ahouandjinou, "Reconnaissance de scénario par les modèles de Markov cachés crédibilistes. Application à l'interprétation automatique de séquences vidéos médicales", Phd Thesis, 2014.
[4]. Ouafae Cohin, Patrick Sondi, "Internet of things for smart factory, IEEE COMSOC MMTC E-Letter, Vol. 10, No. 5, Septembre 2015.
[5]. R. Paradiso, G. Loriga, and N. Taccini, "A wearable health care system based on knitted integrated sensors," IEEE Trans. Info. Tech. in Biomedicine, vol. 9, no. 3, pp. 337–344, Sept 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparison of factor associated infant mortality between NFHS 4 and NFHS 5 data, India- Spatial Analysis |
Country | : | India |
Authors | : | Nandhini P || Vasna Joshua |
Abstract: WHO defines Infant mortality rate as the probability of a child born in a specific year or period dying before reaching the age of one, if subject to age-specific mortality rates of that period. The infant mortality rate is the number of infant deaths for every 1,000 live births. It is often used to identify vulnerable populations. Increasing IMR can be attributed to dissatisfied hygienic requirements, undesirable environmental factors, economic conditions, environmental health, and health care. The risk of child dying before completing the first year of age was highest in the African Region, 52 per 1000 live birth and 7 per 1000 live births
[1]. WHO infant mortality rate - Google Search. Accessed February 21, 2023. https://www.google.com/search?q=WHO+infant+mortality+rate&oq=WHO+infant+morta lity+rate&aqs=chrome..69i57.5946j0j7&sourceid=chrome&ie=UTF-8
[2]. National Family Health Survey. Accessed February 21, 2023. http://rchiips.org/nfhs/factsheet_NFHS-4.shtml
[3]. Spatial heterogeneity and correlates of child malnutrition in districts of India | BMC Public Health | Full Text. Accessed February 21, 2023. https://bmcpublichealth.biomedcentral.com/articles/10.1186/s12889-018-5873-z
[4]. Exploration of population ecological factors related to the spatial.pdf.
[5]. Infant Mortality in the United States, 1915-2017 Large Social.pdf.