Browse Items (11809 total)
Sort by:
-
Auto-encoder Convolut?onal Neural Network (AECNN) for Apple Fruit Flower Detection
The yield estimation task altogether relies upon the way toward identifying and checking the quantity of fruits on trees. In production of fruit, basic yield the board choices are guided through the bloom frequency, i.e., the quantity of the flowers that are present in a plantation. The intensity of bloom technique is still commonly assessed by methods for human visual investigation. Mechanized PC vision frameworks for flower recognizable proof depend closely on designed procedures which function just under explicit conditions and with restricted execution. This work comprises four significant advances, (I) system preparing for Fully Convolutional Network (FCN), (ii) preprocessing, (iii) component extraction, (iv) division. Initially, a strategy for assessing high-resolution pictures with deep FCN on Graphics Processing Unit (GPU). Then, non-linear and linear algorithms are presented for lessening the image noise, so the exact flower identification can be ensured. The next phase of the work handles the highlight extraction for diminishing the quality of the prime assets which are needed for handling without compromising on data applicable. By applying Local Binary Pattern (LBP), surface example likelihood can be summed up into a histogram. At last, isolate an image with high resolution into sub patches, assess all patches with the help of AECNN, at that point apply the refinement calculation on acquired score maps to figure out the final version of the mask segmentation. Trial results are led utilizing two datasets on flower pictures of AppleA and AppleB. Results are estimated regarding the measurements like Precision (P) and Recall (R). The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Real-Time State of Charge Prediction Model for Electric Two-Wheeler
To maximise the efficiency and performance of electric vehicles, traction battery State of Charge (SoC) must be accurately predicted. In this work, a prediction model for traction battery State of Charge estimation is developed in real time. The traction battery powers an electric two-wheeler through a predetermined drive cycle. To produce accurate state-of-charge forecasts, the predictive model considers several input characteristics, such as temperature, voltage, and current. This research is crucial for fostering effective energy management and improving the safety and dependability of electric two-wheelers. Open-circuit voltage (OCV) and coulomb counting are two commonly utilised techniques used to evaluate the state of charge prediction model. These techniques act as standards for assessing the developed Neural Network model prediction, the model's dependability and accuracy. The model's usefulness and its potential to outperform the current State of Charge estimating techniques are demonstrated by comparing the state-of-charge predictions from the model with these standard methods. 2024 IEEE. -
Deep Learning-Based Prediction of Physical Activity Intensity for Athletes
Maximizing training plans for athletes and lowering the risk of injury depends on a precise assessment of the degree of physical activity. Existing system in-use systems often employ simplistic models, which leads to inaccurate projections. The paper presents a deep learning-based system that uses convolutional neural networks (CNNs) to create real-time predictions using wearable sensor data. Because it automatically extracts relevant features from raw sensor data, the technique does not need human feature engineering. Utilizing thorough model training and evaluation, it exceeded the most recent methods in terms of accuracy (0.92), precision (0.90), recall (0.92), F1-score (0.91), and ROC AUC (0.94). Results of cross-validation over many data subsets confirm the resilience of the method. Comparisons of confusion matrices also demonstrate how effectively the algorithm forecasts various activity intensities. Overall, the proposed system represents a breakthrough in accurately estimating how much physical activity athletes do, enhancing the efficacy of their training, and reducing the possibility of damage in sporting settings. 2024 IEEE. -
The Effect of Prediction on Employee Engagement Organizational Commitment and Employee Performance Using Denoised Auto Encoder and SVM Based Model
The purpose of human resources is to ensure that the appropriate people are hired for open positions at appropriate times, that the system receive the necessary training, and that their performance is monitored and their perspective skills are secure through the use of evaluation methods. Despite the importance of this data to decision-makers, it can be difficult to glean useful insights from large datasets. Data mining has made it possible for human resources experts to automate the hitherto tedious task of manually processing enormous data sets. Finding almost perfect outcomes is the main goal of data mining, which is to discover hidden knowledge in data patterns and trends. The proposed method goes as follows: preprocessing is done by data cleaning and data normalization, feature selection using correlation and information theoretic ranking criteria. The last step in training and evaluating the model is using AE-SVM, which stands for Auto Encoder Support Vector Machine. The suggested model is more effective and performs better than two existing models: Support Vector Machine and AE-CNN. The suggested approach attains an accuracy rate of 94%. 2024 IEEE. -
Approach Towards Web for Exploring the Suitable Job for Individuals
In light of future work challenges, true human resource management (HRM) must be rebuilt. This involves over time human resource development; it must also contain the concept of sustainability to move from consuming to generating human resources. The labor market is constantly changing, with nontraditional jobs becoming increasingly important, especially in light of the current COVID-19 legislation. A useful teaching strategy in a variety of academic fields, including career development, is experiential learning. Important elements for establishing experiential learning programs at the institutional level are also covered by researchers. Our framework may assist businesses in identifying the type of experiential learning that best fits their objectives and setting for professional training. It can also help ensure that the training is successfully designed and delivered. 2024 IEEE. -
Comparative Analysis and Development of Recommendations for the Use of Machine Learning Methods to Identify Network Traffic Anomalies in the Development of a Subsystem for User Behavioral Analysis
This article discusses various machine learning methods in order to conduct a more effective analysis of user network traffic using a subsystem for analyzing user behavior and detecting network anomalies, since there is a need to evaluate big data. The methods and techniques used to detect network anomalies are analyzed. In analyzing the methods and technologies used to detect network anomalies, a classification of anomaly detection methods is proposed. To solve these problems, different algorithms can be used, differing in specificity and, as a result, efficiency. The classification of machine learning methods for detecting network anomalies is considered separately, since machine learning algorithms will be the most effective for the task. Various criteria for evaluating the effectiveness of machine learning models in solving the problem of network traffic profiling are considered. In accordance with the specifics of the tasks of user recognition and network anomaly detection, the most appropriate criteria for evaluating the effectiveness of machine learning models have been selected: AUC ROC the area under the error curve. Four stages of the subsystem for analyzing user behavior and detecting network anomalies are highlighted. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Cryptographic Protocols for Securing Internet of Things (IoT)
Cryptographic protocols are used to relax the ever-developing quantity of linked gadgets that make up the net of things (IoT). Those cryptographic protocols have been designed to make certain that IoT tool traffic stays cozy and personal, even while nevertheless allowing tool-to-device and cloud-to-tool communications. Examples of these protocols consist of TLS/SSL, PGP/GPG, IPsec, SSL VPN, and AES encryption. Every one of these protocols enables authentication, message integrity, and confidentiality via encryption and key trade. Moreover, a lot of these protocols are carried out in the form of diverse hardware and software answers, such as smart playing cards and gateways, to make certain that IoT traffic is secured. With the appropriate implementation of those cryptographic protocols, establishments can ensure that their IoT facts are blanketed and securely transmitted. 2024 IEEE. -
Empowering E-commerce: Leveraging Open AI and Sentiment Analysis for Smarter Recommendations
Online product reviews are pivotal in shaping consumer purchasing decisions in today's digital era. Leveraging the wealth of sentiment-rich data available through these reviews, this research proposes an approach to enhance product recommendation systems. This study integrates sentiment analysis techniques into the recommendation process to provide users with more personalized and insightful product recommendations. By analyzing the sentiment expressed in user-generated content, such as reviews and ratings, this system aims to capture not only the explicit preferences but also the underlying sentiments and emotions of users towards products. Furthermore, this system utilizes OpenAI and the power of Langchain to develop a chatbot interface, enabling users to interact naturally and receive personalized product recommendations based on their preferences and sentiment analysis. Through experimentation on real-world datasets, this paper evaluates the effectiveness and performance of the sentiment-enhanced recommendation system compared to traditional recommendation methods. The results demonstrate the potential of sentiment analysis in improving the relevance, accuracy, and user satisfaction of product recommendations. 2024 IEEE. -
FDI in Developing Nations: Unveiling Trends, Determinants and Best Practices for India
In the recent UNCTAD World Investment Report 2023, China has the highest FDI inflows among the developing countries, following Brazil, India, Mexico, and Indonesia. These five developing countries attracted more FDI inflows in the year 2022. However, among these five countries, China and the other four countries have a lot of differences in FDI inflows. So, this study investigates the factors helping China get more FDI inflows by analyzing the trends and determinants of FDI inflows. The study also compares all the selected countries to suggest the best practices India can adopt to enhance its FDI attractiveness. So, the study considered economic indicators like GDP, infrastructure, trade openness, and natural resources. Further, panel data analysis was used to investigate the determinants influencing FDI inflows, utilizing the Panel Autoregressive Distributed Lag (P-ARDL) model for the data from 1990 to 2022. The findings showed that trade openness, market size, and quality of infrastructure explain the attraction of FDI inflows in selected countries in the long run. Thus, it is important to implement policies that encourage international collaboration by raising trade, lowering corporate expenses, and making infrastructural investments. India's availability of a large consumer market, developed infrastructure, and government initiatives like 'Make in India,' and "Skill India"have pulled major FDI inflows. India should prioritize manufacturing, IT, and healthcare while improving infrastructure and streamlining regulations. 2024 IEEE. -
Rating-Based Cyberbullying Detection with Text, Emojis on Social Media
In the dynamic landscape of online interactions, cyberbullying has become pervasive, profoundly impacting user's digital well-being. Public figures, especially celebrities and influencers, face heightened vulnerability to online harassment, exacerbated by the post-pandemic surge in social media usage. To address this challenge, our research adopts a holistic approach to detect cyberbullying in text, considering both textual content and the nuanced expressions conveyed through emojis on social media platforms. We employed a diverse set of machine learning and deep learning models, including Support Vector Classifier, Logistic Regression, Random Forest, XGBoost, LSTM, Bi-LSTM, GRU, and Bi-GRU, to accurately classify non cyberbullying or cyberbullying text. Beyond classification, our study introduces an offensive rating system, assigning severity ratings on a 1-5 scale to identify cyberbullying instances. A critical aspect is the establishment of a threshold value which depends on user security and safety ethics of different social media platforms; texts surpassing this trigger an automatic recommendation to block the user, ensuring a proactive response to minimize harm. This recent contribution not only comprehensively addresses cyberbullying but also empowers society. 2024 IEEE. -
Congestion Avoidance in Vehicular Ad Hoc Network MAC Layer Using Harmony SearchModified Laying Chicken Algorithm (HS-MLCA)
To address congestion in the MAC layer and enhance overall performance, the HS-MLCA is proposed. This algorithm incorporates the principles of both Harmony Search and Laying Chicken Algorithm to optimize resource allocation and congestion control. At the MAC layer, HS-MLCA offers several advantages over traditional congestion control schemes. Firstly, it leverages the Harmony Search algorithm, which is known for its ability to exploit the best outcomes in search processes. By exploring the solution space and exploiting promising regions, HS-MLCA optimizes resource allocation in the MAC layer. The integration of the Laying Chicken Algorithm (LCA) further enhances performance by improving convergence speed and solution accuracy. This hybrid approach leverages the strengths of both Harmony Search (HS) and LCA, resulting in more efficient and effective resource management. The Laying Chicken Algorithm simulates the behavior of laying hens in terms of resource allocation and competition. This approach contributes to provide the solution in quality and convergence speed, as the algorithm adapts to the dynamic nature of the MAC layer and the varying traffic conditions in VANETs. By combining the strengths of Harmony Search and Laying Chicken Algorithm, HS-MLCA offers improved performance in terms of congestion control in the MAC layer. It optimizes resource allocation, minimizes collisions and packet loss, reduces delay, and enhances overall network efficiency. These improvements ultimately lead to better quality of service, increased network capacity, and enhanced user experience in VANETs. It is worth noting that the specific performance improvements and benefits of HS-MLCA may vary depending on the implementation details, network conditions, and the specific VANET scenario. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Investigating Key Contributors to Hospital Appointment No-Shows Using Explainable AI
The healthcare sector has suffered from wastage of resources and poor service delivery due to the significant impact of appointment no-shows. To address this issue, this paper uses explainable artificial intelligence (XAI) to identify major predictors of no-show behaviours among patients. Six machine learning models were developed and evaluated on this task using Area Under the Precision-Recall Curve (AUC-PR) and F1-score as metrics. Our experiment demonstrates that Support Vector Classifier and Multilayer Perceptron perform the best, with both scoring the same AUC-PR of 0.56, but different F1-scores of 0.91 and 0.92, respectively. We analysed the interpretability of the models using Local Interpretable Model-agnostic Explanation (LIME) and SHapley Additive exPlanations (SHAP). The outcome of the analyses demonstrates that predictors such as the patients' history of missed appointments, the waiting time from scheduling time to the appointments, patients' age, and existing medical conditions such as diabetes and hypertension are essential flags for no-show behaviours. Following the insights gained from the analyses, this paper recommends interventions for addressing the issue of medical appointment no-shows. 2024 IEEE. -
Enhancing Stroke Prediction: Leveraging Ensemble Learning for Improved Healthcare
Stroke, a potentially deadly medical disorder, requires excellent prediction and prevention measures to minimize its impact on individuals and healthcare systems. In this study, ensemble learning techniques are employed to enhance the accuracy of stroke prediction. The method combines four different machine learning algorithms, Adaboost, CatBoost, XGBoost, and LightGBM, to produce a strong predictive model. The data was composed of a rich set of demographic, medical, and lifestyle information. The data was preprocessed and features were engineered to maximize predictive performance. Results showed that the stacked ensemble model, which is composed of Adaboost, CatBoost, XGB, LightGBM, and Logistic Regression, meta-model, outperformed other models. The model has the potential to be used as a decision support tool in an early stroke risk assessment system, enhancing clinician decision-making and improving healthcare outcomes. 2024 IEEE. -
Smart Vehicle Recognition System on Indian Roads Under Rainy Conditions
Recognition of vehicles under the different weather condition is very challenging. This work aims to recognize vehicles on Indian road in accordance with their visibility. It is important to recognize the surround roadside objects, particularly front and rare vehicles to avoid the accidents. Especially in raining conditions vehicle recognition is rate traffic surveillance cameras get decreases due to water droplets. Hence, we proposed a method for recognition of vehicles on road in rainy condition using image processing in computer vision techniques to improve the recognition rate. In the proposed method, an instance segmentation technique is used to segment the vehicles in Indian road scene and the visual noise and texture features are analysed and computed in the segmented images to recognize the vehicles more accurately in rainy conditions. By integrating the visual noise features with the texture feature and instance segmentation, the accuracy of vehicle recognition is improved. The experimental findings demonstrated that the suggested approach could more accurately predict the visibility of vehicles in rainy weather conditions. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Machine Learning-Based Imputation Techniques Analysis and Study
Missing values are a significant problem in data analysis and machine learning applications. This study looks at the efficacy of machine learning (ML) - based imputation strategies for dealing with missing data. K-nearest Neighbours (KNN), Random Forest, Support Vector Machines (SVM), and Median/Mean Imputation were among the techniques explored. To address the issue of missing data, the study employs k-nearest neighbors, Random Forests, and SVM algorithms. The dataset's imbalance is considered, and the mean F1 score is employed as an evaluation criterion, using cross-validation to ensure consistent results. The study aims to identify the most effective imputation strategy within ML models, offering crucial insights about their adaptability across various scenarios. The study aims to determine the best plan for data preprocessing in machine learning by comparing approaches. Finally, the findings help to improve our knowledge and application of imputation techniques in real-world data analysis and machine learning. 2024 IEEE. -
Contextual Recommendation System: A Revolutionary Approach Using Hadoop, Spark, NLP and LLMs
This study presents a novel framework for contextual recommendations on platforms like Wikipedia, integrating Hadoop, Spark, NLP, and LLMs. Leveraging these technologies, the framework aims to enhance user experiences by delivering personalized article suggestions aligned with their current interests. Through scalable data processing, advanced NLP techniques, and LLM-powered semantic understanding, the framework offers a transformative approach to recommendation systems, promising to revolutionize knowledge exploration on digital platforms. 2024 IEEE. -
A Heuristic Approach to Resolve Priority-Driven Unbalanced Transportation Problem (PUTP)
This research addresses the priority-driven unbalanced transportation Problem (PUTP), characterized by a situation where the overall demand surpasses the available supply. We propose the Max-flow Min-cost Priority-driven Unbalanced Transportation Problem (MMPUTP) as a heuristic approach to handle this issue effectively. The strategy of MMPUTP focuses on optimizing resource allocation and reducing costs, making it highly effective in fulfilling high priority needs in a cost-efficient manner. Through a comparison with Vogel's Approximation Method (VAM) over different sets of problems ranging in size from 5?5 to 50?50, the effectiveness of the MMPUTP algorithm is evident. The findings underscore the significance of choosing the right algorithm based on the size and complexity of the problem set in the context of the Priority-driven Unbalanced Transportation Problem, with MMPUTP proving to be a flexible and reliable option in various situations. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Smart Certificates Using Blockchain: A Review
When making job offers, it is usual practice for businesses to check applicants academic credentials. The organization that issued the certificate must authenticate it for the employer to ensure that it is genuine. Because of the lengthy process involved in certificate verification, the selection process takes longer overall while establishing the legitimacy of a certificate. To address this issue, blockchain provides a verified distributed ledger along with a cryptography mechanism to thwart academic credential counterfeiting. The Blockchain also provides a standardized platform for document access, storage, and verification that takes the least amount of time. The review of the methodologies and performance of the same has been covered in the paper. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Analyzing the Consumer Buying Behavior by Adapting Artificial Intelligence (AI)
In any business consumers or customers are important part of the market, so it is necessary to attract more customers for increasing the profits. The current research in this area has demonstrated that artificial intelligence (AI) has a substantial impact on the end customer, contrary to the widespread notion that it has more of an impact on industry than other manufacturers. There are many studies on the various applications of AI in analyzing and visualizing the consumer behavior. Thus, it is been observed the behavior of consumer is not same for same businesses, it varies from consumer to consumer. In other respects, AI is changing how consumers act right now. In coming year's use of AI will become common where the human dependable businesses also get automated with time. 2024 IEEE. -
Application of AI in Determining the Strategies for the Startups
Startups face unique challenges in developing viable strategies to create a competitive advantage and achieve long-term success in today's rapid and global business climate. Using tools powered by AI and algorithms, startups may harness massive amounts of data, generate relevant insights, and make intelligent choices across a variety of business processes. The research begins with an examination of the fundamental concepts beneath AI and how they are used in the business sector. It illustrates how organizations may simplify and improve important activities such as market research, customer segmentation, and trend analysis using artificial intelligence (AI), natural language understanding (NLU), as well as predictive analytics. The report also delves into extensive case studies and real-world examples of businesses that have effectively integrated AI into their business decision-making processes. These examples highlight the practical benefits of AI-driven insights that include enhanced resource allocation, customer targeting, as well as operational performance. It highlights the importance of ethical AI methodologies, transparency, and safeguards to ensure unbiased and fair decision-making. Finally, this study demonstrates how AI has the potential to profoundly transform how entrepreneurs design and implement their strategies. By leveraging AI-driven perspectives, startups may handle complex market dynamics with more precision and agility, increasing their chances of enduring and succeeding in a competitive business climate. The study's findings provide a road map for organizations wishing to apply AI in strategic decision-making processes. 2024 IEEE.