Browse Items (2150 total)
Sort by:
-
A Study on Factors Enhancing Immersive Virtual Reality Experiences
The objective of this study is to identify the various influential factors of immersive virtual reality (VR) experiences and examine the relationship between the immersion factors (technology, visuals, sound, interaction, and sound) and virtual reality experiential outcomes (satisfaction and loyalty). The survey comprises 412 participants who experienced VR games at the Orion Mall in Bangalore. The study has identified the prominent factors for enhancing the immersive experience. The factors are technology, visuals, sound, interaction, and sound. It also identified that there exists a positive association between VR experiential satisfaction and technology, visuals, sound, interaction, and sound. The results imply that service providers should focus on elevating immersive experience as it is closely associated with VR experiential satisfaction and VR experiential loyalty. This will increase the revisit intention and spread positive word of mouth about the virtual experiences. This paper provided valuable insights that pay way to analyze the association between immersion factors and VR experiential outcomes. 2024 IEEE. -
A study on impact of Green human resource management practice on its sector - Chennai
The implementation of important plans and choices is a crucial part of the function that Human Resource Management plays in the operation of an organisation throughout its life. This makes it possible for the organisation to continue to cultivate and sustain its culture of supportability. In order to bring about sustainable success via Human Resource Management, the fundamental thinking process behind Green Human Resource Management is to motivate it. Green HRM (Green Human Resource Management) initiatives are currently in progress and are gaining traction among workers and representatives. These initiatives are embracing new work methodologies such as energy conservation, the implementation of E-HRM, telecommuting, and, most importantly, avoiding potential risks to protect the mother climate. Over the course of the last several years, the rate of worry on a worldwide scale has begun to quicken. 2024 Author(s). -
A Study on Machine Learning Techniques for Internet of Things in Societal Applications
Until recent years, monitoring and analysing system inputs, responses were merely based on Sensor Systems. Gradually, Embedded Systems and other Data Resources including Remote Monitoring Units started gaining momentum. But, with advent of Internet of Things (IoT), the outlook and expectations are broadened. IoT introduced incredible volumes of structured and unstructured data of different formats. There is a need to investigate, the underlying concepts of Machine Learning, Internet of Things (IoT) and Embedded Systems. These domains grow and expand its frontiers at a very fast pace. This paper attempts to throw light on possibilities of combining different technological domains, for design and development of Smarter and Context Aware Intelligent Electronics Systems for Societal Utility. Effective implementation and realization of such systems by suitable fusion of essential inter-disciplinary concepts is expected to have considerable potential for societal impact in the years to come. 2019 IEEE. -
A Study on Student Cyber Safety Consciousness in the Light of Online Learning
Our world online and networked is immersed under a wave of populism; populism spreads on the wings of internet. The recent technological advancements like the use of social media platforms and different applications made the information exchange faster and more efficient making the information access easier. To keep our information, gadgets such as cell phones, laptops, desktops, and tablets and also the internet safe, knowledge of cybersecurity is vital everywhere. In many colleges and Universities who are in to interconnected complex systems, data privacy is a huge challenge among their users. In most of the situations, due to lack of knowledge and awareness, users may engage in data breaches knowingly or unknowingly and the complete interconnected systems among the users may have a consequence of a cybercrime. This article seeks to unpack the rise of cyber-crimes and its relationship to cyber security among student groups during the pandemic where much of their interaction is online. The research aims to inquire in to the level of knowledge and awareness on cybersecurity among students during their online learning interaction using a well-structured questionnaire. The questionnaire will be focused on five parts: Awareness and Knowledge, Monitoring and Privilege, Security and Prevention, Protection from malware s and usage of removable Devices. The study is conducted using quantitative research methodology to quantitatively evaluate the knowledge of cybersecurity and inculcate an awareness against Cybercrime protection among the students. Finally, based on the analysis of collected data we present recommendations which will not forego the safety concerns for e mails, viruses, phishing, pop-up windows and forged ads which is a common problem. Some technological solutions and paths for the regulation of the cybercrimes are suggested to the respondents at the end. 2022 IEEE. -
A Study on the Factors Affecting Infants' Health-Related Issues and Child Mortality using Machine Learning
Child mortality and infant health-related issues remain significant challenges worldwide. Understanding the factors that influence these outcomes is crucial for implementing effective interventions and improving child health outcomes. In this study, we employ machine learning techniques to identify and analyze the key factors affecting infants' health-related issues and child mortality. Further, we identify several significant factors that influence infants' health-related issues and child mortality. These factors include maternal health indicators, access to healthcare services, socioeconomic status, environmental factors, and demographic characteristics. The machine learning models provide insights into the relative importance of these factors, enabling policymakers and healthcare professionals to prioritize interventions and allocate resources effectively. Additionally, we investigate the potential interaction effects among these factors and their impact on child health outcomes. This analysis helps in understanding the complex relationships and causal pathways involved in infants' health-related issues and child mortality. The findings of this study contribute to the existing knowledge by leveraging machine learning techniques to identify and analyze the factors affecting infants' health-related issues and child mortality. The insights gained from this research can inform evidence-based policies and interventions aimed at reducing child mortality rates and improving infant health outcomes globally. By addressing the underlying factors identified through this study, we can work towards achieving better health outcomes for infants and reducing the burden of child mortality worldwide. 2023 IEEE. -
A Study on the Influence of Geometric Transformations on Image Classification: A Case Study
The present research work involves the study of the geometrical transformations which influences the training and validation accuracies of machine learning models. For the study, rice plant leaf disease dataset of 2096 images consisting of 4 classes with 523 images per class were used. The dataset subjected to 24 models out of which three models namely - DenseNet201, Densenet169 and InceptionResNetV2 are selected based on highest training accuracy and less difference between training and validation accuracy. To evaluate the performance of the selected three models, loss functions and accuracies have been computed. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
A Survey of Traditional and Cloud Specific Security Issues
The emerging technology popularly referred to as Cloud computing offers dynamically scalable computing resources on a pay per use basis over the Internet. Companies avail hardware and software resources as service from the cloud service provider as opposed to obtaining physical assets. Cloud computing has the potential for significant cost reduction and increased operating efficiency in computing. To achieve these benefits, however, there are still some challenges to be solved. Security is one of the prime concerns in adopting Cloud computing, since the user's data has to be released from the protection sphere of the data owner to the premises of cloud service provider. As more Cloud based applications keep evolving, the associated security threats are also growing. In this paper an attempt has been made to identify and categorize the security threats applicable to Cloud environment. Threats are classified into Cloud specific security issues and traditional security attacks on various service delivery models of Cloud. The work also briefly discusses the virtualization and authentication related issues in Cloud and tries to consolidate the various security threats in a classified manner. Springer-Verlag Berlin Heidelberg 2013. -
A Survey on 5G Standards, Specifications and Massive MIMO Testbed Including Transceiver Design Models Using QAM Modulation Schemes
Massive MIMO (Multiple Input Multiple Output)is the advanced technology in 5G architecture which improves mobile and data wireless system parameters in multiple folds. The basic idea of this technology is to include huge number of antennas in the base stations serving limited user equipment. This will enhance the parameters like spectral efficiency, data rate, wireless devices connectivity, energy or power efficiency and also, significant reduction in interference and error rates. The Third Generation Partnership Project (3GPP)consortium, International Mobile Telecommunication (IMT)and various partner telecom companies are on the way to develop unified architecture to meet the proposed 5G standards by the year 2020. Initial test beds and field-trials are already in process at various universities and telecom companies considering Long Term Evolution (LTE)releases features in the 5G architecture framework. However, the research is still an open issue on improving the parameters. This research paper provides a detailed overview on 5G standards, specifications and Field trials and test beds implemented by various universities and telecom industry utilizing Massive MIMO technology. This literature survey paper aims to enlighten the researchers working in the area of Massive MIMO to understand the test bed and field trials designs existing till date. This paper also motivates to complete experiments on Bit error rate (BER)estimation in various modulation schemes for single transmitter-receiver as well as in MIMO configuration. The reduction in BER is observed when MIMO models are used for transceiver design. The hardware utilization and simulation work of the field trials and testbed provide different existing techniques to develop a transceiver system which meets 5G standard. 2019 IEEE. -
A Survey on Adaptive Authentication Using Machine Learning Techniques
Adaptive authentication is a reliable technique to dynamically select the best mechanisms among multiple modalities to authenticate a user based on the users risk profile generated using behavior and context-based information. Websites or enterprise applications enabled with adaptive authentication will have a more robust security system as analyzing the large volume of the user, device, and browser data in real time generates a risk score that decides the appropriate level of security. Though a significant amount of research is being carried out on adaptive authentication, no single model is suitable for a global attack. This paper provides a structured (extensive) survey of current adaptive authentication techniques available in the literature to identify the challenges which demand future research. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
A Survey on Arrhythmia Disease Detection Using Deep Learning Methods
The Cardiovascular conditions are now one of the foremost common impacts on human health. Report from WHO, says that in India 45% of deaths are caused due to heart diseases. So, heart disease detection has more importance. Manual auscultation was used to diagnose cardiovascular problems just a few years ago. Nowadays computer-assisted technologies are used to identify diseases. Accurate detection of the disease can make recovery simpler, more effective, and less expensive. In this proposed work, 11years of research works on arrhythmia detection using deep learning are integrated. Moreover, here presents a comprehensive evaluation of recent deep learning-based approaches for detecting heart disease. There are a number of review papers accessible that focus on traditional methods for detecting cardiac disease. This article addresses some essential approaches for categorizing ECG signal images into desired classes, such as pre-processing, feature extraction, feature selection, and classification. However, the reviewed literatures consolidated details have been summarized. 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
A Survey on Domain-Specific Summarization Techniques
Automatic text summarization using different natural language processing techniques (NLP) has gained much momentum in recent years. Text summarization is an intensive process of extracting representative gist of the contents present in a document. Manual summarization of structured and unstructured text is a tedious task that involves immense human effort and time. There are quite a number of successful text summarization algorithms for generic documents. But when it comes specialized for a particular domain, the generic training of algorithms does not suffice the purpose. Hence, context-aware summarization of unstructured and structured text using various algorithms needs specific scoring techniques to supplement the base algorithms. This paper is an attempt to give an overview of methods and algorithms that are used for context-aware summarization of generic texts. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
A Survey on Enhancing System Performance of Wireless Sensor Network by Secure Assemblage Based Data Delivery
To provide secure data transmission in Cluster Wireless Sensor Networks (CWSNs), the challenging task is to provide an efficient key management technique. To enhance the performance of sensor networks, clustering approach is used. Wireless Sensor Network (WSN) comprises of large collection of sensors having different hardware configurations and functionalities. Due to limited storage space and battery life, complex security algorithms cannot be used in sensor networks. To solve the orphan node problem and to enhance the performance of the WSN, authors introduced many secure protocols such as LEACH, Sec-LEACH, GS-LEACH and R-LEACH, which were not secure for data transmission. The energy consumption in existing approach is more due to overhead incurred in computation and communication in order to achieve security. This paper studies about different schemes used for secure data transmission. We are proposing new methodology called IBDS and EIBDS that will increase the performance of WSN by reducing computational overhead and also increases resilience against the adversaries. 2017 IEEE. -
A Survey on Feature Selection, Classification, and Optimization Techniques for EEG-Based BrainComputer Interface
In braincomputer interface (BCI) systems, the electroencephalography (EEG) signal is extensively utilized, as the recording of EEG brain signals is having relatively low cost, the potentiality for user mobility, high time resolution, and non-invasive nature. The EEG features are extracted by the BCI to execute commands. In the feature set obtained, the computational complexity increases, and poor classifier generalization can be caused by the utilization of a lot of overlapping features. The irrelevant features accumulation could be avoided with the feature selection procedures application. The feature selection algorithms are utilized to select diverse features for each classifier. Classifiers are the algorithms that are run to attain the classification. The researchers have examined diverse classifier implementation techniques to identify the feature vectors class. A review of EEG-BCI techniques available in the literature for feature selection, classifiers, and optimization algorithms is presented in this work. The research challenges, gaps, and limitations are identified in this paper. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
A Survey on Solution of Imbalanced Data Classification Problem Using SMOTE and Extreme Learning Machine
Imbalanced data are a common classification problem. Since it occurs in most real fields, this trend is increasingly important. It is of particular concern for highly imbalanced datasets (when the class ratio is high). Different techniques have been developed to deal with supervised learning sets. SMOTE is a well-known method for over-sampling that discusses imbalances at the level of the data. In the area, unequal data are widely distributed, and ensemble learning algorithms are a more efficient classifier in classifying imbalances. SMOTE synthetically contrasts two closely connected vectors. The learning algorithm itself, however, is not designed for imbalanced results. The simple ensemble idea, as well as the SMOTE algorithm, works with imbalanced data. There are detailed studies about imbalanced data problems and resolving this problem through several approaches. There are various approaches to overcome this problem, but we mainly focused on SMOTE and extreme learning machine algorithms. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
A Survey on Various Handoff Methods in Mobile Ad Hoc Network Environment
Communication has never been the same since the advent of cellular phones and numerous applications with different functionalities seem to crop up on a daily basis. Various applications seem to crop up on a daily basis. Ad hoc networks were developed with the intent of creating networks made up of interconnected nodes, on-the-go. Ad hoc networks have numerous applications, the most popular being vehicular ad hoc networks (VANETs). In VANETs, moving vehicles are considered to be the mobile nodes and mobile vehicular nodes move at high speeds. Mobility of the nodes makes it difficult to maintain stable communication links between the nodes and the access points. A process known as handoff is used to bridge this gap and is considered to be one of the solutions for unstable communication links over larger distances. Handoff can usually be seen when the nodes are mobile and start to move away from the access points. This paper discusses and compares various handoff methods that were proposed by various researchers with an intent to increase positive attributes while negating the rest of the components that do not support in increasing the efficiency of the handoff process. 2020, Springer Nature Singapore Pte Ltd. -
A Systematic Review of AI Privileges to Combat Widen Threat of Flavivirus
In order to prevent the extraordinary spread of sickness caused by Flavivirus, the healthcare business as well as public health are working tirelessly. Individual lives have been affected, but mosquito-infested public locations have made a considerable influence on the general publics health. Site adaptability, climate change, and inadequate healthcare services and surveillance all contribute to the spread of the virus. The potential dangers of this virus, on the other hand, have been uncovered through extensive and ongoing research in the healthcare business. Modern healthcare facilities may benefit from the reasoning capabilities and ever-evolving analysis techniques provided by artificial intelligence. More conclusive findings have been demonstrated in the realm of AI applications in healthcare domains such as cancer, neurology, and cardiology. A number of research works have justified the use of AI-oriented algorithms for intelligently handling unstructured and huge healthcare data. When it comes to using artificial intelligence (AI) to identify, forecast, diagnose, and treat disease using data from public health and biological databases, the current effort aims to undertake an extensive examination. There may be issues in integrating assistive technology into the current healthcare system, as well. Because of this review, we hope that by merging AI research with clinical and public health specialists, critical knowledge may be extracted from data in order to unchain the relevant information of Flavivirus disease from its chains. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
A Systematic Review of Challenges and Techniques of Privacy-Preserving Machine Learning
Machine learning (ML) techniques are the backbone of Prediction and Recommendation systems, widely used across banking, medicine, and finance domains. ML techniques effectiveness depends mainly on the amount, distribution, and variety of training data that requires varied participants to contribute data. However, its challenging to combine data from multiple sources due to privacy and security concerns, competitive advantages, and data sovereignty. Therefore, ML techniques must preserve privacy when they aggregate, train, and eventually serve inferences. This survey establishes the meaning of privacy in ML, classifies current privacy threats, and describes state-of-the-art mitigation techniques named Privacy-Preserving Machine Learning (PPML) techniques. The paper compares existing PPML techniques based on relevant parameters, thereby presenting gaps in the existing literature and proposing probable future research drifts. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
A Systematic Review of Challenges, Tools, and Myths of Big Data Ingestion
Each sector of the digital world generates enormous data as human life continues to transform. Areas like data analytics, data science, knowledge discovery in databases (KDD), machine learning, and artificial intelligence depend on highly distributed data which requires appropriate storage in a data lake. Collecting the data from different heterogeneous sources and creating a single lake of data is called data ingestion. Ironically, data ingestion has been treated as a less important stage in data analysis because it is considered a minor first step. There are several misconceptions in the data and analytics domain about data ingestion. The survey employed in this research presents a list of significant challenges faced by information technology (IT) industries during data ingestion. The available frameworks are compared in terms of standard parameters that are set against the existing challenges and myths. The findings from the comparison are compiled in a tabular format for easy reference. The paper places emphasis on the significance of data ingestion and attempts to present it as a major activity on the big data platform. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
A Systematic Review of Various Advancements Implementation in the Field of Crop (Plant) Production
An essential component of agricultural output is pest management, especially in fertigation-based farming. Although fertigation systems in Malaysia are beneficial for irrigation and fertilization, they frequently don't have effective pest control techniques. Because pests usually live beneath crop leaves, hand spraying is difficult and labor-intensive. Insect pests have the power to seriously harm, weaken, or even kill agricultural plants, which can lead to lower yields, worse-quality goods, and unsalable outcomes. Furthermore, insects may still cause harm to processed or stored items after harvest. Therefore, creating an autonomous pesticide sprayer specifically designed for chilli fertigation systems is the main goal of this research. The main goal is to create a sprayer arm that is flexible enough to reach under crop leaves. The goal of this project is to build an autonomous, unmanned pesticide sprayer. The goal of autonomous operation is to reduce the amount of dangerous pesticides that people are exposed to, especially in enclosed spaces like greenhouses. In addition, the sprayer arm's adaptability to different agricultural circumstances makes it a valuable tool in both greenhouse and outdoor settings. It is expected that the successful adoption of the autonomous pesticide sprayer would completely transform fertigation-based farming's approach to pest management. 2024 IEEE. -
A Systematic Review on Features Extraction Techniques for Aspect Based Text Classification using Artificial Intelligence
Aspect Extraction is an important, challenging, and meaningful task in aspect-based text classification analysis. To apply variants of topic models on task, while reasonably successful, these methods usually do not produce highly coherent aspects. This review presents a novel neural/cognitive approach to discover coherent methods. They exploited the distribution of word co-occurrences through neural/cognitive word embeddings. Unlike topics that typically assume independently generated words, word embedding models encourage words that appear in similar factors close to each other in the embedding space. Also, use an attention mechanism to de-emphasize irrelevant words during training, improving aspects coherence. Methods results on datasets demonstrate that the approach discovers more meaningful and coherent aspects and substantially outperforms baseline. Aspect-based text analysis aims to determine people's attitudes towards different aspects in a review. The Electrochemical Society