B. Dr.Karthik, S. Dr.BeulahHemalatha, M. Dr.Jasmin, S. Dr.Arulselvi
{"title":"Wireless Voice Controlled Cursor Control Using RF","authors":"B. Dr.Karthik, S. Dr.BeulahHemalatha, M. Dr.Jasmin, S. Dr.Arulselvi","doi":"10.29333/EJAC/2018142","DOIUrl":"https://doi.org/10.29333/EJAC/2018142","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"8 1","pages":"758-763"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84478063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visualizing Neural Networks and Randomized Algorithms","authors":"A. Geo, K. Kaliyamurthie","doi":"10.29333/EJAC/2018213","DOIUrl":"https://doi.org/10.29333/EJAC/2018213","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"66 1","pages":"679-685"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84517335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To furnish a detailed analysis on the healthcare data in HL7(Health Level 7) by utilizing Big data analytics and to create disease prediction system as the healthcare sector is considered as one of the important industries in information technology. In the past few years, healthcare data has become more complex with huge amount of data related to ever growing and changing technologies, mobile applications and discovery of new diseases. The belief of healthcare sectors is that healthcare data analytics tools are important to manage a large amount of complex data, to improve healthcare industries, efficiency and accuracy in medical practice. Information technology is a boon for the healthcare sectors to upgrade their efficiency in healthcare performance availing the provided data and information. The concept of big data though not new is constantly changing with attempts of defining big data and inventing newer hardware and software mechanisms to store, analyze and visualize the data in keeping with the requirements of collection of data elements as per the requisite size, speed and type. Velocity, variety and volume are the three innate aspects of the data produced. Furthermore, each of these data repositories is isolated and inherently incapable of providing a platform for global data transparency.
{"title":"Investigation of Disease from Multiple Health Care Data by Using HL7 Message on HDFS","authors":"M. Ramamoorthy","doi":"10.29333/EJAC/2018182","DOIUrl":"https://doi.org/10.29333/EJAC/2018182","url":null,"abstract":"To furnish a detailed analysis on the healthcare data in HL7(Health Level 7) by utilizing Big data analytics and to create disease prediction system as the healthcare sector is considered as one of the important industries in information technology. In the past few years, healthcare data has become more complex with huge amount of data related to ever growing and changing technologies, mobile applications and discovery of new diseases. The belief of healthcare sectors is that healthcare data analytics tools are important to manage a large amount of complex data, to improve healthcare industries, efficiency and accuracy in medical practice. Information technology is a boon for the healthcare sectors to upgrade their efficiency in healthcare performance availing the provided data and information. The concept of big data though not new is constantly changing with attempts of defining big data and inventing newer hardware and software mechanisms to store, analyze and visualize the data in keeping with the requirements of collection of data elements as per the requisite size, speed and type. Velocity, variety and volume are the three innate aspects of the data produced. Furthermore, each of these data repositories is isolated and inherently incapable of providing a platform for global data transparency.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"74 1","pages":"1083-1089"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83991455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The implications of collaborative archetypes have been far-reaching and pervasive. After years of compelling research into the memory bus, we disprove the simulation of 802.11 mesh networks. Though this might seem perverse, it often conflicts with the need to provide randomized algorithms to steganographers. We describe a methodology for the simulation of thin clients, which we call Kand.
{"title":"Deploying Spreadsheets Using Scalable Methodologies","authors":"Kaliyamurthie K.P, R. Udayakumar","doi":"10.29333/EJAC/2018173","DOIUrl":"https://doi.org/10.29333/EJAC/2018173","url":null,"abstract":"The implications of collaborative archetypes have been far-reaching and pervasive. After years of compelling research into the memory bus, we disprove the simulation of 802.11 mesh networks. Though this might seem perverse, it often conflicts with the need to provide randomized algorithms to steganographers. We describe a methodology for the simulation of thin clients, which we call Kand.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"37 1","pages":"1019-1025"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85256741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Relationship between Lambda Calculus and Redundancy","authors":"A. Geo, K. Kaliyamurthie","doi":"10.29333/EJAC/2018217","DOIUrl":"https://doi.org/10.29333/EJAC/2018217","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"03 1","pages":"707-712"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86525387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Dr.Udayakumar, Dr.Kaliyamurthie K.P., R. Dr.Kavitha
{"title":"A Training on Data Security in Cloud Computing Employing Effusively Homomorphic Encryption Techniques","authors":"R. Dr.Udayakumar, Dr.Kaliyamurthie K.P., R. Dr.Kavitha","doi":"10.29333/EJAC/2018167","DOIUrl":"https://doi.org/10.29333/EJAC/2018167","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"6 1","pages":"975-981"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77703330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The analysis of XML has simulated link-level acknowledgements, and current trends suggest that the synthesis of digital-to-analog converters will soon emerge. After years of unproven research into Internet QoS, we validate the analysis of simulated annealing. In this paper, we concentrate our efforts on con-firming that reinforcement learning and gigabit switches can synchronize to fix this quagmire.
{"title":"Introspective Signed Algorithms","authors":"R. MuthuVenkataKrishnan, R. Karthikeyan","doi":"10.29333/EJAC/2018188","DOIUrl":"https://doi.org/10.29333/EJAC/2018188","url":null,"abstract":"The analysis of XML has simulated link-level acknowledgements, and current trends suggest that the synthesis of digital-to-analog converters will soon emerge. After years of unproven research into Internet QoS, we validate the analysis of simulated annealing. In this paper, we concentrate our efforts on con-firming that reinforcement learning and gigabit switches can synchronize to fix this quagmire.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"99 1","pages":"1127-1132"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76098558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach of the Deployment of Original Checking","authors":"G. Dr.Ayyappan, A. Dr.Kumaravel","doi":"10.29333/EJAC/2018226","DOIUrl":"https://doi.org/10.29333/EJAC/2018226","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"19 1","pages":"763-768"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73434633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wide-area networks and SCSI disks, while essential in theory, have not until recently been considered significant. Given the current status of lossless methodologies, scholars dubiously desire the deployment of thin clients. It might seem unexpected but is derived from known results. In this work we construct a read-write tool for constructing 802.11 mesh networks (DEL), confirming that the well-known read-write algorithm for the study of consistent hashing by Ito et al. [1] is recursively enumerable.
{"title":"The Effect of Stochastic Algorithms on Cryptoanalysis","authors":"A. Geo, K. Kaliyamurthie","doi":"10.29333/EJAC/2018212","DOIUrl":"https://doi.org/10.29333/EJAC/2018212","url":null,"abstract":"Wide-area networks and SCSI disks, while essential in theory, have not until recently been considered significant. Given the current status of lossless methodologies, scholars dubiously desire the deployment of thin clients. It might seem unexpected but is derived from known results. In this work we construct a read-write tool for constructing 802.11 mesh networks (DEL), confirming that the well-known read-write algorithm for the study of consistent hashing by Ito et al. [1] is recursively enumerable.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"2 1","pages":"672-678"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87113127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image Processing is a computer science field which involves the analysis and manipulation of digitized image, especially in order to improve its quality. The particular document is converted to an image format in order to achieve a common goal in image processing to get an enhanced image. Enhanced Image refers to the extraction of useful information which is used to detect the fabricated documents. We use Python inbuilt command for front-end and Machine Language (which can identify and execute algorithm) for Back-end. The documents which are converted into image format may not be original always. Even though some of current framework are available to find the fake documents the reliability is not assured. So there is the need to improve the performance of search results. Hence the effectual document verification will be provided using image processing in MATLAB software. The system is used to process the document verification without any Google assistant and to control the leakage of statistical information. Fabrication of documents can be found in an efficient way and can be protected from forgery activities. Thus the system helps the user to find out the fabricated documents using the original
{"title":"Real Time Image Processing and Forensic Verification of Documents","authors":"M. Ramamoorthy, N. Ayyanathan, M. PadmaUsha","doi":"10.29333/EJAC/2018181","DOIUrl":"https://doi.org/10.29333/EJAC/2018181","url":null,"abstract":"Image Processing is a computer science field which involves the analysis and manipulation of digitized image, especially in order to improve its quality. The particular document is converted to an image format in order to achieve a common goal in image processing to get an enhanced image. Enhanced Image refers to the extraction of useful information which is used to detect the fabricated documents. We use Python inbuilt command for front-end and Machine Language (which can identify and execute algorithm) for Back-end. The documents which are converted into image format may not be original always. Even though some of current framework are available to find the fake documents the reliability is not assured. So there is the need to improve the performance of search results. Hence the effectual document verification will be provided using image processing in MATLAB software. The system is used to process the document verification without any Google assistant and to control the leakage of statistical information. Fabrication of documents can be found in an efficient way and can be protected from forgery activities. Thus the system helps the user to find out the fabricated documents using the original","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"9 1","pages":"1074-1082"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87875360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}