Mobile Health Monitoring System using Fuzzy Logic
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 7
Abstract
This paper was tested on a set of data in order to prove its effectiveness. Simulation gives promising results in detecting the activity of the person. This is efficient system for health monitoring as compare with conventional system. In this paper, to identify person’s activity fuzzy logic is used. It is found that this system is quick, easy to handle and robust in health monitoring.
Authors and Affiliations
Naseem Rao, Anil Kumar, T. A. Abbasi
A NOVEL METHOD OF COLOR IMAGE ENHANCEMENT BY COLOR SPACE TRANSFORMATION FOLLOWED BY GAMMA/LOGARITHMIC TRANSFORMATION
Visual enhancement of image plays a very important role in the field of medical imaging. Enhanced medical images are more suitable for analysis and proper diagnosis. We present a novel method of enhancement of color medi...
Effect of Weight Factor on The Performance of Hybrid Column Wavelet Transform used for Watermarking under Various Attacks.
Digital image watermarking is aimed at copyright protection of digital images. Strength of embedded watermark plays an important role in robustness and invisibility of watermarking technique. In this paper, effect of two...
COMPREHENSIVE STUDY ON CONTENT BASED IMAGE RETRIEVAL WITH THEIR FEATURES
In current years, very huge collections of images and videos have grown swiftly. In parallel with this boom, content-based image retrieval and querying the indexed collections of images from the large database are requir...
Performance Evaluation of Distributed Database Systems
Distributed database management systems manage a huge amount of data as well as large and increasingly growing number of users through different types of queries. Therefore, efficient methods for accessing these data vol...
Study of Vulnerability Diagnosis and Sustaining Integrity of the Embedded Devices
Security vulnerability of the embedded devices with Internet connectivity is frequently reported these days. In this paper, a diagnosis was made for a security vulnerability in the controller that is an element of the se...