Browse Items (11809 total)
Sort by:
-
Smart assistive device for visually impaired /
Patent Number: 202121042792, Applicant: Dr. S. Vijayalakshmi.
The most difficult problem for blind people is to navigate the outside world. Smart devices make it much easier for visual impaired to complete daily tasks like smart speakers, smart bulbs, household smart devices, smart sticks, and many more are easy to control. As a whole, smart devices have the potential to significantly improve the lives of visual impaired people. All apps and devices are used individually for different purposes but for visually impaired person it is very difficult to handle all devices and apps at a particular time. -
An apparatus for a predetermined language transliteration and method thereof /
Patent Number: 202121024080, Applicant: Solley Joseph.
The present invention discloses an apparatus for a predetermined language transliteration and method thereof. The system includes, but not limited to, a processing unit with one or more processors connected with one or more storage devices, and wherein the processing unit is to: acquire scripts or alphabets of the predetermined language through an OCR scanning unit or through any input device. -
A storage system for data encryption and decryption using line graphs and method thereof /
Patent Number: 202141013775, Applicant: Sanjana Theresa.
The present invention discloses a storage system in a computer network for data encryption and decryption using line graphs and method thereof. The system includes, but not limited to, a processing unit in a computer network that includes at least one hardware processor, the processing system configured to perform. -
A diet and workout recommendstion system using improved conditional restricted boltzmann machines (CRBM) and method thereof /
Patent Number: 202141024082, Applicant: Dr. Vaishali M Deshmukh.
The system includes, but not limited to, one or more processor provided in a computer network; and a memory disposed in communication with each of the processor and storing processor executable instructions, the instructions comprising instructions to: process varied datasets of Food items and various nutrient parameters of Food items with respect to their ratings by various food takers and while recommending for a patient or a target user. -
A storage system for data encryption and decryption using line and method thereof /
Patent Number: 202141013775, Applicant: Sanjana Theresa.
The present invention discloses a storage system in a computer network for data encryption and decryption using line graphs and method thereof. The system includes, but not limited to, a processing unit in a computer network that includes at least one hardware processor, the processing system configured to perform: to represent data as vertices in a graph; wherein each character is correspond to a vertex while all adjacent characters in the plaintext will be represented as adjacent vertices in the graph. -
A system for secure collaborative computation and method thereof /
Patent Number: 202121003561, Applicant: Dr. Samiksha Shukla.
The present invention discloses a system for Secure Collaborative Computation and method thereof. The present invention discloses a computation system conjugated with a processor and, the processor is to: provide input data by one or more computer system using an input device and further recognizing the input data. -
A system for simulation of collision resistent secure sum protocol and method thereof /
Patent Number: 202021055655, Applicant: Dr. Samiksha Shukla.
The present invention discloses a system for simulation of collision resistant secure sum protocol and method thereof. The present invention discloses a simulation apparatus, system and method thereof having a computation system conjugated with a processor and a Trusted Third Party (TTP) system provided on a computation server system, in which computing, by the Trusted Third Party (TTP) system having an initiator, and via the processor, for number of party, packets per party and anonymizers. -
Predicting Work Environment and Job Environment Among Employees using Transfer Learning Approach
Today's enterprises face numerous challenges as a result of the world's rapid evolution. Maintaining a content workforce is crucial to a company's success and survival in today's fast-paced business environment. The efficacy, productivity, efficiency, and dedication of the company's staff are directly associated with the company's capacity to meet the needs of its employees in the workplace. The focus of this system is to identify the factors that contribute to a satisfying work environment for the participants. Preprocessing, feature selection, and model training are the first three steps in the suggested methodology. Data mining systems should get in the habit of normalizing data as a preliminary processing step. The multiple elements assessing company culture and worker satisfaction were consolidated using Principal Components Analysis (PCA) in the feature selection phase. Once features have been selected, KNN-SVM is utilized for model training. When compared to the two most popular alternatives, SVM and KNN, the proposed technique performs better. 2023 IEEE. -
Impact of Expert Academic Teaching Quality and its Performance Based on BiLSTM-Deep CNN Network
Undergraduate and postgraduate students from eight different departments at a UK institution participated in organized conversations about the impact of teachers' research activities on their education. In both samples, positive responses greatly outnumbered negative ones. There was an increase in positive feedback on professors' research when the overall quantity and quality of research in a specific field (as measured by Research Assessment Exercise [RAE] ratings) improved. Undergraduate samples with higher RAE scores were more likely to have negative feedback on research than graduate student samples. Both graduate and undergraduate students agreed that lecturers' research increased the instructor's credibility, relevance, and knowledge, as well as piqued and maintained their own interest, engagement, and drive. Data processing, feature selection, and model training are the first steps in the proposed approach. The data are changed from their raw form into a form suitable for academic use during the data pre-processing phase. They are employing Information Gain and Symmetric Uncertainty for feature selection. Following the feature selection process, the models are trained using BiLSTM-CNN. Both the BiLSTM and the CNN methods are inferior to the proposed method. 2023 IEEE. -
Decoding HERO: Predicting psychological capital with subjective well-being
The positive psychology movement has gained momentum in recent years and organizations have ascribed great importance to employee well-being in light of the favorable outcomes associated with it. The widely researched Psychological Capital (PsyCap) has been consistently linked to well-being across a variety of contexts but a gap still exists in literature about what lies to the 'left' of psychological capital. The present study attempts to fill this gap by examining subjective well being components- positive and negative affect and life satisfaction, as potential antecedents of PsyCap. The Academic PsyCap questionnaire, the Positive and Negative Affect Schedule (PANAS) and the Satisfaction with Life Scale (SWLS) were administered to participants. Results confirmed the expected associations between affect and PsyCap-positive affect positively predicted PsyCap and its four constituents whereas negative affect emerged as a negative predictor of PsyCap and its dimensions. Life satisfaction positively predicted only individuals' total hope scores. Thus, highlighting the role of subjective well-being components as antecedents of PsyCap, these findings suggest that promoting higher positive affect and lower negative affect can do more than just make individuals feel good, rather, it can bolster their reservoirs of crucial psychological resources as well. 2021 Ecological Society of India. All rights reserved. -
Secure multi-party computation protocol using asymmetric encryption
Privacy preservation is very essential in various real life applications such as medical science and financial analysis. This paper focuses on implementation of an asymmetric secure multi-party computation protocol using anonymization and public-key encryption where all parties have access to trusted third party (TTP) who (1) doesn't add any contribution to computation (2) doesn't know who is the owner of the input received (3) has large number of resources (4) decryption key is known to trusted third party (TTP) to get the actual input for computation of final result. In this environment, concern is to design a protocol which deploys TTP for computation. It is proposed that the protocol is very proficient (in terms of secure computation and individual privacy) for the parties than the other available protocols. The solution incorporates protocol using asymmetric encryption scheme where any party can encrypt a message with the public key but decryption can be done by only the possessor of the decryption key (private key). As the protocol works on asymmetric encryption and packetization it ensures following: (1) Confidentiality (Anonymity) (2) Security (3) Privacy (Data). 2014 IEEE. -
A distributed randomization framework for privacy preservation in big data
The privacy preservation is a big challenge for data generated from various sources such as social networking sites, online transaction, weather forecast to name a few. Due to the socialization of the internet and cloud computing pica bytes of unstructured data is generated online with intrinsic values. The inflow of big data and the requirement to move this information throughout an organization has become a new target for hackers. This data is subject to privacy laws and should be protected. The proposed protocol is one step toward the security in case of above circumstances where data is coming from multiple participants and all are concerned about individual privacy and confidentiality. 2014 IEEE. -
Data: An Anchor for Decision- Making to Build the Future Workforce Management System
In this digital era, the change in business environments and the nature of work lead to skill gaps. Training the workforce on desired skill sets must fill these skill gaps. Data play a crucial role in identifying the skills needed and helping organizations to plan the future workforce. Data is essential for any organizations growth and success in the dynamic market. Knowing the skill set in advance allows organizations and individuals to plan the business and skill requirements well. The way work is done may be impacted by these structural changes as the world is changing swiftly. Building the abilities necessary for the uncertain environments of the present and future environments is also crucial for training the employees. However, such skills must first be acknowledged and appreciated before being developed. Empirical data must support the methodology for valuing such abilities and skills. This chapter outlines the significance of data in skill identification for individuals to be future-ready. Finding the most relevant abilities in a given environment is the first step toward their formalization and acceptance at the systems level. It also presents the importance of creating skill matrices for students and organizations. The skill matrix objectively quantifies skill value for specific occupations and the possible trajectories to acquire those skill sets. This metric will allow policymakers to navigate this fast-changing workforce landscape and focus resources to ensure that skills are needed as students transition into the workforce and have skills that enable them to transition. 2024 selection and editorial matter, Alex Khang, Sita Rani, Rashmi Gujrati, Hayri Uygun, and Shashi Kant Gupta; individual chapters, the contributors. -
Emotion Detection Using Machine Learning Technique
Face Emotion Recognition (FER) is an emerging and crucial topic today; since much research has been done in this field, there are still many things to explore. In daily life, where people dont have time to fill out feedback, emotion detection plays an important role, which helps to know customer feedback by analyzing expressions and gestures. Analyzing current studies in emotion recognition demonstrates notable advancements made possible by deep learning. A thorough overview of facial emotion recognition (FER) is provided in this publication. The literature cited in this study is taken from various credible research published in the last 10years. This study has built a model for emotion recognition using photos or a camera. The paper is based on the concepts of Machine Learning (ML), Deep Learning (DL), and Neural Networks (NN). A range of publicly available datasets have been used to evaluate evaluation metrics. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Challenges of Digital Transformation in Education in India
Online learning has been present since the 1960s and has risen in popularity over time. World-class universities have been using online teaching-learning methodologies to fulfill the needs of students who reside far away from academic institutions for more than a decade. Many people predicted that online education would be the way of the future, but with the arrival of COVID-19, online education was imposed upon stakeholders far sooner and more suddenly than expected. When the COVID-19 pandemic broke out, educational institutions began to explore digital ways to keep students studying even when they couldn't be together in person as governments enacted legislation prohibiting large groups of people from gathering for any reason, including education. The future of such a transition looks promising. However, transitioning from one mode of education to another is not easy. Historically, when educators adopt new tools, learning still continues in the conventional manner. Based on the responses of 176 students, this paper studies the challenges of Digital transformation in the Education sector. The research is extremely beneficial in evaluating the scope of societal opposition to change. 2022 IEEE. -
Data Privacy
Data privacy is a private and public phenomenon and its operations have implications for the individual and the society. This understanding of privacy ceases it from being viewed as a simple technological process and highlights different factors that are associated with it. While on one hand, the right to privacy is seen as integral to the freedom of the individual, on the other hand, it is also seen as the ability to hide certain information for malpractice. This chapter delves into this existing dichotomy of data privacy and simplifies various terms and operations that have emerged in the field of study. A discussion is facilitated on the concept and its associated areas. The chapter looks at privacy regimes in different countries to note emerging developments and also presents a critique of the practice to bring forth shortcomings and enable change. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Data and Its Dimensions
In current times Data is the biggest economic opportunity. As per the studies, it is observed that the world is becoming 2.5 quintillions data-rich every day, with an average of every human contributing 1.7MB of data per second. Every individual has a good appetite for data, as it gives immense insight to explore and expand the business. With the invention of smart devices and innovation in the field of connectivity such as 4G-5G Mobile Networks and Wi-Fi, the generation and consumption of the data are steadily increasing. These smart devices continuously generate data, leading to a bigger pool for better decision-making. This chapter presents data, the various forms and sources, and the concept of Data Science; it discusses how the ownership and value of data are decided; and also highlights the use, abuse, and overuse of the data along with data theft, and a case study to represent data breach. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.