Browse Items (5511 total)
Sort by:
-
A Multifaceted Approach at Discerning Redditors Feelings Towards ChatGPT
Generative AI platforms like ChatGPT have leapfrogged in terms of technological advancements. Traditional methods of scrutiny are not enough for assessing their technological efficacy. Understanding public sentiment and feelings towards ChatGPT is crucial for pre-empting the technologys longevity and impact while also providing a silhouette of human psychology. Social media platforms have seen tremendous growth in recent years, resulting in a surge of user-generated content. Among these platforms, Reddit stands out as a forum for users to engage in discussions on various topics, including Generative Artificial Intelligence (GAI) and chatbots. Traditional pedagogy for social media sentiment analysis and opinion mining are time consuming and resource heavy, while lacking representation. This paper provides a novice multifrontal approach that utilises and integrates various techniques for better results. The data collection and preparation are done through the Reddit API in tandem with multi-stage weighted and stratified sampling. NLP (Natural Language processing) techniques encompassing LDA (Latent Dirichlet Allocation), Topic modelling, STM (Structured Topic Modelling), sentiment analysis and emotional analysis using RoBERTa are deployed for opinion mining. To verify, substantiate and scrutinise all variables in the dataset, multiple hypothesises are tested using ANOVA, T-tests, KruskalWallis test, Chi-Square Test and MannWhitney U test. The study provides a novel contribution to the growing literature on social media sentiment analysis and has significant new implications for discerning user experience and engagement with AI chatbots like ChatGPT. 2024 Padarha et al., licensed to EAI. -
A multilevel analysis of hiv1-miR-H1 miRNA using KPCA, K-means, Random Forest and online target tools
The goal of this study was to propose a workflow using machine learning to identify and predict the miRNA targets of Human Immunodeficiency virus 1. miRNAs which is ~21 nt long are attained from larger hairpin RNA precursors and is maintained in the secondary structure of their precursor relatively than in primary chain of successions. The proposition approach for identification and prediction of miRNA targets in hiv1-miR-H1is based on secondary structure and E-value through machine learning. Data Linearity of Length and e-value for sequence match with hiv1-mir-H1 is verified using Kernel PCA. miRNA targets were grouped into clusters thereby indicating similar targets using K-means algorithm. Classification model using Random Forest was implemented regards to each secondary features variable considering feature relevance. A learning methodology is put forward that assimilate and integrate the score returned by various machine learning algorithms to predict cellular hiv1-miR-H1 targets. Gene targets results using TargetScan, miRanda, PITA, DIANA microT and RNAhybrid are also explored for multiple parameters. 2021 Inderscience Enterprises Ltd. -
A Multiplier-Less FRM-Based Reconfigurable Regulated Bank of Filter for Spectrum Hole Detection in IoT
A promising solution for the detection of spectrum holes in the Internet of Things networks is the cognitive radio (CR) system, which is used to identify spectrum holes effectively. The intention of this work is to design a low-complexity Reconfigurable Regulated Bank of Filter (RRBF) structure for spectrum hole detection in IoT networks. The RRBF structure is designed by utilizing the Frequency Response Masking (FRM) approach and the Cosine Modulation Technique (CMT). Using the RRBF structure, multiple sharp non-uniform channels are generated for efficient spectrum hole detection in IoT networks. With the aid of an example, the performance and computational complexity of the RRBF structure are demonstrated. The result shows that the RRBF structure has a fewer multipliers than other existing methods. To obtain hardware-efficient realization, the RRBF structure is made of multiplier-less by incorporating Canonical Signed Digit (CSD), Multi-Objective Artificial Bee Colony (MOABC), and Shift Inclusive Differential Coefficients (SIDC) with Common Sub-expression Elimination (CSE) optimization techniques. 2024 IETE. -
A Neuro Fuzzy with Improved GA for Collaborative Spectrum Sensing in CRN
Cognitive Radio Networks (CRN) have recently emerged as an important solution for addressing spectrum constraint and meeting the stringent criteria of future wireless communication. Collaborative spectrum sensing is incorporated in CRNs for proper channel selection since spectrum sensing is a critical capability of CRNs. According to this viewpoint, this study introduces a new Adaptive Neuro Fuzzy logic with Improved Genetic Algorithm based Channel Selection (ANFIGA-CS) technique for collaborative spectrum sensing in CRN. The suggested methods purpose is to find the best transmission channel. To reduce spectrum sensing error, the suggested ANFIGA-CS model employs a clustering technique. The Adaptive Neuro Fuzzy Logic (ANFL) technique is then used to calculate the channel weight value and the channel with the highest weight is selected for transmission. To compute the channel weight, the proposed ANFIGA-CS model uses three fuzzy input parameters: Primary User (PU) utilization, Cognitive Radio (CR) count and channel capacity. To improve the channel selection process in CRN, the rules in the ANFL scheme are optimized using an updated genetic algorithm to increase overall efficiency. The suggested ANFIGA-CS model is simulated using the NS2 simulator and the results are investigated in terms of average interference ratio, spectrum opportunity utilization, average throughput, Packet Delivery Ratio (PDR) and End to End (ETE) delay in a network with a variable number of CRs. 2022, Tech Science Press. All rights reserved. -
A new algorithm with its randomness and effectiveness against statistical tests in data encryption
In the world where security is one of the main concern, we are still not able to make our data secure. Privacy is one of the major concerns in todays world, where all the organization are dealing with data leak problem, data theft, data intrusion. We came up with a mathematical model to encrypt and decrypt data securely. In this paper we have came up with a technique to encrypt and decrypt data using non-deterministic random numbers and generating two cipher text for each data unit (character) and verified the randomness of our cipher text using chi-square test, Gaps test. IJSTR 2020. -
A new assessment of quantum key distribution, attenuation and data loss over foggy, misty and humid environment
Quantum encryption is a method of key transfer in cryptography by using quantum entanglement of photons. The real power of quantum entanglement is instantaneous communication that is non intercept able. The advantage of quantum encryption method is, it can be incorporated with conventional encryption methods safely. The quantum cryptography can replace conventional key exchange mechanism with the polarized photons using channels like optic fiber cables. Quantum cryptographic can also provide far and secure data communication. The present day experiments clearly proved that the quantum cryptography can be implemented through medium like optic fiber cable or air. But the distance of transmission through the air is limited by rule of line of sight propagation. The quantum key distribution will have uses in different types of communication between distant parts of earth. So this paper discussing various aspects of Quantum key distribution and successfully calculated polarized photon loss during transmission of Quantum cryptography link, while using in various type of atmospheric conditions like Mist Fog Haze. Also successfully calculated probability of single polarized photon missing by successfully utilizing the Light transmission characteristics and power measurements in various Atmospheric conditions. 2018, UK Simulation Society. All rights reserved. -
A new combinational technique in image steganography
Internet is used for exchanging information. Sometimes it is needed to transmit confidential data via internet. Here the authors use image steganography to pass confidential data within a cover image. To construct the algorithm, they take the combinational help of particle swarm optimization (PSO), bi-orthogonal wavelet transform (BWT), and genetic algorithm (GA). They use PSO to take the enhanced version of cover image. They use BWT to choose the selective sub bands of cover image and we utilize GA to select a particular stego image among a set of stego images. Thus, an innovative technique of image steganography has been made to transmit confidential data via cover image generating stego image. This combinational approach of image steganography is quite safe for confidential data transmission and makes it hard for the attackers to retrieve the confidential data. 2021 IGI Global. All rights reserved. -
A new computational technique for the analytic treatment of time-fractional EmdenFowler equations
This paper presents the study of fractional EmdenFowler (FEF) equations by utilizinga new adequate procedure, specifically the q-homotopy analysis transform method (q-HATM). The EF equation has got greater significance in both physical and mathematical investigation of capillary and nonlinear dispersive gravity waves. The projected technique is tested by considering four illustrations of the time-fractional EF equations. The q-HATM furnish ?, known as an auxiliary parameter, by the support of ? we can modulate the various stages of convergence of the series solution. Additionally, to certify the resolution and accurateness of the proposed method we fitted the suitable numerical simulations. The redeem results guarantee that the proposed process is more convincing and scrutinizes the extremely nonlinear issues emerging in the field of science and engineering. 2021 International Association for Mathematics and Computers in Simulation (IMACS) -
A New Economics Awaits Us
This article attempts to look into the concept of othering in the context of urban development. The major motivation for the initiation of this article came after reading Dipankar Guptas book review titled A New Sociology Awaits Us (EPW, 26 December 2020), which mainly concentrated on urban affairs. 2022 Economic and Political Weekly. All rights reserved. -
A new extension of hesitant fuzzy set: An application to an offshore wind turbine technology selection process
Wind energy is an energy source that is naturally clean, safe and cheap. It comes from a variety of sources. The electric energy generated by a wind turbine manifests as kinetic energy throughout the earth. The energy received from the wind is clean and is permanently available and can be generated forever. Turbine characteristics also have an impact on wind energy production. The turbine properties within a wind farm are important in estimating the load on power generation and wind turbine energy. The amount of energy released is calculated according to the type of the turbine model applied. In many situations, the choices of turbine model can incur various vague and complicated hesitation situations. To manage this situation, a hesitant fuzzy set with the Multi Criteria Decision Making (MCDM) is used. In the present research, the newly proposed Normal Wiggly Hesitant Fuzzy-Criteria Importance Through Intercriteria Correlation (NWHF-CRITIC) and Normal Wiggly Hesitant Fuzzy-Multi Attribute Utility Theory (NWHF-MAUT) methods were employed to rank turbine models based on quality, power level, voltage, and capacity. As part of this process, the NWHF method was utilized to extract and gather deeper information from the decision-makers. 2021 The Authors. IET Renewable Power Generation published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. -
A New Facile Iodine-Promoted One-Pot Synthesis of Dihydroquinazolinone Compounds
A one-pot iodine catalyzed reaction has been developed for the preparation of dihydroquinazolinones from isatoic anhydride, enaminones, and amines in modest to good yields. The reaction has been screened in various catalysts and solvents and a gram scale experiment has been performed based on the optimum conditions. A possible mechanism has been proposed based on the control experiments. The reaction has been checked with broad range of substrates. 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim -
A new facile synthesis of (2S,5S)-5-hydroxypipecolic acid hydrochloride
A simple and efficient synthesis of (2S,5S)-5-Hydroxypipecolic acid hydrochloride is reported. The key features of the synthesis involve the asymmetric reduction of ketone using (S)-CBS oxazaborolidine and the use of commercially available methyl pyroglutamate as a starting material.. 2022 Taylor & Francis Group, LLC. -
A New Facile Ultrasound-Assisted Magnetic Nano-[CoFe2O4]-Catalyzed One-Pot Synthesis of Pyrano[2,3-c]pyrazoles
Pyrano[2,3-c]pyrazole derivatives have been synthesized through a one-pot multicomponent condensation of various aldehydes, dialdehydes, and ketones with malononitrile, ethyl acetoacetate, hydrazine hydrate (or phenylhydrazine) in the presence of magnetic nano-[CoFe2O4] catalyst under ultrasonic irradiation. The catalyst can be recovered using an external magnet and used repeatedly. 2019, Pleiades Publishing, Ltd. -
A new framework for contour tracing using Euclidean distance mapping
In this paper, a new fast, efficient and accurate contour extraction method, using eight sequential Euclidean distance map and connectivity criteria based on maximal disk, is proposed. The connectivity criterion is based on a set of point pairs along the image boundary pixels. The proposed algorithm generates a contour of an image with less number of iterations compared to many of the existing methods. The performance of the proposed algorithm is tested with a database of handwritten character images. In comparison to two standard contour tracing algorithms (the Moore method and the Canny edge detection method), the proposed algorithm found to give good quality contour images and require less computing time. Further, features extracted from contours of handwritten character images, generated using the proposed algorithm, resulted in better recognition accuracy. Copyright 2021 Inderscience Enterprises Ltd. -
A new lightweight data security system for data security in the cloud computing
In recent decades, data has proved indispensable to all facets of human existence. The development of several applications has resulted in the exponential expansion of data. This information can be encrypted and stored in secure areas. Cloud computing is the technology that can be used to store these massive data sets. The article suggests a Cloud-based Data Security System (C-DSS) that employs a five-tiered trust model for cloud-edge data-sharing architectures. The data owner can select an appropriate trust level and Cyber Threat Information (CTI) sanitization procedure before releasing CTI for analytic strategy. In addition, this cleansing method is conducted either by an end device or by the cloud service supplier, based on the organization's degree of confidence in latter. Research presents the trust architecture, cloud architecture, and installation methodology, all of which are intended to meet widest variety of needs for exchanging secret CTI information. The testing findings high degree of data security and an evident improvement in terms of cypher processing time and security services when compared to the encryption systems that are most often employed in cloud technology. In conclusion, research briefly outlines development and evaluation performed so far by pilot applications confirming the architecture. 2023 The Authors -
A new meta-heuristic pathfinder algorithm for solving optimal allocation of solar photovoltaic system in multi-lateral distribution system for improving resilience
A new meta-heuristic Pathfinder Algorithm (PFA) is adopted in this paper for optimal allocation and simultaneous integration of a solar photovoltaic system among multi-laterals, called interline-photovoltaic (I-PV) system. At first, the performance of PFA is evaluated by solving the optimal allocation of distribution generation problem in IEEE 33- and 69-bus systems for loss minimization. The obtained results show that the performance of proposed PFA is superior to PSO, TLBO, CSA, and GOA and other approaches cited in literature. The comparison of different performance measures of 50 independent trail runs predominantly shows the effectiveness of PFA and its efficiency for global optima. Subsequently, PFA is implemented for determining the optimal I-PV configuration considering the resilience without compromising the various operational and radiality constraints. Different case studies are simulated and the impact of the I-PV system is analyzed in terms of voltage profile and voltage stability. The proposed optimal I-PV configuration resulted in loss reduction of 77.87% and 98.33% in IEEE 33- and 69-bus systems, respectively. Further, the reduced average voltage deviation index and increased voltage stability index result in an improved voltage profile and enhanced voltage stability margin in radial distribution systems and its suitability for practical applications. 2021, The Author(s). -
A new numerical investigation of fractional order susceptible-infected-recovered epidemic model of childhood disease
The susceptible-infected-recovered (SIR) epidemic model of childhood disease is analyzed in the present framework with the help of q-homotopy analysis transform method (q-HATM). The considered model consists the system of three differential equations having fractional derivative, and the non-linear system exemplifies the evolution of childhood disease in a population and its influence on the community with susceptible, infected and recovered compartment. The projected method is a mixture of q-homotopy analysis method and Laplace transform. Two distinct explanatory cases are considered, and corresponding simulations have been demonstrated in terms of plots for different value of the order. The present investigation elucidates that the projected both derivative and technique play a vital role in the analysis and illustrate the behaviour of diverse mathematical models described with differential equations in human disease. 2021 THE AUTHORS -
A new optimal design and analysis method based on MADM for MEMS products development
Abstract This paper presents an optimum design method to support the total micro-electromechanical systems (MEMS) product/device optimization, and its evaluation at the conceptual stage itself using the multiple attribute decision making method. In the traditional MEMS product development cycle, simulation and design using software tools are very important due to the knowledge limitation and complexity in design, fabrication, and packaging processes. The available tools are time consuming and relay on trial and error to achieve an optimum solution. The proposed method simplifies the relationship between parameters of design, fabrication, materials, packaging, and the performance of the MEMS product. The methodology is explained with the help of design flow diagram and time chart. A MEMS-based radio frequency (RF) power sensor is designed and the methodology is demonstrated. The proposed sensitivity analysis method is more effective and less time consuming than traditional techniques. Sensitivity analysis is carried out by varying the thickness of the signal conductor. The results of RF power sensor with insertion loss 0.428 dB, reflection loss 25.956 and voltage standing wave ratio of 1.106 at 1.5 GHz are reported. Springer-Verlag London Limited 2012. -
A New Series Solution Applicable to a Class of Boundary Layer Equations with Exponential Decay in Solution
A new series solution for the coupled nonlinear boundary value problem (BVP) of the FalknerSkan-type, resulting from the use of the boundary layer approximation to a mixed convective flow is obtained. The solution domain is transformed from the semi-infinite interval of physical interest to the unit interval by using the transformation z= 1 - e-?. The coupled nonlinear BVP is converted into an equivalent initial value problem (IVP) by supplying appropriate initial conditions. Series solution of the equivalent IVP is obtained in powers of 1 - e-? with assistance from the NewtonRaphson method. Convergence of the series is assured by the very design of the series as confirmed by the DombSykes plots and the plots of partial sums. The results of the series solution compare well with the numerical results obtained by the shooting method based on the RungeKuttaFehlberg45 and NewtonRaphson methods. The novelty of the methodology lies in the construction of a new series solution for a class of problems with exponential decay in their solution. Such a work has not been reported before. 2020, Springer Nature India Private Limited. -
A new shape of the supply chain during the COVID-19 pandemic
Purpose: The COVID-19 pandemic has created a new normal for international business (IB) activities, leaving them pondering their next steps. The decreasing effectiveness of current vaccines to protect individuals against new variants have created uncertainty on how to respond to the new waves of the COVID-19 infection. This study aims to empirically assesses how IBs perceive the unfolding challenges in the supply chain due to the pandemic and the solutions. Design/methodology/approach: The survey data is obtained from 166 logistics professionals in Hong Kong and India. Findings: The results reveal that returns on investment, logistics, delays and imports are the most affected areas. The most often recommended solutions for supply chain management (SCM) include using local manufacturing capabilities, analytics and automation, offering better customer service, providing more effective transportation means, ensuring diligence around optimization and focusing on sustainability. Originality/value: The findings of this study help to improve supply chain operations. This study also provides recommendations for changes to SCM in response to the new normal. 2022, Emerald Publishing Limited.