International Journal of Engineering & Technology, 2019
The present paper reviews the areas where Augmented Reality (AR) has been used in Artificial Neur... more The present paper reviews the areas where Augmented Reality (AR) has been used in Artificial Neural Networks (ANN) (Artificial Neural Networks). The focus on systems based on AR is largely on enhancing technologies in diverse application areas such as; defense, robotics, medical, manufacturing, education, entertainment, assisted driving, maintenance and mobile assistance. However, AR is now finding much usage in ANN. The research considered a review based methodology wherein most studies conducted in the past on AR and ANN were reviewed. AR with ANN has profound applications in various sectors and has been developed in an extended way but still has some distance to go afore industries, the military and the common public will receive it as a accustomed user interface. AR would modernize the way people animate and the way industries endeavor by effective utilization. There is an incredible potential in fields such as construction, art, architecture, repair and manufacturing with media...
Asian Journal of Biomedical and Pharmaceutical Sciences, 2017
Diabetes mellitus (DM) is a serious disease that affects not only the patient’s internal organs, ... more Diabetes mellitus (DM) is a serious disease that affects not only the patient’s internal organs, circulation system and eyesight, but also their entire body. There are reportedly more than 120 million diabetic patients in the world at the moment and this figure is expected to double within the next ten years. India is the country with the highest rateof diabetes patient, with a current figure of 50.8 million. Modern laser diode spectroscopy is becoming important in medicine. The aim of this paper is to design a finger plethysmograph to measure (estimate) blood resistivity which relate to the amount of glucose level in the blood. The device construction consist of: laser Diode around 650 nm wavelength, Laser Driver, Voltage regulator (2), stepdown transformer (9v), Bridged rectifier circuit, photodetector (2), amplifier, ADC, microcontroller (Arduino Uno) and LCD to display the signal intensity. The device has been constructed in such a way to insert right index finger of the subject...
Risk is the likelihood that something bad will happen that causes harm to an informational asset.... more Risk is the likelihood that something bad will happen that causes harm to an informational asset. In today’s corporate structure, information is the biggest asset and needs protection from attacks. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Information when stored in the network needs to be secure. Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and consistent and continuous monitoring and measurement of its effectiveness combined together. The term Internet Protocol (IP) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system. The term spoofing is also...
Natural language processing (NLP) is widely used in multi‐media real‐time applications for unders... more Natural language processing (NLP) is widely used in multi‐media real‐time applications for understanding human interactions through computer aided‐analysis. NLP is common in auto‐filling, voice recognition, typo‐checking applications, and so forth. Multilingual NLP requires vast data processing and interaction recognition features for leveraging content retrieval precision. To strengthen this concept, a predictive typological content retrieval method is introduced in this article. The proposed method maximizes and relies on distributed transfer learning for training multilingual interactions with pitch and tone features. The phonetic pronunciation and the previous content‐based predictions are forwarded using knowledge transfer. This knowledge is modelled using the training data and precise contents identified in the previous processing instances. For this purpose, the auto‐fill and error correction data are augmented with the training and multilingual processing databases. Dependin...
Advances in Intelligent Systems and Computing, 2020
Detecting software bugs is considered to be an active area of research as bugs detected after the... more Detecting software bugs is considered to be an active area of research as bugs detected after the delivery of software is considered to be very expensive to deal with. Whenever a new software bug is detected, software developer faces extreme difficulty in detecting the exact location of the bug in the product. Identifying bugs efficiently through genetic algorithms is the active area of research nowadays. Based on the bug reports dataset, a self-operating genetic algorithm, Strength Pareto Evolutionary Algorithm (SPEA II) identifies and ranks the application files in the reference code as per their likelihood of carrying bugs. In the presented exposition, a text-mining strategy, term frequency–inverse document frequency (TFIDF) is applied for the proper ranking of application files. The ranking is based on the history-based similarity and lexical similarity within the generated report of bugs and the documentation of the application program interface (API). The striking feature of the paper is that a multi-objective approach is used to improve upon the conventional techniques such that contradictory demands of increasing the similarity index and minimizing the number of suggested classes are met simultaneously. Thus, the proposed new approach employs SPEA II as the multi-objective genetic algorithm to meet the conflicting demands and uses both history-based as well as lexical similarity for information retrieval and ranking.
Nowadays, the industry is running on the assumption that a single user interface (UI) can effecti... more Nowadays, the industry is running on the assumption that a single user interface (UI) can effectively engage a diverse group of users. However, it is not effectively implemented on several UI platforms which often leads to dissatisfaction among various user groups. Moreover, the majority of the users belong to a non-technological background with varying levels of understanding and comfortability with modern technology. Thus, a dynamically customized UI “tailormade” for front-end users' needs is a necessity. The presented exposition introduces a methodology to generate a personalized user interface using the age, gender and browser history of the user. It is processed using face recognition and machine learning techniques. Further, the concept of Fuzzy Logics is used to choose which websites the user might want to be personalized. The data for the generation of personalized UI is collected passively. Thus solving the issue of the passive response of the customer in customization and feedback features.
International Journal of Engineering & Technology, 2019
The present paper reviews the areas where Augmented Reality (AR) has been used in Artificial Neur... more The present paper reviews the areas where Augmented Reality (AR) has been used in Artificial Neural Networks (ANN) (Artificial Neural Networks). The focus on systems based on AR is largely on enhancing technologies in diverse application areas such as; defense, robotics, medical, manufacturing, education, entertainment, assisted driving, maintenance and mobile assistance. However, AR is now finding much usage in ANN. The research considered a review based methodology wherein most studies conducted in the past on AR and ANN were reviewed. AR with ANN has profound applications in various sectors and has been developed in an extended way but still has some distance to go afore industries, the military and the common public will receive it as a accustomed user interface. AR would modernize the way people animate and the way industries endeavor by effective utilization. There is an incredible potential in fields such as construction, art, architecture, repair and manufacturing with media...
Asian Journal of Biomedical and Pharmaceutical Sciences, 2017
Diabetes mellitus (DM) is a serious disease that affects not only the patient’s internal organs, ... more Diabetes mellitus (DM) is a serious disease that affects not only the patient’s internal organs, circulation system and eyesight, but also their entire body. There are reportedly more than 120 million diabetic patients in the world at the moment and this figure is expected to double within the next ten years. India is the country with the highest rateof diabetes patient, with a current figure of 50.8 million. Modern laser diode spectroscopy is becoming important in medicine. The aim of this paper is to design a finger plethysmograph to measure (estimate) blood resistivity which relate to the amount of glucose level in the blood. The device construction consist of: laser Diode around 650 nm wavelength, Laser Driver, Voltage regulator (2), stepdown transformer (9v), Bridged rectifier circuit, photodetector (2), amplifier, ADC, microcontroller (Arduino Uno) and LCD to display the signal intensity. The device has been constructed in such a way to insert right index finger of the subject...
Risk is the likelihood that something bad will happen that causes harm to an informational asset.... more Risk is the likelihood that something bad will happen that causes harm to an informational asset. In today’s corporate structure, information is the biggest asset and needs protection from attacks. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Information when stored in the network needs to be secure. Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and consistent and continuous monitoring and measurement of its effectiveness combined together. The term Internet Protocol (IP) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system. The term spoofing is also...
Natural language processing (NLP) is widely used in multi‐media real‐time applications for unders... more Natural language processing (NLP) is widely used in multi‐media real‐time applications for understanding human interactions through computer aided‐analysis. NLP is common in auto‐filling, voice recognition, typo‐checking applications, and so forth. Multilingual NLP requires vast data processing and interaction recognition features for leveraging content retrieval precision. To strengthen this concept, a predictive typological content retrieval method is introduced in this article. The proposed method maximizes and relies on distributed transfer learning for training multilingual interactions with pitch and tone features. The phonetic pronunciation and the previous content‐based predictions are forwarded using knowledge transfer. This knowledge is modelled using the training data and precise contents identified in the previous processing instances. For this purpose, the auto‐fill and error correction data are augmented with the training and multilingual processing databases. Dependin...
Advances in Intelligent Systems and Computing, 2020
Detecting software bugs is considered to be an active area of research as bugs detected after the... more Detecting software bugs is considered to be an active area of research as bugs detected after the delivery of software is considered to be very expensive to deal with. Whenever a new software bug is detected, software developer faces extreme difficulty in detecting the exact location of the bug in the product. Identifying bugs efficiently through genetic algorithms is the active area of research nowadays. Based on the bug reports dataset, a self-operating genetic algorithm, Strength Pareto Evolutionary Algorithm (SPEA II) identifies and ranks the application files in the reference code as per their likelihood of carrying bugs. In the presented exposition, a text-mining strategy, term frequency–inverse document frequency (TFIDF) is applied for the proper ranking of application files. The ranking is based on the history-based similarity and lexical similarity within the generated report of bugs and the documentation of the application program interface (API). The striking feature of the paper is that a multi-objective approach is used to improve upon the conventional techniques such that contradictory demands of increasing the similarity index and minimizing the number of suggested classes are met simultaneously. Thus, the proposed new approach employs SPEA II as the multi-objective genetic algorithm to meet the conflicting demands and uses both history-based as well as lexical similarity for information retrieval and ranking.
Nowadays, the industry is running on the assumption that a single user interface (UI) can effecti... more Nowadays, the industry is running on the assumption that a single user interface (UI) can effectively engage a diverse group of users. However, it is not effectively implemented on several UI platforms which often leads to dissatisfaction among various user groups. Moreover, the majority of the users belong to a non-technological background with varying levels of understanding and comfortability with modern technology. Thus, a dynamically customized UI “tailormade” for front-end users' needs is a necessity. The presented exposition introduces a methodology to generate a personalized user interface using the age, gender and browser history of the user. It is processed using face recognition and machine learning techniques. Further, the concept of Fuzzy Logics is used to choose which websites the user might want to be personalized. The data for the generation of personalized UI is collected passively. Thus solving the issue of the passive response of the customer in customization and feedback features.
Uploads
Papers by Srinath Doss