The present study included the diagnosis of three species of hard ticks belong to the family Ixodidae parasitizing 72 cows out of a total of 145 cows examined, with a total distribution ratio of 49.6% in the eastern and western regions of Mosul city. Tick species were diagnosed according to morphological and standard characteristics such as palps, capitulum, coxa, scutum, anus, and spiracles. Ticks of H. anatolicum anatolicum recorded the highest prevalence and distribution ratio in cows of 48.6%, followed by both B. annulatus and R. turanicus with 34.7%, 16.7% respectively. As for specifying the patterns of ticks’ distribution on cows, it was observed that a pattern of single infestation recorded highest distribution ratio of 51%, followed by a double-infestation of 19.4%, while a mixed infestation pattern recorded lowest ratio of 9.7%. With regard to the distribution of tick species on the body areas per tick species, the results showed the prevalence and distribution of H. anatolicum anatolicum tick species on the back was 44.1%, B. anaulatus recorded highest prevalence ratio of 29% in the ear, while R. truanicus recorded highest prevalence in the ear, back, and Axillary of 37.1%, 28.5%, and 20% respectively. The results concerning the distribution of tick species in each area of body showed the prevalence of H. anatolicum anatolicum in the ear area by 51.1%, both H. anatolicum and anatolicum recorded highest prevalence ratio in the tail by 51.6% and 43.6% respectively, and highest prevalence of H. anatolicum and anatolicum species was found in the back by 72%, while the highest prevalence of B.annaulatus Journal of University of Shanghai for Science and Technology ISSN: 1007-6735 Volume 23, Issue 6, June 2021 Page -358 was found in the udder and Axillary of 57.9% and 56.4% respectively. Nevertheless, the results illustrated that no significant difference had been found regarding the distribution and prevalence of tick species in the eastern and western regions of the city of Mosul.
{"title":"Diagnosis and Distribution of Hard Ticks in Cows in Mosul City-Iraq","authors":"Hiba Hazim Mahmoud, Eman Daham Hadi Al-Mola","doi":"10.51201/JUSST/21/05247","DOIUrl":"https://doi.org/10.51201/JUSST/21/05247","url":null,"abstract":"The present study included the diagnosis of three species of hard ticks belong to the family Ixodidae parasitizing 72 cows out of a total of 145 cows examined, with a total distribution ratio of 49.6% in the eastern and western regions of Mosul city. Tick species were diagnosed according to morphological and standard characteristics such as palps, capitulum, coxa, scutum, anus, and spiracles. Ticks of H. anatolicum anatolicum recorded the highest prevalence and distribution ratio in cows of 48.6%, followed by both B. annulatus and R. turanicus with 34.7%, 16.7% respectively. As for specifying the patterns of ticks’ distribution on cows, it was observed that a pattern of single infestation recorded highest distribution ratio of 51%, followed by a double-infestation of 19.4%, while a mixed infestation pattern recorded lowest ratio of 9.7%. With regard to the distribution of tick species on the body areas per tick species, the results showed the prevalence and distribution of H. anatolicum anatolicum tick species on the back was 44.1%, B. anaulatus recorded highest prevalence ratio of 29% in the ear, while R. truanicus recorded highest prevalence in the ear, back, and Axillary of 37.1%, 28.5%, and 20% respectively. The results concerning the distribution of tick species in each area of body showed the prevalence of H. anatolicum anatolicum in the ear area by 51.1%, both H. anatolicum and anatolicum recorded highest prevalence ratio in the tail by 51.6% and 43.6% respectively, and highest prevalence of H. anatolicum and anatolicum species was found in the back by 72%, while the highest prevalence of B.annaulatus Journal of University of Shanghai for Science and Technology ISSN: 1007-6735 Volume 23, Issue 6, June 2021 Page -358 was found in the udder and Axillary of 57.9% and 56.4% respectively. Nevertheless, the results illustrated that no significant difference had been found regarding the distribution and prevalence of tick species in the eastern and western regions of the city of Mosul.","PeriodicalId":17520,"journal":{"name":"Journal of the University of Shanghai for Science and Technology","volume":"33 1","pages":"358-374"},"PeriodicalIF":0.0,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86242933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this digital era, extensive usage of internet has resulted in images being subjected to various distortions during processing and transmitting over open networks. For watermarking applications, watermarked image quality is evaluated in comparison to the original image. In the last decade literature, many performance metrics have been used, comprising of both subjective and objective quality metrics. The subjective image quality metrics are generally time consuming and expensive in contrast to objective image quality metrics. This paper, attempted an investigation for measuring performance of nested watermarking schemes and objective image quality metrics which included Peak signal to Noise Ratio (PNSR), Mean Square Error (MSE), Correlation Coefficient (CC), Normalized Correlation Coefficient (NCC) and Structural Similarity Index (SSIM). For the proposed nested watermarking method, these objective image quality metrics were evaluated using combination of Discrete Wavelet Transforms (DWT) and Singular values (SVD) in the four frequency bands. Performance of objective metrics can be judged based on the their sensitiveness to watermarking artifacts. It is clear from the results obtained, for most watermarking applications SSIM provides better insight into the performance of the algorithm used where as PNSR fails for certain watermark artifacts. Findings drawn in this paper are based on the experimentation of nested watermarking algorithm using a DICOM image database.
{"title":"Performance Evaluation of Nested Watermarked Scheme using Objective Image Quality Metrics","authors":"Priya R Sankpal, P. Vijaya","doi":"10.51201/JUSST/21/05273","DOIUrl":"https://doi.org/10.51201/JUSST/21/05273","url":null,"abstract":"In this digital era, extensive usage of internet has resulted in images being subjected to various distortions during processing and transmitting over open networks. For watermarking applications, watermarked image quality is evaluated in comparison to the original image. In the last decade literature, many performance metrics have been used, comprising of both subjective and objective quality metrics. The subjective image quality metrics are generally time consuming and expensive in contrast to objective image quality metrics. This paper, attempted an investigation for measuring performance of nested watermarking schemes and objective image quality metrics which included Peak signal to Noise Ratio (PNSR), Mean Square Error (MSE), Correlation Coefficient (CC), Normalized Correlation Coefficient (NCC) and Structural Similarity Index (SSIM). For the proposed nested watermarking method, these objective image quality metrics were evaluated using combination of Discrete Wavelet Transforms (DWT) and Singular values (SVD) in the four frequency bands. Performance of objective metrics can be judged based on the their sensitiveness to watermarking artifacts. It is clear from the results obtained, for most watermarking applications SSIM provides better insight into the performance of the algorithm used where as PNSR fails for certain watermark artifacts. Findings drawn in this paper are based on the experimentation of nested watermarking algorithm using a DICOM image database.","PeriodicalId":17520,"journal":{"name":"Journal of the University of Shanghai for Science and Technology","volume":"1 1","pages":"306-314"},"PeriodicalIF":0.0,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74306399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A data centre has hundreds of servers and storage devices running on virtual machines that can be deployed and migrated over servers as per the requirement. If each server uses local storage, migration of this storage and restoration is mandatory. An attempt to organize and track storage throughout the data centre is quite tedious. Using a dedicated storage system like a storage array, it possible to collectively monitor and manage such a network. A storage area network is essentially a network dedicated to storage devices. A storage area network can interconnect devices in all its layers, therefore improving storage availability. Interconnecting all elements in SAN also reduces the chances of a single point of failure. Using the storage devices collectively improves their utilization. SAN offers to manage and maintain all devices in the network. Although SAN is beneficial, it has drawbacks when configuring, monitoring and managing components in a large-scale network. This paper consolidates the problems associated with SAN and offers possible solutions to overcome them.
{"title":"A study of Storage Area Networks and issues in its management","authors":"Varsha Kulkarni, Nagaraj Bhat","doi":"10.51201/JUSST/21/05257","DOIUrl":"https://doi.org/10.51201/JUSST/21/05257","url":null,"abstract":"A data centre has hundreds of servers and storage devices running on virtual machines that can be deployed and migrated over servers as per the requirement. If each server uses local storage, migration of this storage and restoration is mandatory. An attempt to organize and track storage throughout the data centre is quite tedious. Using a dedicated storage system like a storage array, it possible to collectively monitor and manage such a network. A storage area network is essentially a network dedicated to storage devices. A storage area network can interconnect devices in all its layers, therefore improving storage availability. Interconnecting all elements in SAN also reduces the chances of a single point of failure. Using the storage devices collectively improves their utilization. SAN offers to manage and maintain all devices in the network. Although SAN is beneficial, it has drawbacks when configuring, monitoring and managing components in a large-scale network. This paper consolidates the problems associated with SAN and offers possible solutions to overcome them.","PeriodicalId":17520,"journal":{"name":"Journal of the University of Shanghai for Science and Technology","volume":"108 1","pages":"238-245"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89173646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Microservices architectural design is widely used today which helps one to build an application as a set of services that can be developed and deployed independently. Each service is independent and gives a set of functions or features that can be individually serviced. In spite of the fact that microservices design has been advanced as the fix just for all cutting-edge application development ailments and is viewed as the replacement for API first application advancement, its execution needs undeniably more idea and practicality. In order for these independent services to work together towards a common goal, we need something that will stitch them together because they cannot work in complete isolation and need to share data and interact with one another. There are two ways to do this – microservice choreography and microservice orchestration. This paper tries to explain the difference between choreography and orchestration of microservices, and why the latter is better. We will then discuss the orchestration of microservices using an open-sourced microservices orchestrator – Conductor.
{"title":"Orchestration of Micro services Using Conductor","authors":"Rakshata Karlingannavar, N. Bhat","doi":"10.51201/JUSST/21/05254","DOIUrl":"https://doi.org/10.51201/JUSST/21/05254","url":null,"abstract":"The Microservices architectural design is widely used today which helps one to build an application as a set of services that can be developed and deployed independently. Each service is independent and gives a set of functions or features that can be individually serviced. In spite of the fact that microservices design has been advanced as the fix just for all cutting-edge application development ailments and is viewed as the replacement for API first application advancement, its execution needs undeniably more idea and practicality. In order for these independent services to work together towards a common goal, we need something that will stitch them together because they cannot work in complete isolation and need to share data and interact with one another. There are two ways to do this – microservice choreography and microservice orchestration. This paper tries to explain the difference between choreography and orchestration of microservices, and why the latter is better. We will then discuss the orchestration of microservices using an open-sourced microservices orchestrator – Conductor.","PeriodicalId":17520,"journal":{"name":"Journal of the University of Shanghai for Science and Technology","volume":"10 1","pages":"250-255"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90803952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. AbishekR, K. Dinesh, Divakar, C. Muralidharan, S. Jothiraj
A common male sexual disorder is erectile dysfunction which has multidimensions. In this fast-moving world, it is prominently seen in lots of males. There are many causes for Erectile Dysfunction, one of the major causes is the improper supply of blood to the penile organ. That may be due to vasoconstriction or blockage in the internal pudendal artery which supplies oxygen to the penile organ. A simulated model of the internal iliac artery to the internal prudential artery is designed and a flow simulation is done using Solid works software. The Computed Tomography of a male subject is obtained and a three-dimensional model of the abdominal artery is extracted using MIMICS (Materialize Interactive Medical Image Control System) software. By making use of the measured dimensions from the three-dimensional image. The 3D models (Normal condition, Abnormal condition with blockage, and Abnormal condition with constrictions) are designed and the Flow analysis is done in Solid works software. By the end of the study, we came to a conclusion that at normal temperature and pressure, the simulated normal volumetric blood flow at the internal pudendal artery is 6.88701e-09 m3/s and for abnormal cases the simulated volumetric blood flow is 2.6107e-09m3/s.
{"title":"Modelling and Blood Flow Analysis of Internal Pudendal Artery","authors":"P. AbishekR, K. Dinesh, Divakar, C. Muralidharan, S. Jothiraj","doi":"10.51201/JUSST/21/05229","DOIUrl":"https://doi.org/10.51201/JUSST/21/05229","url":null,"abstract":"A common male sexual disorder is erectile dysfunction which has multidimensions. In this fast-moving world, it is prominently seen in lots of males. There are many causes for Erectile Dysfunction, one of the major causes is the improper supply of blood to the penile organ. That may be due to vasoconstriction or blockage in the internal pudendal artery which supplies oxygen to the penile organ. A simulated model of the internal iliac artery to the internal prudential artery is designed and a flow simulation is done using Solid works software. The Computed Tomography of a male subject is obtained and a three-dimensional model of the abdominal artery is extracted using MIMICS (Materialize Interactive Medical Image Control System) software. By making use of the measured dimensions from the three-dimensional image. The 3D models (Normal condition, Abnormal condition with blockage, and Abnormal condition with constrictions) are designed and the Flow analysis is done in Solid works software. By the end of the study, we came to a conclusion that at normal temperature and pressure, the simulated normal volumetric blood flow at the internal pudendal artery is 6.88701e-09 m3/s and for abnormal cases the simulated volumetric blood flow is 2.6107e-09m3/s.","PeriodicalId":17520,"journal":{"name":"Journal of the University of Shanghai for Science and Technology","volume":"46 1","pages":"213-220"},"PeriodicalIF":0.0,"publicationDate":"2021-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87114817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper briefly presents the concept of ethnicity and nationality. Based on the definition and scope of the concept, the paper presents the characteristics of ethnic groups and analyzes the history of ethnic relations in Lam Dong. From these analyzes, the paper focuses on interpreting the importance of building ethnic relations in the process of industrialization and modernization in Lam Dong province: i) To create opportunities and conditions for ethnic groups in the province to cooperate and develop in all aspects, together successfully realize the cause of industrialization and modernization. ii) To build up ethnic relations so that the ethnic groups in the province can consolidate their mutual understanding and trust, thus avoiding conflict and tension leading to the danger of ethnic separateness, obstructing the process of industrialization and modernization.
{"title":"Resolving Ethnic Relations in Vietnam: A Case in Lam Dong Province in the Central Highlands","authors":"Vu Kim Diem, N. Thien","doi":"10.51201/JUSST/21/05243","DOIUrl":"https://doi.org/10.51201/JUSST/21/05243","url":null,"abstract":"The paper briefly presents the concept of ethnicity and nationality. Based on the definition and scope of the concept, the paper presents the characteristics of ethnic groups and analyzes the history of ethnic relations in Lam Dong. From these analyzes, the paper focuses on interpreting the importance of building ethnic relations in the process of industrialization and modernization in Lam Dong province: i) To create opportunities and conditions for ethnic groups in the province to cooperate and develop in all aspects, together successfully realize the cause of industrialization and modernization. ii) To build up ethnic relations so that the ethnic groups in the province can consolidate their mutual understanding and trust, thus avoiding conflict and tension leading to the danger of ethnic separateness, obstructing the process of industrialization and modernization.","PeriodicalId":17520,"journal":{"name":"Journal of the University of Shanghai for Science and Technology","volume":"28 1","pages":"204-212"},"PeriodicalIF":0.0,"publicationDate":"2021-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83288824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hardik Devrangadi, Rithwik Goel, Vishnusai Reddy Tadiparthi, Mohammed Kalender Shihab
Abstract: For any insurance contract to see the light of day, a particular process flow is usually followed. This process flow begins with the customer calling an agent to obtain insurance, and ends with the customer receiving a quote for the coverage. Precision methods focus around improving precision and quality and on planning measures that absolutely address issues and meet the necessary requirements. Unlike automation where the focus is on speeding up tasks and processes, a precisionbased approach is centered around improving the quality of the process. More current practices call for ceaselessly examining and retooling tasks/operations to achieve ever more noteworthy business esteem. In this paper, the Insurance Policy Administration System is covered in detail. The format, layout andthe key details that the insurance policy entails is thoroughly covered. Some key functionalities like The Policy Submission, Risk Analysis, Policy changes and renewals, Policy cancellationin a typical Policy Administration System is reviewed. Since the Policy Administration System cannot be a standalone service,and has to be used along with external systems, the integration of this typical policy administration system with an external system like ausermanagementsystemisalsodiscussed.
{"title":"Policy Management System: Overview","authors":"Hardik Devrangadi, Rithwik Goel, Vishnusai Reddy Tadiparthi, Mohammed Kalender Shihab","doi":"10.51201/JUSST/21/05250","DOIUrl":"https://doi.org/10.51201/JUSST/21/05250","url":null,"abstract":"Abstract: For any insurance contract to see the light of day, a particular process flow is usually followed. This process flow begins with the customer calling an agent to obtain insurance, and ends with the customer receiving a quote for the coverage. Precision methods focus around improving precision and quality and on planning measures that absolutely address issues and meet the necessary requirements. Unlike automation where the focus is on speeding up tasks and processes, a precisionbased approach is centered around improving the quality of the process. More current practices call for ceaselessly examining and retooling tasks/operations to achieve ever more noteworthy business esteem. In this paper, the Insurance Policy Administration System is covered in detail. The format, layout andthe key details that the insurance policy entails is thoroughly covered. Some key functionalities like The Policy Submission, Risk Analysis, Policy changes and renewals, Policy cancellationin a typical Policy Administration System is reviewed. Since the Policy Administration System cannot be a standalone service,and has to be used along with external systems, the integration of this typical policy administration system with an external system like ausermanagementsystemisalsodiscussed.","PeriodicalId":17520,"journal":{"name":"Journal of the University of Shanghai for Science and Technology","volume":"43 1","pages":"231-237"},"PeriodicalIF":0.0,"publicationDate":"2021-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84238342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Robotic Process Automation (RPA) technology is used to automate the tasks and create the software bots. Actually RPA is that technology which mimic the actions of humans step by step to automate the entire process. There are several tools for RPA such as Blueprism, Automation Anywhere, Uipath and Microsoft Power Automation. These tools are used to identify the end to end business process and need to create the code that will describe the business process and run the commands. Presently, Automation process is used in several fields such as accounting and finance, in travel bookings, Traveling payment refund, managing and resolving the complaints of the customers, hotel inventories, etc. But this paper is based on to managing the customer complaints that are faced during their travel time with the use of Automation process. Process of Automation is very well now a days, to do everything very quickly and with the better way.
机器人过程自动化(RPA)技术用于自动化任务和创建软件机器人。实际上,RPA是一种一步一步模仿人类行为以实现整个过程自动化的技术。RPA有几个工具,如Blueprism, Automation Anywhere, Uipath和Microsoft Power Automation。这些工具用于识别端到端业务流程,并需要创建描述业务流程和运行命令的代码。目前,自动化流程应用于会计、财务、旅游预订、旅游退款、客户投诉管理和解决、酒店库存等多个领域。而本文是基于利用自动化流程来管理乘客在出行过程中所面临的顾客投诉。自动化的过程现在是非常好的一天,做每件事都非常快和更好的方式。
{"title":"Administrating and Resolving the Traveler’s Complaints with the use of Robotic Process Automation","authors":"A. Anjali, Jasminder Kaur Sandhu, D. Goyal","doi":"10.51201/JUSST/21/05239","DOIUrl":"https://doi.org/10.51201/JUSST/21/05239","url":null,"abstract":"Robotic Process Automation (RPA) technology is used to automate the tasks and create the software bots. Actually RPA is that technology which mimic the actions of humans step by step to automate the entire process. There are several tools for RPA such as Blueprism, Automation Anywhere, Uipath and Microsoft Power Automation. These tools are used to identify the end to end business process and need to create the code that will describe the business process and run the commands. Presently, Automation process is used in several fields such as accounting and finance, in travel bookings, Traveling payment refund, managing and resolving the complaints of the customers, hotel inventories, etc. But this paper is based on to managing the customer complaints that are faced during their travel time with the use of Automation process. Process of Automation is very well now a days, to do everything very quickly and with the better way.","PeriodicalId":17520,"journal":{"name":"Journal of the University of Shanghai for Science and Technology","volume":"48 1","pages":"221-230"},"PeriodicalIF":0.0,"publicationDate":"2021-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86174721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. A. Shunmugam, Ruba Soundar Kathavarayan, M. Narayan
The Internet of Things (IoT) is a cutting-edge and quickly advancing innovation wherein everything (brilliant items and keen gadgets) is connected to the web for effective correspondence between them. The web of things is an impetus for medical care and assumes a basic part in an assortment of medical services following applications. By gathering internal heat level, circulatory strain, and sugar levels, organized sensors gadgets, regardless of whether worn on the body or installed in living conditions; permit the assortment of rich information to decide a patient’s physical and psychological well-being condition. The troublesome errand in the Internet of things is conveying the gathered information to the specialist, settling on the right choices dependent on the information gathered, and advising the patient. The creator of this paper centers around an investigation of IoT-based medical care frameworks, just as promising circumstances and difficulties for IoT-based patient wellbeing checking frameworks.
{"title":"Challenges of an Internet of Things-Based Health Monitoring System","authors":"D. A. Shunmugam, Ruba Soundar Kathavarayan, M. Narayan","doi":"10.51201/JUSST/21/05214","DOIUrl":"https://doi.org/10.51201/JUSST/21/05214","url":null,"abstract":"The Internet of Things (IoT) is a cutting-edge and quickly advancing innovation wherein everything (brilliant items and keen gadgets) is connected to the web for effective correspondence between them. The web of things is an impetus for medical care and assumes a basic part in an assortment of medical services following applications. By gathering internal heat level, circulatory strain, and sugar levels, organized sensors gadgets, regardless of whether worn on the body or installed in living conditions; permit the assortment of rich information to decide a patient’s physical and psychological well-being condition. The troublesome errand in the Internet of things is conveying the gathered information to the specialist, settling on the right choices dependent on the information gathered, and advising the patient. The creator of this paper centers around an investigation of IoT-based medical care frameworks, just as promising circumstances and difficulties for IoT-based patient wellbeing checking frameworks.","PeriodicalId":17520,"journal":{"name":"Journal of the University of Shanghai for Science and Technology","volume":"48 1","pages":"164-169"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85692732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Disease detection in plants is one of the essential steps in the field of agriculture to improve the quality and yield of crops. Applications of image processing play a major role in the early detection of diseases and also in terms of accuracy and time consumption. In many plant health monitoring systems, Fourier and wavelet transform is applied for feature extraction from plant images and then they are classified using different classifiers. In this study, tomato leaf images are collected from the PlantVillage database, images are preprocessed to improve the contrast, and then image segmentation is performed using the k-means clustering technique. Texture features are extracted from the region of interest using Discrete Wavelet Transforms (DWT). Fourteen image features obtained from Daubechies (db3), Symlet (sym3), and biorthogonal (Bior 3.3, Bior 3.5, Bior 3.7) wavelets. These features are used to classify the images as healthy and unhealthy with the help of the Support Vector Machine (SVM) classifier. Performance of the system is measured in terms of Sensitivity, Specificity, and Accuracy. The proposed system classifies the images with a sensitivity of 92%, specificity of 84%, and accuracy of 88%.
{"title":"Plant Disease Identification Using Discrete Wavelet Transforms and SVM","authors":"M KiranS, N ChandrappaD","doi":"10.51201/JUSST/21/05226","DOIUrl":"https://doi.org/10.51201/JUSST/21/05226","url":null,"abstract":"Disease detection in plants is one of the essential steps in the field of agriculture to improve the quality and yield of crops. Applications of image processing play a major role in the early detection of diseases and also in terms of accuracy and time consumption. In many plant health monitoring systems, Fourier and wavelet transform is applied for feature extraction from plant images and then they are classified using different classifiers. In this study, tomato leaf images are collected from the PlantVillage database, images are preprocessed to improve the contrast, and then image segmentation is performed using the k-means clustering technique. Texture features are extracted from the region of interest using Discrete Wavelet Transforms (DWT). Fourteen image features obtained from Daubechies (db3), Symlet (sym3), and biorthogonal (Bior 3.3, Bior 3.5, Bior 3.7) wavelets. These features are used to classify the images as healthy and unhealthy with the help of the Support Vector Machine (SVM) classifier. Performance of the system is measured in terms of Sensitivity, Specificity, and Accuracy. The proposed system classifies the images with a sensitivity of 92%, specificity of 84%, and accuracy of 88%.","PeriodicalId":17520,"journal":{"name":"Journal of the University of Shanghai for Science and Technology","volume":"1 1","pages":"108-112"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84559920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}