Browse Items (2150 total)
Sort by:
-
Taming theComplexity ofDistributed Lag Models: A Practical Approach toMulticollinearity, Outliers, andAuto-Correlation inFinance
This research investigates the application of robust estimators within the finite distributed lag model (DLM), a critical framework in finance research capturing temporal dependencies between lagged explanatory variables and a response variable. Traditional Ordinary Least Squares (OLS) estimation faces challenges when dealing with high lag counts, multicollinearity, and outliers, potentially compromising parameter estimates and model reliability. Employing real-world data from the RBI, spanning the years 20222023 encompassing budgetary and economic variables of Indian states and Union Territories, the study demonstrates that the MMS estimator emerges as the most efficient estimator, showcasing enhanced robustness against outliers and multicollinearity. Additionally, the study reveals positive autocorrelation in residuals, underscoring the importance of robust methods in addressing such issues in financial modeling. This research contributes valuable insights to financial analysts and offers a more accurate understanding of dynamic relationships in financial systems. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Advancements in Electronic Healthcare: A Bibliometric Analysis
Electronic healthcare has changed the traditional form of medical treatment. The integrated approach of interconnected devices had enhanced the process of record keeping and dissemination, benefitting Doctors, patients, and other stakeholders. This study aims to highlight the research carried out in the field of electronic healthcare from the year 2011 to 2020. Metadata of 821 publications from Scopus database was extracted and analyzed. VOS viewer was used to generate the network diagrams and link strengths. It was found that Harvard Medical School and European Commission were the top publication affiliation and funder, respectively. United Stated dominated with the maximum number of publications till 2017 but was surpassed by publications from India from 2018 onwards. Publications inclined toward Internet of things, network security, retrospective study, and authentication toward the end of this decade indicating the shift in trend for the future. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Sustainable driven Predictive Approaches to Address Climatic Crisis: Issues and Challenges
The issue of climate crisis is currently one of the critical challenges humanity faces in the present era and it holds significant implications, for the future of our planet. To gain an understanding and mitigate the impacts of climate change several methods have been developed to model and forecast future climate trends. This paper critically analyzes sustainable techniques utilized in studying the climate crisis, such as statistical models, machine learning algorithms and climate simulations. The strengths and limitations of each method is analyzed while also considering the factors that can affect their accuracy and reliability. By consolidating existing research on this subject our aim is to provide insights into the effective sustainable approaches for predicting our climates future trajectory while offering suggestions for further research, in this crucial field. 2023 IEEE. -
Human-Machine Interactions andAgility inSoftware Development
A modern organization cannot function without project management. Organizations, governments, and non-profits recognize how important modern project techniques are to the success of their IT projects. Many people understand that excellent project skills are crucial for remaining competitive in the workplace. Many project management concepts will help them with their everyday interactions with people and technology. Project management aims to plan, organize, motivate, and control resources to accomplish specific objectives and meet specific success criteria. The major challenge is to achieve all the project goals and objectives while respecting the preconceived constraints of the project. Project management for data science is easy with Agile. Understanding the different approaches to project management and how they can fit into information science is essential. Several project management tools are available to maintain and report on a projects progress. As proposed in this paper, a comprehensive study on project management and Agile methodologies helps enhance the teams interactions when working for data science project management. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Classification of Skin Diseases Using Convolutional Neural Networks (VGG) with Histogram Equalization Preprocessing
Skin diseases are a major global health concern for which prompt and precise diagnosis is necessary for effective treatment. Convolutional neural networks (CNN), one of the deep learning techniques, have shown potential in automating the diagnostic procedure. The goal of this research is to enhance the effectiveness of skin disease categorization by fusing the capabilities of CNNs - particularly the VGG architecture - with the histogram equalization preprocessing method. In image processing, histogram equalization is a commonly used approach to enhance the contrast and general quality of medical photographs, which include photos of skin conditions. In order to improve the characteristics and details of dermatological pictures for this study, we employed histogram equalization as a preprocessing step. This allowed CNN to extract pertinent features more quickly. 2024 IEEE. -
Intricate Plane of Adversarial Attacks in Sustainable Territory and the Perils faced Machine Intelligent Models
The issue of model security and reliability in Artificial Intelligence (AI) is a concern due to adversarial attacks. In order to tackle this issue, researchers have developed sustainable defense strategies, but certain challenges remain. These challenges involve transferability, higher computing costs, and adaptability. Striking a balance between accuracy and robustness is difficult, as defense mechanisms often come with trade-offs between the two. Real-world situations demonstrate the practical implications of sustainable adversarial AI. For example, it improves the security of self-driving vehicles, enhances the accuracy of medical imaging diagnoses, and incorporates AI-driven defenses into network intrusion detection and phishing detection systems. It is crucial to consider ethical aspects throughout this process. Future trends in adversarial AI research for cybersecurity will involve ensemble defense mechanisms, adversarial learning from limited data, and hybrid attacks. By embracing the evolving landscape, researchers and practitioners can develop sustainable AI systems that are more secure and resilient, effectively countering adversarial threats. 2023 IEEE. -
Rescue Operation with RF Pose Enabled Drones in Earthquake Zones
The main objective of this research is to use machine learning algorithms to locate people stranded by an earthquake or other big disasters. Disasters are often unpredictable, they can result in significant economic loss, and the survivors may struggle with despair and other mental health issues. The time, the victim's precise location, the possible condition of the victim, the resources and manpower on hand are the main challenges the rescue team must deal with. This article examines a model that gathers data and, using that data, predicts risk analysis and probability of finding the shortest distance to reach the person in need. Using a drone equipped with RF-pose technology and EHT sensors, it will be able to locate any individuals trapped inside a collapsed structure. To determine the dataset's extreme points and the shortest route to the victim's location by using the Dijkstra's algorithms. The primary aim of this article is to discuss the idea of applying these ML (Machine Learning) algorithms and creating a model that aids in rescuing those trapped beneath collapsed buildings. Devices that are part of the Internet of Things (IoT) have grown in popularity over the past few years as a result of their capacity for data collection and transmission. Particularly in disaster management, search and rescue operations, and other related disciplines, drones have shown to be useful IoT devices. These tools are perfect for emergency response circumstances because they can be utilized to access locations that are hard to get to or too dangerous for humans. Drones with cameras and other sensors can be used in disaster management to gather data in real-time on the severity of the damage caused by earthquakes and other disasters. The afflicted area may be mapped out with their help, and they can also be used to find survivors and spot dangerous places that should be avoided. The rescue operation can then be planned and the resource allocation made more efficient using this information. Drones can be used in search and rescue operations to find and follow people who are stuck or lost. Drones can be equipped with the RF-pose sensors used in the research described in the abstract to assist in locating people who are buried under debris. Thermal camera-equipped drones can also be used to locate people in low-light or night-time conditions by detecting their body heat. The capacity of drones to offer real-time data is one of the benefits particularly disaster management. 2023 IEEE. -
Thermal Studies of Multiwalled Carbon Nanotube Reinforced with Silicone Elastomer Nanocomposites
This article studies the enhancement in the properties of silicon elastomer (SiR) reinforced by multiwalled carbon nanotube (MWCNT). Multiwalled carbon nanotube filled silicone rubber composites were prepared. The effects of loading levels of MWCNT on the thermal properties of silicone elastomer were investigated. SEM studies reveal the smooth distribution of MWCNT in silicon matrix. At higher concentration nanoparticles collapse together to form agglomerates. The high resolution transmission electron microscopy (HR-TEM) photographs shows excellent/homogeneous distribution of MWCNT in silicon matrix and agglomeration occurs at higher concentrations. Thermal properties of nanocomposites have been characterized using differential scanning calorimetry (DSC) and thermo-gravimetric analysis (TGA). The transition temperature appears at below -25C for MWCNT reinforced SiR nanocomposites. TGA thermogram, shows that temperature at 10%, 20%, 30%, and 50% weight loss for SiR nanocomposites is higher than as compared to unfilled SiR. The results indicate that the addition of MWCNT significantly enhanced the thermal stability of silicon elastomer. 2018 Elsevier Ltd. -
Performance analysis of training algorithms of multilayer perceptrons in diabetes prediction
Artificial Intelligence plays a vital role in developing machines or software that can create intelligence. Artificial Neural Networks is a field of neuroscience which contributes tremendous developments in Artificial Intelligence. This paper focuses on the study of performance of various training algorithms of Multilayer Perceptrons in Diabetes Prediction. In this study, we have used Pima Indian Diabetes data set from UCI Machine Learning Repository as input dataset. The system is implemented in MatlabR2013. The Pima Indian Diabetes dataset consists of about 768 instances. The input data is the patient history and the target output is the prediction result as tested positive or tested negative. From the performance analysis, it was observed that out of all the training algorithms, Levenberg-Marquardt Algorithm has given optimal training results. 2015 IEEE. -
A Comprehensive Review of Small Building Detection in Collapsed Images: Advancements and Applications of Machine Learning Algorithms
Accurately identifying small buildings in images of collapses is essential for disaster assessment and urban planning. In the context of collapsed images, this study provides an extensive overview of the methods and approaches used for small building detection. The investigation covers developments in machine learning algorithms, their uses, and the consequences for urban development and disaster management. This work attempts to give a brief grasp of the difficulties, approaches, and potential paths in the field of small building detection from collapsed imaging through a thorough investigation of the body of existing literature. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Review on Image Processing-Based Building Damage Assessment Techniques
Quick damage assessment is essential for starting efficient emergency response operations following natural calamities or any other kind of disasters. After a disaster, it is crucial for rescue departments to produce judgments and distribute the resources based on a fast retrieval of precise building damage status. A ground survey is used to implement traditional building assessment, and this is labor-intensive, dangerous, and time-consuming. Studies on building damage extraction over the past few decades have generally concentrated on localizing and evaluating the destructed structures, analyzing the ratio of damaged constructions, and determining the sort of destruction each construction has sustained. Recent research trends are mainly concentrated on the utilization of data collected from multiple sensors for the damage assessments of buildings. Each stage of digital image processing can be carried out in multiple ways and several novel ideas are emerging every single day. This paper reviews the various damage assessment techniques in the different steps of digital image processing. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023. -
Controlling the Accuracy and Efficiency of Collision Detection in 2d Games using Hitboxes
Collision detection is a process in game development that involves checking if two or more objects have intersected or collided with each other. It is a fundamental aspect of game mechanics that cannot be overlooked. Games invloves assets/sprites, which tend to be drawn digitally with the help of a computer program. This paper discusses controlling and detecting collisions in games that make use of PNG images as game assets. The conventional way to detect collision in a game is to check if the object is within the bounding box of another object or asset. However, such a method lacks realism and doesn't work well with much complex shapes as the game might register a hit when another object collides with the transparent part of the object being checked for collision. In order to overcome these limitations, the proposed algorithm divides the entire image into smaller rectangles and stores its coordinates in an array. The array is then pruned by removing coordinates with no translucent or opaque elements. Collision is detected by checking if any of the points of the collision object is inside the image array. 2023 IEEE. -
Comprehensive Study on Sentiment Analysis: Types, Approaches, Recent Applications, Tools and APIs
Sentiment analysis can be considered a major application of machine learning, more particularly natural language processing (NLP). As there are varieties of applications, Sentiment analysis has gained a lot of attention and is one among the fastest growing research area in computer science. It is a type of data analysis which is observed from news reports, user reviews, feedbacks, social media updates etc. Responses are collected and analyzed by researchers. All sentiments can be classified into three categories-Positive, Negative and Neutral. The paper gives a detailed study of sentiment analysis. It explains the basics of sentiment analysis, its types, and different approaches of sentiment analysis. The recent tools and APIs along with various real world applications of sentiment analysis in various areas are also described briefly. 2020 IEEE. -
Certificate Generation and Validation Using Blockchain
Verifying academic credentials is a standard procedure for employers when making job offers. After the interview procedure is complete, the employer takes a long time to supply the offer letter. The employer must have the certificate authenticated by the organization that issued it to confirm its originality. While confirming the authenticity of a certificate, the employer takes a long time. The selection procedure takes longer overall because of the long process involved in certificate verification. Blockchain offers a verified distributed ledger with a cryptography technique to combat academic certificate forgery to address this issue. The blockchain also offers a standard platform for document storage, access, and minimization of verification time. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Predicting the Stock Markets Using Neural Network with Auxiliary Input
Predicting the stock market has always been a challenging task and has always had a certain appeal for researchers all around the world. Stock markets are supposed to be quite random and people with experience in the market strongly agree to the fact. Thus, predicting the stock market accurately paves the way for endless money. To date, no such algorithm has been devised that could even predict the stock market with a 90% accuracy rate. The difficulty lies in the randomness of the markets, and the various complexities involved in modeling market dynamics. Nevertheless, there have been algorithms with a decent success rate and researchers around the world have been in a constant attempt to improve over them. Thus, through this paper we attempt at predicting the return of a stock over a period of 10days after a particular news was out regarding the stock using the headlines of the news and certain other features important in determining the direction of a stock. The model was implemented with a sigma score of 0.81. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
AI Healthcare Industry in Life Science Industry: A Perspective View
The main goal of this study is to look at how well the innovation system for AI healthcare technology is working in the life science business and find things that are getting in the way of progress. A lot of different types of research were used for this study. It combines both quantitative and qualitative data from tertiary studies, business-related written sources, and conversations with 21 experts and 25 life science management leaders to get new ideas. The results make it clear that innovation system performance is being held back by a lack of resources and poor communication from top healthcare experts about what they need to improve healthcare with AI technology innovations. The study says that to deal with these problems, policymakers need to make changes that increase the resources that are available and come up with clear goals and visions for how AI technology can improve healthcare. Using the socio-technical technological advancement System (TIS) approach in the healthcare setting, the study adds to our knowledge of how the innovation system works and how different parts of it affect each other. Overall, this study throws light on the complicated ways that innovation works in the life science field. It gives lawmakers, industry workers, and other interested parties useful information for pushing AI healthcare technology forward in a sociotechnical framework. 2024 IEEE. -
Survey on Malicious URL Detection Techniques
Crimes in the cyberspace are increasing day by day. Recent cyber threat defense reports states that 80.7% of the systems are compromised at least once in 2020. Cyber criminals taking the pandemic situation as an opportunity for the mass attack through malicious URL circulated by email or text messages in social media. Performing cyber-attacks through malicious URLs is the handy method for the cyber criminals. Protecting from such attacks requires proper awareness and solid defense system. Some of the common approaches followed by the cybercriminals to deceive the victims are 1. Phishing URLs which is very similar to the legitimate URLs. 2. Redirecting URLs 3. Using JavaScript, redirects to the phishing URL when user interacts with webpage 4. Social engineering etc. As soon as the novice internet users clicks on the malicious URL link, cyber criminals can easily steal personal information or install malware on their device to get additional access. Recently malicious URLs are generated algorithmically and uses URL shortening service to evade the existing security setup such as firewall and web filters. In literature, the researchers have proposed several ways to detect the malicious URLs but, new attack vectors that are introduced by the cyber criminals can easily bypass the security system. The purpose of this paper is to provide an overview of various malicious URL detection techniques which includes blacklist based, rules based, machine learning and deep learning-based techniques. Most importantly, the paper discusses the common features used by the detection system from webpages to classify the URL as malicious or benign and various performance metrics. This will encourage the new researchers to bring out the innovative solutions. 2022 IEEE. -
Prominent label identification and multi-label classification for cancer prognosis prediction
Cancer prognosis prediction improves the quality of treatment and increases the survivability of the patients. Conventional methods of cancer prediction deal with single class by limiting the prognosis prediction to one response variable. The SEER Public Use cancer database has more prominent variables that support better prediction approach. The objective of this paper is to find the prominent labels from cancer databases and use them in a multi-class environment. The implementation consist of three phases namely, pre-processing, prominent label identification and multi-label classification. Breast, Colorectal and Respiratory Cancer Data sets have been used for the experimentation. Also random samples from all three data sets are generated to form a mixed cancer data. Patient survival, number of primaries and age at diagnosis are the prominent labels identified from others using the Decision tree, Nae Bayes and KNN algorithms. The three prominent labels have been tested using multi-label RAkEL algorithm to find the relations between them. The results of the empirical study are comparatively better than the traditional way of cancer prediction. 2012 IEEE. -
Revolutionizing Road Traffic Management and Enforcement: Harnessing AI, ML, and Geospatial Techniques
This study investigates the synergistic application of Artificial Intelligence (AI), Machine Learning (ML), and Geospatial Technologies in optimizing traffic management systems. Through a mixed-methods research design, it evaluates the potential of these technologies to enhance urban traffic flow and reduce congestion. The research emphasizes the critical importance of data quality, ethical considerations, and the selection of appropriate technological solutions based on specific urban traffic scenarios. Findings highlight the significant role of integrated AI and geospatial analyses in improving traffic predictions and operational efficiency. Future work will focus on developing more sophisticated models that ensure privacy, equity, and adaptability to new transportation trends. 2024 IEEE. -
Enhancing Traffic Incident Management and Regulatory Compliance Using IoT and Itms: A Mumbai Traffic Police Case Study
In the rapidly urbanizing landscape of Mumbai, a megacity confronted with significant traffic management and law enforcement challenges, the deployment of an advanced city surveillance system represents a transformative approach to urban governance. This paper examines the integration of over 11,000 CCTV cameras into the Mumbai Traffic Police's operational framework, covering an area of 438 square kilometers encompassing 41 traffic divisions and 94 police stations. Since its inception in 2016, the system has been pivotal in enhancing safety, order, and mobility within the city, especially amid obstacles such as ongoing infrastructure projects, traffic congestion, accidents, and natural disasters. Central to this study is the analysis of the Mumbai City Surveillance System Project (MCSP), which leverages CCTV technology to generate and classify Incident Reports (IR) based on severity, ranging from minor disruptions to significant emergencies. The period from October 2021 to 2023 saw a marked increase in IR generation, from 742 reports in 2021 to 10,392 in 2022 and 9,639 in 2023, indicating the system's growing efficacy in real-time traffic management and incident response.This paper further explores the cutting-edge integration of Artificial Intelligence (AI) and Internet of Things (IoT) technologies within the MCSP framework, highlighting the role of computational intelligence in enhancing the capabilities of Intelligent Transportation Systems (ITS). By employing AI-driven predictive analytics, the system effectively anticipates traffic conditions based on diverse variables such as traffic flow, vehicle speed, and weather, thereby optimizing traffic management strategies.The findings underscore the significant impact of AI and IoT technologies in redefining urban transportation networks, demonstrating improved efficiency, safety, and resilience in the face of Mumbai's complex transportation challenges. This study contributes to the discourse on smart city initiatives, offering insights into the role of advanced computational technologies in facilitating intelligent transportation solutions and shaping the future of urban living. 2024 IEEE.