Volume-1 Issue-1, 2018

June-Article-1 : Title: Design of Wrist Mounted Glove for Handicap [Full Article - PDF1]
June- Article-2 : Title:E-Tracking System For Municipal Solid Waste Management Using RFID Technology:[Full Article - PDF2]
Mrs. Thushara T ,Assistant professor V111 Semester, Department of ECE Dept. Of ECE,CIT, Ponnampet CIT, South Kodagu,  Karnataka
With the increase of population of a country, proper management of Municipal Solid Waste (MSW) becomes more acute for maintaining green environment. In conventional approach a number of trucks collect the MSW and then transport and transfer these MSW in a pre-specified location, but all the above jobs are not properly monitored. This project exploits the tremendous power of RFID technology and presents the development of an electronic monitoring (e-monitoring) system to overcome the above problem in the conventional approach.
June-Aarticle-3 : Title:Automatic Railway Track Safety And Problem Detecting System:[Full Article – PDF3]
Mr. Naveen Pai, Assistant Professor, dept of ece, yenepoya institute of technology thodar, mijar post, moodabidri
Abstract:IR transmitter transmits the IR rays and these rays will be detected by the IR detector, which will detect the crack present in the track. PIR sensor detects human or animal presence in the railway track. Water level switch senses the water level on the railway track. When each sensor indicates HIGH, an alert message is sent to the pre-saved number, displayed on the LCD. To develop a module which will perform the automatic detection of track breakage, obstacles and water level in the railway track and sends the alert messages to pre-saved number, displays on the LCD of the module and notify the same in the android application
July-Article-4 : Title:Design Oculographic Guidance of Amaxi Using Eye Movements Condification: [Full Article - PDF4]
 Mr. Venkate gowda N Educational consultant , Mr. Ajay Pinto, Assistant professor , Mangalore ,Karnataka, India.
AbstractToday the use of computers is extended to every field. Many sophisticated devices like touch screen, track ball, digitizers etc, made interaction with computer ease from novice to professional. But physically disabled individuals are deterred from using computers due to their inability to control mouse. However, if directional discrimination of an icon can be achieved, quadriplegics can take the function of a mouse without the use of hand. In this paper I come before with a new model of based on Electro- Oculography which uses Electro-oculogram Bio potential amplified signal to control computer.I also discuss its implementation details, including software and hardware design. As my contribution to this paper I introduce a new keyboard design.
July-Article-5 : Title:Review on Home Tele Health Monitoring using Labview and Feasible Studies:[Full Article - PDF5]
Panchami Prasannakumar  Faculty of Electronics and Communication  Mangalore Institute of Tecnology, Mangalore,Karnataka.  panchami@mite.ac.in
AbstractIn this paper, establishing the clear idea of home based patient monitoring system. This is the next stage in home medical system, which measures the oxygen saturation, respiratory rate, body temperature, electrical activity of heart, blood glucose levels, blood pressure and health of muscles in the safety of our homes. Patients require prompt & accurate decisions so that life-saving therapy can be applied timely. In major cases prolonged treatment at hospital is not feasible. The experimental results also reflected the virtual instrumentation platform is a viable option for rapid prototyping of a system before actual implementation.
July-Article-6 : Title:Dynamic behaviour of Subframe of Dump Truck Chassis :[Full Article - PDF6]
 Dr. Shanmukha Nagaraj Prof. L Ranganath Gowda   Prof. Keshav M. Department of Mechatronics Engineering ,Department of Mechanical Engineering Acharya Institute of Tech,
AbstractInjection molding is an important polymer processing operation in the plastic industry. In this process, polymer is injected into a mold cavity and solidifies to the shape of the mold. Optimizing the parameters of the injection molding process is critical to enhance productivity. This research work is focused on design ,analysis and manufacturing of an Injection molding tool for production of Pre-Chamber part which is used in MCB (Miniature Circuit Breaker) as a Non-conductor. The tool is designed for 16 Cavity mold to achieve the required productivity. The designed tool is analyzed for reduction of Cycle time by altering the parameters like Fill time, Cooling rate and feed system. The actual cycle time obtained for the production of Pre-Chamber part is 22 seconds that was reduced to 18 seconds by analysis process using Mold Flow Software. The reduction of cycle time is done by increasing the diameter of cooling channels and also runner system which results in fast cooling and fast filling respectively.
July-Article-7 : Title:Design And  Manufacturing Of Injection Molding Tool For Pre-Chamber Part:[Full Article -- PDF7]
Dennison J1, Dr.Mahendra Kumar2, Mr. Gangadhar T GMasters in Tool Engineering, PG Student, Department of Mechanical Engineering, Rashtreeya Vidyalaya College of Engineering, Bengaluru, Associate Professor, Assistant Professor, Department of Mechanical Engineering, SJBIT, Bengaluru
Abstract: Injection molding is an important polymer processing operation in the plastic industry. In this process, polymer is injected into a mold cavity and solidifies to the shape of the mold. Optimizing the parameters of the injection molding process is critical to enhance productivity. This research work is focused on design ,analysis and manufacturing of an Injection molding tool for production of Pre-Chamber part which is used in MCB (Miniature Circuit Breaker) as a Non-conductor. The tool is designed for 16 Cavity mold to achieve the required productivity. The designed tool is analyzed for reduction of Cycle time by altering the parameters like Fill time, Cooling rate and feed system. The actual cycle time obtained for the production of Pre-Chamber part is 22 seconds that was reduced to 18 seconds by analysis process using Mold Flow Software. The reduction of cycle time is done by increasing the diameter of cooling channels and also runner system which results in fast cooling and fast filling respectively.
July-Article-8 : Title:Liquefied Petroleum Gas (LPG) as an Secondary Fuel in 4-Stroke SI Engine: [Full -Article - PDF8]
 Balu A1, Manu Kumar D M2  Department of Mechanical Engineering  G Madegowda Institute of Technology, VTU Belgaum, Karnataka India  Email: balugowda.2505@gmail.com1, gowdadmk@gmail.com2
 Abstract: Man has always been in pursuit of energy to meet his ever increasing demands. Nowadays due to increase in pollutions and global warming, there is a need for use of eco friendly fuels. In this project attempt has been made to use LPG as an alternative (secondary) fuel for two wheeler of four stroke engine. By using LPG, efficiency of engine can be increased and pollutions caused due to emissions can be reduced. Separate LPG fuel supply system (Gas Kit) has been installed through which LPG is supplied to carburetor directly. By this both Gasoline and LPG can be used in a single vehicle. According to our requirements we can change the supply of fuel to the engine. The changes required to install LPG to the vehicle are discussed below. When the vehicle is running at lower speed LPG is suitable and at higher speed Gasoline is suitable. So, this concept of using both Gasoline and LPG as fuel is suitable for cities where operation of vehicle is in lower speed due to the traffic. Hence by using this concept we save money in buying fuel and also reduce pollutions caused.
July-Article-9 : Title:Design And Fabrication Of Progressive Press Tool For Current Bar Component: [Full Article-PDF9]
Mr. Kantharaja N1, Dr. Mahendra Kumar2, Gangadhar T G1M. Tech Student, Associate Professor, Dept. of Mechanical Engineering, R. V. College of Engineering, Bengaluru, India
In today’s practical and cost-conscious world, due to the increasing demand for high quality formed products with minimum scrap material and low manufacturing costs sheet-metal parts have already replaced many expensive cast, forged, and machined products. The object is obviously the relative cheapness of stamped or otherwise mass-produced parts to meet the requirement of the consumer, maintain consistent quality and to make the product cost effective, as well as greater control of their technical and aesthetic parameters. Sheet metal forming is a cold working operation where material undergoes permanent plastic deformation and shear off by the special tool referred as a press tool.
August-Article-10 : Title:A Multilevel Transformer less Inverter : [PDF10]
Mr. Mohan A R, Assistant Professor, Cauvery Institute of Technology , Mandya ,Karnataka

For the safe operation of transformer less grid connected PV inverters, the issue of common mode (CM) leakage current needs to be addressed carefully. In this paper, a novel multilevel transformer less inverter topology is proposed which completely eliminates CM leakage current by connecting grid neutral point directly to the PV negative terminal, thereby bypassing the PV stray capacitance . It provides a low-cost solution consisting of only four power switches, two capacitors and a single filter inductor. As compared to half bridge topologies, with this inverter a minimum of 27% and maximum of 100% more output voltage is obtained for the same DC link voltage.

September-Article-11 : Title:Design of shared-memory Achitectured processor on Altera Fpga:[Full -Article - PDF11]
Venkategowda.N, Dr. Kurahatti.N.G.
This project work presents a framework to design a shared memory and  Processor, on a programmable platform. Complete flow is proposed by a programming model and architecture. The effectiveness of shared memory blocks is demonstrated by implementing on FPGA. The aim of the project is to develop an architecture, design, implement and test  Processor on Altera DE1 FPGA Board. Four Processors are connected in star topology and share common memory for program and data. Processor is expected to run at 150 MHz, with effective instruction cycle speed of 600MHz.

VOLUME-2 ISSUE-1, 2019

Jan-Article-1- : Title: RF-ID BASED BOOK PICKING ROBOT:[PDF12019]
Author1 Mr. Naveena Pai G ,Author2  Mr. Harsha C J Assistant Professor ,YIT Mangalore
Robotics is the branch of engineering science & Technology related to robots, and their design, manufacture, application, and structural disposition. Robotics is related to electronics, mechanics, and software. Robotics research today is focused on developing systems that exhibit modularity, flexibility, redundancy, fault-tolerance, a general and extensible software environment. By using the proposed prototype misplacing of the books can be identified easily. It reduces the manual work. With the proposed architecture, if constructed with at most accuracy, the robot will pick the book. If such a system is developed, it will act as a basic platform for the generation of more such devices for the book picking.
Jan-Article-2- : Title:Traffic Light Controller with Fuzzy Control System:[IJERPDF2019]
Author1 : Mr . M J Prasanna Kumar, Assistant Professor ,Author2: Dr. Ravikumar G K,  Professor ,Dept Of  Computer Science Engineering ,BGSIT. Email  ID: prasannamandya@gmail.com
Vehicular travel is increasing throughout the world, particularly in large urban areas. With the increasing use of automobiles in cities traffic congestion occurred. So there is requirement for optimizing traffic control methods to better accommodate this increasing demand. So as the transportation system will continue to grow, intelligent traffic controls have to be employed to face road traffic congestion problems. Fuzzy controllers have been widely used in many consumer products and industrial applications with success over the past two decades. For traffic control, however, fuzzy controllers have not been widely applied. This project proposes a fuzzy traffic lights controller to be used at a complex traffic junction.The real time parameters such as traffic density and queue length are obtained by using image processing techniques. So the on and off timings for the green, red and orange lights are adjusted as per the actual road conditions. Fuzzy logic has been widely used to develop a traffic signal controller because it allows qualitative modeling of complex systems. This project describes a fuzzy logic signal controller for a four–way intersection suitable for mixed traffic, including a high proportion of vehicles.
Jan-Article-3- : Title:A Survey On Traffic Light Control System Using Machine Learning:[IJERJANPDF2019]
 Author1: Usha C M, M.Tech Scholar, Author2: Mr. J Prasanna Kumar, Assistant Professor,Author3: Dr. Ravikumar G K, Professor, Dept Of Computer Science Engineering, BGSIT
In everyday life to reach our destination it may be home or office we come across several problems one among them is traffic problem. The two major reasons that lead to drastic increase in vehicular traffic are increase in population and modernization. Many problems are raised because of increase in vehicular traffic like air and noise pollution. Rather than this problem vehicular traffic makes people to wait for long time in congestion and thus leads to wastage of vehicles fuel. In order to find an optimal solution to solve traffic delays so many applications has been implemented. For example fuzzy logic, edge detection technique, linear programming, Q-learning, deep learning and re-inforcement learning techniques. In this paper we discussed about different machine learning algorithms to solve traffic problem. And also discussed comparison among different techniques.
Feb-Article-4- : Title:A Novel Data Masking Approach for Preserving Format and Size:[IJERFEBPDF2019]
 Author1:  Mr. Siddharth B K , Research Scholar, Author2:  Dr. Ravikumar G K, Professor, Dept Of Computer Science Engineering, BGSIT
Rapid advancement in data generation by the individuals, organizations, government and from other sources demands efficient security requirements. As the data size grows they might be open for intruders who can make use of the sensitive data illegally. Data Masking is the one of the effective technique to overcome the security issues in sensitive data environments. There are many data masking techniques are available today, one of the major requirement of any data masking technique is preserving the format of the data after masking process. As we know data which are obtained from the data store some time used by the testers, developers, analysis teams. For data testing and analysis environments format of the data is one of the major requirement. Hence in this paper we are presenting format preserving technique which is useful in testing and data analysis environment.
Feb-Article-5- : Title:Brain Tumor Detection Using Support Vector Machine, K-Means and PCA Algorithm:[IJERP-FEB-IIPDF2019]
 Author: Dr Malini Suvarna, Professor Dept of Electronics and Communication Engineering , Vijaya Vittala Institute of Technology, Bengaluru,  Email:Maliniatria@gmail.com
The conventional method of detection and classification of brain tumor is by human inspection with the use of medical resonant brain images. But it is impractical when large amounts of data is to be diagnosed and to be reproducible. And also the operator assisted classification leads to false predictions and may also lead to false diagnose. Medical Resonance images contain a noise caused by operator performance which can lead to serious inaccuracies classification. The use Support Vector Machine, Kmean and PCA shown great potential in this field. Principal Component Analysis gives fast and accurate tool for Feature Extraction of the tumors. Kmean is used for Image Segmentation. Support Vector Machine with Training and Testing of Brain Tumor Images techniques is implemented for automated brain tumor classification.
April-Article-6- : Title:Voice Controlled Wheelchair:[1IJERP-APRIL-PDF2019]
 Author: Ms. Sufiya Noori1.  T , PG Scholar, Mr. R. Paramesh ,Associate Professor Dept of CSE, Global Academy of Technology, Bengaluru.karnataka,India. Email:sufiasoni@gmail.com
In order to assist physically handicapped persons, a voice controlled wheelchair is developed. The user can control the wheelchair by voice commands. The objective of this project is to fascilate the movement of people who are disable or handicapped and elderly people who are not able to move well. The goal of this system will allow certain people to live a life with less dependence on others for their movement as a daily need. This can be realized and optimized with the use smart phone device as an intermediary or interface..The project represents the design of an Arduino based voice controlled automated wheelchair. The voice command is useful for the person who have issues in hand movement due to ageing or paralysis for joystick controlled wheelchairs. The design also provide some additional features such as obstacle detection for the safe movement. The proposed technique is relatively simple and cheaper to implement with the widely used available electronic devices in comparison to other existing techniques which will have a great impact on the societies of developing and under developing countries. obtained a successful recognition rate 98.3%, 97.0% of the movement command and the verification command.
April-Article-7- : Title:Application of Steganography in Image Processing Framework:[IJERP_APRIL_PDF2019S]
 Author:Arpitha K Shetty1  A.J Institute of Engineering &Technology  ; Usha Desai2   NMAM IT, Nitte, Udupi ; Ganesh Shetty3 Shri Madhwa Vadiraja Institute of Technology and Management, Udupi, Karnataka, India ;Department of Electronics and Communication Engineering.
The term steganography referred as covered writing or the procedure of hiding information inside other information. Different applications have various   requirements   of the steganography techniques applied.  For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography techniques.  It also attempts to identify the requirements of a good stenographic algorithm and briefly reflects on the stenographic techniques available for different applications.
May-Article-8- : Title:A Survey On Intrusion Detection System in Handling Web Attacks:[IJREP2019PDF1]
 Authors:Ms. Bhavika G S , Mr.Jagadeesh Sai D ,Assistant Professor, Dept of ISE, Ramaiah Institute of Technology Bangalore, India Email: Bhavika.gs1995@gmail.com
Network based attacks are currently the major ultimatum to information security. Attacks against web-based applications endure a serious global security threat. Assailants are now able to compromise the web services and collect confidential information from web databases and invade the web servers. Intrusion Detection Systems are the powerful and a new generation security technology that serves against malicious activities. This paper contains the survey of Intrusion detection system in handling web attacks.
May-Article-9- : Title:A SURVEY ON CROP YIELD RECOMMENDER SYSTEM IN AGRICULTURE:[IJERP2019PDF2]
Authors:Ms. Sangeeta R, Ms. Shruthi G ,Assistant Professor, Department of Information Science & Engg , Ramaiah Institute of Technology Bangalore, India Email: sangeetarreddy@gmail.com                                                                                 

Agriculture is the best utility region especially inside the developing worldwide areas like India. Usage of records age in horticulture can substitute the circumstance of decision making and Farmers can yield in higher manner. About portion of the number of inhabitants in India relies upon on farming for its occupation however its commitment towards the GDP of India is just 14 percent. One suitable explanation behind this is the deficiency of adequate decision making by farmers on yield prediction. There isn't any framework in location to suggest farmer what plants to grow. The proposed machine learning approach aims at predicting the best yielded crop for a particular region by analysing various atmospheric factors like rainfall, temperature, humidity etc., and land factors like soil pH, soil type including past records of crops grown. Finally our system is expected to recommend farmers about suitable crops grown in their region which yields best in terms of quantity and quality and also market prices.

May-Article-10- : Title:Survey On Recommender System and Its Cold-Start Problem :[IJERP2019PDF3]
 Authors:Ms. Veena K ,Ms. Sunitha R S ,Assistant Professor, Dept of ISE, Ramaiah Institute of Technology Bangalore, India Email: veenakreddy1619@gmail.com
Recommender system or an advice system is a subclass of data information filtering that tries to expect the "score" or "inclination" a buyer would provide for an item. Recommender systems are connected in a spread of regions alongside motion pictures, tune, news, books, research articles, search queries, social tags, and products in trendy. There additionally are recommender systems for experts, colleagues, jokes, cinemas, garments, fiscal administrations, presence inclusion, and Twitter pages. Recommender systems are utilized to help clients find content material they're intrigued by when there are numerous choices, and is exceptionally normal in spilling contributions. One of the inconveniences of recommender structures is known as the cool begin inconvenience, in which the systems do never again have enough data around a thing or a purchaser to make precise proposals. To moderate this issue through gathering data from Twitter. Twitter is a broad supply of information about real time exercises; anyway due to critical clamor it could be hard to discover the information pertinent for a recommender machine. Here systems fit for gathering and sorting out actualities from Twitter in a way that makes it usable for film recommender systems. This is finished by separating tweets about new motion pictures by means of a classifier dependent on a fake neural system that types film-related tweets from non-film-related tweets. In the wake of finding material tweets, the systems can advise film titles aside by method for bunching the information in one of along these lines that groups are allotted a film title and a sentiment.
May-Article-9- : Title:Face Recognition Based Attendance Monitoring Using Haar-Cascade Classifier:[IJREP2019BGSITPDF_110]
 Authors:Manjunath H R ,Assistant Professor, Nithin M K, Kiran Kumar D, Prabhu K S, Prajwal M R,Dept of CSE, BGS Institute of Technology , India Email: manjuhr19@gmail.com
Daily attendance marking is a common and important activity in schools and colleges for checking the performance of students. Manual Attendance maintaining is difficult process, especially for large group of students. Some automated systems developed to overcome these difficulties, have drawbacks like cost, fake attendance, accuracy, intrusiveness. To overcome these drawbacks, there is need of smart and automated attendance system. Traditional face recognition systems employ methods to identify a face from the given input but the results are not usually accurate and precise as desired. The system described in this we aims to deviate from such traditional systems and introduce a new approachtoidentifyastudentusingafacerecognitionsystem, thegenerationofafacialModel.Thisdescribestheworkingof the face recognition system that will be deployed as an Automated Attendance System in a class room environment.
May-Article-10- : Title:A Novel Approach for Disease Prediction over Big Data from Healthcare Communities Using Machine Learning:[IJREP2019BGSITPDF_111]
 Authors:Manjunath H R ,Assistant Professor, Sinchana H S, Asha B, Apeksha S L, Dept of CSE, BGS Institute of Technology , India Email: manjuhr19@gmail.com
With big data growth in biomedical and healthcare communities, accurate analysis of medical data benefits early disease detection, patient care, and community services. However, the analysis accuracy is reduced when the quality of medical data is incomplete. Moreover, different regions exhibit unique characteristics of certain regional diseases, which may weaken the prediction of disease outbreaks. In this paper, we streamline machine learning algorithms for effective prediction of chronic disease outbreak in disease-frequent communities. We experiment the modified prediction models over real-life hospital data collected from central China in 2013–2015. To overcome the difficulty of incomplete data, we use a latent factor model to reconstruct the missing data. We experiment on a regional chronic disease of cerebral infarction. We propose a new convolutional neural network (CNN)-based multi modal disease risk prediction algorithm using structured and unstructured data from hospital. To the best of our knowledge, none of the existing work focused on both data types in the area of medical big data analytics.
May-Article-11- : Title:Secure Attribute-Based Signature Scheme with Multiple Authorities for Block chain in Electronic Health Records Systems:[IJERPSRSIT2019PDF]
 Authors: AfreenFathima, Arvind P,Kritika Ganesh Tripathi,Punith R,Santosh Kumar C, Assistant Professor, Dept of CSE, Sri RevanaSiddeshwara Institute of Technology Bengaluru, India Email: afreenfathima202@gmail.com
Electronic Health Records (EHRs) are entirely controlled by hospitals instead of patients, which complicates seeking medical advices from different hospitals. Patients face a critical need to focus on the details of their own health care and restore management of their own medical data. The rapid development of block chain technology promotes population healthcare, including medical records as well as patient-related data. This technology provides patients with comprehensive, immutable records, and access to EHRs free from service providers and treatment websites. In this paper, to guarantee the validity of EHRs encapsulated in block chain, we present an attribute-based signature scheme with multiple authorities, in which a patient endorses a message according to the attribute while disclosing no information other than the evidence that he has attested to it. Furthermore, there are multiple authorities without a trusted single or central one to generate and distribute public/private keys of the patient, which avoids the escrow problem and conforms to the mode of distributed data storage in the block chain
May-Article-12- : Title:E-Commerce Product Ranking Based on Artificial Neural Networks:[IJERPGAT2019PDF]
 Authors: Ms Swathi U, Dr. Kavitha C, Dept. of CSE, Global Academy of Technology, Bengaluru, Karnataka, India      Email:swathi0495@gmail.com
Today, decision making has been quite an easy task ANN being the backbone of business decisions. ANN are very much useful and significant in today’s cyberspace. E-commerce has made life easy for people. ANN is pertinent to E-commerce as well. Billions of products are launched in an E-commerce website and the user can purchase them with just a click. Made so easy the problem is pertaining the quality of the product. The user can discern the quality by going through the reviews which is a tedious task. ANN when applied processes the actual user reviews and through the implementation of sentimental analysis, finally allocates the ranks for each product. The ranks would be in a gamut of 1 to 10. Product ranking using ANN would be fruitful for the user as well as the E-commerce stakeholders.
May-Article-13- : Title:Study of Edge Detection and Object Tracking Methods:[IJERPAJIETPDF2019]
 Authors: Arpitha K Shetty1, Pratheksha Rai N2, Ganesh Shetty3 Dept of ECE ,A J Institute of Engineering &Technology and Shri Madhwa Vadiraja Institute of Technology and Management Mangaluru Email:shettyarpitha6@gmail.com

In computer vision applications, the object detection technique is the fundamental and most important step for the video analysis. Primarily, the object detection and tracking process is based on the movement of the object. This paper aims to detect the movement of the object from the background image in the video sequence and further tracks the object location. Edge based approaches has been widely adopted in object detection and tracking because the edges provide reliable information which is not dependent upon the motion type or the shape of the objects. In this paper, different operators applied for the edge detection are highlighted and background subtraction modelling for object tracking in a real time video is proposed. The current work, finds its application in traffic management, navigation systems, surveillance systems and also in the medical therapy.

May-- Article-14 : Title:Ada-Boost and Majority Voting for credit card fraud detection:[IJERPGATB2019PDF]
Authors: Ms Bindu T, Dr. Kavitha C, Dept. of CSE, Global Academy of Technology, Bengaluru, Karnataka, India,Email:bindunavibindu@gmail.com
Credit card fraud is a serious problem in financial services. Billions of dollars are lost due to credit card fraud every year. There is a lack of research studies on analyzing real-world credit card data owing to confidentiality issues. In this paper, machine learning algorithms are used to detect credit card fraud. Standard models are first used. Then, hybrid methods which use AdaBoost and majority voting methods are applied. To evaluate the model efficacy, a publicly available credit card data set is used. Then, a real-world credit card data set from a financial institution is analyzed. In addition, noise is added to the data samples to further assess the robustness of the algorithms. The experimental results positively indicate that the majority voting method achieves good accuracy rates in detecting fraud cases in credit cards.
June-- Article-15 : Title:Prediction and classification of Cardiac Arrhythmia using more efficient  machine learning Algorithm:[IJERP_GAT_PDF2_2019]
Authors:Ms.Manasa G V Kumar, Dr. Kavitha K.S,, Dept. of CSE, Global Academy of Technology, Bengaluru, Karnataka, India,Email:manasagvkumar3@gmail.com,drkavitha2015@gmail.com
June-- Article-16 : Title:Brain Tumour Detection Using MRI Image :[IJERPGAT_PDF_2019]
Authors:Ms Yogita Umesh Ligadi, Dr. Kavitha K.S,, Dept. of CSE, Global Academy of Technology, Bengaluru, Karnataka, India,Email:yogitavy7@gmail.com,drkavitha2015@gmail.com

Leave a Reply