Browse Items (5511 total)
Sort by:
-
A new stepwise method for selection of input and output variables in data envelopment analysis
Data envelopment analysis (DEA) is one of the widely accepted optimization technique uses to measure the relative efficiency of organizational units where multiple inputs and outputs are present. The significance of DEA results depends on the variables selected for DEA modelling. One of the main challenges in data envelopment analysis modelling is of identify the significant input and output variables for DEA modelling. In this study, we propose an enhanced stepwise method to identify the significant and insignificant input and output variable by reducing the iterations process in stepwise method. The statistical significance of the input and output variables evaluated using the statistical methods: Least significance difference (LSD), and Welchs statistics. The proposed method applied to the Indian banking sector and the results have shown that the proposed model significantly identified the significant and insignificant input and output variables with least loss of information. 2021 the author(s). -
A node deployment mechanism for energy-efficient routing in heterogeneous wireless sensor networks
Military applications are the primary concern of the wireless sensor networks (WSNs). Efficient target object/event monitoring is a primary goal of military systems in unattended and unmanned areas. Heterogeneous wireless sensor network (HTWSN) is an emerging network for efficient enemy object monitoring in sensitive areas of low cost. The performance of HTWSN is mainly depends on the quality of data transmission and better network lifetime. However, after deployment of HTWSN, the network can experience a serious problem known as path failure. Path failure occurs due to high route overhead, which result poor-quality data transmission and increase the node energy consumption. Path failure results route rediscovery and data packet retransmission. The proposed node deployment mechanism for HTWSN has been minimized the route overhead and improved the path quality, quality data packet transmission by avoid the path failure. The proposed node deployment strategy has given better results in terms of 20 % low node energy consumption, 56 % lower route overhead, 22 % higher network lifetime and 17 % higher data packet delivery ratio than the existing node deployment mechanism of IMCC protocol. 2005 - 2016 JATIT & LLS. All rights reserved. -
A note on ?(k)-colouring of the Cartesian product of some graphs
The chromatic number, x(G) of a graph G is the minimum number of colours used in a proper colouring of G. In an improper colouring, an edge uv is bad if the colours assigned to the end vertices of the edge is the same. Now, if the available colours are less than that of the chromatic number of graph G, then colouring the graph with the available colours lead to bad edges in G. The number of bad edges resulting from a ? (k)-colouring of G is denoted by bk(G). In this paper, we use the concept of (k)-colouring and determine the number of bad edges in Cartesian product of some graphs. 2022 by the authors. -
A Note on J-colouring of Jahangir Graphs
In this paper, we discuss J-colouring of the family of Jahangir graphs.Note that the family of Jahangir graphs is a wide ranging family of graphs which by a generalised definition includes wheel graphs. We characterise the subset of Jahangir graphs which admit a J-colouring. 2019, The National Academy of Sciences, India. -
A note on perfect lucky k-colourable graphs
This paper presents the notion of perfect Lucky k-colouring. Basic conditions for a perfect Lucky k-colourable graph are presented. Application thereof is then presented by obtaining the Lucky 4-polynomials for all connected graphs G on six vertices with ten edges. The chromatic number of these connected graphs is ?(G) = 3 or 4. For k = max{?(G): 3 or 4g = 4, it is possible to find Lucky 4-polynomials for all graphs on six vertices and ten edges. The methodology improves substantially on the fundamental methodology such that, vertex partitions begin with Lucky partition forms immediately. Finally, further problems for research related to this study are presented. 2020, International Scientific Research Publications. All rights reserved. -
A Note on the Rainbow Neighbourhood Number of Certain Graph Classes
A rainbow neighbourhood of a graph G is the closed neighbourhood N[v] of a vertex v? V(G) which contains at least one colored vertex of each color in the chromatic coloring C of G. Let G be a graph with a chromatic coloring C defined on it. The number of vertices in G yielding rainbow neighbourhoods is called the rainbow neighbourhood number of the graph G, denoted by r ? (G). In this paper, rainbow neighbourhood number of certain graph classes are discussed. 2018, The National Academy of Sciences, India. -
A Note on the Significance of Quartic Autocatalysis Chemical Reaction on the Motion of Air Conveying Dust Particles
Little is known on the significance of fluid-particle interaction for velocity and temperature as in the case of centrifuge for separating particles of different types, launching of rockets, and motion of space shuttle through the air when there exist chemical reactions between the flow and the wall. The aim of this study is not only to explore the significance of quartic autocatalytic chemical reaction on the flow of dusty fluid in which the transmission of energy in form of electromagnetic is nonlinear but also to unravel the effects of buoyancy on the velocity of the dust and temperature of the dust. The nonlinear partial differential equations that model the transport phenomenon was transformed, nondimensionalised, and parameterised using suitable variables. The corresponding boundary value problems were converted to an initial value problem using the method of superposition and solved numerically. The outcome of the study indicates that enhancement of buoyancy is a yardstick to increase the vertical velocity, horizontal velocity, and shear stress within the fluid domain; increase the velocity of the dust particles; increase the temperature distribution across the flow of dusty fluid; increase the concentration of dusty fluid; and decrease the concentration of the catalyst. It is worth noticing that utmost velocity of the dust occurs at a minimum value of fluid-particle interaction for velocity in the flow over a larger thickness of paraboloid of revolution. 2019 Walter de Gruyter GmbH, Berlin/Boston 2019. -
A novel African buffalo based greedy routing technique for infrastructure and cluster based communication in vehicular ad-hoc network
In this modern era, the wire free replica is utilized Vehicular Ad hoc Networks (VANETs) to converse each other. Also, the VANET paradigm not required any specific fixed infrastructure. Furthermore, the vehicle in VANET framework is movable like as mobile nodes. Also, the wireless connectivity between the vehicular nodes is not stable in all cases, it often changes their structure. Research have recommended various responses to control these issues and furthermore to lessen blockage in VANET environment. Therefore, the infrastructure of a network changes frequently which results in communication overheads, energy consumption and lifetime of the nodes. Consequently, in this paper a novel African Buffalo based Greedy Routing (ABGR) technique is to improve the performance of infrastructure and cluster based communication of the node. Moreover, the routing overhead and infrastructure communication can be enhanced by this proposed protocol. Consequently, the energy consumption solution is enhanced based on the CH. Sequentially, the proposed routing protocol is compared with existing protocols in terms of end-to-end delay, throughput, Data transmission Ratio (DTR), and energy consumption and so on. Therefore, it shows that the energy utilization and lifetime of the nodes in the proposed network has been enhanced. 2021 Little Lion Scientific. -
A novel AI model for the extraction and prediction of Alzheimer disease from electronic health record
Dark data is an emerging concept, with its existence, identification, and utilization being key areas of research. This study examines various aspects and impacts of dark data in the healthcare domain and designs a model to extract essential clinical parameters for Alzheimer's from electronic health records (EHR). The novelty of dark data lies in its significant impact across sectors. In healthcare, even the smallest data points are crucial for diagnosis, prediction, and treatment. Thus, identifying and extracting dark data from medical data corpora enhances decision-making. In this research, a natural language processing (NLP) model is employed to extract clinical information related to Alzheimer's disease, and a machine learning algorithm is used for prediction. Named entity recognition (NER) with SpaCy is utilized to extract clinical departments from doctors' descriptions stored in EHRs. This NER model is trained on custom data containing processed EHR text and associated entity annotations. The extracted clinical departments can then be used for future Alzheimer's diagnosis via support vector machine (SVM) algorithms. Results show improved accuracy with the use of extracted dark data, highlighting its importance in predicting Alzheimer's disease. This research also explores the presence of dark data in various domains and proposes a dark data extraction model for the clinical domain using NLP. 2025 Institute of Advanced Engineering and Science. All rights reserved. -
A Novel AI-Based Stock Market Prediction Using Machine Learning Algorithm
The time series forecasting system can be used for investments in a safe environment with minimized chances of loss. The Holt-Winters algorithm followed various procedures and observed the multiple factors applied to the neural network. The final module helps filter the system to predict the various factors and provides a rating for the system. This research work uses real-time dataset of fifteen stocks as input into the system and, based on the data, predicts or forecasts future stock prices of different companies belonging to different sectors. The dataset includes approximately fifteen companies from different sectors and forecasts their results based on which the user can decide whether to invest in the particular company or not; the forecasting will give an accurate result for the customer investments. 2022 Iyyappan. M et al. -
A novel and secured bitcoin method for identification of counterfeit goods in logistics supply management within online shopping
Counterfeit merchandise poses significant challenges for both consumers and retailers. When counterfeit goods infiltrate the market, they damage the trustworthiness and reputation of legitimate companies, leading to negative publicity. Furthermore, these imitations can be harmful, especially in critical sectors like food and pharmaceuticals. To address this issue, it is essential to identify and prevent counterfeit products from reaching consumers. Our proposed solution leverages blockchain technology to authenticate products. Blockchains decentralized database securely stores all transaction data, ensuring transparency and traceability. Additionally, we introduce a tool that records ownership and product details. By utilizing a Quick Response (QR) code, consumers can easily verify the authenticity of a product, thus accessing its manufacturing and ownership information. This approach not only safeguards consumer safety but also protects the reputation and financial performance of legitimate business. Bharati Vidyapeeth's Institute of Computer Applications and Management 2024. -
A Novel Approach for Fractional (1 + 1 ) -Dimensional BiswasMilovic Equation
In this paper, we find the solution for (1 + 1 ) -dimensional fractional Biswas-Milovic (FBM) equation using the q-homotopy analysis transform method (q-HATM). The Biswas-Milovic equation is a generalization of the nonlinear Schringer (NLS) equation. The future scheme is the elegant mixture of q-homotopy analysis scheme with Laplace transform technique and fractional derivative considered in Caputo sense. To validate and illustrate the competence of the method, we examine the projected model in terms of arbitrary order. Moreover, the nature of the attained results have been presented in 3D plots and contour plots for different value of the order. The gained consequences show that, the hired algorithm is highly accurate, easy to implement, and very operative to investigate the nature of complex nonlinear models ascended in science and engineering. 2021, The Author(s), under exclusive licence to Springer Nature India Private Limited. -
A novel approach for integrating cryptography and blockchain into IoT system
The quick advancement of Internet of Things (IoT) emphasizes the significance of cryptography and blockchain ensuring the security of sensitive data and connected devices. Blockchain technology and encryption play key roles in ensuring the security of the expansive IoT network. Blockchain offers decentralized trust, immutability, and transparency to IoT networks and transactions, while encryption serves to protect IoT data from unauthorized access. It is a novel approach for integrating cryptography and blockchain into IoT System, cryptography and blockchain stand out as robust technologies that enhance the security of IoT systems. The implementation of an integrated architecture, along with a strategic integration approach, further strengthens the security measures. This methodology proves valuable for managing and validating digital transactions on decentralized, immutable networks. This work also explores the potential significance of integrating cryptography and blockchain into IoT System, this functions and applications in enhancing IoT security. This methodology introduces encryption techniques tailored for resource-constrained IoT devices, which are essential for ensuring end-to-end security. 2024, Taru Publications. All rights reserved. -
A Novel Approach for Linguistic Steganography Evaluation Based on Artificial Neural Networks
Increasing prevalence and simplicity of using Artificial Intelligence (AI) techniques, Steganography is shifting from conventional model building to AI model building. AI enables computers to learn from their mistakes, adapt to emerging inputs, and carry out human-like activities. Traditional Linguistic Steganographic approaches lack automation, analysis of Cover text and hidden text volume and accuracy. A formal methodology is used in only a few Steganographic approaches. In the vast majority of situations, traditional approaches fail to survive third-party vulnerability. This study looks at evaluation of an AI-based statistical language model for text Steganography. Since the advent of Natural Language Processing (NLP) into the research field, linguistic Steganography has superseded other types of Steganography. This paper proposes the positive aspects of NLP-based Markov chain model for an auto-generative cover text. The embedding rate, volume, and other attributes of Recurrent Neural Networks (RNN) Steganographic schemes are contrasted in this article between RNN-Stega and RNN-generated Lyrics, two RNN methods. Here the RNN model follows Long Short Term Memory (LSTM) neural network. The paper also includes a case study on Artificial Intelligence and Information Security, which discusses history, applications, AI challenges, and how AI can help with security threats and vulnerabilities. The final portion is dedicated to the study's shortcomings, which may be the subject of future research. 2013 IEEE. -
A novel approach for the synthesis of functionalized hydroxylamino derivative of dihydroquinazolinones
A new metal-free and modular approach for the synthesis of various functionalized dihydroquinazolinones has been developed from isatoic anhydride, amines, 4-chloro-N-hydroxybenzimidoylchloride to yield up to 71%. The reaction has been screened in various bases, solvents at different temperatures. The substrate scope of the reaction has been studied with various amines and the possible reaction mechanism for this reaction has also been proposed. 2020, 2020 Taylor & Francis Group, LLC. -
A novel approach in prediction of crop production using recurrent cuckoo search optimization neural networks
Data mining is an information exploration methodology with fascinating and understand-able patterns and informative models for vast volumes of data. Agricultural productivity growth is the key to poverty alleviation. However, due to a lack of proper technical guidance in the agriculture field, crop yield differs over different years. Mining techniques were implemented in different applications, such as soil classification, rainfall prediction, and weather forecast, separately. It is proposed that an Artificial Intelligence system can combine the mined extracts of various factors such as soil, rainfall, and crop production to predict the market value to be developed. Smart analysis and a comprehensive prediction model in agriculture helps the farmer to yield the right crops at the right time. The main benefits of the proposed system are as follows: Yielding the right crop at the right time, balancing crop production, economy growth, and planning to reduce crop scarcity. Initially, the database is collected, and the input dataset is preprocessed. Feature selection is carried out followed by feature extraction techniques. The best features were then optimized using the recurrent cuckoo search optimization algorithm, then the optimized output can be given as an input for the process of classification. The classification process is conducted using the Discrete DBN? VGGNet classifier. The performance estimation is made to prove the effectiveness of the proposed scheme. 2021 by the authors. Licensee MDPI, Basel, Switzerland. -
A novel approach to study generalized coupled cubic SchringerKorteweg-de Vries equations
The Kortewegde Vries (KdV) equation represents the propagation of long waves in dispersive media, whereas the cubic nonlinear Schringer (CNLS) equation depicts the dynamics of narrow-bandwidth wave packets consisting of short dispersive waves. A model that couples these two equations seems intriguing for simulating the interaction of long and short waves, which is important in many domains of applied sciences and engineering, and such a system has been investigated in recent decades. This work uses a modified Sardar sub-equation procedure to secure the soliton-type solutions of the generalized cubic nonlinear SchringerKorteweg-de Vries system of equations. For various selections of arbitrary parameters in these solutions, the dynamic properties of some acquired solutions are represented graphically and analyzed. In particular, the dynamics of the bright solitons, dark solitons, mixed bright-dark solitons, W-shaped solitons, M-shaped solitons, periodic waves, and other soliton-type solutions. Our results demonstrated that the proposed technique is highly efficient and effective for the aforementioned problems, as well as other nonlinear problems that may arise in the fields of mathematical physics and engineering. 2022 -
A novel approach with matrix based public key crypto systems
Here in this model, a new mechanism is used for Public Key Cryptography. A generator matrix is used to generate a field with a large prime number. The generator matrix, prime number and quaternary vector are used as global variables. The Generator Matrix is powered by a private key to generate Public Key. Since the model is based on Discrete Logarithm Problem, which is Hard problem, the proposed algorithm supports the features like Authenticity of users, Security & Confidentiality of data transmitted. Going by the construction of the algorithm, Encryption is being done on blocks of data for which it consumes less computing resources. Going by complexity of the algorithm, the key length needed is about 72 bit lengths to provide sufficient strengths against crypto analysis. 2017 Taru Publications. -
A Novel Artificial Intelligence System for the Prediction of Interstitial Lung Diseases
Interstitial lung disease (ILD) encompasses a spectrum of more than 200 fatal lung disorders affecting the interstitium, contributing to substantial mortality rates. The intricate process of diagnosing ILDs is compounded by their diverse symptomatology and resemblance to other pulmonary conditions. High-resolution computed tomography (HRCT) assumes the role of the primary diagnostic tool for ILD, playing a pivotal role in the medical landscape. In response, this study introduces a computational framework powered by artificial intelligence (AI) to support medical professionals in the identification and classification of ILD from HRCT images. Our dataset comprises 3045 HRCT images sourced from distinct patient cases. The proposed framework presents a novel approach to predicting ILD categories using a two-tier ensemble strategy that integrates outcomes from convolutional neural networks (CNNs), transfer learning, and machine learning (ML) models. This approach outperforms existing methods when evaluated on previously unseen data. Initially, ML models, including Logistic Regression, BayesNet, Stochastic Gradient Descent (SGD), RandomForest, and J48, are deployed to detect ILD based on statistical measures derived from HRCT images. Notably, the J48 model achieves a notable accuracy of 93.08%, with the diagnostic significance of diagonal-wise standard deviation emphasized through feature analysis. Further refinement is achieved through the application of Marker-controlled Watershed Transformation Segmentation and Morphological Masking techniques to HRCT images, elevating accuracy to 95.73% with the J48 model. The computational framework also embraces deep learning techniques, introducing three innovative CNN models that achieve test accuracies of 94.08%, 92.04%, and 93.72%. Additionally, we evaluate five full-training and transfer learning models (InceptionV3, VGG16, MobileNetV2, VGG19, and ResNet50), with the InceptionV3 model achieving peak accuracy at 78.41% for full training and 92.48% for transfer learning. In the concluding phase, a soft-voting ensemble mechanism amplifies training outcomes, yielding ensemble test accuracies of 76.56% for full-training models and 92.81% for transfer learning models. Notably, the ensemble comprising the three newly introduced CNN models attains the pinnacle of test accuracy at 97.42%. This research is poised to drive advancements in ILD diagnosis, presenting a resilient computational framework that enhances accuracy and ultimately betters patient outcomes within the medical domain. 2024, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. -
A novel assessment of bio-medical waste disposal methods using integrating weighting approach and hesitant fuzzy MOOSRA
Bio-medical waste (BMW) management is highly important precaution for human health and environmental concern. There are several disposal treatment followed by medical practitioners in medical waste management. Here, a few disposal treatment is considered to be an alternatives. When assessing, it is necessary to evaluate and assume that all disposal treatment methods are safe and hygienic. In this way, every alternative assessment is evaluated based on the social acceptance, technology and operation, environmental protection, cost, noise and health risk. Finally the best alternative is chosen. When BMW is disposed and we select the best treatment method in BMW management, it can lead to multi-criteria decision making (MCDM) processes related to uncertain critical assessments. When making a decision, the decision makers having some hesitation to give their suggestions. Therefore, here we use hesitant MCDM method. In today's practice we have choose five methods of BMW disposal methods used in the medical world and we have its alternatives. One of these alternative is sorted by six criteria weights for selecting the best method. The main aim of this research paper is propose a new methodology of hesitant fuzzy weight finding technique, it is named as Hesitant Fuzzy Subjective and Objective Weight Integrated Approach (HF-SOWIA) and also propose a new hesitant fuzzy rank finding methodology, it is named as Hesitant Fuzzy Multi-Objective Optimization on the basis of Simple Ratio Analysis (HF-MOOSRA). After evaluation, the result shows that autoclaving is the best alternative for BMW disposal treatment methods. Furthermore, sensitivity analysis is make in order to observe the difference of alternative ranking when the importance of subjective and objective weights changes. 2020 Elsevier Ltd