scispace - formally typeset
Proceedings ArticleDOI: 10.1109/ISCO.2017.7856030

An assessment framework for Precipitation decision making using AHP

01 Jan 2017-pp 418-421
Abstract: This work aims to study the relation between Precipitation and six of its various climatic factors. The analysis shows how much is the contribution of Reference Crop Evapotranspiration, Average Temperature, Wet Day frequency, Potential Evapotranspiration, Vapor Pressure and the Cloud Cover towards precipitation. For the purpose of finding the percentage of contribution by every parameter on Precipitation, we use a method called Analytical Hierarchical Processing. Basically, Analytical Hierarchical Processing is used for decision making. more

Topics: Evapotranspiration (54%)

Proceedings ArticleDOI: 10.1109/IPACT.2017.8244948
01 Apr 2017-
Abstract: A new variant of RSA has been proposed called Memory Efficient Multi Key (MEMK) generation scheme. For sensitive data, our scheme will aid in exchanging the information between cloud to IoT and IoT to IoT devices. When cryptography belongs to the asymmetric type, then it has public and private keys. For memory efficiency, our scheme reuses the RSA scheme with a Diophantine form of the nonlinear equation. Moreover, our scheme performance comparatively performs well and this mainly due to the use of RSA public key alone. Due to this, our MEMK does not require multiplicative inverse function or Extended Euclid's algorithm. Finally, we have made an experimental result on various phases of MEMK PKC such as key generation, encryption, and decryption by varying the N-bit modulo bits from 1K to 10K. more

Topics: Key generation (61%), Public-key cryptography (59%), Encryption (57%) more

48 Citations

Proceedings ArticleDOI: 10.1109/ICEEOT.2016.7755025
01 Mar 2016-
Abstract: Now-a-days, in the medical field, prescribing a medicine for a patient without mentioning its brand name is a tedious job. But it can be made possible, when both the parties (physician and pharmacist) are adapting well and standardized methodology. Our aim is to suggest an idea to make this process easy to understand and light to use. Based on the types of common diseases, the medicinal prescription lists can be categorized with relevant medicinal blocks. If a physician prescribes the medicine through this standardized predefined scheme, then the system will generate a unique number using Grace Code Cryptography and Linear RSA algorithms. The unique number will be given to the patient in the prescription sheet. Through this unique number, the pharmacist can get back the medical unit which is intended for a particular patient with the help of the same algorithms and using the standardized predefined scheme as it is a general template, and he delivers the medicine. So the patient will be given the prescribed medicine without specifying the brand name at any stage. more

Topics: Medical prescription (50%)

43 Citations

Proceedings ArticleDOI: 10.1109/ICECA.2017.8212799
20 Apr 2017-
Abstract: Spearman's rank relationship coefficient is a nonparametric (dispersion free) rank measurement. Spearman's coefficient is not a measure of the direct relationship between two factors, as a few ”analysts” proclaim. Pearson's relationship coefficient is the covariance of the two factors separated by the result of their standard deviations. The possibility of the paper is to look at the estimations of Pearson's concrete compressive strength coefficient and Spearman's rank relationship coefficient and in addition their factual hugeness for various arrangements of information depicting provincial records of the financial advancement. In this, the Spearman correlation coefficient is based on the ranked values for each variable rather than the raw data. Spearman correlation is often used to evaluate relationships involving ordinal variables. The Pearson and Spearman's method is compared with the rank coefficient in the concrete compressive strength. more

40 Citations

Proceedings ArticleDOI: 10.1109/IPACT.2017.8245059
01 Apr 2017-
Abstract: IoT devices are everywhere. Shortly, every “thing” is going to be connected and interact with each other. What are these things? They can be your microwaves, heaters, air conditioners or even your refrigerators. It assessed that there would be 50 billion connected IoT devices by 2020 which is about 7 IoT gadgets for every individual on the planet. IoT devices are low powered devices which have a minimal amount of processing capabilities. With ever increasing number of IoT devices, there is a subsequent need for secure communication among them. In this paper, we aim to propose an encryption algorithm used for secure communication by taking into account the limitations of IoT devices. more

Topics: Encryption (56%), Secure communication (56%), Key distribution (54%)

38 Citations

Proceedings ArticleDOI: 10.1109/IPACT.2017.8245071
01 Apr 2017-
Abstract: In statistical analysis, we have a collection of data, with the use of these data, we have to do analysis based on our requirements. With the collection of data using Statistical analysis, we deal collection, analysis, presentation and organizing the data. With the help of statistical analysis, we can find underlying patterns, relationships, and trends between data samples. The R system for statistical computing is an environment for data analysis and graphics. Here we are going to implement boxplot method and control chart methods for Lung cancer dataset. With the help of boxplot, we can easily make relations between samples and we can find the outliers. more

Topics: Box plot (61%), Control chart (52%)

38 Citations


Journal ArticleDOI: 10.1007/S11518-006-0151-5
Thomas L. Saaty1Institutions (1)
Abstract: This is the first part of an introduction to multicriteria decision making using the Analytic Hierarchy Process (AHP) and its generalization, the Analytic Network Process (ANP). The discussion involves individual and group decisions both with the independence of the criteria from the alternatives as in the AHP and also with dependence and feedback in the entire decision structure as in the ANP. This part explains the Analytic Hierarchy Process, with examples, and presents in some detail the mathematical foundations. An exposition of the Analytic Network Process and its applications will appear in later issues of this journal. more

886 Citations

Open accessJournal ArticleDOI: 10.3390/W6061515
01 May 2014-Water
Abstract: This study aims at providing expertise for preparing public-based flood mapping and estimating flood risks in growing urban areas. To model and predict the magnitude of flood risk areas, an integrated Analytical Hierarchy Process (AHP) and Geographic Information System (GIS) analysis techniques are used for the case of Eldoret Municipality in Kenya. The flood risk vulnerability mapping follows a multi-parametric approach and integrates some of the flooding causative factors such as rainfall distribution, elevation and slope, drainage network and density, land-use/land-cover and soil type. From the vulnerability mapping, urban flood risk index (UFRI) for the case study area, which is determined by the degree of vulnerability and exposure is also derived. The results are validated using flood depth measurements, with a minimum average difference of 0.01 m and a maximum average difference of 0.37 m in depth of observed flooding in the different flood prone areas. Similarly with respect to area extents, a maximum error of not more than 8% was observed in the highly vulnerable flood zones. In addition, the Consistency Ratio which shows an acceptable level of 0.09 was calculated and further validated the strength of the proposed approach. more

Topics: Flood myth (61%)

261 Citations

Open accessJournal ArticleDOI: 10.1016/J.SCITOTENV.2015.08.055
Abstract: The present study introduces a multi-criteria index to assess flood hazard areas in a regional scale. Accordingly, a Flood Hazard Index (FHI) has been defined and a spatial analysis in a GIS environment has been applied for the estimation of its value. The developed methodology processes information of seven parameters namely flow accumulation, distance from the drainage network, elevation, land use, rainfall intensity and geology. The initials of these criteria gave the name to the developed method: "FIGUSED". The relative importance of each parameter for the occurrence and severity of flood has been connected to weight values. These values are calculated following an "Analytical Hierarchy Process", a method originally developed for the solution of Operational Research problems. According to their weight values, information of the different parameters is superimposed, resulting to flood hazard mapping. The accuracy of the method has been supported by a sensitivity analysis that examines a range for the weights' values and corresponding to alternative scenarios. The presented methodology has been applied to an area in north-eastern Greece, where recurring flood events have appeared. Initially FIGUSED method resulted to a Flood Hazard Index (FHI) and a corresponding flood map. A sensitivity analysis on the parameters' values revealed some interesting information on the relative importance of each criterion, presented and commented in the Discussion section. Moreover, the sensitivity analysis concluded to a revised index FHIS (methodology named FIGUSED-S) and flood mapping, supporting the robustness of FIGUSED methodology. A comparison of the outcome with records of historical flood events confirmed that the proposed methodology provides valid results. more

Topics: Flood myth (58%)

234 Citations

Journal ArticleDOI: 10.1016/J.ESWA.2005.01.008
Dhavachelavan Ponnurangam1, G. V. Uma1Institutions (1)
Abstract: Although each paradigm has its own influence in the software engineering field on the support of its proficiencies, due to the exceptional growth of the software industry, researchers continue to strive for more efficient and powerful techniques. As new requirements arise, on the one hand, from the increasing complexity of modern software systems, and on the other hand, from distribute of today's information economies, it has been recognized that the modularity and reusability provided by existing techniques and approaches are in sufficient. Agents are being advocated as a next generation ad hoc model for engineering complex, distributed systems they facilitate the automated software testing by virtue of their high-level decomposition, independency and parallel activation. Here, we address a set of more specific characteristics of agent-based approach (modularity, independency and parallel activation) and its efficacy in software testing. In this paper, we do not just described the claims for agent-based approach in software testing, also developed an ad hoc distributed multi-agent system for software. The multi-agent system illustrated here is on the basis of few basic operational real-world testing techniques, as an attempt to describe how to practice Agent-Oriented Software Testing (AOST), which has not previously done. more

16 Citations

No. of citations received by the Paper in previous years
Network Information
Related Papers (5)