Entity

Time filter

Source Type

Nāgpur, India

Bhadoria S.,MAE | Dethe C.G.,PIET
DSDE 2010 - International Conference on Data Storage and Data Engineering | Year: 2010

Among the applications of computer science in the field of medicine, the processing of medical image data is playing an increasingly important role. With medical imaging techniques such as X-Ray, computer tomography, magnetic resonance imaging, and ultrasound, the amount of digital images that are produced in hospitals is increasing incredibly. Thus the need for systems that can provide efficient retrieval of images of particular interest is becoming very high. Unfortunately, only very few medical image retrieval systems are currently used in clinical routine. This paper presents a highlight on the role of image retrieval in medical domain. Also it reviews the techniques used in medical image. Paper has also briefed about retrieval trends, key issues and limitations. It also point out scope and challenges in designing image retrieval systems. © 2010 IEEE. Source


Deshpande A.,G.H. Raisoni College of Engineering | Mahajan A.,PIET
Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014 | Year: 2014

Combined Mining is an approach to combine various mining techniques to get more understandable and useful patterns from complex data. Different classical data mining techniques have their advantages and disadvantages so a single technique cannot be applied on different business data. Serial Multi-method Combined Mining (SMCM) is an approach where different mining techniques are used to get the patterns and finally the resultant patterns or rules are actionable. The actionable patterns are descriptive and assist us to finalize business decision. In SMCM, different mining methods are applied in predetermined sequential pattern. The resultant patterns of the previous method are also considered as a part of the input for the next method to be executed. SMCM helps to get advantages of different classical mining techniques to generate combined patterns but it needs the domain knowledge of business data for selection of different methods. The SMCM for credit card data by combining clustering and association techniques is demonstrated and experimental results are taken. © 2014 IEEE. Source


Mahajan B.N.,G.H. Raisoni College of Engineering | Mahajan A.,PIET
International Conference on Emerging Trends in Engineering and Technology, ICETET | Year: 2013

The Transmission of multimedia content typically has bandwidth, delay and loss issues. Video compression, layer, media distribution services, streams servers, synchronization technique and synchronization protocols for streaming are major areas of research. It require scheduling protocol to sequence the events. Various useful applications for streaming in internet world are available and their implementation in ad hoc network needs improvement in architecture. To achieve efficiency and flexibility, a new streaming and compression along with scheduling technique is required which can uses the buffer for encoding, compression. Design of RMDMTS (Reliable Multimedia Data Management & Transport protocol) is prepared in such a way that it deals with proper schedule management and managing buffer and playback rate. In RMDMTS, torrent kind of technique is used for cooperative relay and multiple participants' buffer management. It is designed for efficient streaming as well as buffer management at receiver side. Overhead of processing can be also minimized at node level using RMDMTS. © 2013 IEEE. Source


Mishra B.,PIET | Singh Y.,Jaypee University of Information Technology
Proceedings of 2015 3rd International Conference on Image Information Processing, ICIIP 2015 | Year: 2015

In this paper we have analyzed the distributed node clone detection techniques in wireless sensor networks. Although there are many protocols in literature proposed for node clone detection, but we have discussed some efficient protocol like LSM and RED under the category of witness based node clone detection. We have analyzed the detection level, memory, and energy overhead of LSM, RED and proposed protocol. We have presented an approach for the optimization of witness based distributed node clone detection. For the validation of proposed protocol performance, we have provided mathematical as well as simulation results for the various parameters of the WSN. © 2015 IEEE. Source


Kailuke A.C.,PIET | Agrawal P.,E.M.A.R.C. | Kshirsagar R.V.,PCE
Proceedings - International Conference on Electronic Systems, Signal Processing, and Computing Technologies, ICESC 2014 | Year: 2014

A simple new phase frequency detector and integrated Dickson Charge pump design with charge transfer switches (CTS's) are presented in this paper. The proposed Phase-Frequency Detector (PFD) and Charge-Pump are useful for low voltage, high frequency Phase-Looked-loops (PLL). This brief analyzes the blind zone in latch-based PFDs and proposes a technique that removes the blind zone caused by the precharge time of the internal nodes. With the proposed technique, the PFD achieves a small dead zone. The experimental results shows that the proposed PFD has minimal dead zone compared with the conventional PFD and CTS based Dickson charge pump is the best structure for integration. The PFD and Charge Pump are designed and simulated on Tanner 13.0V tool and has been simulated in a 0.18μm CMOS technology. © 2014 IEEE. Source

Discover hidden collaborations