Browse Items (2150 total)
Sort by:
-
A Novel Approach for Implementing Conventional LBIST by High Execution Microprocessors
The major VLS I circuits like sequential circuits, linear chips and op amps are very important elements to provide many logic functions. Today's competitive devices like cell phone, tabs and note pads are most prominent and those are used to get function the 5G related operations. In this work lower built-in self-test (LBIS T) mechanism is used to designing a microprocessor. The proposed methodology is giving performance measure like power efficiency 97.5%, improvement of delay is 2.5% and 32% development of area had been attained. This methodology attains more out performance and compete with present technology. The proposed equipment and execution for our approach requiring a constrained range overhead (lower than 3% power) over conventional LBIS T. 2022 IEEE -
MediCrypt: A Model with Symmetric Encryption for Blockchain Enabled Healthcare Data Protection
In the dynamic field of medicine, combining blockchain technology and data security becomes a vital strategy to solve the problem of protecting sensitive medical data. This study presents a new way to improve the security and privacy of medical data, using MediCrypt as an example of two- way encryption. Doctors initially used algorithms like AES or Blowfish to retrieve medical data. Smart contracts on the Ethereum-based blockchain introduce a layer of protection, combining SHA-256 with symmetric encryption technology. The multi-level transmission model includes encryption time, encryption time, elapsed time, and encryption size. Functionality in this model involves managing patient records (EHR), counterfeit drugs, drug reviews, clinical outcomes, and consent for all care areas. As shown in the methodology, the user ecosystem facilitates the exchange of information by defining the roles and responsibilities of doctors/pharmacists, administrators, and patients. The study shows the deployment of the MediCrypt model in three distinct stages. Distinct comparison of encryption time is done for different encryption algorithms. Also, parameters of MediCrypt model is compared with existing healthcare based blockchain models. 2024 IEEE. -
Challenges and Opportunities: Quantum Computing in Machine Learning
Many computing applications are being developed and applied in almost every aspect of life and in every discipline. With increasing number of problems and complexities, there is requirement for more computational power, faster speed and better results. To overcome these computational barriers, quantum computers, which are based on principles of quantum mechanics were introduced. Faster computation is the main reason behind the evolution of quantum computers which is achieved by using quantum bits instead of bits as quantum bits store both the values 1 and 0 together in superposition. The article focuses on basics of quantum computing in brief and the underlying phenomenon behind quantum computers. Also this article exposes recent trends and the problems that are being faced in this quantum technology. The major impact of quantum machine learning is also discussed. The quantum machine learning is providing better application in this modern field. This article analyses the different research gaps and possible solutions in quantum computing. Recent days quantum computing is implemented in different applications which is also described. 2019 IEEE. -
A framework for smart transportation using Big Data
In the current era of information technology, data driven decision is widely recognized. It leads to involvement of the term 'Big Data'. The use of IOT and ICT deployment is a key player of the smart city project in India. It leads to smart transportation systems with huge amounts of real time data that needs to be communicated, aggregated, interpreted, analyzed and maintained. These technologies enhance the effective usage of smart transportation systems, which is economical and has a high social impact. Social applications like transportation can be benefited by using IOT, ICT and big data analytics to give better prediction. In this paper, we present how big data analytics can be used to build a smart transportation system. Increasing traffic and frequent jams in today's scenario are becoming a routine, citizens are facing various health issues due to the bad transportation systems such as high blood pressure, stress, asthma due to air and noise pollution. In smart transportation mobility can be easily implemented as most of the citizens use smartphones. It can be easily linked to smart traffic signals to achieve the objective of smart transportation. Smart transportation is a key component to attract companies as it leads to better services, business planning, support beneficial environment and social behavior. 2016 IEEE. -
Data Economy: Data and Money
The article explores the concept of data economy, which is based on the sharing of data across platforms and ecosystems. Data has evolved from factual information to a new asset for companies worldwide, and the article discusses its evolution from brittle paper records to complex databases and algorithms like blockchain. With a prediction of a data explosion of about 175 zettabytes by 2025, data is used extensively in various domains, from agriculture to healthcare. The article also discusses how the data economy is not domain-specific but is a universal shift as all companies transition to become technology-driven companies. The data network effect is a cycle that uses data to acquire service users and generate more data. This has become a B2B service model that has added profits to various tech giants balance sheets. The article concludes by exploring the current need for data sharing across organizations and the future scope of the data economy. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Challenges of Digital Transformation in Education in India
Online learning has been present since the 1960s and has risen in popularity over time. World-class universities have been using online teaching-learning methodologies to fulfill the needs of students who reside far away from academic institutions for more than a decade. Many people predicted that online education would be the way of the future, but with the arrival of COVID-19, online education was imposed upon stakeholders far sooner and more suddenly than expected. When the COVID-19 pandemic broke out, educational institutions began to explore digital ways to keep students studying even when they couldn't be together in person as governments enacted legislation prohibiting large groups of people from gathering for any reason, including education. The future of such a transition looks promising. However, transitioning from one mode of education to another is not easy. Historically, when educators adopt new tools, learning still continues in the conventional manner. Based on the responses of 176 students, this paper studies the challenges of Digital transformation in the Education sector. The research is extremely beneficial in evaluating the scope of societal opposition to change. 2022 IEEE. -
Emotion Detection Using Machine Learning Technique
Face Emotion Recognition (FER) is an emerging and crucial topic today; since much research has been done in this field, there are still many things to explore. In daily life, where people dont have time to fill out feedback, emotion detection plays an important role, which helps to know customer feedback by analyzing expressions and gestures. Analyzing current studies in emotion recognition demonstrates notable advancements made possible by deep learning. A thorough overview of facial emotion recognition (FER) is provided in this publication. The literature cited in this study is taken from various credible research published in the last 10years. This study has built a model for emotion recognition using photos or a camera. The paper is based on the concepts of Machine Learning (ML), Deep Learning (DL), and Neural Networks (NN). A range of publicly available datasets have been used to evaluate evaluation metrics. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
A distributed randomization framework for privacy preservation in big data
The privacy preservation is a big challenge for data generated from various sources such as social networking sites, online transaction, weather forecast to name a few. Due to the socialization of the internet and cloud computing pica bytes of unstructured data is generated online with intrinsic values. The inflow of big data and the requirement to move this information throughout an organization has become a new target for hackers. This data is subject to privacy laws and should be protected. The proposed protocol is one step toward the security in case of above circumstances where data is coming from multiple participants and all are concerned about individual privacy and confidentiality. 2014 IEEE. -
Secure multi-party computation protocol using asymmetric encryption
Privacy preservation is very essential in various real life applications such as medical science and financial analysis. This paper focuses on implementation of an asymmetric secure multi-party computation protocol using anonymization and public-key encryption where all parties have access to trusted third party (TTP) who (1) doesn't add any contribution to computation (2) doesn't know who is the owner of the input received (3) has large number of resources (4) decryption key is known to trusted third party (TTP) to get the actual input for computation of final result. In this environment, concern is to design a protocol which deploys TTP for computation. It is proposed that the protocol is very proficient (in terms of secure computation and individual privacy) for the parties than the other available protocols. The solution incorporates protocol using asymmetric encryption scheme where any party can encrypt a message with the public key but decryption can be done by only the possessor of the decryption key (private key). As the protocol works on asymmetric encryption and packetization it ensures following: (1) Confidentiality (Anonymity) (2) Security (3) Privacy (Data). 2014 IEEE. -
Impact of Expert Academic Teaching Quality and its Performance Based on BiLSTM-Deep CNN Network
Undergraduate and postgraduate students from eight different departments at a UK institution participated in organized conversations about the impact of teachers' research activities on their education. In both samples, positive responses greatly outnumbered negative ones. There was an increase in positive feedback on professors' research when the overall quantity and quality of research in a specific field (as measured by Research Assessment Exercise [RAE] ratings) improved. Undergraduate samples with higher RAE scores were more likely to have negative feedback on research than graduate student samples. Both graduate and undergraduate students agreed that lecturers' research increased the instructor's credibility, relevance, and knowledge, as well as piqued and maintained their own interest, engagement, and drive. Data processing, feature selection, and model training are the first steps in the proposed approach. The data are changed from their raw form into a form suitable for academic use during the data pre-processing phase. They are employing Information Gain and Symmetric Uncertainty for feature selection. Following the feature selection process, the models are trained using BiLSTM-CNN. Both the BiLSTM and the CNN methods are inferior to the proposed method. 2023 IEEE. -
Predicting Work Environment and Job Environment Among Employees using Transfer Learning Approach
Today's enterprises face numerous challenges as a result of the world's rapid evolution. Maintaining a content workforce is crucial to a company's success and survival in today's fast-paced business environment. The efficacy, productivity, efficiency, and dedication of the company's staff are directly associated with the company's capacity to meet the needs of its employees in the workplace. The focus of this system is to identify the factors that contribute to a satisfying work environment for the participants. Preprocessing, feature selection, and model training are the first three steps in the suggested methodology. Data mining systems should get in the habit of normalizing data as a preliminary processing step. The multiple elements assessing company culture and worker satisfaction were consolidated using Principal Components Analysis (PCA) in the feature selection phase. Once features have been selected, KNN-SVM is utilized for model training. When compared to the two most popular alternatives, SVM and KNN, the proposed technique performs better. 2023 IEEE. -
A study on impact of Green human resource management practice on its sector - Chennai
The implementation of important plans and choices is a crucial part of the function that Human Resource Management plays in the operation of an organisation throughout its life. This makes it possible for the organisation to continue to cultivate and sustain its culture of supportability. In order to bring about sustainable success via Human Resource Management, the fundamental thinking process behind Green Human Resource Management is to motivate it. Green HRM (Green Human Resource Management) initiatives are currently in progress and are gaining traction among workers and representatives. These initiatives are embracing new work methodologies such as energy conservation, the implementation of E-HRM, telecommuting, and, most importantly, avoiding potential risks to protect the mother climate. Over the course of the last several years, the rate of worry on a worldwide scale has begun to quicken. 2024 Author(s). -
An Improved Artificial Intelligence based Service Quality to Increase Customer Satisfaction and Customer Loyalty in Banking Sector
This study clarifies and determines how service quality affects customer loyalty and reliability. The support of quality in the open and private financial sphere and understanding of its connection to customer loyalty and conduct goal Utilizing an upgraded SERVQUAL (BANQUAL) tool with 26 items, the review was conducted among 802 bank customers. The social goal battery was used to estimate the clients' expected conduct. The expert used a seven-point Likert scale to assess the standard and saw service quality (implementation), as well as the social expectations of the clients. The most reliable tool to quantify the conceptualization of the differentiation score is the BANQUAL instrument. It is used to evaluate gaps in service between assumptions and perceptions of service quality. The SERVQUAL instrument is modified to make it suitable in the banking industry. Questions on parking at the bank, the variety of things and programmes available, and the banks' genuine efforts to address customer grievances are added to the instrument (Responsiveness). The writing audit was sufficiently compiled from many sources, reflecting both an Indian and foreign environment. The postulation included several hypotheses then examined using structural equation modelling. To meet the exploration goals, the views were tested using the products AMOS and SISS. The data were analysed using corroborative and explorative element research to confirm the BANQUAL instrument's dependability and legitimacy of the financial business execution and service quality aspects. The resulting CFA model value exhibits excellent psychometric qualities. Professional businesses and clients increasingly use artificial intelligence support specialists (AISA) for management. However, no measure measuring the support quality can fully capture the essential factors affecting AISA service quality. By developing a scale for evaluating the quality of AISA service, this study seeks to solve this deficiency(AISAQUAL). 2023 IEEE. -
A Novel Approach to Optimizing Third-Party Logistics Growth through IT, Big Data, and Machine Learning for Superior Supply Chain Management
The purpose of this research is to explore proper development prospects of 3PL business, particularly focusing on the utilization of Information Technology and big data technologies for improving the solidity of supply chains. The change of the industry that started from the provision of services and then became an integrated solution implies the rising role of IT as one of the means for supply chain improvement. Based on the market study and investigation of customers' behaviors, as well as the contexts of the 3PL industry of the India, this research outlines how the IT and big data analytics can contribute to the operations improvement and innovation of the 3PL. Besides, this paper aims at finding out whether the Big Data analytics can enhance the competitiveness of third party logistics providers in a volatile market. 2024 IEEE. -
E-Commerce in Indian Retail Industry: Its Proliferation and Performance
The growth of the e-commerce industry in India has seen a multitude of growth since the growth of netizens in India has reached its peak post the demonetization in Indian economy. Research in e-commerce acts as a catalyst for studies in the field of digital innovation. The developments made by India in the field of e-commerce are notable by the world. India has made extensive use of the advancement in the field of technology. Recent years have seen a transformation in the way Indian shops and exchanges grew from cash mode payments to digital mode of service delivery and payments. This research is focused on studying the parameters that have acted as impetus in the expansion of e-commerce in the Indian retail sector. 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Gesture based Real-Time Sign Language Recognition System
Real-Time Sign Language Recognition (RTSLG) can help people express clearer thoughts, speak in shorter sentences, and be more expressive to use declarative language. Hand gestures provide a wealth of information that persons with disabilities can use to communicate in a fundamental way and to complement communication for others. Since the hand gesture information is based on movement sequences, accurately detecting hand gestures in real-time is difficult. Hearing-impaired persons have difficulty interacting with others, resulting in a communication gap. The only way for them to communicate their ideas and feelings is to use hand signals, which are not understood by many people. As a result, in recent days, the hand gesture detection system has gained prominence. In this paper, the proposed design is of a deep learning model using Python, TensorFlow, OpenCV and Histogram Equalization that can be accessed from the web browser. The proposed RTSLG system uses image detection, computer vision, and neural network methodologies i.e. Convolution Neural Network to recognise the characteristics of the hand in video filmed by a web camera. To enhance the details of the images, an image processing technique called Histogram Equalization is performed. The accuracy obtained by the proposed system is 87.8%. Once the gesture is recognized and text output is displayed, the proposed RTSLG system makes use of gTTS (Google Text-to-Speech) library in order to convert the displayed text to audio for assisting the communication of speech and hearing-impaired person. 2022 IEEE. -
Sentiment Analysis on Educational Tweets: A Case of National Education Policy 2020
Due to COVID-19 pandemic lockdowns, the transition from traditional class-room-based approaches, there has been rise in online education. There is a growing need to adopt the best global academic and innovative practices and implement the National Education Policy-2020 (NEP) in Indian education. This study uses a dataset, NEPEduset, created by gathering tweets about education. An attempt has been made in this study to examine the tweets by preprocessing, generating labels or sentiments using standard tools and libraries in Python language, applying and comparing various machine learning (ML) algorithms. ML approaches are powerful and used in various applications ranging from sentiment analysis, text analysis, natural language processing (NLP), image processing, object detection. ML methods are widely used in sentiment analysis tasks and text annotations. This work uses Text-Blob, Valence Aware Dictionary for Sentiment Reasoning (VADER), and a Customized method, SentiNEP to analyze the sentiment score of tweets' text. SentiNEP method is shown is produce better results for various experiments conducted for the dataset, NEPEduset. Various supervised ML models have been applied for text classification of user sentiment. Word2Vec feature extraction technique has been applied to build and evaluate the models. Performance metrics such as precision, accuracy, F1 score and recall have been used to evaluate the ML models. The results reveal that the support vector machine and random forest classifiers achieve higher accuracy with Word2Vec. The performance results have been compared with VADER, TextBlob and SentiNEP. It has been found that the SentiNEP method produces better results. 2023 IEEE. -
Privacy Optimization in Sensors Based Networks With Industrial Processes Management
The Internet of Things (IoT) also known as IoT has the potential that is required to revolutionize industries, this has been discussed in this research article. Advancements in technology have made devices affordable, efficient and reliable. Different sectors have already started to incorporate these devices into their operations to boost productivity, to minimize failure and downtime. They also use it to optimize resource utilization which is also an important factor. However, the use of these devices also has some security challenges which need to be handled. This research paper proposes a security model specifically designed for process management in the industries. The goal of this model is to find the vulnerabilities, to minimize the risks and threats. Also ensuring integrity, confidentiality and availability of processes is a part of the goal. This paper gives evidence from its implementation and trial apart from its explanation. During the implementation phase, the sensitive data achieved a 100% encryption rate, for protection. Also, integrity checks were conducted on 99.8% of data to guarantee data integrity. 2023 IEEE. -
Empirical Study on Categorized Deep Learning Frameworks for Segmentation of Brain Tumor
In the medical image segmentation field, automation is a vital step toward illness detection and thus prevention. Once the segmentation is completed, brain tumors are easily detectable. Automated segmentation of brain tumor is an important research field for assisting radiologists in effectively diagnosing brain tumors. Many deep learning techniques like convolutional neural networks, deep belief networks, and others have been proposed for the automated brain tumor segmentation. The latest deep learning models are discussed in this study based on their performance, dice score, accuracy, sensitivity, and specificity. It also emphasizes the uniqueness of each model, as well as its benefits and drawbacks. This review also looks at some of the most prevalent concerns about utilizing this sort of classifier, as well as some of the most notable changes in regularly used MRI modalities for brain tumor diagnosis. Furthermore, this research establishes limitations, remedies, and future trends or offers up advanced challenges for researchers to produce an efficient system with clinically acceptable accuracy that aids radiologists in determining the prognosis of brain tumors. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Comparison between Symmetrical and Asymmetrical 13 Level MLI with Minimal Switches
Voltage source converters that are dependable and of the highest quality are offered by Multilevel Inverter to convert DC power systems to the AC power grid. One of the intriguing technologies in the field of power electronics are multilevel inverters (MLIs) in various configurations. It is also possible to integrate a few DC sources in MLIs to create a singular output, reducing the number of isolated inverters, the overall component count, and losses. MLIs are the top converters in many applications because to their capacity for medium and high-power applications. In order to produce the levels for the stair case wave shape, this research work introduces a new configuration module for asymmetrical multilevel in which capacitors are employed as DC linkages. With two unequal DC sources, the suggested Box -type modular structure will produce more voltage levels. It is useful for a variety of renewable applications since it has two back-to-back T-type inverters and minimal parts. This module contains this structured method to lessen the Total Harmonic Distortion (THD) rating and raise the quality of the sinusoidal output voltage. 2022 IEEE