Pub Date : 2017-01-01DOI: 10.35940/ijitee.f3729.059720
S. Jayashree, C. Ishwarya, P. Yesodha
In this paper, a smart garbage management system is proposed. This system monitors the garbage overflow in garbage bin. In this project, the level of garbage in the dustbin is detected with the help of sensor systems, and communicated to the authorized person through GSM system. Infrared sensor (IR sensor) is used to detect the level of garbage. Microcontroller is used to interface the sensor system with the GSM system. An RFID is used to monitor the desired information related to the garbage for different selected locations. It also monitors the attendance of the authority person. With the use of conveyor belt and PH sensor the degradable and non-degradable waste can be separated. Thus the collection and separation of garbage is monitored efficiently.
{"title":"Iot based Garbage and Waste Collection Bin Overflow Indicator","authors":"S. Jayashree, C. Ishwarya, P. Yesodha","doi":"10.35940/ijitee.f3729.059720","DOIUrl":"https://doi.org/10.35940/ijitee.f3729.059720","url":null,"abstract":"In this paper, a smart garbage management system is proposed. This system monitors the garbage overflow in garbage bin. In this project, the level of garbage in the dustbin is detected with the help of sensor systems, and communicated to the authorized person through GSM system. Infrared sensor (IR sensor) is used to detect the level of garbage. Microcontroller is used to interface the sensor system with the GSM system. An RFID is used to monitor the desired information related to the garbage for different selected locations. It also monitors the attendance of the authority person. With the use of conveyor belt and PH sensor the degradable and non-degradable waste can be separated. Thus the collection and separation of garbage is monitored efficiently.","PeriodicalId":13793,"journal":{"name":"International Journal of Advance Research and Innovative Ideas in Education","volume":"3 1","pages":"2235-2240"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82332898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Modelling and Optimization of water distribution system is addressed in this paper by WaterGEMS and EPANET. A water distribution network is used to show the algorithm performance and the obtained results are compared with those given by using dynamic programming to solve the same problem under the same conditions. The work presented in this thesis has been driven by the need for reduced, while at the same time suitably accurate, models to imitate the complex and nonlinear nature of water distribution systems to optimize their operation. WaterGEMS and EPANET are software that models the water transmission and distribution piping system. It is used to build a hypothetical model which is simulated and run to observe the performance of the network. Nagpur transmission network was designed and modelled for this study. The model is built from source- Pench Dam to the MBR in seminary hills. The models are later divided in 3 zones with assumed population. This system is optimized for diameter and pressure.
{"title":"MODELLING AND OPTIMIZATION OF WATER DISTRIBUTION SYSTEM” SITE: NAGPUR","authors":"R. Bhoyar","doi":"10.21090/ijaerd.32252","DOIUrl":"https://doi.org/10.21090/ijaerd.32252","url":null,"abstract":"Modelling and Optimization of water distribution system is addressed in this paper by WaterGEMS and EPANET. A water distribution network is used to show the algorithm performance and the obtained results are compared with those given by using dynamic programming to solve the same problem under the same conditions. The work presented in this thesis has been driven by the need for reduced, while at the same time suitably accurate, models to imitate the complex and nonlinear nature of water distribution systems to optimize their operation. WaterGEMS and EPANET are software that models the water transmission and distribution piping system. It is used to build a hypothetical model which is simulated and run to observe the performance of the network. Nagpur transmission network was designed and modelled for this study. The model is built from source- Pench Dam to the MBR in seminary hills. The models are later divided in 3 zones with assumed population. This system is optimized for diameter and pressure.","PeriodicalId":13793,"journal":{"name":"International Journal of Advance Research and Innovative Ideas in Education","volume":"35 1","pages":"1056-1068"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90531309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.5040/9781474290333.ch-002
M. Prabhakar
Logical empiricism is a philosophic movement rather than a set of doctrines, and it flourished in the 1920s and 30s in several centers in Europe and in the 40s and 50s in the United States. It had several different leaders whose views changed considerably over time. Moreover, these thinkers differed from one another, often sharply. Because logical empiricism is here construed as a movement rather than as doctrine, there is probably no important position that all logical empiricists shared—including, surprisingly enough, empiricism. And while most participants in the movement were empiricists of one form or another, they disagreed on what the best form of empiricism was and on the cognitive status of empiricism. What held the group together was a common concern for scientific methodology and the important role that science could play in reshaping society. Within that scientific methodology the logical empiricists wanted to find a natural and important role for logic and mathematics and to find an understanding of philosophy according to which it was part of the scientific enterprise.
{"title":"THE LEGACY OF LOGICAL EMPIRICISM","authors":"M. Prabhakar","doi":"10.5040/9781474290333.ch-002","DOIUrl":"https://doi.org/10.5040/9781474290333.ch-002","url":null,"abstract":"Logical empiricism is a philosophic movement rather than a set of doctrines, and it flourished in the 1920s and 30s in several centers in Europe and in the 40s and 50s in the United States. It had several different leaders whose views changed considerably over time. Moreover, these thinkers differed from one another, often sharply. Because logical empiricism is here construed as a movement rather than as doctrine, there is probably no important position that all logical empiricists shared—including, surprisingly enough, empiricism. And while most participants in the movement were empiricists of one form or another, they disagreed on what the best form of empiricism was and on the cognitive status of empiricism. What held the group together was a common concern for scientific methodology and the important role that science could play in reshaping society. Within that scientific methodology the logical empiricists wanted to find a natural and important role for logic and mathematics and to find an understanding of philosophy according to which it was part of the scientific enterprise.","PeriodicalId":13793,"journal":{"name":"International Journal of Advance Research and Innovative Ideas in Education","volume":"79 1","pages":"516-519"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80790616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nishikant G. Sadafale, Kulprabha V. Suryawanshi, Bhagyashree R. Bhute, A. Ubale
Security systems and navigators have always been a necessity of human’s life. Millions of children need to travel between homes to school every day. Safer transportation of school children has been a critical issue as it is often observed that, kids find themselves locked in the school bus after going to school, they miss the bus or ride. This project intends to find yet another solution to solve this problem by developing a bus safety system that will control the entry and exit of students from the buses through an efficient methodology. The proposed system will control the entry and exit of students to and from the bus using RFID (Radio Frequency Identification) and GSM technologies to ensure the entering and exiting of all students to and from the school bus in a safer manner. The process, does not require any additional process to be done by the students and drivers. The system will do all the process and allow the student to be tracked while entering and leaving the bus. If the bus journey is successful from the source to destination, it will send an SMS to the management to inform its departure and arrival. By using RFID technology other applications such as locate access control, location tracking, billing easily and other applications. RFID tags are expected to multiply into the billions over the coming few years.
{"title":"SCHOOL BUS ATTENDANCE AND MONITORING SYSTEM USING RFID","authors":"Nishikant G. Sadafale, Kulprabha V. Suryawanshi, Bhagyashree R. Bhute, A. Ubale","doi":"10.21090/ijaerd.66616","DOIUrl":"https://doi.org/10.21090/ijaerd.66616","url":null,"abstract":"Security systems and navigators have always been a necessity of human’s life. Millions of children need to travel between homes to school every day. Safer transportation of school children has been a critical issue as it is often observed that, kids find themselves locked in the school bus after going to school, they miss the bus or ride. This project intends to find yet another solution to solve this problem by developing a bus safety system that will control the entry and exit of students from the buses through an efficient methodology. The proposed system will control the entry and exit of students to and from the bus using RFID (Radio Frequency Identification) and GSM technologies to ensure the entering and exiting of all students to and from the school bus in a safer manner. The process, does not require any additional process to be done by the students and drivers. The system will do all the process and allow the student to be tracked while entering and leaving the bus. If the bus journey is successful from the source to destination, it will send an SMS to the management to inform its departure and arrival. By using RFID technology other applications such as locate access control, location tracking, billing easily and other applications. RFID tags are expected to multiply into the billions over the coming few years.","PeriodicalId":13793,"journal":{"name":"International Journal of Advance Research and Innovative Ideas in Education","volume":"76 1","pages":"1938-1943"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83133523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.23883/ijrter.2018.4187.6d5z7
Tejaswini A Mahajan, Vrushali Gangurde, Dipali Nerkar, J. Mahajan, M. Jagtap
Over the past three decades, a number of face recognition methods have been proposed in computer vision, and most of them use holistic face images for person identification. In many real-world scenarios especially some unconstrained environments, human faces might be occluded by other objects and it is difficult to obtain fully holistic face images for recognition. To address this, system propose a new partial face recognition approach to recognize persons of interest from their partial faces. Given a pair of gallery image and probe face patch, system first detect key points and extract their local textural features. Then, system propose a robust point set matching (RPSM) method to discriminatively match these two extracted local feature sets, where both the textural and geometrical information of local features are explicitly used for matching simultaneously. Lastly, the similarity of two faces is converted as the distance between these two aligned feature sets. Experimental results on four public face datasets show the effectiveness of the proposed approach.
{"title":"Partial Face Recognition Using RPSM Algorithm","authors":"Tejaswini A Mahajan, Vrushali Gangurde, Dipali Nerkar, J. Mahajan, M. Jagtap","doi":"10.23883/ijrter.2018.4187.6d5z7","DOIUrl":"https://doi.org/10.23883/ijrter.2018.4187.6d5z7","url":null,"abstract":"Over the past three decades, a number of face recognition methods have been proposed in computer vision, and most of them use holistic face images for person identification. In many real-world scenarios especially some unconstrained environments, human faces might be occluded by other objects and it is difficult to obtain fully holistic face images for recognition. To address this, system propose a new partial face recognition approach to recognize persons of interest from their partial faces. Given a pair of gallery image and probe face patch, system first detect key points and extract their local textural features. Then, system propose a robust point set matching (RPSM) method to discriminatively match these two extracted local feature sets, where both the textural and geometrical information of local features are explicitly used for matching simultaneously. Lastly, the similarity of two faces is converted as the distance between these two aligned feature sets. Experimental results on four public face datasets show the effectiveness of the proposed approach.","PeriodicalId":13793,"journal":{"name":"International Journal of Advance Research and Innovative Ideas in Education","volume":"24 1","pages":"2090-2093"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86379257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new technique is proposed for secure image transmission, which automatically transforms large-volume secret image into secret-fragment-visible mosaic image of the same size. The mosaic image is obtained by dividing the secret image into fragments and transforming their color characteristics to be those of the corresponding blocks of the target image. It looks similar to an arbitrarily selected target image and may be used as a camouflage of the secret image. We proposed a approach to enhance security of the mosaic image by providing better Encryption logic which provide faster encryption. And for the sake of transmission we proposed JPEG lossless compression technique which provide good compression ratio.
{"title":"ENHANCING SECURITY ON MOSAIC IMAGE USING CRYPTOGRAPHIC ALGORITHM AND COMPRESSION TECHNIQUE","authors":"Nilam Gandhe, Vikas Kumar","doi":"10.18535/IJECS/V4I10.46","DOIUrl":"https://doi.org/10.18535/IJECS/V4I10.46","url":null,"abstract":"A new technique is proposed for secure image transmission, which automatically transforms large-volume secret image into secret-fragment-visible mosaic image of the same size. The mosaic image is obtained by dividing the secret image into fragments and transforming their color characteristics to be those of the corresponding blocks of the target image. It looks similar to an arbitrarily selected target image and may be used as a camouflage of the secret image. We proposed a approach to enhance security of the mosaic image by providing better Encryption logic which provide faster encryption. And for the sake of transmission we proposed JPEG lossless compression technique which provide good compression ratio.","PeriodicalId":13793,"journal":{"name":"International Journal of Advance Research and Innovative Ideas in Education","volume":"13 1","pages":"684-690"},"PeriodicalIF":0.0,"publicationDate":"2016-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82474349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-01-01DOI: 10.21275/v4i12.nov152063
Bhavisha Patel
Reconstruction of sharedded pieces is requisite in archaeology, art conservation, and forensics for Recovery of important information from shredded and damage documents. Documents can be machine-shredded or hand-shredded. Reconstructing the document manually with the help of glue, sellotape etc is a tedious and time consuming process as well as the output is not satisfactory. Hence, here we are illustrating a process to recover the original document from its shredded pieces by using the concept of Image Mosaicing. Image Mosaicing is a process where two or more shredded images are merged together to form a single, continuous image. Here, in this paper we have to reconstruct the shredded fragments and then find Accuracy of two types of torn fragments one is strip shredded and another one is hand shredded fragments. The input of shredded pieces is scanned or capture by camera and various processing is applied to match the two or more shredded piece and in the last stage the shredded pieces are finally stitched and the original document is recovered.
{"title":"Reconstruction of Shredded Document Using Image Mosaicing Technique","authors":"Bhavisha Patel","doi":"10.21275/v4i12.nov152063","DOIUrl":"https://doi.org/10.21275/v4i12.nov152063","url":null,"abstract":"Reconstruction of sharedded pieces is requisite in archaeology, art conservation, and forensics for Recovery of important information from shredded and damage documents. Documents can be machine-shredded or hand-shredded. Reconstructing the document manually with the help of glue, sellotape etc is a tedious and time consuming process as well as the output is not satisfactory. Hence, here we are illustrating a process to recover the original document from its shredded pieces by using the concept of Image Mosaicing. Image Mosaicing is a process where two or more shredded images are merged together to form a single, continuous image. Here, in this paper we have to reconstruct the shredded fragments and then find Accuracy of two types of torn fragments one is strip shredded and another one is hand shredded fragments. The input of shredded pieces is scanned or capture by camera and various processing is applied to match the two or more shredded piece and in the last stage the shredded pieces are finally stitched and the original document is recovered.","PeriodicalId":13793,"journal":{"name":"International Journal of Advance Research and Innovative Ideas in Education","volume":"138 1","pages":"617-626"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78189086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Now-a-days Millions of people are sharing their views daily on micro blogging sites, it contains short and simple expressions. In this paper, we will discuss about a perspective to extract the sentiment from a Twitter, where users post their opinions for everything. we are going to concentrate on twitter, which is a micro blogging site. Many people tweet their feeling on twitter. In this project , we are going to analyze the tweets made by people. And determine their happiness. We are going to do sentiment analysis on this twitter data. These messages or tweets are classified as positive, negative or neutral with respect to a expression. This is very useful for the companies who want to know the feedback about their product brands or the customers who want to search the recommendation from others about product before purchase. We will use natural language toolkit processing algorithms for classifying the sentiment of Twitter messages We are going to make a web based UI application. Which will show the data and crawl through live feeds.
{"title":"Sentiment Analysis On Twitter Data","authors":"S. Shweta, Kanade Ashwini, U. Rohini, K. Priyanka","doi":"10.4135/9781526468857","DOIUrl":"https://doi.org/10.4135/9781526468857","url":null,"abstract":"Now-a-days Millions of people are sharing their views daily on micro blogging sites, it contains short and simple expressions. In this paper, we will discuss about a perspective to extract the sentiment from a Twitter, where users post their opinions for everything. we are going to concentrate on twitter, which is a micro blogging site. Many people tweet their feeling on twitter. In this project , we are going to analyze the tweets made by people. And determine their happiness. We are going to do sentiment analysis on this twitter data. These messages or tweets are classified as positive, negative or neutral with respect to a expression. This is very useful for the companies who want to know the feedback about their product brands or the customers who want to search the recommendation from others about product before purchase. We will use natural language toolkit processing algorithms for classifying the sentiment of Twitter messages We are going to make a web based UI application. Which will show the data and crawl through live feeds.","PeriodicalId":13793,"journal":{"name":"International Journal of Advance Research and Innovative Ideas in Education","volume":"63 1","pages":"87-90"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85023053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agriculture is the mother of all cultures. Due to increasing demand in the agricultural industry, the need to effectively grow a plant and increase its yield is very important. Diseases in fruit cause devastating problem in economic losses and production in agricultural industry worldwide. So to protect the product, it is important to monitor the plant during its growth period, as well as, at the time of harvest. In this paper, a solution for the detection and classification of Strawberry fruit diseases is proposed and experimentally validated. For Fruit Disease Detection, the image processing based proposed approach is composed with the following main steps; in first step, Image acquisition is done, After that in second step Preprocessing is done including Noise Remove using masking and Image Enhancement using Discrete Cosine Transform (DCT). In third step Feature Extraction is done, in which, Color Feature Extraction using Color Space Conversion and Texture Feature Extraction using Canny Edge Detection and Dilation. As same as, For Fruit Leaf Disease Detection, the image processing based proposed approach is composed with the following main steps; in first step, Image acquisition is done, in this images are collected from Internet. After that in second step Preprocessing is carried out. In which, Image Enhancement is done using Equalize Histogram and Color Space Conversion. In third step Feature Extraction is done using Gray Level Co-occurrence Matrix (GLCM) for Texture Feature Extraction. After that, classification is done using Support Vector Machine (SVM) Classifier.
{"title":"An Approach for Detection and Classification of Fruit Disease","authors":"Zalak R. Barot, Narendra Limbad","doi":"10.21275/v4i12.8121502","DOIUrl":"https://doi.org/10.21275/v4i12.8121502","url":null,"abstract":"Agriculture is the mother of all cultures. Due to increasing demand in the agricultural industry, the need to effectively grow a plant and increase its yield is very important. Diseases in fruit cause devastating problem in economic losses and production in agricultural industry worldwide. So to protect the product, it is important to monitor the plant during its growth period, as well as, at the time of harvest. In this paper, a solution for the detection and classification of Strawberry fruit diseases is proposed and experimentally validated. For Fruit Disease Detection, the image processing based proposed approach is composed with the following main steps; in first step, Image acquisition is done, After that in second step Preprocessing is done including Noise Remove using masking and Image Enhancement using Discrete Cosine Transform (DCT). In third step Feature Extraction is done, in which, Color Feature Extraction using Color Space Conversion and Texture Feature Extraction using Canny Edge Detection and Dilation. As same as, For Fruit Leaf Disease Detection, the image processing based proposed approach is composed with the following main steps; in first step, Image acquisition is done, in this images are collected from Internet. After that in second step Preprocessing is carried out. In which, Image Enhancement is done using Equalize Histogram and Color Space Conversion. In third step Feature Extraction is done using Gray Level Co-occurrence Matrix (GLCM) for Texture Feature Extraction. After that, classification is done using Support Vector Machine (SVM) Classifier.","PeriodicalId":13793,"journal":{"name":"International Journal of Advance Research and Innovative Ideas in Education","volume":"1 1","pages":"1917-1926"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88666511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Natural language processing (NLP) is an area of computer science, artificial intelligence, and computational linguistics connected with the communications between computers and natural languages. There are many challenges in NLP involve natural language understanding, that is, enabling computers to derive meaning from human or natural language input, and others involve natural language generation. Document summarization is a part of it. Many different classes of such process based on machine learning are developed. In researches earlier document summarization mostly use the similarity between sentences in the document to extract the most significant sentences. The documents as well as the sentences are indexed using traditional term indexing measures, which do not take the context into consideration. The resulting indexing weights are used to compute the sentence similarity matrix. The proposed sentence similarity measure has been used with the baseline graph-based ranking models for sentence extraction.
{"title":"An algorithm of word indexing model for document summarization based on perspective of document","authors":"M. Shah","doi":"10.21275/v5i3.nov162223","DOIUrl":"https://doi.org/10.21275/v5i3.nov162223","url":null,"abstract":"Natural language processing (NLP) is an area of computer science, artificial intelligence, and computational linguistics connected with the communications between computers and natural languages. There are many challenges in NLP involve natural language understanding, that is, enabling computers to derive meaning from human or natural language input, and others involve natural language generation. Document summarization is a part of it. Many different classes of such process based on machine learning are developed. In researches earlier document summarization mostly use the similarity between sentences in the document to extract the most significant sentences. The documents as well as the sentences are indexed using traditional term indexing measures, which do not take the context into consideration. The resulting indexing weights are used to compute the sentence similarity matrix. The proposed sentence similarity measure has been used with the baseline graph-based ranking models for sentence extraction.","PeriodicalId":13793,"journal":{"name":"International Journal of Advance Research and Innovative Ideas in Education","volume":"64 1","pages":"1978-1991"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89934890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}