Browse Items (2150 total)
Sort by:
-
The Influence of Alloying Constituent Fe on Mechanical Properties of NiTi Based Shape Memory Alloys
The influences of Fe-addition on phase transformation behavior, mechanical properties and microstructure of Ti50Ni50-xFex alloys were investigated by means of optical microscopy, scanning electron microscopy (SEM) and X-ray diffraction (XRD). Results indicate that, as a substitute for Ni, Fe added to TiNi alloys can dramatically decrease the martensite transformation temperature and R phase transformation and martensite transformation are accordingly separated. The results show that TiNiFe alloys exhibit two-step martensitic transformation. The start temperature of martensitic transformation increases sharply from 212 K to 267 K when 2% Fe is added in, and then decreases gradually if Fe content further increases. The hardness of TiNiFe ternary alloys before heat treatment is constant for up to 6% of the composition and suddenly increases for 9% composition and also it behaves same for heat treated specimens because of formation of equilibrium precipitates Ni3Ti formation. 2017 Elsevier Ltd. -
The Influence of Mobile Commerce on Consumer Behavior: A FCM-RF-DNN Analysis
For m-commerce vendors, the difficulty is to decipher what factors impact customer actions in the ubiquitous mobile setting. In addition, companies are attempting to incorporate social media into their mobile approach in some way. This proposed approach to the findings of a qualitative exploratory study regarding the use of social media and smartphones within the framework of mobile commerce. Keep in mind the order of importance while doing data preprocessing, feature selection, and training the model. The usual steps in getting data ready for processing, such as cleaning it, identifying users and sessions, and finding episodes. The IS-DT suggested method's implementation technique is utilized in feature selection. Unified FCM-RF-DNN models need to be trained after features have been retrieved. Two state-of-the-art approaches, RF and DNN, are outperformed by the suggested approach. Following the implementation of the method, accuracy improved by 96.13%. 2024 IEEE. -
The Integration of HMS using IOMT and CE Through ANFIS
Advances in the IoMT-enabled cloud computing and interactive applications provide a basis for reconsidering the landscape for delivery of healthcare services. Even though the IoMT-cloud-based systems monitor patients remotely, it fails to take into account the sustainability of the healthcare systems. The paper presents the integrated framework of green healthcare under the umbrella of unique technology to enhance user interactivity. Our system is user-friendly, considering scalability and performance for both patients and doctors. Patients can send their health data to the doctor in real time with the help of the wearable sensor. We propose that in the presence of Hierarchical Clustering Algorithms and adaptive neuo-fuzzy inference system (ANFIS) for identification and analysis of the data, the applied solutions could enhance the healthcare experience interaction among all the stakeholders. 2024 IEEE. -
The Interplay Between Artificial Intelligence and Operations Management
Artificial intelligence incorporated into machines utilizes capacities to work and replaces people. Knowledge is the method of assembling empowered machines that can mirror human tasks as unique. With digitalization, organizations are remodifying their enterprises and making new business possibilities. Because of AI innovation, organizations change their dynamic cycles and systems and everyday tasks to accomplish the upper hand. An impressive development in the utilization of AI for activities, the board, is fully intent on observing answers for issues that are expanding in intricacy and scale. With the turn of growth and advancement of data innovation, competitiveness has become increasingly more in-depth worldwide. The AI has its own explanations behind examining and settling the sorts of issues that prompted a critical measure of exploration along with the conventional operational research discipline. Many organizations have estimated the fate of operations management. This paper lines with a descriptive research study highlighting the importance of process operations. This paper gives insights about AI technology into operations management and suggests selecting process technology and deploying AI into operations management. 2023 American Institute of Physics Inc.. All rights reserved. -
The Latest Technology and its Integration for the Development of Healthcare(Medical)
Healthcare advances that use Artificial Intelligence (AI) to analyze data, use devices, and identify patients offer new possibilities for better patient care, cutting costs, and growing the medical sector. The age of specialized human health tests has begun. It uses noninvasive instruments, sound, visual the use of photography, electronic health tools, embedded health instruments, fluidic diagnostic tracking, and combined data analysis to provide people with tailored medical suggestions. These technologies contribute to early identification and comprehending of health issues linked to chronic illnesses and general health using information analysis and AI-driven ideas. Notable uses include a Parkinson's and Huntington's Under certain circumstances, diabetes, cancer, kidney disease, heart problems, elderly care, and a number of healthcare areas. Industry changes are expected as a result of the latest breakthroughs in outdoor monitors, AI-driven evaluation of data, and healthcare testing technologies. AI systems give data to people and health workers, possibly better their way of life and cutting healthcare costs. These include: tracking the effectiveness of medicines, finding chronic illnesses early, and offering individualized care using medical trends and DNA. In relation to healthcare studies and sensor tracking, this study explains new technologies and advances in diverse fusion methods, materials, and processes. Precise diagnostic info, small merchandise dimensions, and cost are high considerations. Healthcare workers, patients, consumers all benefit from more personal health care services thanks to the merging of AI with information streams. The text highlights both advantages and hurdles while showing the way toward upcoming displays and academic papers that follow a path of growth in the industry. 2024 IEEE. -
The Optimization of Output of Wind Turbine with the Ongoing Grid System through BP Method Using ANN
Wind turbines are intricate devices that need careful planning, evaluation, and installation to guarantee peak performance under a range of environmental circumstances. Comprehensive load calculations, performance evaluations, and iterative optimisation processes are all part of the design process. However, complex simulation techniques are required to adequately depict the non-linear behaviour of wind turbine systems because of their complicated structure. Automation of optimisation processes and simulation executions is crucial to optimise the design process and manage the large number of simulations that are needed. This work provides a thorough framework using back propagation (BP) and artificial neural networks (ANN) for simulation and optimization that will make it easier to manage and automate the execution of iterative simulations during the design and development of wind turbines. The framework's main goals are to make design load case simulations easier and optimise activities more automatically. The framework makes it possible to optimise wind turbine systems and explore design options more effectively by automating these procedures. Three example optimisation jobs illustrate the framework's versatility and functionality. 2024 IEEE. -
The Pendant Number ofLine Graphs andTotal Graphs
The parameter, pendant number of a graph G, is defined as the least number of end vertices of paths in a path decomposition of the given graph and is denoted as ? p(G). This paper determines the pendant number of regular graphs, complete r-partite graphs, line graphs, total graphs and line graphs of total graphs. We explore the bougainvillea graphs, e-pendant graphs and v-pendant graphs. If the pendant number is 2, then the number of paths in the path decomposition of the given graph is at most ? (G), the maximum degree of the graph. Hence, a large class of graphs give a more reasonable solution to Gallais conjecture on number of paths in the given path decomposition. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
The Preservative Technology in the Inventory Model for the Deteriorating Items with Weibull Deterioration Rate
An EOQ model for perishable items is presented in this study. The deterioration rate is controlled by preservative technology. This technology only enhances the life of perishable items. So, retailers invested in this technology to get extra revenue. The Weibull deterioration rate is considered for the ramp type demand. Shortages consider partially backlogged, and discount is provided to loyal customers. The concavity of the profit function is discussed analytically. Numerical examples support the solution procedure; then, Sensitivity analysis is applied to accomplish the most sensitive variable. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
The Quantification of Human Facial Expression Using Trapezoidal Fuzzy Membership Function
Fuzzy Inference System is an interesting approach. Major benefit of the FIS is, it permits the natural narration in linguistic terms of tribulations that can be resolved rather than in requisites of associations between accurate arithmetical points. This helps, handling with the complicated systems in easy way, is the major motive why fuzzy system is broadly incorporated in practice. In the present research paper, an effective approach is proposed that quantifies the human facial expression using Mamdani implication based fuzzy logic system. The recent principle engages in retrieving arithmetical values from persons face and feed them to a fuzzy classifier. Fuzzification and Defuzzification process issues trapezoidal fuzzy membership function for input as well as output. The diverse characteristic of this method is its effortlessness and maximum correctness. Experimental outcome on Image dataset depicts excellent accomplishment of the proposed methodology. In this paper, a legitimate procedure proposed for quantification of human facial expression from the features of the face by means of Mamdani type fuzzy inference system, which is proficient to set up a convenient membership association involving the various dimensions of the happy expression. Values representing features of the face are fed to a Mamdani-type fuzzy classifier. This system recognizes three levels of same happy expression namely Normal, Bit Smiley and Loud Laugh. The total output expressions for this proposed scheme is three. Another discrete element of the proposed methodology is the membership method model of expression outcome which stands on various surveys and readings of psychology. Springer Nature Singapore Pte Ltd. 2019. -
The Road to Reducing Vehicle CO2 Emissions: A Comprehensive Data Analysis
In recent years, the influence of carbon dioxide (CO2) releases on the environment have become a major concern. Vehicles are one of the major sources of CO2 emissions, and their contribution to climate change cannot be ignored. This research paper aims to investigate the CO2 emissions of vehicles and compare them with different types of engines, fuel types, and vehicle models. The study was carried out by gathering information about the CO2 emissions of vehicles from the official open data website of the Canadian government. Data from a 7-year period are included in the dataset, which is a compiled version. There is a total of 220 cases and 9 variables. The data is analyzed using statistical methods and tests to identify the significant differences in CO2 emissions among different Car Models. The results indicate that vehicles with diesel engines emit higher levels of CO2 compared to those with gasoline engines. Electric vehicles, on the other hand, have zero CO2 emissions, making them the most environmentally friendly option. Furthermore, the study found that the CO2 emissions of vehicles vary depending on the type of fuel used. The study also reveals that the CO2 emissions of vehicles depend on the model and age of the vehicle. Newer models tend to emit lower levels of CO2 compared to older models. In conclusion, this study provides valuable insights into the CO2 emissions of Cars and highlights the need to adopt cleaner and more sustainable transportation options. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
The Roadmap Implementation for Smart Cities via High Level Communication Technology
This paper explores the integration of smart city technologies to enhance urban living standards and optimize city services. Leveraging modern 6 g technologies such as the Internet of Things (IoT), fog computing, robotics, and predictive analytics, smart cities aim to improve efficiency across various sectors including healthcare, transportation energy, and education. Through real-time monitoring enabled by Wireless Sensor Networks (WSNs), IoT devices, and unmanned aerial vehicles (UAVs), smart cities can efficiently manage resources and infrastructure. In this paper proposes an architectural design to improve urban security using 6G technology and present an extensively light weighted secured mechanism for easing intricacy in medium channel. This study validate and test arithmetical framework with respect to extensively light weighted secured mechanism. The instant study explores the background of defined urban security framework focusing on Internet of Things technology and its application in urban development. This study also introduces a lightweight edge fogging algorithm to optimize general computer network topologies. The proposed framework is thoroughly analyzed and evaluated through computational analysis, simulation, and comparison with existing models. The results show that the proposed framework with 6 G technology and lightweight security model shows better performance, less service downtime, and higher connectivity with current models. 2024 IEEE. -
The Role of IOT in Creating SC'S through Ultra Fast Updation of the Status for Accurate Action Plan
The idea of a smart city includes the merging of technologies and advances aimed at improving urban efficiency, scientific progress, the preservation of the environment, and social inclusion. Coined in the year 2000, the term became widely used in politics, business, management, and urban planning groups to drive tech-based changes in urban areas. It reacts to the difficulties posed by postindustrial communities handling problems such as pollution to the environment, demographic changes, population growth, health care monetary crises, and resource shortages. Beyond technical answers, the smart city idea includes non-technical innovations for healthy urban life. Particularly encouraging is the application that uses Internet of The circumstances (IoT)based sensors in healthcare, applying machine learning for effective data management. This paper discusses the application of AI-powered Ai and Wireless Sensor Networks, more commonly known as the field of health care, acting as a basic study to understand the impact of IoT in smart cities, especially in healthcare, for the sake of future research. 2024 IEEE. -
The Role of IoT in Revolutionizing Payment Systems and Digital Transactions in Finance
The revolutionary impact of the Internet of Things (IoT) on payment systems and digital transactions within the financial industry is investigated so as to better understand its implications. During this period of unparalleled digitalization in the financial environment, the Internet of Things has emerged as a crucial participant in the process of altering traditional payment paradigms. For the purpose of improving efficiency, security, and the overall user experience, this article analyzes the incorporation of Internet of Things (IoT) devices into financial transactions. These devices include smart cards, wearables, and linked appliances. The paper elucidates how Internet of Things-driven innovations are expediting payment processes, reducing transaction costs, and mitigating fraud risks. This is accomplished through a comprehensive investigation of case Researches, technology breakthroughs, and regulatory frameworks. In addition to this, the article investigates the implications of the Internet of Things (IoT) in terms of promoting financial inclusion by providing digital payment services to groups that were previously underserved. This research gives useful insights for policymakers, financial institutions, and technologists who are looking to navigate and harness the potential of the Internet of Things in transforming payment systems. These insights are gained through an examination of the obstacles and opportunities related with the adoption of IoT in the financial sector. 2024 IEEE. -
The Role of Machine Learning Analysis and Metrics in Retailing Industry by using Progressive Analysis Pattern Technique
Analyzing customer purchasing data has been a challenging task for data analyzers. Even though lots of methods are introduced in this kind of research but still many barriers are there to finding the optimal pattern. Consider customer buying data is used to examine the types of parameters which is influence the customer. In this proposed work, Progressive Analysis Pattern Technique (PAPT) to predict future customer buying patterns in online shopping. We incorporated dynamic data handling prior to the proposed methodology. It will give ample purpose for the organization's perspective because the proposed work primarily focused on customer features related to the number of product quantities and product price variations of the previous purchase. Marketing strategies are most effective if they are focused to the exact client requirements. A Significant mission in campaign planning is deciding which customer to target. This research paper focusses on empirical targeting models. 2023 IEEE. -
The secured data provenance: Background and application oriented analysis
It is with the advancement of overwhelming wireless internet access in mobile environments, users and usage data has become huge and voluminous on regular basis. For instance, the financial transactions performed via online by users are unsecure and unauthenticated in many contexts. Methods and algorithms exist for secure data transmission over different channels, perhaps lacks to achieve high performance with respect to the basic goals of security; confidentiality, integrity, availability at a considerable level. The origin of the data i.e., by whom the original transaction thread have been started, is the critical question to be answered while finalizing with the financial transaction. This concept of 'history of data' have attained good attention by the researchers from many decades at different application domains and is named as Data Provenance. However, provenance with security has got a little progress with research in the recent times especially in cyber security. This study focuses on the security aspects of data provenance with a unique approach in cryptography. The blend of these two technologies could provide an indigenous solution for securing the provenance of the related data. 2016 IEEE. -
The Troubling Emergence of Hallucination in Large Language Models - An Extensive Definition, Quantification, and Prescriptive Remediations
The recent advancements in Large Language Models (LLMs) have garnered widespread acclaim for their remarkable emerging capabilities. However, the issue of hallucination has parallelly emerged as a by-product, posing significant concerns. While some recent endeavors have been made to identify and mitigate different types of hallucination, there has been a limited emphasis on the nuanced categorization of hallucination and associated mitigation methods. To address this gap, we offer a fine-grained discourse on profiling hallucination based on its degree, orientation, and category, along with offering strategies for alleviation. As such, we define two overarching orientations of hallucination: (i) factual mirage (FM) and (ii) silver lining (SL). To provide a more comprehensive understanding, both orientations are further sub-categorized into intrinsic and extrinsic, with three degrees of severity - (i) mild, (ii) moderate, and (iii) alarming. We also meticulously categorize hallucination into six types: (i) acronym ambiguity, (ii) numeric nuisance, (iii) generated golem, (iv) virtual voice, (v) geographic erratum, and (vi) time wrap. Furthermore, we curate HallucInation eLiciTation (), a publicly available dataset comprising of 75,000 samples generated using 15 contemporary LLMs along with human annotations for the aforementioned categories. Finally, to establish a method for quantifying and to offer a comparative spectrum that allows us to evaluate and rank LLMs based on their vulnerability to producing hallucinations, we propose Hallucination Vulnerability Index (HVI). Amidst the extensive deliberations on policy-making for regulating AI development, it is of utmost importance to assess and measure which LLM is more vulnerable towards hallucination. We firmly believe that HVI holds significant value as a tool for the wider NLP community, with the potential to serve as a rubric in AI-related policy-making. In conclusion, we propose two solution strategies for mitigating hallucinations. 2023 Association for Computational Linguistics. -
The Various Challenges Involved in Sensor Based Cloud System to Protect the Data and to Avoid Attacks: A Technical Review
In these studies, we introduce a unique protection framework for the integration of Wireless Sensor Networks (WSN) with cloud computing, aimed closer to enhancing statistics-centric programs consisting of far-flung healthcare structures. The framework's cornerstone is a robust, bendy safety version that ensures immoderate-degree information confidentiality, integrity, and terrific-grained get proper of access to control, addressing the important protection demanding situations in WSN-Cloud integration. By the use of a hybrid encryption mechanism that mixes the strengths of symmetric and uneven encryption techniques, our method gives a entire safety answer that protects information during transmission and garage. Furthermore, the version includes an efficient key manipulate gadget, facilitating the dynamic era and relaxed distribution of encryption keys. This contemporary framework is designed to mitigate common safety threats, such as Man-in-the-Middle (MITM) and Denial of Service (DoS) attacks, even as preserving the overall performance and standard performance of the blanketed gadget. Our research offers a massive contribution to securing statistics-centric packages in WSN-Cloud ecosystems, making sure dependable and comfortable facts verbal exchange and get right of entry to for a way off healthcare programs and past. 2024 IEEE. -
The world of communication & computing platform in research perspective: Opportunities and challenges
Computing paradigms are introduced for solving complex problems by analyzing, designing and implementing by complex systems. Computing can be defined as the effective use of computer or computer technology to solve tasks that are goal oriented. Computing is used in development of producing scientific studies, building intelligent systems, channeling different media for communication. Over the last few years, internet became so popular which lead to the increase in computer processing capacity, data storage and communication with one another. Computing has evolved from one technology to another in its field and formed a robust framework over the years. In this paper a survey on different computing paradigms like evergreen computing is cloud computing, to deal with basic scheduling is grid computing, for multi task handing is parallel computing, to handle smart phone data's that is mobile computing, cluster computing, and distributed computing is carried out. These technologies improved the way computing functions and made it easier to the computer world. The applications and research issues of the most of the computing paradigms are discussed in this article. The recent research issues in computing platform are scheduling and security. The scheduling is dealing with data processing from one computing platform to other computing device. Security is one of the important research issues. 2021 IEEE. -
Theoretical Framework for Blockchain Secured Predictive Maintenance Learning Model Using Digital Twin
The automotive sector benefits from Digital Twins (DTs), software replicas of physical assets or processes. DTs enable engineers and data scientists to obtain deeper insights into the system and solve the most difficult problems faster and more affordably. Blockchain technology is a developing and exciting technology that has the potential to offer DTs monitoring capabilities, strengthening security and enhancing DTs transparency, dependability, and immutability. Intelligent behavior can be integrated into blockchain-based DTs to foresee important maintenance tasks and successfully manage machine functions. Our research involves creating a theoretical framework that leverages emerging technologies such as blockchain, artificial intelligence and DTs to facilitate resolution in the predictive maintenance of industry machines with minimised governing cost. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Theoretical Framework for Integrating IoT and Explainable AI in a Smart Home Intrusion Detection System
Using IoT devices in smart homes brings benefits and security dangers. This study extensively examines various intrusion detection methods within smart home environments. It also suggests a novel hybrid intrusion detection theoretical framework integrating IoT data with Explainable Artificial Intelligence (XAI) approaches. Using information from multiple IoT devices, including motion sensors, door/window sensors, cameras, and temperature sensors, our theoretical framework can create a comprehensive image of the home environment. By effectively detecting new threats, it offers anomaly detection utilizing unsupervised learning approaches to discover potential breaches without tagged data. 2024 IEEE.