Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Other Computer Engineering

A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl Dec 2020

A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl

Library Philosophy and Practice (e-journal)

Due to a pandemic situation arising from the past few decades and the covid -19 patients are increasing at the rapid rate. Looking in the near future an IOT model is build which can be useful for people in coming years and allows rapid testing and efficient testing methodologies using various sensors such as Temperature, Respiration, RFID etc which takes various parameters. The study focuses around 412 scientific documents such as Journals, articles, book chapters and Patents in various papers. These documents are extracted from the scopus databases after querying with the keywords related to covid patients and IOT. The …


A Systematic Literature Review With Bibliometric Meta-Analysis Of Deep Learning And 3d Reconstruction Methods In Image Based Food Volume Estimation Using Scopus, Web Of Science And Ieee Database, Prachi Kadam, Nayana Petkar, Shraddha Phansalkar Dr. Nov 2020

A Systematic Literature Review With Bibliometric Meta-Analysis Of Deep Learning And 3d Reconstruction Methods In Image Based Food Volume Estimation Using Scopus, Web Of Science And Ieee Database, Prachi Kadam, Nayana Petkar, Shraddha Phansalkar Dr.

Library Philosophy and Practice (e-journal)

Purpose- Estimation of food portions is necessary in image based dietary monitoring techniques. The purpose of this systematic survey is to identify peer reviewed literature in image-based food volume estimation methods in Scopus, Web of Science and IEEE database. It further analyzes bibliometric survey of image-based food volume estimation methods with 3D reconstruction and deep learning techniques.

Design/methodology/approach- Scopus, Web of Science and IEEE citation databases are used to gather the data. Using advanced keyword search and PRISMA approach, relevant papers were extracted, selected and analyzed. The bibliographic data of the articles published in the journals over the past …


A Bibliometric Survey Of Smart Wearable In The Health Insurance Industry, Apeksha Shah, Swati Ahirrao, Shraddha Phansalkar, Ketan Kotecha Nov 2020

A Bibliometric Survey Of Smart Wearable In The Health Insurance Industry, Apeksha Shah, Swati Ahirrao, Shraddha Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Smart wearables help real-time and remote monitoring of health data for effective diagnostic and preventive health care services. Wearable devices have the ability to track and monitor healthcare vitals such as heart rate, physical activities, BMI (Body Mass Index), blood pressure, and keeps an individual notified about the health status. Artificial Intelligence-enabled wearables show an ability to transform the health insurance sector. This would not only enable self-management of individual health but also help them focus from treatments to the preventions of health hazards. With this customer-centric approach to health care, it will enable the insurance companies to track the …


Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade Oct 2020

Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade

Library Philosophy and Practice (e-journal)

Authentication is an essential step for giving access to resources to authorized individuals and prevent leakage of confidential information. The traditional authentication systems like a pin, card, a password could not differentiate among the authorized users and fakers who have an illegal access to the system. Traditional authentication technique never alerts about the unwanted access to the system. The device that allows the automatic identification of an individual is known as a biometric system. It is not required to remember a password, card, and pin code in the Bio-metric system. Numerous biometric characteristics like the fingerprint, iris, palm print, face …


A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha Oct 2020

A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

The Internet has become an essential part of modern communication. People are sharing ideas, thoughts, and beliefs easily, using social media. This sharing of ideas has raised a big problem like the spread of the radicalized extremist ideas. The various extremist organizations use the social media as a propaganda tool. The extremist organizations actively radicalize and recruit youths by sharing inciting material on social media. Extremist organizations use social media to influence people to carry out lone-wolf attacks. Social media platforms employ various strategies to identify and remove the extremist content. But due to the sheer amount of data and …


A Bibliometric Survey On Cognitive Document Processing, Dipali Baviskar, Swati Ahirrao, Ketan Kotecha Oct 2020

A Bibliometric Survey On Cognitive Document Processing, Dipali Baviskar, Swati Ahirrao, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Heterogenous and voluminous unstructured data is produced from various sources like emails, social media tweets, reviews, videos, audio, images, PDFs, scanned documents, etc. Organizations need to store this wide range of unstructured data for more and longer periods so that they can examine information all the more profoundly to make a better decision and extracting useful insights. Manual processing of such unstructured data is always a challenging, time-consuming, and expensive task for any organization. Automating unstructured document processing using Optical Character Recognition (OCR) and Robotics Process Automation (RPA), seems to have limitations, as those techniques are driven by rules or …


A Bibliometric Survey On The Reliable Software Delivery Using Predictive Analysis, Jalaj Pachouly, Swati Ahirrao, Ketan Kotecha Oct 2020

A Bibliometric Survey On The Reliable Software Delivery Using Predictive Analysis, Jalaj Pachouly, Swati Ahirrao, Ketan Kotecha

Library Philosophy and Practice (e-journal)

Delivering a reliable software product is a fairly complex process, which involves proper coordination from the various teams in planning, execution, and testing for delivering software. Most of the development time and the software budget's cost is getting spent finding and fixing bugs. Rework and side effect costs are mostly not visible in the planned estimates, caused by inherent bugs in the modified code, which impact the software delivery timeline and increase the cost. Artificial intelligence advancements can predict the probable defects with classification based on the software code changes, helping the software development team make rational decisions. Optimizing the …


Bibliometric Analysis Of Passive Image Forgery Detection And Explainable Ai, Kalyani Dhananjay Kadam, Dr. Swati Ahirrao Ahirrao, Dr. Ketan Kotecha Jan 2020

Bibliometric Analysis Of Passive Image Forgery Detection And Explainable Ai, Kalyani Dhananjay Kadam, Dr. Swati Ahirrao Ahirrao, Dr. Ketan Kotecha

Library Philosophy and Practice (e-journal)

Due to the arrival of social networking services such as Facebook and Instagram, there has been a vast increase in the volume of image data generated in the last decade. The use of image processing tools like GNU Gimp, Adobe Photoshop to create doctored images and videos is a major concern. These are the main sources of fake news and are often used in malevolent ways such as for mob incitement. Before a move can be taken based on a fake image, we should confirm its realness. This paper shows systematic mappings of existing literature for image forgery detection using …


Bibliometric Analysis Of Bearing Fault Detection Using Artificial Intelligence, Pooja Kamat, Rekha Sugandhi Dr. Jan 2020

Bibliometric Analysis Of Bearing Fault Detection Using Artificial Intelligence, Pooja Kamat, Rekha Sugandhi Dr.

Library Philosophy and Practice (e-journal)

The new industrial revolution called Industry 4.0 is proliferating at its peak. The time is no longer away when the human race is going to witness a huge paradigm shift. Intelligent machines empowered by Artificial Intelligence (AI)will take over the presence of human workers in the industrial manufacturing sector with the target of achieving 100% automation. With the emergence of cut-throat price competition in the product market, it has become equally important to manufacture goods at minimal costs and with the highest quality. Predicting the decrease in machinery efficiency at an earlier stage to accomplish this objective helps to reduce …