Browse Items (2150 total)
Sort by:
-
Twitter sentiment for analysing different types of crimes
Online social media like a twitter play a vital role as it helps to track the Spatialoral on social media data with respect crime rate. With the very fast evolving of users in social media, sentimental analysis has become an excellent source of information in decision making. Twitter is one of the most popular social networking site for communication and a primary source of information. More than 150 million users publish above 500 million 140 character TWEETS each day. Tweets have become a basis for product recommendation using sentimental analysis. This paper explains the approach for analyzing the sentiments of the users about a particular crime event tweets posted by the active users. The results so obtained will let you know about the change in the public opinion about the crime events whether it's positive or negative and to find out emotions on different types of crimes. 2018 IEEE. -
UAV Security Analysis Framework
This study presents a framework that allows for various types of checks to detect weaknesses in UAV subsystems. The UAV testing process is automated and allows the operator only to select the types of checks or types of structural and functional characteristics that the operator wants to test. To ensure the possibility of automated verification, implemented databases are used, which include a catalog of structural characteristics, threats, vulnerabilities, and attacks. These catalogs are many-to-many related, and thanks to these links, it is possible to identify threats or vulnerabilities specific to a particular structural characteristic. In essence, such an architecture is a knowledge base based on an ontological model. Thanks to this architecture of the system, it is enough for the operator to determine what types of structural characteristics need to be checked and the system will give him information about the vulnerabilities of the UAV. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Uncovering User Attitudes and Satisfaction Levels with HRMS Applications: Insights from Sentiment Analysis
This study examines employee perspectives on various features and specifications of Human Resource Management System (HRMS) applications, as expressed in online discussion boards. An in-depth literature review was conducted to identify key factors, followed by topic modeling on unstructured text data. Sentiment analysis using the Li-Hu method and a tweet profile helped gauge employee satisfaction with HRMS applications. The findings suggest a moderate level of satisfaction among users, offering insights for companies to enhance user interfaces and software development. By addressing negative attitudes and fostering positive ones, businesses can cultivate better relationships with users. This research also aids in identifying top-performing HRMS applications in the market, highlighting the features and specifications that set them apart from competitors. Overall, the study serves as a valuable resource for organizations aiming to improve their HRMS offerings and user experiences. 2024 IEEE. -
Understanding the use of Regression Analysis in Business Analytics to understand the perceptions of Students about Quality in Higher Education
For a very long time, researchers in a variety of fields have utilized regression analysis as a crucial tool for data analysis and result interpretation. Regression analysis has also been widely employed in the business world to determine what factors influence consumers' decisions to purchase any of the company's products. Comprehending the interplay of these variables will enable the business to conduct a more thorough consumer analysis and boost sales. This essay is an attempt to comprehend students' perceptions on the qualities they consider important while applying to universities. Regression analysis is another approach used in this article to determine how the quality criteria affect the respondents' overall happiness. 2024 IEEE. -
Universal Electrical Motor Acoustic Noise Reduction based on Rotor Surface Modification
Electromagnetic noise is referred to the audible sound which is produced by materials vibrating due to electromagnetic force. In the present day circumstances, a greater attention is being given to the electromagnetic acoustic noise produced by electrical machines. It is found to annoy human beings and other living organisms due to its tonal sound. The current work aims at designing a rotor for a universal motor with the objective to decrease the acoustic noise by minimization of forced density harmonics. The design consists of some irregularities in the rotor surface to decrease the acoustic noise by internally modifying the air gap permeance. Simulation shall be carried out based on FEM. A lot of research is being carried out on the methods of reducing the noise from electrical machines. The results of the current work significantly help in reducing a lot of noise pollution. The change in the rotor surface will reduce the electromagnetic acoustic noise from the electrical machine. It will also affect the torque parameters positively as studied from earlier research work. 2019 IEEE. -
University-Community Collaboration for A Sustainable School-Based Program for The Holistic Education and Wellness of Adolescents
Adolescents have been particularly affected by the COVID-19 pandemic and the closure of schools that are already struggling to carry out their mission of quality education and holistic well-being of students. Research suggests that community-collaborative schools are improving students' academic engagement and reducing learning barriers. When communities and universities are involved in holistic education, it benefits all the stakeholders by enhancing mutual learning and strengthening both. Community members' involvement for student development encourages students and their families to be more involved in community-service initiatives. The paper reports DREAMS, a multi-stakeholder partnership (schools, universities and communities) after-school mentoring model's sustainability. The study identifies and delineates how the model has incorporated the Sustainable Development Goals (SDGs) calling for Good Health and Well-being (SDG-3), Quality Education (SDG-4), Sustainable Cities and Communities (SDG-11) through Partnerships to Achieve its Goals (SDG-17) and proposes it as a sustainable afterschool plan for the post COVID scenario. The Electrochemical Society -
Unlocking the potentials of using nanotechnology to stabilize agriculture and food production
In the face of alarmingly increasing climate change, agricultural sector is exposed to innumerable and unprecedented challenges globally. This has led to food insecurity worldwide and in order to achieve the required food security at the global level, various methods and techniques have been put forth by researchers from around the world for boosting crop production and ensuring sustainability. Advanced nano-engineering is found to be of great import in improving production in agriculture and increasing input efficiency and minimization of losses. The fertilizers and pesticides, used for increasing and protecting the crop production respectively, can gain not only specific but also wider surface area with the help of nanomaterials, which serve as exclusive agrochemical carriers and assure facilitation of nutrients to target areas with the help of delivery monitoring techniques. Nanobiosensors, an example of the wide ranging nanotools, scaffold the growth of high-tech agricultural farms and also stand proof for the practical and proposed applications of the nanotools in terms of agricultural inputs control and their management precision. Nanosensors the off-spring of the culmination of biology and nanotechnology has an increased potential level in sensing and identifying both the advantageous and adverse conditions of the environment. The other applications of nano-technology include nanofertiliers with release-control techniques for healthy growth and rich yield and productivity of crops, nano-based target delivery approach, also referred to as gene transfer technique, for improved quality of crops, nanopesticides for effective protection of crops and other nanomaterials for promotion of stress tolerance among plants and enhancement of quality of soil [4]. In our review paper, we intend sum up the recent research and studies on the nanotechnology's innovative uses in agriculture to cope up with the ever-increasing necessity for food and sustenance of environment. 2021 Author(s). -
Unmanned Artificial Intelligence-Based Financial Volatility Prediction in International Stock Market
This study investigates the capacity of autonomous artificial intelligence to predict the volatility of the worldwide stock market and proposes an innovative approach utilizing cutting-edge AI algorithms. A comprehensive literature review examines the evolution of financial prediction systems and the transformative effects of artificial intelligence in improving predictive capabilities. The AI system under consideration employs machine learning techniques more effectively than traditional methods for collecting and predicting financial volatility. The strategy heavily relies on automated data capture, preprocessing, and model training. A recall of 76%, an accuracy rate of 94%, a precision of 81%, an area under the curve of 0.87, and a sharp ratio of 1.25 comprise the model's impressive specifications. This research illuminates the prospective financial applications of artificial intelligence and provides a way to navigate the intricacies of international stock markets. 2024 IEEE. -
Unraveling Campus Placement Success Integrating Exploratory Insights with Predictive Machine Learning Models
The dynamics of campus placements have garnered considerable attention in recent years, with educational institutions, students, and employers all keenly invested in understanding the factors that drive successful recruitment. This surge in interest stems from the potential implications for academic curricula, student preparation, and hiring strategies. In this study, we aimed to unravel the myriad factors that influence a student's placement success, drawing from a comprehensive dataset detailing a range of academic and demographic attributes. Our methodology combined thorough exploratory data analysis with advanced predictive modeling. The exploratory phase unveiled notable patterns, particularly highlighting the roles of gender, academic performance analysis, Degree and MBA specialization in placement outcomes. In the predictive modeling phase, the spotlight was on state-of-the-art machine learning models, with a particular emphasis on their capacity to forecast placement success. Notably, algorithms like Logistic Regression and Support Vector Machines not only confirmed the insights from our exploratory analysis but also showcased remarkable predictive prowess, with accuracy scores nearing perfection. These findings not only demonstrate the capabilities of machine learning in the academic and recruitment spheres but also emphasize the enduring importance of core academic achievements in influencing placement outcomes. As a prospective direction, future research might benefit from examining how placement trends evolve over time and integrating qualitative insights to provide a holistic view of the campus recruitment process. 2023 IEEE. -
Unraveling the Potential of Artificial Intelligence-Driven Blockchain Technology in Environment Management
Blockchain as an emerging technology provides a ray of hope to the most intensive environmental issues facing the planet. Blockchain with its decentralized business model has great relevance not only in the field of finance but also in environmental sustainability. The World Economic Forum has identified blockchain as a repair mechanism to the most challenging global environmental issues. It is a highly promising technology gaining traction in diverse fields. Blockchain through this technology unveils its capabilities as a decentralized ledger of all dealings across peer-to-peer networks, where participants can ratify transactions without any central authority. Blockchain technology is an indestructible electronic ledger of transactions designed to record and store everything of value in addition to financial transactions. Blockchain can ensure a shift to cleaner and more resource conserving decentralized solutions, unravel natural capital and to empower communities. This chapter attempts to study the applicability of blockchain in protecting and sustaining the global environment at various levels including life on land, life below the earth and climate changes. Deployment of blockchain technology is needed in areas like climate change, biodiversity conservation and healthy water bodies to overcome the threats they face. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Unraveling Women's Involvement in the Digital Realm: An Empirical Investigation
A virtual world in which communication is done through the electronic medium using the computer. This world allows the user to gain knowledge in the form of information. Even though it has a lot of advantages, there are enormous issues when an individual exists in cyberspace. At hand are several challenges to be overcome by individuals to protectively survive cyberspace. Such as various attacks, financial risks, online crimes, and more. In cyberspace, the targeted audience is womanhood of all eons. Educating and promoting awareness about the risk in cyberspace for women in society is the need of the hour. Each individual is facing risk while they are in a digital world. Stakeholders are not given alertness of the threat and its consequences. The paper analyzes the risk and consequences of women's society, as most victims are from that environment. In this, different risks faced and the consequences affected by women's civilization, are discussed. Also remedial measures are taken and should be taken are also deliberated. Supporting this, an online survey is taken from various groups of common people to know the status of women's civilization in the current era. 2023 IEEE. -
Unsupervised Feature Selection Approach for Smartwatches
Traditional feature selection methods can be time-consuming and labor-intensive, especially with large datasets. This studys unsupervised feature selection approach can automate the process and help identify important features preferred by a particular segment of users. The unsupervised feature selection method is applied for smartwatches. Smartwatches continue to gain popularity. It is important to understand which features are most important to users to design and develop smartwatches that are more engaging, user-friendly, and meet the needs and preferences of their target audience. The rapid pace of technological innovation in the smartwatch industry means that new features and functionalities are constantly being developed. Multi-cluster feature selection, Laplacian score, and unsupervised spectral feature are used. Conjoint analysis is done on the most common features in all three selection methods. The unsupervised feature selection technique is used for identifying the relevant and important features of new smartwatch users.The practical implication of the research is in the application of the technique in the new product design of smartwatches. The result of the study also informs smartwatch manufacturers and developers on the features they need to prioritize and invest in. This can ultimately result in better and more user-friendly smartwatches and a good overall experience for the user. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Unsupervised Learning for Understanding Diversity: Applying Feature Engineering and Cluster Analysis to Deaf and Hard of Hearing Data
As e-Learning emerges as a promising tool for instruction delivery, personalizing the e-Learning platform for DHH learners will benefit them to improve their learning engagement and educational attainment. This study aims to collect and analyze the different features unique to DHH learners and analyze the significant features among them. This study highlights the importance of addressing the diversity among DHH learners, while creating a personalized learning environment for them. With this focus, we employ the K-Means clustering algorithm to group the learners based on similar needs and preferences and identified that distinguishing clusters can be formed within the DHH group. We also tried to understand the significant features contributing to forming well separated groups. These results provide valuable insights into the diverse preferences and requirements when they interact with the learning materials. These findings emphasize the significance of personalized approach for DHH learners in educational settings and serve as the stepping stone to develop a personalized learning environment for them. 2024 IEEE. -
Unveiling Powerful Machine Learning Strategies for Detecting Malware in Modern Digital Environment
Machine learning has emerged as formidable instrument in realm of malware detection exhibiting capacity to dynamically adapt to ever-shifting topography of digital hazards. This study presents an exhaustive comparative analysis of four intricate machine learning algorithms namely XGBoost Classifier, K-Nearest Neighbors (KNN) Classifier, Binomial Logistic Regression and Random Forest with primary objective of assessing their effectiveness in domain of malware detection. Conventional signature-based detection methodologies have struggled to synchronize with rapid mutations exhibited by malware variants. In sharp contrast machine learning algorithms proffer data-centric approach adept at unraveling intricate data patterns thereby enabling identification of both well-known and hitherto uncharted threats. To meticulously appraise efficacy of these machine learning models we employ stringent set of evaluation metrics. Precision, recall, F1 Score, testing accuracy and training accuracy are meticulously scrutinized to ascertain distinctive strengths and frailties of these algorithms. By providing comparative analysis of machine learning algorithms within milieu of malware detection this research engenders significant contribution to ongoing endeavor of fortifying cybersecurity. Resultant analysis elucidates that each algorithm possesses its unique competencies. XGBoost Classifier showcases remarkable precision (Benign files: 99%, Malicious files: 99%), recall (Benign files: 97%, Malicious files: 99%) and F1 Score (Benign files: 98%, Malicious files: 99%) implying its aptitude for precise malware identification. KNN Classifier excels in discerning benign software exhibiting precision (Benign files: 90%) and recall (Benign files: 91%) to mitigate likelihood of erroneous positives. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Unveiling the Dynamics: A Performance Analysis of RPL under Congestion in IoT Network
The Routing Protocol for Low Power and Lossy Network (RPL) is a standardized routing protocol for resource constraint devices deployed in diverse applications in Internet of Things (IoT). RPL is the most efficient protocol which is carefully designed to meet energy efficiency of sensor nodes. However, this protocol is prone to network congestion which is one of most crucial bottlenecks of this protocol. In the current study a thorough analysis of effect of congestion on RPL routing metrics are analyzed. We have designed a congestion scenario using Cooja simulator and analyzed its effects on ETX, Power, Duty Cycle through graphs. The results of the experiments finally outline the critical parameters affected due to congestion in RPL. Grenze Scientific Society, 2024. -
Unveiling the Future: Exploring Stock Price Prediction in the Finance Sector through Machine Learning and Deep Learning - A Comprehensive Bibliometric Analysis
The investigation of predicting share prices is a captivating and beneficial area of study within the realm of economic research. precise projections and findings can potentially benefit shareholders by reducing the risk of making suboptimal investment selections. The objective of this investigation is to examine the present state of research pertaining to the prognostication of share price predictions through the utilization of Machine Learning (ML) and Deep Learning techniques. The present study examined the existing body of scientific works on methods involving DL and ML in the context of predicting the value of stocks. This study presents a comprehensive overview of research trends, methodologies, and applications in a particular field by conducting a bibliometric analysis of publications indexed in the Scopus database. Drawing from the presented data, recommendations for optimal methodologies can be formulated. The data was visually represented through the utilization of the R programming language and Vos Viewer software. The investigation additionally discerns the primary authors, institutions, and nations that are making contributions to this particular field of research. The outcomes of this investigation possess the potential to guide future research trajectories and offer significant perspectives for professionals and policymakers who are keen on utilizing machine learning and deep learning in the financial sector. 2024 IEEE. -
Unveiling the Landscape: A Comparative Study of U-Net Models for Geographical Features Segmentation
Geographical features segmentation is a critical task in remote sensing and earth observation applications, enabling the extraction of valuable information from satellite imagery and aiding in environmental analysis, urban planning, and disaster management. The U-Net model, a deep learning architecture, has proven its efficacy in image segmentation tasks, including geographical feature analysis. In this research paper, a comparative study of various U-Net models customized explicitly for geographical features segmentation is presented. The study aimed to evaluate the performance of these U-Net variants under diverse geographical contexts and datasets. Their strengths and limitations were assessed, considering factors such as accuracy, robustness, and generalization capabilities. The efficacy of integrated components, such as skip connections, attention mechanisms, and multi-scale features, in enhancing the models performance was analyzed. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Unveiling the pattern of PhishingAttacks using the Machine Learning approach
This study introduces a unique approach to strengthening cybersecurity by combining advanced models for real-time detection of phishing websites. A classifier is trained to discern patterns associated with legitimate and phishing URLs, leveraging a carefully organized labeled dataset. The model in this paper forms the foundation for a real-time detection system, providing users with real-time information on potential phishing threats. Integrating an adaptive decision-making algorithm improves decision-making adaptability, particularly in scenarios challenging the model's confidence. A user feedback loop ensures the continuous learning and refinement of the system, aligning it more closely with user expectations. The future scope of this research involves exploring advanced models, improving explainability, and incorporating dynamic features for enhanced detection. Adaptive policies, large-scale deployment, and ethical implications are pivotal for real-world applicability. In conclusion, this study contributes to advancing phishing detection methodologies and lays the groundwork for future innovations in cybersecurity. The collaborative efforts of academia, industry, and cybersecurity stakeholders arenecessaryfor realizing the full potential of this paper and ensuring a safer online platform for users. 2024 IEEE. -
Upgradation of business applications with autonomic computing
Autonomic computing has come a long way since its inception a decade ago and has been positioned as a venerable and value-adding technology for producing and sustaining self-managing, real-time, and resilient systems for the future. A series of concerted efforts by multiple IT companies and academic research laboratories across the world have brought in a number of advancements in this discipline with vigorous study and research. A variety of proven and potential mathematical and computational concepts have been selected and synchronized to arrive at noteworthy improvements in the autonomic systems design, development, deployment, and delivery methods. Having understood the unique value-proposition and the significant achievements in the autonomic computing space, business executives and IT experts are consciously embracing the autonomic idea, which is very generic to be easily embedded in any kind of business and IT systems. However, the penetration of this technology into both IT and business applications has not been as originally envisaged by its creators due to various reasons. The business environment is still filled and saturated with large-scale packaged and monolithic applications. If the autonomic capabilities are innately squeezed into business and IT applications, then there can be major differentiators in how those applications function in seamlessly and spontaneously automating business operations. Both, existing as well as emerging applications can be targeted to become autonomic in their operations, outputs, and outlooks. In this paper, we have described how the leading enterprise packages (ERP, CRM, SCM, and so on.) can be enabled to be adaptive, highly available, secure, and scalable in their actions and reactions. The well-known enterprise applications such as CRM, Online Retail, and Marketing with focus on self-optimization characteristics are described here. A detailed analysis of a Discount Manager in an online retail scenario is also explained. The simulation results obtained clearly show how embedded autonomic capability is very close to human thinking and decision-making ability. 2013 ACM. -
Upper Bounds of Zagreb Radio Indices
Let G= (V, E) be a simple connected graph with vertex set V and edge set E. This chapter consists of several bounds of the Zagreb radio indices of graphs such as the Primary Zagreb Radio Index, the First Zagreb Radio Index, the Second Zagreb Radio Index and the Third Zagreb Radio Index. The indices are defined for graphs after administering a radio labelling. In radio labelling, vertices are labelled with the positive integers such that the absolute difference of two vertex labels added to their distance should be at least one more than the diameter of the graph. In radio labelling, every vertex gets distinct labels. The least possible labels given to the vertices are used to create the radio indices. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.