Browse Items (2150 total)
Sort by:
-
Artificial Intelligence Influence on Accounting Methods
Due to its benefits in terms of enhancing and redefining the actual manner of performing activities in this field, artificial intelligence is swiftly changing the reality of the accounting business. Accounting has seen a significant transformation over the years as computers, first and foremost, and more importantly, developers ready to spend less time on laborious work that minimises the amount of errors, have replaced the job done with paper and pencil. Although there has always been a fascination with artificial intelligence systems in this field, attention has recently shifted more toward it. Although technology has advanced, it seems that there aren't enough facts to back up businesses' readiness to include artificial intelligence systems into their accounting procedures. A crucial element of this reality is also the ability of professionals to quickly adjust to the new business climate, get the skills required to work with AI systems, and overcome their fear of losing their jobs. The requirements of the financial society, the quick development of data innovation, and artificial intelligence have brought about the modern era. Implementing artificial intelligence innovation is an unavoidable trend that will result in substantial changes and advancements in the accounting sector. In this essay, the usage of AI in the accounting industry is examined, its effects on the sector's expansion are examined, and significant solutions to current issues are suggested. 2022 IEEE. -
An improvised grid resource allocation and classfication through regression
The resource allocation is one of the important mechanisms of grid computing, which helps to assign the available resources very efficiently. The one of the issue of grid computing is fixing the target nodes during the grid job execution. In existing method, resource monitored data are collected from grid then jobs are allocated to the resources based on available data, through regression algorithm. In this method total execution time of an application and run time of jobs should be high. The proposed method mitigate running time by classify the resources in the data collected from grid based on dwell time using novel classification algorithm. It reduces the jobs run time and fit the best available resources to the jobs in the computational grid. 2017 IEEE. -
Mapping extinction using GALEX and SDSS photometric observations
The primary objective of this work is to create an all sky extinction map of the Milky Way galaxy. We have cross-matched the Sloan Digital Sky Survey (SDSS data release 8) photometric observations with that of Galaxy Evolution Explorer (GALEX data release 6). This provides a wide range of wavelength coverage from Far Ultra-Violet through the optical spectrum and gives one unique SDSS source for every GALEX source. We discuss a sample of ?32000 objects in the north galactic pole (?75 latitude) from this combined database. The Castelli and Kurucz Atlas was fit to the photometric observations of each star, best fit being determined using a chi-square test. Best fit parameters provide the spectral type and extinction towards each of the objects. The shift in magnitude obtained during the best-fit can be used to determine the distance to each of the stars. With this data, a comprehensive extinction map can be made for the high-latitude objects and later extended to all-sky. 2013 AIP Publishing LLC. -
A Quality of Service Study for Downlink Scheduling Algorithms in Mobile Networks
Internet usage and the number of applications/users growth is going in an unprecedented manner. In these days, lot of users are changed themselves to use internet-based applications rather than traditional voice service. The fundamental of voice-based communication is shifted to packet data access for satisfying the human needs through internet based mobile applications. 4G network is an IP supported rising technology for the past decade and at present also because of un availability service of 5G in all the places. Still, 4G is ruling the globe and the number of subscribers kept growing only. In these days, this remains on the list of latest research topics. Under 4G technology lot of research problems are exist like QoS, Uplink and Downlink Scheduling, Security, Mobility etc., Inspite of discussing that several issues, this paper mainly focusing the QoS in Downlink scheduling algorithms. Also, it presents the issues of various existing QoS downlink scheduling algorithms, names, QoS aware/unaware, parameters used/simulated, drawbacks of those algorithms and result verifications etc. Packet scheduling plays a crucial role for providing Quality of Service (QoS) to the mobile users. Ultimately, it gives some suggestions to explore more further about QoS based research work in Mobile Networks. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Design and analysis of single stage Step-up converter for Photovoltaic applications
Main novelty of the proposed work is dual leg single stage DC-AC converter for DC\AC grid and solar based applications. Operating principles, components design and modulation techniques are presented. Initially proposed concept is simulated in MATLAB Simulink platform and after validated in a real time prototype model is the future work. Proposed idea has some advantages like few passive components, less leakage current due to few switching frequency components, wide range voltage with absence of DC link capacitor. High efficiency due to single stage operation so this circuit is highly suitable for high\low voltage photo-voltaic energy conversion. Electromagnetic interference also less with continuous current. 2023 IEEE. -
Physical Unclonable Function and OAuth 2.0 Based Secure Authentication Scheme for Internet of Medical Things
With ubiquitous computing and penetration of high-speed data networks, the Internet of Medical Things (IoMT) has found widespread application. Digital healthcare helps medical professionals monitor patients and provide services remotely. With the increased adoption of IoMT comes an increased risk profile. Private and confidential medical data is gathered across various IoMT devices and transmitted to medical servers. Privacy breach or unauthorized access to personal medical data has far-reaching consequences. However, heterogeneity, limited computational resources, and lack of standardization in authentication schemes prevent a robust IoMT security framework. This paper introduces a secure lightweight authentication and authorization scheme. The use of the Physical Unclonable Function (PUF) reduces pressure on computational resources and establishes the authenticity of the IoMT. The use of OAuth 2.0 open standard for authorization allows interoperability between different vendors. The resilience of the model to impersonation and replay attacks is analyzed. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Zero Trust-Based Adaptive Authentication using Composite Attribute Set
Rapid evolution of internet-oriented applications has increased the threats to confidential data. Single-factor authentication approaches are no longer sufficient to ensure user credibility. Multi-factor authentication schemes are also not tamper-proof. A Zero Trust, adaptive authentication-based approach that uses the user's past behavior can offer protection in this scenario. This paper proposes a system that collects a composite attribute set that includes the user behavior, attributes of the application through which the user is requesting access, and the device used. The enhanced collection allows the creation of detailed context that allows granular variance calculation and risk score. 2021 IEEE. All Rights Reserved. -
A JSON Web Signature Based Adaptive Authentication Modality for Healthcare Applications
In the era of fast internet-centric systems, the importance of security cannot be stressed more. However, stringent and multiple layers of security measures tend to be a hindrance to usability. This even prompts users to bypass multi-factor authentication schemes recommended by enterprises. The need to balance security and usability gave rise to Adaptive authentication. This system of utilizing the user's behavioral context and earlier access patterns is gaining popularity. Continuously analyzing the user's request patterns and attributes against an established contextual profile helps maintain security while challenging the user only when required. This paper proposes an Open standards based authentication modality that can seamlessly integrate with an Adaptive Authentication system. The proposed authentication modality uses JavaScript Object Notation(JSON), JSON Web Signature(JWS) and supports a means of verifying the authenticity of the requesting client. The proposed authentication modality has been formally verified using Scyther and all the claims have been validated. 2022 IEEE. -
An Enhanced Data-Driven Weather Forecasting using Deep Learning Model
Predicting present climate and the evolution of the ecosystem is more crucial than ever because of the huge climatic shift that has occurred in nature. Weather forecasts normally are made through compiling numerical data on from the atmospheric state at the moment and also applying scientific knowledge in the atmospheric processes to forecast on how the weather atmosphere would evolve. The most popular study subject nowadays is rainfall forecasting because of complexity in handling the data processing in addition to applications in weather monitoring. Four different state temperature data were collected and applied deep learning methods to predict the temperature level in the forthcoming months. The results brought out with the accuracy from 92.5% to 97.2% for different state temperature data. 2023 IEEE. -
Predicting the Thyroid Disease Using Machine Learning Techniques
An endocrine gland that is allocated in the front of the neck is called the thyroid, which produces thyroid hormones as its main job. Thyroid hormone may be produced insufficiently or excessively as a result of its potential malfunction. There are various thyroid types including Hyperthyroidism, Hypothyroidism, Thyroid Cancer Thyroiditis, swelling of the thyroid. A goiter is an enlarged thyroid gland. When your thyroid gland produces more thyroid hormones than your body requires, you have hyperthyroidism. When the thyroid gland in our body doesnt provide enough thyroid hormones, then our body has hypothyroidism; when you have euthyroid sick, your thyroid function tests during critical illness taken in an inpatient or intensive care setting show alterations. Hypothyroid, hyperthyroid, and euthyroid conditions are expected from these thyroid conditions. The Three similarly used machine learning algorithms are: Support Vector Machine (SVM), Logistic Regression, and Random Forest methods, were evaluated from among the various machine learning techniques to forecast and evaluate their performance in terms of accuracy. Random forest can perform both regression and classification tasks. Logistic Regression is used to calculate or predict the probability of a binary (yes/no) event occurring. SVM classifiers offers great accuracy and work well with high dimensional space. A thyroid data set from Kaggle is used for this. This study has demonstrated the use of SVM, logistic regression, and random forest as classification tools, as well as the understanding of how to forecast thyroid disease. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Identification of Cyberbullying and Finding Target User's Intention on Public Forums
Numerous cybercriminals are active in the online realm, carrying out cyber-crimes according to predetermined and preplanned agendas. Cyberbullying, which was formerly limited to physical limits, has now expanded online as a result of technology advancements. One type of cyberbullying is denigration or insult. The cyberbullying cases are in exponential rise in social media as per the reports of Computer Emergency Team by Sri Lanka. Insulting words are changeable in dynamic and the same terminology may have numerous meanings depending on the context. Bullying cannot be defined just because a statement comprises such a term. As a result, when classifying comments, standard keyword detecting approaches are insufficient. Other languages also may have dealt with this issue by utilizing lexical databases like WordNet, which might give synonyms as well as homonyms for words. Because no adequate lexical database mainly for the English language has been built, recognizing a word like bullying is difficult. As a result, employed rules to solve the problem. Facebook comments containing profanity were gathered, outliers were eliminated, and the remaining messages were pre-processed. Five feature extraction rules were employed to assess insult in the text. Following that, used the Support Vector Machine (SVM) technique. Using an F1-score of 85%, the findings demonstrate that when compared to existing works, SVM performs better. The focus on English language cyberbully identification, which has never been addressed earlier, distinguishes this study. 2023 IEEE. -
Epilepsy Detection Using Supervised Learning Algorithms
In the current scenario, people are suffering and isolated by themselves by seizure detection and prediction in epilepsy. Also, it is highly essential that it needs to be identified through wearable devices. Researchers discussed this issue and outlined future developments in this field, suggesting that Machine Learning (ML) techniques could radically change how we diagnose and manage patients with epilepsy. However, as data availability has increased, Deep Learning (DL) techniques have become the most cutting-edge approach to adopt and use with wearable devices. On the other hand, large amounts of data are needed to train DL models, making overfitting problematic. DL models are created with open-source toolboxes and Python, allowing researchers to create automated systems and broaden computational accessibility. This work thoroughly overviews deep learning (DL) methods and neuroimaging modalities for automated epileptic seizure identification. It covers several MRI and EEG techniques for epileptic seizure diagnosis and treatment programmes designed to treat these seizures. The study also covers the difficulties in precise detection, the benefits and drawbacks of DL-based strategies, potential DL models and upcoming research in this area. 2024 IEEE. -
Analysis of Routing Protocols in MANET Networks
The scientific article is a review and comparative analysis of routing protocols for MANETs. The study examines the main protocols connected to mobile ad hoc networks such as B.A.T.M.A.N, BMX7, OLSRv1, Babel and provides a detailed analysis of their characteristics, advantages and disadvantages. To empirically evaluate performance, tests were carried out in a network simulator. The results of the study allow us to draw conclusions about the effectiveness and reliability of each of the monitoring protocols under various operating conditions of MANET. This article is a valuable contribution to the field of MANET research and can be used in the development of new technologies and solutions for mobile wireless networks. The work is relevant and practically significant because it helps researchers and engineers make informed decisions when choosing the optimal routing protocol in MANET networks. The results obtained can be useful in the design of mobile applications, emergency communication systems, transport management and other areas where the efficient operation of wireless networks is important. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Diseased Leaf Identification Using Bag-of-Features and Sigmoidal Spider Monkey Optimization
Agricultural products decide the economy of a country like India. The agricultural business has the involvement of a large population. The quality and quantity of agricultural products highly depend on environmental conditions and facilities provided to farmers. Timely and efficient detection of diseases in plants and crops is one of the most critical issues that affect crop production. Therefore, it is highly desirable to develop some cheap and easy-to-handle automated plant disease detection systems for the timely treatment of plants. Leaves are considered a primary source of information about the health of plants. In the case of plants, the disease may be easily visualized and identified by observing its effect on leaves. Therefore, this paper introduces a bag-of-features in sigmoidal spider monkey optimization to identify a diseased leaf, separating the diseased leaf from a healthy leaf. The investigational outcomes show the superiority of the anticipated technique in contrast to other meta-heuristic-based systems. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2024. -
SmartHealth: Personalized Diet and Exercise Plans Using Similarity Modeling
Due to the growing prevalence of chronic diseases stemming from unhealthy lifestyles, a personalized approach to patient care is crucial. This paper delves into a system that utilizes cosine similarity and Pearson correlation to generate tailored diet and exercise plans, effectively managing chronic diseases. The system focuses on common chronic conditions like diabetes, hypertension, and thyroid disorders. Through sophisticated similarity modeling for diet and exercise, the proposed system provides integrated and personalized lifestyle recommendations, outperforming non-personalized or basic rule-based systems. 2024 IEEE. -
HULA: Dynamic and Scalable Load Balancing Mechanism for Data Plane of SDN
Multi-rooted topologies are used in large-scale networks to provide greater bisectional bandwidth. These topologies efficiently use a higher degree of multipathing, probing, and link utilization. An end-to-end load balancing strategy is required to use the bisection bandwidth effectively. HULA (Hop-by-hop Utilization-aware Load balancing Architecture) monitors congestion to determine the best path to the destination but, needs to be evaluated in terms of scalability. The authors of this paper through artifact research methodologies, stretch the scalability up to 1000 nodes and further evaluate the performance of HULA on software defined network platform over ONOS controller. A detailed investigation on HULA algorithm is analysed and compared with four proficient large-scale load balancing mechanisms including: connection hash, weighted round-robin, Data Plane Devlopment Kit (DPDK) technique, and a Stateless Application-Aware Load-Balancer (SHELL). 2023 IEEE. -
P4 based Load Balancing Strategies for Large Scale Software-Defined Networks
To meet the large demands of future networks, several large-scale Software Defined Networking (SDN) test-beds have been designed. The increasing complexity of networks has resulted in convoluted methods for managing and orchestrating efficiently across a wide range of network environments. The load balance function is impaired when the controller fails to connect with the switches. A traditional Load Balancer (LB) must decapsulate layers one by one and get the information needed to run load balancing algorithms. For instance, OpenFlow, NetConf, Programming Protocol-independent Packet Processors (P4), and Data Plane Developement Kit (DPDK) provide network programmability at both the control and data plane levels. In this paper, authors implement load balancing using the P4 programming language without the need of a controller, the P4 load balancer can operate on its own. Controller's support is used to keep track on the health of the web servers. In this situation, the controller can identify a server failure and notify the P4 load balancer, which will restrict requests to the malfunctioning server, lowering the dispatching failure rate. A detailed investigation of various load balancing mechanisms is analysed in this paper followed by the identification of four potential approaches to large-scale SDN tests, including connection hash, weighted round-robin, DPDK technique, a Stateless Application-Aware Load-Balancer (SHELL). 2022 IEEE. -
Verification and validation of MapReduce program model for parallel K-means algorithm on Hadoop cluster
With the development of information technology, a large volume of data is growing and getting stored electronically. Thus, the data volumes processing by many applications will routinely cross the petabyte threshold range, in that case it would increase the computational requirements. Efficient processing algorithms and implementation techniques are the key in meeting the scalability and performance requirements in such scientific data analyses. So for the same here, we have p analyzed the various MapReduce Programs and a parallel clustering algorithm (PKMeans) on Hadoop cluster, using the Concept of MapReduce. Here, in this experiment we have verified and validated various MapReduce applications like wordcount, grep, terasort and parallel K-Means Clustering Algorithm. We have found that as the number of nodes increases the execution time decreases, but also some of the interesting cases has been found during the experiment and recorded the various performance change and drawn different performance graphs. This experiment is basically a research study of above MapReduce applications and also to verify and validate the MapReduce Program model for Parallel K-Means algorithm on Hadoop Cluster having four nodes. 2013 IEEE. -
Improved Acceptance model: Unblocking Potential of Blockchain in Banking Space
Over the past ten years, blockchain has emerged as the new buzzword in the banking sector.The new technology is being adopted globally in many industries, including the business sector,because of its unique uses and features. However, no adoption model is available to help with this process.This research paper examines the new technology known as blockchain, which powers cryptocurrencies like Bitcoin and others. It looks at what blockchain technology is, how it works especially in the banking sector, and how it can change and upend the financial services sector. It outlines the features of the technology and discusses why these can have a significant effect on the financial industry as a whole in areas like identity services, payments, and settlements in addition to spawning new products based on things like 'smart contracts'. The adoption variables found in the literature study were used to gather, test, and evaluate the official papers that are currently available from regulatory organizations, practitioners, and research bodies. This study was able to classify adoption factors into three categories - supporting, impeding, and circumstantial - identify a new adoption factor, and determine the relative relevance of the factors. Consequently, an institutional adoption paradigm for blockchain technology in the banking sector is put out. In light of this, it is advised to conduct additional research on using the suggested model at banks using the new technology in order to assess its suitability. 2024 IEEE. -
Implementation of Recent Advancements in Cyber Security Practices and Laws in India
In the past few decades, a large number of scholars and experts have found that wireless connectivity technologies and systems are susceptible to many kinds of cyber attacks. Both governmental organizations and private firms are harmed by these attacks. Cybersecurity law is a complex and fascinating area of law in the age of information technology. This essay aims to outline numerous cyber hazards as well as ways to safeguard against them. In both local and international economic contexts, it is critical to establish robust regulatory and legal structures that address the growing concerns about fraud on the internet, security of information, and intellectual property protection. Additionally, it covers cybercrime's different manifestations and security in a global perspective. Due to recent technical breakthroughs and a growth in access to the internet, cyber security is now utilized to safeguard not just a person's workstation but also their own mobile devices, including tablets and mobile phones, that have grown into crucial tools for data transmission. The community of security researchers, which includes members from government, academia, and industry, must collaborate in order to comprehend the new risks facing the computer industry. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.