Browse Items (2150 total)
Sort by:
-
Enhancement of efficiency of military cloud computing using lanchester model
Cloud computing is a technology that uses centrally processed computing resources over the Internet by a large number of users. Because many requests are concentrated on cloud servers, they must be properly distributed to avoid degradation of quality. Load balancing categorizes requests from users according to established algorithms and assigns appropriate virtual machines. Because load balancing algorithms are developed according to the cloud's usage environment, various algorithms are being utilized. Recently, government agencies are also interested in introducing cloud technologies beyond private sectors. Many militaries have selected Cloud as its basic task to apply new technologies such as AI to military operations. However, there is no precedent for military cloud development, and the lack of doud technology research considering the operational environment has delayed the progress of cloud adoption. The algorithm presented by this paper makes the combat power, which varies according to the importance of the operation, an important variable. This variable makes each user's access to computing resources different. Although similar to other dynamic algorithms, the impact of priorities is so big that the degree of imbalance between tasks was higher. 2020 IEEE. -
Enhancement of Reflected Faces on Semi-reflecting Surfaces
Face recognition is interesting research area in computer vision. This paper proposes to enhance faces reflected on semi reflecting surfaces such as glass window, glass screens or any other mirror like surfaces. Visibility or clarity of reflected image is depending on the reflecting ability of material surface on which reflection occurs. Other than mirror surfaces, majority of reflected images are less visibility. So recognition of reflected face is a challenge in the proposed method. This paper addresses enhancement of reflected face image. Estimating atmospheric light and medium transmission map, recover haze free image. Apply CLAHE i.e., adaptive histogram equalization by limiting contrast to obtain enhanced reflected face image. 2019 IEEE. -
Enhancement of substitution voices using F1 formant deviation analysis and DTW based template matching
Speech is the best way to express the thoughts and feelings among the human beings. But for many reasons the sound produced by human beings becomes disordered voice and termed with many names based on the cause as stammering, dys-theria, apraxia and so on. In the above mentioned few examples, the voice becomes disordered because of the underperformance of body's organ. The larynx is removed in some human beings because of cancer. For them an artificial larynx transducer (ALT) is used to produce the sounds. The above all sounds are categorized as disordered voice and the sound produced by ALT is also called as Substitution voice. In this paper, a method is used to improve the quality of substitution voice produced by ALT. Algorithm is developed to estimate undesired audio components from the device output and remove the same using Non Linear Spectral Subtraction (NLSS) technique. Further, Fundamental (F0) contour and novel parameter F1 formant deviation of healthy speech (HE) and ALT speech are determined. The above two parameters are estimated and stored during the training phase of the system. In the test phase, the above mentioned parameters are estimated and they are used to scale down the database to reduce overall enhancement time. Next step is template matching done by mapping test data with training data using Dynamic Time Warping (DTW) Technique. The data base with least distance estimation is recognized as the utterance and the same is played back. 2017 IEEE. -
Enhancements in anomaly detection in body sensor networks
Anomaly detection in Body Sensor Networks (BSNs), have recently received much attention from the healthcare community. This is partly due to the development of sensor based real-time tracking and monitoring networks. These networks have been responsible not only for ensuring critical medical treatment at times of emergency, but have also made it easier for health-care personnel to administer critical treatment. In this paper we consider improvements to existing machine learning methods that detect anomalous sensor measurements. The improved methods are a step in the right direction in ensuring unduly overheads due to faulty sensors don't interfere while administering life-critical treatment in a limited resources scenario. 2019 IEEE. -
Enhancements to Content Caching Using Weighted Greedy Caching Algorithm in Information Centric Networking
Information-Centric Networks (ICN) or Future Internet is the revolutionary concept for the existing infrastructure of the internet that changes the paradigm from host-centric networks to data-centric networks. Caching in Information-Centric Networks (ICN) has become one of the most critical research areas in today's world, especially for the leading in content delivery over Internet companies like Netflix, Facebook, Google, etc. This paper is intended to propose a novel Caching strategy called Weighted Greedy Dual Size Frequency for caching in Information-Centric networks. In this paper, the WGDSF considers multiple critical factors for maintaining the Web Content efficiently in ICN Caching Router. Simulation is done for the various performance metrics like Cache Hit ratio, Link load, Path Stretch, and Latency for WGDSF cache replacement algorithm, and results shown that WGDSF outperforms well compared with LRU, LFU, and RAND Caching Strategies. 2020 The Authors. Published by Elsevier B.V. -
Enhancements to randomized web proxy caching algorithms using data mining classifier model
Web proxy caching system is an intermediary between the users and servers that tries to alleviate the loads on the servers by caching selective web pages, behaves as the proxy for the server, and services the requests that are made to the servers by the users. In this paper, the performance of a proxy system is measured by the number of hits at the proxy. The higher number of hits at the proxy server reflects the effectiveness of the proxy system. The number of hits is determined by the replacement policies chosen by the proxy systems. Traditional replacement policies that are based on time and size are reactive and do not consider the events that will possibly happen in the future. The outcomes of the paper are proactive strategies that augment the traditional replacement policies with data mining techniques. In this work, the performance of the randomized replacement policies such as LRU-C, LRU-S, HARM, and RRGVF are adapted by the data mining classifier based on the weight assignment policy. Experiments were conducted on various data sets. Hit ratio and byte hit ratio were chosen as parameters for performance. Springer Nature Singapore Pte Ltd. 2019. -
Enhancing Banana Cultivation: Disease Identification through CNN and SVM Analysis for Optimal Plant Health
Detection and effective remedies play a crucial role in revolutionizing banana crop health. The banana industry faces numerous challenges, including the prevalence of diseases and pests that can lead to significant yield losses. This paper explores the potential impact of detection techniques and remedies on improving banana crop management. Disease detection models based on machine learning, image processing and deep learning offer high accuracy in identifying diseases like Fusarium Wilt, Yellow Sigatoka, and Black Sigatoka. Implementing detection and targeted treatments can enhance crop productivity, reduce pesticide usage, and ensure sustainable banana production. 2024 IEEE. -
Enhancing Copper Price Prediction: A Machine Learning and Explainable AI Approach
This research introduces a hybrid model for copper price prediction, employs advanced machine learning models (linear regression, random forest, SVM, Adaboost, ARIMA), and utilizes the SHAP method for model interpretability. The study focuses on transportation-related variables over a 10-year period from Bloomberg Terminal, employing STL decomposition for time series forecasting. Key features impacting copper prices are identified, emphasizing the significance of demand, transportation, and supply. The Random Forest model highlights the critical role of demand. Addressing transportation supply constraints is crucial for enhancing model output in the dynamic copper market. 2024 IEEE. -
Enhancing Customer Experience and Sales Performance in a Retail Store Using Association Rule Mining and Market Basket Analysis
The retail business grows steadily year after year andemploys an abounding amounts of people globally, especially with the soaring popularity of online shopping. The competitive character of this fast-paced sector has been increasingly evident in recent years. Customers desire to blend the advantages of old purchasing habits with the ease of use of new technology. Retailers must thus guarantee that product quality is maintained when it comes to satisfying customer demands and requirements. This research paper demonstrates the potential value of advanced data analytics techniques in improving customer experience and sales performance in a retail store. Apriori, FP-Growth, and Eclat algorithms are applied in the real time transactional data to discover sociations and patterns in transactional data. Support, confidence and lift ratio parameters are used and apriori algorithm puts out several candidate item sets of increasing lengths and prunes those that fail to offer the assistance that is required threshold. We identified lift values are more when considering frozen meat, milk, and yogurt. if the customer decides to buy any of these items together, there is a chance that the customer will buy 3rd item from that group. Research arrived High confidence score is for Items like Semi Finished Bread and Milk so these products should be sold together, Followed by Packaged food and rolls. As retailers continue to face increasing competition and pressure to improve their operations, The aforementioned techniques may provide you a useful tool to comprehend consumer buying habits and tastes and for utilising that knowledge to come up with data-driven decisions that optimise product placement, enhance customer satisfaction, and attract sales. 2023 IEEE. -
Enhancing Cybersecurity: Machine Learning Techniques for Phishing URL Detection
Phishing attacks exploit user vulnerabilities in cybersecurity awareness by tricking them to fake websites designed to steal confidential data. This study proposes a method for detecting phishing URLs using machine learning. The proposed method analyzes various URL characteristics, such as length, subdomain levels, and the presence of suspicious patterns, which are key indicators of phishing attempts. Gradient Boosting was selected due to its robustness in handling complex, non-linear relationships between features, making it particularly effective in distinguishing between legitimate and phishing URLs, by evaluating the Gradient Boosting classifier on a dataset with 10,000 entries and 50 features, the method achieves an accuracy of 99%.This approach has the potential to enhance web browsers with add-ons or middleware that alert users from potential phishing sites which will be based solely on URL. 2024 IEEE. -
Enhancing Digital Citizenship Through Secure Identification Technologies in the Global Unified Digital Passport
Passports play a vital role in enabling international movement and security, as well as confirming one's identity. However, the existing passport system has many problems and limitations, such as identity fraud, passport falsification, human smuggling, terrorism, and border control. Despite the fast growth and adoption of digital technologies in various fields, the passport system has not been able to adapt to the changing demands and expectations of the global community. Therefore, there is a pressing need to investigate and develop a digital passport and verification system that can address the shortcomings of the conventional passport system and provide a more safe, convenient, and effective way of managing and verifying the identity and travel history of individuals across the world. This paper presents the solution and requirement for the development of a digital passport system that can be applied globally and universally. The paper proposes a conceptual framework and a technical architecture for the digital passport system, based on the principles of blockchain, biometrics, and cryptography. The paper also discusses the possible benefits, challenges, and implications of the digital passport system for various stakeholders, such as travelers, governments, airlines, and immigration authorities. The paper aims to contribute to the research and innovation of digital identity and citizenship, as well as to the progress of the sustainable development goals (SDGs) related to peace, justice, and strong institutions. 2024 IEEE. -
Enhancing Dimensional Geometry Casting using Computer Modeling
Sand casting method is used to produce many useful products for many applications. The aim of the study is to manufacture a product with excellent dimensional geometry is achieved in sand casting process at low cost. We would expect manuscripts to show how design and/or manufacturing problems have been solved using computer modeling, simulation and analysis. In this work, the important mechanical properties of hardness and surface roughness are investigated on Aluminum 6063 cast material with and without incorporating the copper tubes as a vent hole in sand casting process. Since copper has high thermal conductivity when compared to other metals, the heat transfer rate will be varying from existing system. The copper tubes have made different diameters of holes on outer surfaces with selective distance of intervals. The specific number of copper tubes with various diameters are designed by CATIA modeling software and analyzed with Taguchi Design of Experiment. Taguchi L9 orthogonal array is used proficiently in the optimal value of hardness and surface roughness. The results are revealed that the maximum hardness value of 104 BHN is attained for 10mm distance of holes made on copper tube with an angle of 90o degree. The minimum surface roughness of 2.11 micron is achieved for 20mm distance of holes made on copper tube with 45o of angle as a vent hole in sand casting process. 2024 E3S Web of Conferences -
Enhancing Disease Prediction in Healthcare: A Comparative Analysis of PSO and Extreme Learning Approach
The healthcare business generates a tremendous quantity of data, and the goal is to collect it and use it effectively for analysis, prediction, and treatment. The best approach to disease management is disease prevention through early intervention. There are a number of methods that can advise you on how to treat a specific sickness, but much fewer that can tell you with any degree of certainty if you will actually get sick in the first place. Preprocessing, feature selection, feature extraction, and model training are all parts of the proposed method. The suggested layout includes a preprocessing stage that takes care of things like moving average, missing values, and normalization. Feature selection describes the process of selecting the most relevant features from a dataset. After gathering features, the models are trained using PSO-ELM. The proposed strategy is superior to the widely used PSO and ELM. 2023 IEEE. -
Enhancing Early Detection of Cardiovascular Disease through Feature Optimization Methods
cardiovascular diseases are the most common reason for mortality around the world. Early detection of the ailment can help to reduce the mortality rate considerably. The ever-growing technologies like machine learning algorithms and deep learning models can be used for this purpose. The AI models thus developed can be used for health sector for assisting doctors in assessing the stage of the disease and detection and tracking of the clots in the cardio blood vessels. The proposed work uses two benchmark datasets for analysing the performance of various machine learning algorithms including KNN, Nae Bayes, Decision Tree and Random Forest. The performance was compares based on the AUC %. The method feature reduction were used here to reduce the computational complexity of the model. The results show that Random Forest Algorithm gave the best result when compared to other algorithms in case of UCI dataset and MLP classifier gave best results for Kaggle dataset. 2024 IEEE. -
Enhancing Educational Adaptability: A Review and Analysis of AI-Driven Adaptive Learning Platforms
This study explores the transformative potential of AI-powered adaptive learning platforms (ALPs) in education, specifically focusing on personalized learning paths and their impact on student engagement and outcomes. Through a comprehensive analysis of four prominent ALPs - Carnegie Learning, DreamBox Learning, Smart Sparrow, and Knewton - this study investigates their approaches to content tailoring and feedback delivery. The comparative analysis highlights each platform's strengths and limitations, providing educators with valuable insights for informed selection and implementation. This study also considers the broader landscape of ALPs, acknowledging concerns such as bias, data privacy, and the role of educators in the tech-driven educational environment. The findings contribute to our understanding of how ALPs can empower educators, personalize learning, and address achievement gaps, offering a nuanced perspective on the complex tapestry of AI in education. 2024 IEEE. -
Enhancing Human-Computer Interaction with a Low-Cost Air Mouse and Sign Language Recognition System
The purpose of this study is to investigate the development of assistive technologies that are designed to empower people with disabilities by increasing their level of freedom and accessibility. Voice assistants, air mice, and software that recognizes sign language are some of the topics that are specifically covered in this. Those who have impaired fine motor skills can benefit from using air mice since they allow controls to be made by hand gestures. Using machine learning algorithms, sign language recognition software is able to decipher signs with an accuracy rate of over 90 percent, making it easier for people who are deaf or hard of hearing to communicate themselves. By relying solely on vocal instructions, voice assistants like Alexa make it possible to control devices without using your hands. Not only do these technologies have the potential to be revolutionary, but they also confront obstacles in terms of improving identification accuracy and integrating them into common gadgets. In this study, the development and impact of voice assistants, sign language software, and air mice are discussed. More specifically, the paper highlights the potential for these technologies to help millions of people with disabilities all over the world. Additionally, it examines potential enhancements that could be made to these technologies in the future in order to further improve accessibility and inclusivity. This research integrates computer vision and machine learning to create a multimodal system blending air mouse functionality with real-time sign language translation. Achieving 95% accuracy in gesture recognition for air mouse control and 98% accuracy in sign language letter classification using a basic webcam, the system promotes accessible interaction without specialized hardware. Despite limitations in vocabulary and lighting sensitivity, future efforts aim to broaden data training and explore mobile deployment. These advancements hold promise for enhancing natural human-computer interaction, particularly for users with disabilities, by enabling intuitive, hands-free control and communication. 2024 IEEE. -
Enhancing Industrial Equipment Reliability: Advanced Predictive Maintenance Strategies Using Data Analytics and Machine Learning
In today's dynamic industrial landscape, optimizing machinery performance and minimizing downtime are paramount for sustained operational excellence. This paper presents advanced predictive maintenance strategies, with a focus on leveraging machine learning and data analytics to enhance the reliability and efficiency of industrial equipment. The study explores the key components of predictive maintenance, including data collection, condition monitoring, predictive models, failure prediction, optimized maintenance scheduling and the extension of equipment longevity. The paper discusses how predictive maintenance aligns with modern industrial paradigms. The study evaluated the performance of five popular forecasting models like Random Forest, Linear Regression, Exponential Smoothing, ARIMA, and LSTM, to estimate maintenance for industrial equipment. The effectiveness of each model was evaluated using a number of performance metrics. The percentage of the variation in the real data that the model can explain is shown by the R-squared number. The lowest MSE, RMSE, and greatest R-squared values indicate a model's accuracy. The study highlights practical implications across diverse industries, showcasing the transformative impact of predictive maintenance on minimizing unplanned downtime, reducing maintenance costs, and maximizing the lifespan of critical machinery. When it comes to predictive maintenance for industrial machinery, the LSTM model has been shown to be the most accurate and efficient model with the highest R-squared value, indicating a better fit and higher predictive ability. As technology continues to evolve, the paper discusses future directions, including the integration of artificial intelligence and advanced analytics, and emphasizes the importance of continuous improvement in refining predictive maintenance strategies for the evolving needs of industries worldwide. 2024 IEEE. -
Enhancing IoT Security Through Deep Learning-Based Intrusion Detection
The Internet of Things (IoT) has revolutionized the way we interact with technology by connecting everyday devices to the internet. However, this increased connectivity also poses new security challenges, as IoT devices are often vulnerable to intrusion and malicious attacks. In this paper, we propose a deep learning-based intrusion detection system for enhancing IoT security. The proposed work has been experimented on IoT-23 dataset taken from Zenodo. The proposed work has been tested with 10 machine learning classifiers and two deep learning models without feature selection and with feature selection. From the results it can be inferred that the proposed work performs well with feature selection and in deep learning model named as Gated Recurrent Units (GRU) and the GRU is tested with various optimizers namely Follow-the-Regularized-Leader (Ftrl), Adaptive Delta (Adadelta), Adaptive Gradient Algorithm (Adagrad), Root Mean Squared Propagation (RmsProp), Stochastic Gradient Descent (SGD), Nesterov-Accelerated Adaptive Moment Estimation (Nadam), Adaptive Moment Estimation (Adam). Each evaluation is done with the consideration of highest performance metric with low running time. 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Enhancing IoT Security Through Multilayer Unsupervised Learning and Hybrid Models
This research addresses the challenge of limited unsupervised learning in current IoT security research, which heavily relies on labelled datasets, hindering the detection of unknown threats. To overcome this constraint, the study proposes a sophisticated methodology integrating K-means clustering, autoencoders, and a hybrid model (combining both). The aim is to enhance detection capabilities without being reliant on prior labelled data. Emphasizing the need to go beyond traditional models, the research underscores the significance of incorporating a diverse range of smart home IoT devices to gain comprehensive insights. Tests conducted on the N-BaIoT dataset, which incorporates authentic traffic data from nine commercial IoT devices afflicted with Mirai and BASH-LITE infections, demonstrate the effectiveness of the suggested models. K-means clustering demonstrates excellence in precision, recall, and F1-scores, particularly in Doorbell and Thermostat categories. The Hybrid model consistently achieves high precision and recall metrics across various device categories by leveraging the strengths of both Kmeans and autoencoder techniques. Notably, the Autoencoder model stands out for its exceptional ability to achieve a perfect 100% detection rate for anomalies across all devices. This study highlights the robust performance of the proposed unsupervised learning models, emphasizing their strengths and potential areas for refinement in enhancing IoT network security. 2024 IEEE. -
Enhancing Kubernetes Auto-Scaling: Leveraging Metrics for Improved Workload Performance
Kubernetes is an open-source production-grade container orchestration platform, that can enable high availability and scalability for various types of workloads. Maximizing the performance and reducing the cost are two major challenges modern applications encounter. To achieve this, resource management and proactively deploying resources to meet specific application requirements becomes utmost important. Adopting Kubernetes auto-scaler to fit one's needs are important to maximize the performance. This study aims to perform a comprehensive analysis of Kubernetes auto-scaling policies. This paper also lists out the various parameters considered for auto-scaling, and prediction methods used to efficiently handle resource requirements of applications. The research findings reveal a scarcity in the existing work regarding the variety of workload based auto-scaling and custom metrics. This paper provides a concise overview of a forthcoming research endeavor that explores the utilization of custom metrics in conjunction with auto-scaling. 2023 IEEE.