Browse Items (9795 total)
Sort by:
-
An algorithm for IoT based vehicle verification system using RFID
The verification of vehicle documents is an important role of transport department which is rising day by day due to the mass registration of the vehicles. An automated vehicle verification system can improve the efficiency of this process. In this paper, we propose an IOT based vehicle verification system using RFID technology. As a result, the vehicle checking which is done now manually can be replaced by automation. There is a loss of a significant amount of time when the normal vehicle checking is done manually. The proposed system will make this process automated. The present verification process is using inductive loops that are placed in a roadbed for detecting vehicles as they pass through the loop of the magnetic field. Similarly, the sensing devices spread along the road can detect passing vehicles through the Bluetooth mechanism. The fixed audio detection devices that can be used to identify the type of vehicles on the road. Other measurements are fixed cameras installed in specific points of roads for categorising the vehicles. But all these mechanisms cannot verify the documents and certificates of the vehicles. In our work, we have suggested an algorithm using RFID technology to automate the documentation verification process of the vehicles like Pollution, Insurance, Rc book etc with the help of RFID reader placed at road checking areas. This documents will be updated by the motor vehicle department at specific periods. Copyright 2019 Institute of Advanced Engineering and Science. All rights reserved. -
An algorithm to detect an object in a confined space by using improved fingerprinting approach
The rapid evolution of location-based services has made tremendous changes in the society. In this paper, Trilateration method is implemented in fingerprinting methodology to obtain very precise and low error position details of the client portable device. Trilateration is a method in which the portable device is determined by the received signal strength intersecting at one position from the three reference points. Fingerprinting method involves several steps like training stage and positioning stage in which the training stage consists of the creation of the database of the signal strengths along with its associated location measurements. In the positioning step where effective and efficient received signal strength collected from the portable device is matched with the data saved into the database to get the position information of the client. The position of the user is estimated by collecting the received signal strengths from three reference points by using the concepts of trilateration approach in fingerprinting methodology to obtain more precise and accurate information. 2005 - ongoing JATIT & LLS. -
An Alternative Deep Learning Approach for Early Diagnosis of Malaria
Considering the malaria disease-related moralities prevailing mainly in underdeveloped countries, early detection and treatment of malaria must be an essential strategy for lowering morbidity and fatality rates. Detection of Malaria using traditional investigation methods through blood samples and expert judgments was found to be time-consuming. In this paper, the authors introduced a Machine Learning automated system to eliminate the need for human intervention, which in turn enables early detection of malaria. The study has used various Deep Learning techniques such as traditional Convolutional Neural Network (CNN), VGG19, ConvNeXtXLarge, ConvNeXtBase, ConvNeXtSmall, ConvNeXtTiny, InceptionResnetv2, Xception, DenseNet169, EfficientNetB7, MobileNet, ResNet50, and NasNetLarge as base models. These models have been trained and tested with microscopic blood smear images dataset and observed that ConvNeXtXLarge detects malarial parasites with an accuracy of 96%. The proposed method outperforms the existing approaches in terms of both accuracy and speed. The findings of this work can contribute to the development of more accurate and efficient automated systems for early detection of Malaria. 2024 IEEE. -
An analogical study of the narrative techniques used in the film Paradesi (2013) an adaptation of Tamil translation (Yerium Panikkadu) of the novel 'Red Tea' /
International Journal Of Humanities and Social Science Invention, Vol.5, Issue 3, pp.1-6, ISSN: 2319-7722 (Online) 2319-7714 (Print). -
An Analysis Conducted Retrospectively on the Use: Artificial Intelligence in the Detection of Uterine Fibroid
The most frequent benign pelvic tumors in women of age of conception are uterine fibroids, sometimes referred to as leiomyomas. Ultrasonography is presently the first imaging modality utilized as clinical identification of uterine fibroids since it has a high degree of specificity and sensitivity and is less expensive and more widely accessible than CT and MRI examination. However, certain issues with ultrasound based uterine fibroid diagnosis persist. The main problem is the misunderstanding of pelvic and adnexal masses, as well as subplasmic and large fibroids. The specificity of fibroid detection is impacted by the existing absence of standardized image capture views and the variations in performance amongst various ultrasound machines. Furthermore, the proficiency and expertise of ultra sonographers determines the accuracy of the ultrasound diagnosis of uterine fibroids. In this work, we created a Deep convolutional neural networks (DCNN) model that automatically identifies fibroids in the uterus in ultrasound pictures, distinguishes between their presence and absence, and has been internally as well as externally validated in order to increase the reliability of the ultrasound examinations for uterine fibroids. Additionally, we investigated whether Deep convolutional neural networks model may help junior ultrasound practitioners perform better diagnostically by comparing it to eight ultrasound practitioners at different levels of experience. 2024 IEEE. -
An analysis of factors associated with employee satisfaction in information technology companies
BACKGROUND AND OBJECTIVES: An employees satisfaction and performance are linked to the companys work discipline, personal factors, and organizational culture. This paper studies these three factors in the context of Information Technology companies and their connection to employee satisfaction. Job satisfaction is a significant issue in Information Technology Companies, leading to increased labour turnover in Information Technology Companies. The study highlights the relevance of Information Technology companies to understanding the reasons behind their employees satisfaction. Until now, little is known concerning the variants of job satisfaction among Information Technology employees, enriching the understanding in this particular professional area. The study was conducted to assess the job satisfaction needs of the employees in major Information Technology companies. The study helps to know the preferences and problems of the employees. METHODS: In this study, data was collected from employees from various Information Technology companies to uncover the factors that impact the satisfaction of employees. Considering the studys goal and the literature review, the technique was analytical and interpretive. Due to large populations random sampling method is convenient for the study. The studys objectives were achieved explicitly via the questionnaires design. To test the proposed hypotheses, all data were processed using the Structural Equation Modelling, Statistical Package for Social Science (SPSS) and Analysis of Moment Structures. FINDINGS: Information Technology companies need their employees to feel satisfied to achieve the overall objectives and remain loyal to the company to achieve company success. From the responses, we learned that 31% of the respondents were satisfied with their employer about the various allowances and benefits they receive. Also, we knew that around 50% of the respondents were happy with their choice of the company because of its future commitments. 102 of the respondents highly disagreed that they were satisfied with the attitude and nature of their employees. Also, 22.26% of the male respondents have said they are only sometimes motivated to go to work. The limitation of this study was that the collected data was only of the general employees of the Indian Information Technology companies and not to specific departments of those companies. Also, no categories of companies were defined as per turnover. CONCLUSION: By recognizing the importance of job satisfaction, managers can create an environment that motivates and engages employees, leading to better performance, increased productivity and reduced employee turnover 2024 Tehran Urban Research and Planning Center. All Rights Reserved. -
An Analysis of Financial and Technological Factors Influencing AgriTech Acceptance in Bengaluru Division, Karnataka
In 2023, India surpassed China to become the world's most populated nation. This demographic surge has precipitated an escalating exigency for sustenance as populace burgeons unabatedly. To satiate this burgeoning demand there arises an imperative to augment yield of agriculture commensurately. It is pertinent to acknowledge that as per Global Hunger Index of 2019, India occupies disconcerting rank of 102 amongst consortium of 117 nations when gauged by severity of hunger quantified through Hunger Severity Scale with disquieting score of 30.3. Aspiration of attaining utopian objective of zero hunger by 2030 as promulgated by Sustainable Development Goals appears to be quixotic endeavor seemingly beyond realm of plausibility. In this milieu agricultural technology (AgriTech) enterprises within India present veritable opportunity to invigorate agricultural sector. Agrarian landscape of India has been undergoing profound metamorphosis owing to technological renaissance that has permeated nation facilitated by innovative solutions proffered by nascent corporate entities. State of Karnataka stands as an epicenter of sorts for AgriTech enterprises within India. In this study we meticulously scrutinize impact wielded by financial factors on adoption of AgriTech solutions by agrarian stakeholders and elucidate technological determinants that actuate embracement of AgriTech within this demographic. The study uses descriptive statistics and chi-square analyses to rigorously assess predefined objectives. Geographic ambit of this inquiry encompasses regions of Chikkaballapura and Doddaballapura Taluks situated within Bengaluru division of Karnataka in 2022. The empirical revelations distinctly illuminate that individuals vested with access to technological and financial resources exemplified by parameters such as annual household income, accessibility to commercial banking services, cooperative financial institutions, mobile telephony, internet connectivity and Global Positioning System (GPS) technology exhibit palpable predilection for integration of AgriTech solutions into their agrarian practices. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
An Analysis of Grimms' Transmedia Storytelling in the Age of Technology
This research paper delves into an intersection of traditional literature and transmedia storytelling, with particular emphasis on Grimms' tales and its television series adaptation. Providing young audiences with engaging and dynamic experiences, transmedia storytelling involves delivering a single story across numerous platforms. Utilizing narrative analysis, this research seeks to uncover hidden themes, character growth, and story dynamics by breaking down the complex presentation and structure of stories in diverse media. Natural Language Processing (NLP) techniques like thematic analysis, sentiment analysis, keyword sentiment analysis have been employed to examine the differences between the presentation of these stories in varied formats as well as evaluating audience reception. It also assesses the degree to which transmedia adaptations support the resuscitation of beloved children's books in popular culture. By incorporating digital surrealism and aspects of technology, this paper enhances our understanding of how traditional stories captivate audiences across various media forms while maintaining their timeless quality. 2024 IEEE. -
An Analysis of Levenshtein Distance Using Dynamic Programming Method
An edit distance (or Levenshtein distance) amongst dual verses refers to the slightest amount of replacements, additions and omissions of signs essential to turn one name addicted to the additional is referred to as the edit distance (or Levenshtein distance) amongst dual verses. The challenge of calculating the edit distance of a consistent verbal, that is the set of verses recognised by a fixed mechanism, is addressed in this research. The Levenshtein distance is a straightforward metric for calculating the distance amongst dual words using a string approximation. After witnessing its efficiency, this approach was refined by combining certain comparable letters and minimising the biased modification between associates of the similar set. The findings displayed a considerable enhancement over the old Levenshtein distance method. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
An analysis of load balancing algorithms in the cloud environment
The emerging area in an IT environment is Cloud Computing. There are many advantages of the computing but unfortunately, allocation of the job request effectively is a trouble. It requires lots of infra structural commitments and the quality inputs of the resources. Also, in the cloud computing environment, Load Balancing is an important aspect. Efficient load balancing algorithm helps the resource to have optimized utilization with the proper dissemination of the resources to the cloud user in pay-as-you-say-manner. It also supports ranking the job request based on the priority with the help of scheduling technique. We present the various types of Load Balancing Techniques in the different platform of Cloud Environment specified in SLA (Service level Agreement). 2016 IEEE. -
An Analysis of Machine Learning and Deep Learning to Predict Breast Cancer
According to the report published by American Cancer Society, breast cancer is currently the most prevalent cancer in women. In addition, it is the second leading cause of death. It needs to be taken into serious consideration. Earlier and faster detection can help in the earlier and easier cure. Normally, medical practitioners take a large amount of time to understand and identify the presence of cancer cells in the human body. This can lead to serious complications even to the death of the individual. Hence there is a need to identify and detect the presence of this disease very accurately and in a shorter span of time. Like every other industry, the medical industry is shifting its paradigm to automation giving excellent results having high accuracy and efficiency, which is achieved using Artificial Intelligence. There are two sets of models developed based on the numerical dataset Wisconsin and image dataset BreakHis. Machine Learning algorithms and Deep Learning algorithms were applied on the Wisconsin dataset. Meanwhile, Deep Learning models were used for analysis of the Breakhis dataset. Machine Learning models- Logistic Regression, K Neighbors, Naive Bayes, Decision tree, Random Forest and Support vector classifiers were used. Deep Learning models- normal deep learning models, Convolutional Neural Network (CNN), VGG16 & VGG19 models. All the models have provided a very good accuracy ranging between 75% and 100%. Since medical research has a requirement for higher accuracy, these models can be considered and embedded into several applications. Grenze Scientific Society, 2022. -
An Analysis of Manufacturing Machine Failures and Optimization Using Replacement Year Prediction
The manufacturing industry is highly susceptible to equipment failures, leading to costly downtime, production delays, and increased maintenance expenses. Effective maintenance planning and resource allocation depend on the early detection of possible faults and the precise forecasting of replacement years. The fundamental technique for assuring operational resilience, limiting disruptions, and improving preventative maintenance processes is manufacturing failure analysis. It entails the methodical analysis of failures and spans several sectors, including the automobile, aerospace, electronics, and heavy machinery. In this research, an integrated methodology for predicting replacement years in the manufacturing industry using operations research approaches and the Python-based machine learning algorithm Random Forest Classifier (RFC) is proposed. The program first calculates the total failure rate after importing manufacturing data from a dataset. The failure rate for each manufacturing line is then determined, and the lines with a high failure rate are identified. The program uses machine learning to improve the analysis by teaching a Random Forest classifier to anticipate failures. The model's performance is assessed by measuring the accuracy of a test set. To determine machine replacement years, it also incorporates replacement theory assumptions. Based on the company's founding year and the current year, it determines the replacement year considering the machine's lifespan. This program's advantages include recognizing production lines with high failure rates, employing machine learning to forecast problems, and offering suggestions on when to replace machines. Manufacturers may enhance their processes, lower failure rates, and increase overall efficiency by utilizing statistical analysis, machine learning, andoptimizationstrategies. As technology advances, the field of failure analysis will continue to evolve, enabling firms to achieve improvements. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
AN ANALYSIS OF PERCEPTION AND AWARENESS OF UNDERGRADUATE YOUTH TOWARDS CYBERCRIME
The perception of a situation or reality determines how one responds and awareness is the first step towards understanding, knowing or recognizing it. The majority of the public and the police may be familiar with the phrase cybercrime, but all of the mare fully informed ofthe nature and scope of these crimes, as well as of the cybercriminals and cyber victims, which has an impact on how they see these issues. This studys main goal was to examine the perception and awareness of cybercrime among undergraduate youth studying in BBA or BCA courses. In this study, we discovered that young peoples responses to cybercrime mostly depend on their perceptions of it and their awareness level. To accomplish the studys objective, a thorough examination of existing literature was undertaken. Primary data of200 students were collected through Google Forms. Percentile analysis, correlation analysis and t-test are done to test the hypotheses. The results of this study may help college administrators better comprehend the mind set of todays youth as they develop laws and policies aimed at reducing cybercrime among students. The results of this study show that the youngsters surveyed have high levels of awareness and a good perception. 2024 Kiran Joshi and Priyanka Kaushik. -
An analysis of policy prospective of taxi aggregators and consumers in digital eco-system
The term digital trade is becoming more prevalent in the modern era. Newer company structures have evolved to replace traditional methods with online companies as digitalisation has become the standard. Taxi aggregators are one of the most prevalent digital business concepts. With this particular model, which is now known as taxi aggregators, you may quickly book a cab using your smartphone for transportation inside and outside the city limits. They are also inexpensive to use. Nevertheless, as lawmakers created new and revised rules to control these business models, the last two years have been very difficult for application-based taxi providers like Ola and Uber. The regulations are being developed by legislators in several nations, but the pace and the scope are much slower than necessary. This essay will examine past and present taxi market scenarios before suggesting ways to enhance them in the future. Copyright 2024 Inderscience Enterprises Ltd. -
An Analysis of Sentiment Using Aspect-Based Perspective
Opinions play a major role in almost every human practice. Finding product and service reviews is made easy online. Product reviews are readily available in huge quantities. Considering each review and making a concise decision about a product is not feasible or even possible. Aspect-based sentiment analysis (ABSA) is one of the best solutions to this problem. Summary and online reviews analysis is delivered in this paper. ABSA has made extensive use of machine learning techniques. Recent years have seen deep learning take off due to the growth of computer processing power and digitalization. When applied to various deep learning techniques, numerous NLP tasks produced futuristic results. An overview of various deep learning models used in the field of ABSA is presented in this chapter after an introduction to ABSA. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
An analysis of the ethical challenges of blockchain-enabled E-healthcare applications in 6G networks
Developments in blockchain technology coupled with rapid developments in network technologies have disrupted traditional business and service models. One such application is in the domain of healthcare. However, the domain's sensitive nature and complexity require blockchain-enabled e-healthcare to ensure utilitarianism while suitably addressing the associated ethical challenges. In this milieu, the paper attempts to identify and evaluate the parameters of ethical challenges associated with blockchain adoption in e-healthcare. This paper contributes to the extant body of knowledge by presenting a critical review of the ethical considerations at the meso level of blockchains in e-healthcare. Based on findings from the literature, the study identified nine parameters of blockchain ethics. Of these, Accuracy and Right to be Forgotten were found to be most critical in terms of ethical dilemmas in healthcare applications. No evidence of ethical dilemma could be found with respect to Accountability and Data Ownership. As these services are deployed over networks, all these challenges are further evaluated in the context of 6G network-based models. This will not only provide the stakeholders with a holistic view of the ethical challenges in various blockchain-enabled healthcare applications but also enable a meticulous transition to the 6G network. 2021 -
An Analysis of Word Sense Disambiguation (WSD)
Word sense disambiguation (WSD) is the method of using computer algorithms to determine the sense of arguments in the background. As a result of its difficult nature, WSD has measured an AI-complete problem, i.e., a problem whose key is as minimum as difficult as those posed by artificial intelligence. This article describes the task and introduces motives to resolve the ambiguity of words discussed throughout the text. This article summarizes supervised, unsupervised, and knowledge-based solutions. Senseval/semeval campaigns are described in relation to the assessment of WSDs, with the aim of an unbiased assessment of schemes working on numerous disambiguation errands. Finally, future directions, requests, open difficulties, and open problems are discoursed. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
An analysis on direct authentication of data
Authentication is the procedure which permits a sender and receiver of data to validate each other. On the off chance that the sender and receiver of data can't legitimately confirm each other, there is no trust in the activity or data gave by either party. This paper talks about where and when can the service providers use the various authentication models adopted and the comparison between two authentication models. 2017 IEEE. -
An Analysis on the Reasons for Students Opting Tourism as a Course with Reference to Bangalore
Contemporary Research in India, Vol-3 (3), pp. 133-142. ISSN-2231-2137 -
An analytical model for a TFET with an n-doped channel operating in accumulation and inversion modes
The tunnel field-effect transistor (TFET) is an ambipolar device that conducts current with the channel in both accumulation and inversion modes. Analytical expressions for the channel potential and current in a TFET with an n-doped channel when operating in the accumulation and inversion modes are proposed herein. The potential model is derived by solving the two-dimensional (2D) Poisson equation using the superposition principle while considering the charges present in the channel due to electron or hole accumulation along with the depletion charges. An expression for the tunneling current corresponding to the maximum tunneling probability is also derived. The tunneling current is obtained by analytically calculating the minimum tunneling length in a TFET when operating in the accumulation or inversion mode. The results of the proposed potential model is compared with technology computer-aided design (TCAD) simulations for TFET with various dimensions, revealing good agreement. The potential and current in an n-type TFET (nTFET) obtained using the proposed models are also analyzed. 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.