RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Use of Silence as an Altered Approach for Speaker Recognition

        Rupali Pawar,R. M. Jalnekar,J. S.Chitode 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.5

        Speaker recognition is an important application of Speech Signal Processing and has been used in public safety, authenticating users for important financial transactions, access control systems and many more. The conventional approach in speaker identification and speaker verification has been to remove the silence from the recorded speech signal and further extract the significant features from the residual signal for recognition. This paper presents an alternative approach and puts forth the experimental results of obtaining silence as a parameter to check if the pattern of pauses/silence for train and test files recorded for individual speaker match. The paper emphasizes the approach in which a paragraph is recorded for 8 speakers and used as train files. The duration of silence/pauses of the speaker in a paragraph are obtained. This silence obtained is compared with the silence obtained from test file the matching of pattern of the silences decides the identity of the speaker.

      • Software Module Fault Prediction using Convolutional Neural Network with Feature Selection

        Rupali Sharma,Parveen Kakkar 보안공학연구지원센터 2016 International Journal of Software Engineering and Vol.10 No.12

        Software plays a significant role in technological and economic development due to its utmost importance in day to day activities. A sequence of rigorous activities under certain constraints is followed to come up with reliable software. Various measures are taken during the process of software development to ensure high quality software. One such method is software module fault prediction for quality assurance to discover defects in the software prior to testing. It aids in predicting the software module faults earlier in the development of the software which predicts fault prone modules so that these can be given special attention to avoid any future risk which eventually curbs the testing along with maintenance cost and effort. The literature survey uncovers many findings that had never been focused like dimensionality reduction and feature selection based on individual feature importance which leads to increase in time complexity and chances of false information. This paper addresses these issues and proposes a supervised machine learning based software module fault prediction technique by implementing Convolutional Neural Network (CNN) as classifier model. Feature selection methods used are InfoGain and Correlation. The results obtained are compared with the existing method HySOM (SOM Clustering with Artificial Neural Network Classification) by considering three different feature sets (Fifteen features, Eighteen features and Twenty one features) of PC1 dataset from NASA. The comparative analysis is performed on the basis of accuracy, precision, recall and F1-measure. The results clearly show better performance of the proposed CNN based technique than HySOM. This paper will contribute towards improvement of quality assurance models utilized for software fault prediction by automating this process using machine learning which enhances True Positive Rate and reduces the detection error. This in turn will help project managers, testers and developers to locate and keep track of fault prone modules so that final software is more accurate, consistent and reliable without consuming much of the testing and maintenance resources.

      • An Experimental of Health Monitoring System using Wearable Devices and IoT

        Rupali Shinde,Min Choi 한국통신학회 2021 한국통신학회 학술대회논문집 Vol.2021 No.2

        In this paper, we want to present a novel approach for health data collection and storage on a secure distributed network such as the IPFS cloud. This system is not fully developed yet; we are still working on this system for good performance. Our approach is to collect data using GY- 906 and Max30100 sensors using raspberry pi and store data securely on the IPFS cloud for analysis and privacy.

      • KCI등재

        Rubia cordifolia: a review

        Rupali Patil,Mahalaxmi Mohan,Veena Kasture,Sanjay Kasture 경희대학교 융합한의과학연구소 2009 Oriental Pharmacy and Experimental Medicine Vol.9 No.1

        Medicinal herbs are significant source of synthetic and herbal drugs. In the commercial market, medicinal herbs are used as raw drugs, extracts or tinctures. Isolated active constituents are used for applied research. For the last few decades, phytochemistry (study of plants) has been making rapid progress and herbal products are becoming popular. According to Ayurveda, the ancient healing system of India, the classical texts of Ayurveda, Charaka Samhita and Sushruta Samhita were written around 1000 B.C. The Ayurvedic Materia Medica includes 600 medicinal plants along with therapeutics. Herbs like turmeric, fenugreek, ginger, garlic and holy basil are integral part of Ayurvedic formulations. The formulations incorporate single herb or more than two herbs (poly-herbal formulations). Medicinal herb contains multitude of chemical compounds like alkaloids, glycosides, saponins, resins, oleoresins, sesquiterpene, lactones and oils (essential and fixed). Today there is growing interest in chemical composition of plant based medicines. Several bioactive constituents have been isolated and studied for pharmacological activity. R. cordifolia is an important medicinal plant commonly used in the traditional and Ayurvedic system of medicine for treatment of different ailments. This review illustrates its major constituents, pharmacological actions substantiating the claims made about this plant in the traditional system of medicine and its clinical applications. Medicinal herbs are significant source of synthetic and herbal drugs. In the commercial market, medicinal herbs are used as raw drugs, extracts or tinctures. Isolated active constituents are used for applied research. For the last few decades, phytochemistry (study of plants) has been making rapid progress and herbal products are becoming popular. According to Ayurveda, the ancient healing system of India, the classical texts of Ayurveda, Charaka Samhita and Sushruta Samhita were written around 1000 B.C. The Ayurvedic Materia Medica includes 600 medicinal plants along with therapeutics. Herbs like turmeric, fenugreek, ginger, garlic and holy basil are integral part of Ayurvedic formulations. The formulations incorporate single herb or more than two herbs (poly-herbal formulations). Medicinal herb contains multitude of chemical compounds like alkaloids, glycosides, saponins, resins, oleoresins, sesquiterpene, lactones and oils (essential and fixed). Today there is growing interest in chemical composition of plant based medicines. Several bioactive constituents have been isolated and studied for pharmacological activity. R. cordifolia is an important medicinal plant commonly used in the traditional and Ayurvedic system of medicine for treatment of different ailments. This review illustrates its major constituents, pharmacological actions substantiating the claims made about this plant in the traditional system of medicine and its clinical applications.

      • Two Way Authentication in MITM Attack to Enhance Security of E-commerce Transactions

        Rupali Savita,Unmukh Datta 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.9

        Serviceable and secure authentication is a research field that approaches dissimilar challenges related to authentication, including security, from a human-computer interaction perspective. The process of identifying an individual usually based on an email id and passwords. In this paper, we focus on client and server authentication. We examine the phishing problem, Man-In-The-Middle Attack, The main challenge in the design of a security system for high security is, how to prevent the attacks against data modification and authentication. Web based delivery is one of the most complicated phishing techniques. Also known as “man-in-the-middle,” the hacker is being found on the original website and the phishing system.

      • 1 D contaminant transport through unsaturated stratified media using EFGM

        Rupali, S.,Sawant, Vishwas A. Techno-Press 2019 Advances in environmental research Vol.8 No.1

        In the present study, analysis of contaminant transport through one dimensional unsaturated stratified media using element free Galerkin method has been presented. Element free Galerkin method is a meshfree method. A FORTRAN code has been developed for the same. The developed model is compared with the results available in the literature and are found in good agreement. Further a parametric study has been conducted to examine the effects of various parameters like velocity, dispersivity, retardation factor and effect of saturation on the contaminant flow. The results presented conclude that transport of contaminant is retarded in unsaturated zone in comparison with the saturated zone.

      • KCI등재

        Error Recovery Script of Immunity Debugger for C# .NET Applications

        Rupali Shinde,최민,이수현 한국정보처리학회 2019 Journal of information processing systems Vol.15 No.6

        We present a new technique, called VED (very effective debugging), for detecting and correcting division byzero errors for all types of .NET application. We use applications written in C# because C# applications aredistributed through the internet and its executable format is used extensively. A tool called Immunity Debuggeris used to reverse engineer executable code to get binaries of source code. With this technique, we demonstrateinteger division by zero errors, the location of the error causing assembly language code, as well as errorrecovery done according to user preference. This technique can be extended to work for other programminglanguages in addition to C#. VED can work on different platforms such as Linux. This technique is simple toimplement and economical because all the software used here are open source. Our aims are to simplify themaintenance process and to reduce the cost of the software development life cycle.

      • 1D contaminant transport using element free Galerkin method with irregular nodes

        Rupali, S.,Sawant, Vishwas A. Techno-Press 2016 Coupled systems mechanics Vol.5 No.3

        The present study deals with the numerical modelling for the one dimensional contaminant transport through saturated homogeneous and stratified porous media using meshfree method. A numerical algorithm based on element free Galerkin method is developed. A one dimensional form of the advectivediffusive transport equation for homogeneous and stratified soil is considered for the analysis using irregular nodes. A Fortran program is developed to obtain numerical solution and the results are validated with the available results in the literature. A detailed parametric study is conducted to examine the effect of certain key parameters. Effect of change of dispersion, velocity, porosity, distribution coefficient and thickness of layer is studied on the concentration of the contaminant.

      • Avoiding Buffer-Overloading in the Wireless Sensor Network

        Rupali saini,Harsukhpreet Singh 보안공학연구지원센터 2016 International Journal of Grid and Distributed Comp Vol.9 No.12

        The main problem of wireless sensor network is congestion occur due to buffer-overloading. Due to this issue, the performances of the network such as network throughput and packet loss are affected. To reduce the buffer-overloading from the WSN a comparative study has been done between AODV and QAODV using queue length buffer-overloading equation. In this paper, we proposed QAODV using queue length buffer-overloading equation through which major cause of congestion, buffer-overloading is reduced from the network.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼