Abstract: : Brain tumor is an abandoned growth that is affecting no of peoples all over the world. Most analysis and research tell us that numbers of death are caused because the user is not known or unaware of detection of Tumor. In this Survey paper we focus to explain about different techniques and algorithm that are used to detect Brain Tumor regarding this we will deeply discuss MRI, CT scan, Segmentation, Extraction of noisy material, K-Mean Clustering and C-Mean Fuzzy, Gaussian and Median Filters to identify the best Algorithm for Brain Tumor Detection. We will also discuss in this survey paper about what are automation techniques to find brain tumor without human interaction to get more accurate results. Our goal is to find or detect the position of cancer or tumor of the brain. How we do an experiment to detect brain tumors actually we take real mage of the tumor and their results show that algorithm s convenient. The most important concern of AIS (artificial intelligence system) is image processing and machine learning.
Keywords: Usability, MRI; Image Segmentation; CT; Algorithms for Brain Detection Tumor; Image Processing; Machine Learning; Noise elimination; Techniques
Abstract: Now a days, there are a lot of security threats for which every security departments work dawn to dusk. In case, there is a person whose entrance is banned in an organization, or information about that person is required either he was there or not. For this outcome, it will be necessary to watch the CCTV footage even it is 10 hours long to sport that person. To tackle this happening, what if there is a tool or software which could do all this work in the same time. IFMP is a desktop-based video player application through which any humane face can be detected through computing algorithms of recognition and detection under consideration of framework provided by Microsoft Corporation. Its a tool that only takes the picture of the person as input and after processing all the footage, it gives the time hits as output from that footage in which the required person is being spotted.
Keywords: Software Utility; Open CV; Video Processor; CCTV footage; Microsoft Framework
Abstract: There are a lot of users on social media who wants to collect information of others and meet people for sharing data on different topics. Therefore, number of social media sites have been made, through this large number of people in a few time interact with one another astoundingly. The purpose of social media sites is same. Every sites wants to attract users in a huge number in different ways. The main purpose is to know the various impacts on social networking on students/users and human life. In this study, want to focus on important impacts on social media with help of literature review. Social media impacts include health issues and studies effected etc. The previous studies show impacts of social media on male and female students and collected data through questionnaire. Some results are same while mostly results are changed by previous work done.
Keywords: Social Media, Facebook, WhatsApp, LinkedIn Students
Abstract: : Several techniques have been proposed for the detection of SQL injection vulnerability detection in the source code. These techniques include the analysis of the code to detect SQL injection vulnerabilities. The code of the software system under consideration can be tested for SQL injection vulnerabilities and the tester can be notified. The existing techniques either lack the ability to detect SQL injection vulnerability or provides greater number of false positives (detection of non-existent SQL injection vulnerabilities).In our research proposed SQL injection vulnerability detection in Java code through model checking. The code is transformed into intermediate representa- tions (graphs), which then are converted into model. The model is checked against the specifications that are created according to the requirement (in our case SQL injection vulnerability detection). If the model satisfies the specifications, the code represented by the model is concluded to be safe from SQL injection vulnerability. We have used constant propagation analysis (CPA) for the purpose of expression evaluation for constant variables used in the test programs. We have also proposed algorithms to create necessary graphs from Java byte code to act as an intermediate representation of the code.Results have shown that the number of false positives are reduced while increasing the number of true negatives for the OWASP Benchmarks. The number of true positives for our implemented approach is consistent for the bench- mark test cases that are handled by the implementation of our approach.
Keywords: SQL injection vulnerability, Java, Constant propagation analysis, OWAS
Abstract: The art of kashi tile is very famous and popular among the various dynasties of the Sindh which have ruled over the sub-continent, but most of its work is found in the ruling period of the mirs and kalhoras, the use of this art is done on the different spaces most of them are religious space but along with residential spaces which includes the hawelies, otaks, khangaas, darghas and masjids, shrines of these two dynasties which makes them more attractive and worth sighting. This piece of richer will help to compare the tile of these two dynasties by form, shape, motifs, color and sizes for which a case study will be made on the location and physical presence of the tombs to understand the importance of the kashi work on it, besides of it a photographical survey and CAD designs will be made to have measurements and sizes, the results and findings of the research will be helpful to the Architects and kashigers to re use this art in modern architecture and to establish the sustainable industries for the production of the kashi tile to improve the use of this traditional art in modern work.
Keywords: Kashi tile; Architecture; Psychological impact; Mir & Kalhoro; Hyderabad region
Abstract: : Image segmentation is a significant process for the segregation of image into several regions in order to achieve the desired object or meaningful information. It is considered as the first step for any autonomous computer vision application. And for that purpose active contour models plays a vital and effective role because of its potential to detect object boundaries with the curve evolution. Various conventional approaches namely edge based, region based(global and local) have been proposed for accurate segmentation. These traditional methods performs very well on images having homogeneous intensity behavior, However it suffers on images with intensity inhomogeneity. In this paper we proposed an improved image-based hybrid energy metric by integrating Bayesian classification in conventional region growing to allow improve segmentation where current approaches suffer through degradation of gradient and intensity inhomogeneity. The quantitative results and experimental comparison validates that the proposed method performs better as compared to existing conventional approaches.
Keywords: Active contour, Image segmentation, Bayesian classification, Region based segmentation, Local and global segmentation, Intensity inhomogeneity, Hybrid energy
Abstract: : Glaucoma is an eye disease that affects the optic nerve head and, if not treated, may cause full or partial loss of vision. Since damage caused by glaucoma is irreversible, early diagnosis caries a paramount importance. Lately, automatic methods of glaucoma detection are getting popular, and the recent literature reports a continual increment in their accuracy and performance. In this paper, we opt deep learning based on a convolutional neural network for automatic feature extraction and classification in one go. The proposed system uses five convolutional layers for feature extraction and two fully connected layers for classification. A bigger dataset is formed by combining all three releases of RIM-ONE datasets. Dataset is further augmented using affine transform of the original dataset for the purpose of training and a dropout layer is also added to avoid overfitting. The results with five-fold experiments on binary classification are presented. The average results show the overall classification accuracy of 0.85, sensitivity of 0.80 and specificity of 0.88 with an equal error rate of 0.15.
Keywords: Glaucoma, Deep Learning, Convolutional Neural Network, RIM-ONE.
Abstract: Internet has so much information and become a data source for us. If a user desires to go looking for data on the web, he just gets information from internet sources and search engines like Google but that contains both desirable and non-desirable information, so for that purpose a Recommender System was created to solve that problem of searching. It considers user requirements, interests and explores information that targeted user looks for. The Recommender System has become famous topic of research for past few years. At first all the studies have mainly concentrated only one user suggestions. Recently the Group Recommender Systems have paid attention to suggestions of a group of users as in few cases the products to be suggested are not only for one user but for a group of users. For example, a DVD could be visually examined by different users in a group of family members. The current research has labeled the query of initializing advises of different members of a group and that is to satisfy the distinct preferences of all the group members as much as possible. This paper we discuss at Existing Aggregation strategies favors the opinion of that group member who gets extreme rating (either very high or very low). For Example, a group has three members, two of them have given 3 rating on a particular item and one of them has given 1 rating than according to the average aggregation strategy the group rating will be approximately 2 which means group members dislike the item however if we consider their individual rating than two members from the group of 3 members actually like the item but only for one member the low rating is considered as dislike. Finally, if we consider the problem of ratings or recommendations, it requires more extension and needs to be improved for that here we use RMSE as evaluation matric One characteristic of the RMSE is that it tends to disproportionately penalize large errors because of the squared term within the summation in result it will be get appropriate results.
Keywords: Recommender system; Group recommendation; Collaborative filtering; Aggregation strategy.
Abstract: The morphology of street patterns has been the subject of many studies in recent decades, there have been few attempts to quantify the street patterns. For this study, we measured and compared the trending street pattern in Jamshoro, listed down all the types of street pattern trending there along with their rising problems related to sun & wind orientation. The pattern according to which housing societies are developed in Jamshoro are different as they are designed by different Architects & town planners, making socio- psycho issues for inhabitants, most of the houses have to sacrifice for the wind & light. Aim of this research is to identify the orientation issues with respect to wind & light related to street patterns & Providing better solution for the development of eco-friendly Residential scheme. For this purpose, we visited these residential areas, conducted case studies, reviewed literature in order to get keen observation on how others cope with these issues, and conducted un structured interview from the inhabitants. The adopted methodology of research will help us in sorting out the major issues with most appropriate solutions for the development of eco-friendly residential scheme.
Keywords: Street Pattern; Murk society; Jamshoro
Abstract: Big Data tremendously big data set that may be analyze computationally to expose pattern, trend, and relations, particularly connecting to human performance and connections. Big Data is an appearance used to mean a massive quantity of both controlled and amorphous data that is so outsized it is tricky to development using conventional database and software technique. Big data is used in every field of life.Ithas been said that this is age of Big Data. Big Data consist of ten Vs. In this paper, provide only a brief survey of 7 Vs of Big Data in order to understand Big Data and 7 Vs definition, its applications and merits in detail. Finally we conclude the 7 Vs uses and Big Data Utilization, as a future work for researchers and students, while moving forward.
Keywords: Big Data; 7’Vs of big data; Big data extract and Utilization
Abstract: Fog computing is referring to spreading cloud computing to the edge of an originality’s network. It is basically a devolved research paradigm where knowledge, storage and software are spread in the absolute most defined, effective position between the information supply and the cloud. Besides the Similarities to cloud computing, it has some distinctiveness which makes the fog computing to experience new security and privacy challenges. This paper describes the definition of fog computing and similar perception, commences about application scenarios, and identifies security and privacy challenges in fog based computing systems.
Keywords: Fog computing, Cloud computing, Mobile edge computing, Cloudlet
Abstract: Light Fidelity is popularly known as Li-Fi. This is a very new technology that is driven by German physicist Harald Haas  in 2011. The technology is proposed during a global talk on Technology Entertainment Design on VLC communications. Visible light communications are optical ways of communication that networks the LED for data transmission. The term Li-Fi uses the VLC communication for the high end communication that can be an alternative of Wi-Fi. The proposal of Harald Haas is comparable with IEEE 802.15.7 that is fully dual directional and networked standard built for 802.11.
Keywords: Li-Fi; Li-Net; VaNet; Communication technology;Network;Smart Network
Abstract: Today human life is entering in new era of technology where all functions that depends on human will be done by many interconnecting devices called internet of things (IoT). Internet of things is able to provide billions of services at any time and any palace. There are many reasons that make IoT most interesting most researchable topic today. IoT provide dynamic control in daily life, enhance the resource utilization, and create dynamic relationship between humans and nature. In this survey paper many applications (smart homes, connected cars, wearable, use in industry, smart cities, in agriculture, smart retail systems, energy management systems, in health care, in poultry and farming) of IoT are discussed in details. Importance and challenges are also discussed in this survey paper.
Keywords: IoT; Applications; Importance; Challenges; Technology
Abstract: TAutomated vehicles get increased attention by vehicular makers and researchers. However, their preparation needs the security problem be resolved, significantly since they admit wireless communication and rouge vehicles will roam with contaminated with software system. Automatic vehicles use a multiplicity technique to understand their surrounds, like microwave radar, optical device light, GPS. Advanced mechanisms interpret sensory info to recognize appropriate course plotting ways, in addition as hindrances and important accumulation. In this paper, provides the comprehensive survey on automated vehicles and their applications. Automotive industry plays very important role to resolve the price issue and create it easier for business users to adopt a replacement vehicular technology.
Keywords: Automated vehicles; Global Positioning System (GPS); applications; business user; vehicular technology
Abstract: During drilling operation, many challenges are faced in context of drilling mud performance. With the increase in depth temperature and pressure unwanted impacts on drilling fluid. In addition, usually at higher temperature and high pressure the additives and polymers are not too effective. Keeping in view that problem, we have conducted experimental study on HIPOLY based drilling mud for high temperature conditions. In this research rheological properties of HIPOLY polymer base fluid are determined at wellbore conditions in order to check sustainability and performance of drilling fluid at elevated temperature and pressure. Rheological parameters of HIPOLY based drilling fluid samples at eight different concentrations were measured at laboratory. The usage of Hipoly in drilling fluid will ameliorate its working as viscosifier agent in HTHP conditions that improves the API property of drilling fluid up to 180 oC.
Keywords: Drilling fluid; Rheology; Polymer; Plastic viscosity; HPHT
Abstract: Initially the hydrocarbons are produced by the natural pressure of the reservoir, by the passage of time its pressure starts to deplete and at a certain point it does not cover the economical limit of a producer well. To overcome that depletion artificial lift methods are widely used. To meet the economical limit more than 90% oil wells require artificial lift method. Different ALM are used to suck out the oil from producing well and Electrical Submersible Pump (ESP) is one of the ALM that will be used for increasing the production of an oil well. The decline of Production occur due to mismanagement of wells, improper perforation method and oversized tuning so consequently wells cannot produce expected rates so the company will not meet their economic criteria and may go for the economic losses.
Keywords: Artificial lift method; Water cut; Production Decline Rate
Abstract: Housing is one of the basic human needs. The shortage of housing in a country is mounting due to immense growth rate of population. The current housing situation in Sukkur is not very different from the national one. A significant percentage of the urban population and the majority of rural migrants live in terrible living conditions and there is a strong shortage of adequate and affordable housing units. Furthermore, the deficit continues to rise; like more shelters, less population is forced to live in deplorable conditions. Families below the poverty line have been neglected. Land is also scarce resource and major contributor in housing supply. Related obstacles include dill planning of land without any management system together with higher cost of land and materials. Hence, the objective of this study is to evaluate housing nee. The housing supply gap was used to analyze through multiple secondary source data. The findings are defined as the housing demand is increasing with limited supply of housing with average backlog of 5000 houses. Government also is failed to take strong initiatives of supply of housing and this gap strongly affects affordability.
Keywords: Adequate housing; Demand; Supply; Backlog; Real estate
Abstract: Cement rheology plays a significant role in the removal of mud from well and provide help in determining the flow consistency during cementing operation. These properties predict the flowing characteristics of cement under different well conditions. The flow properties of cement slurry such as yield point, gel strength, plastic viscosity, and frictional properties etc. can be calculated by rheological measurements. Rheological behavior of slurry is controlled by various factors including the mix water, cement grain size and shape, chemical structure, cement additives and testing procedures. Cement rheology does not retain its properties in high temperature environment and may lead to fluid loss and strength retrogression over the life of a well. Therefore, it is key challenge for petroleum industry to maintain the slurry properties. To address this issue, cellulose based polymer, i.e. hydroxypropyl methylcellulose (HPMC) is added to slurries to act as viscosifying agent. The purpose of this research is to examine the effect of HPMC polymer with other additives on rheology of cement slurry at temperature of 100oC. It is concluded that HPMC polymer works as multifunctional additive in cement slurry that overcome the effect of temperature on rheology and upgraded the rheological properties.