Browse Items (11810 total)
Sort by:
-
Real-time video segmentation using a vague adaptive threshold
For the last two decades, video shot segmentation has been a widely researched topic in the field of content-based video analysis (CBVA). However, over the course of time, researchers have aimed to improve upon the existing methods of shot segmentation in order to gain accuracy. Video shot segmentation or shot boundary analysis is a basic and vital step in CBVA, since any error incurred in this step reduces the precision of the other steps. The shot segmentation problem assumes greater proportions when detection is preferred in real time. A spatiotemporal fuzzy hostility index (STFHI) is proposed in this work which is used for edge detection of objects occurring in the frames of a video. The edges present in the frames are treated as features. Correlation between these edge-detected frames is used as a similarity measure. In a real-time scenario, the incoming images are processed and the similarities are computed for successive frames of the video. These values are assumed to be normally distributed. The gradients of these correlation values are taken to be members of a vague set. In order to obtain a threshold after defuzzification, the true and false memberships of the elements are computed using a novel approach. The threshold is updated as new frames are buffered in and is referred to as the vague adaptive threshold (VAT). The shot boundaries are then detected based on the VAT. The VAT for detecting the shot boundaries is determined by using the three-sigma rule on the defuzzified membership values. The effectiveness of the real-time video segmentation method is established by an experimental evaluation on a heterogeneous test set, comprising videos with diverse characteristics. The test set consists of videos from sports, movie songs, music albums, and documentaries. The proposed method is seen to achieve an average F1 score of 0.992 over the test set consisting of 15 videos. Videos from the benchmark TRECVID 2001 are selected for comparison with other state-of-the-art-methods. The proposed method achieves very high precision and recall, with an average F1 score of 0.939 on the videos chosen from the TRECVID 2001 dataset. This is a substantial improvement over the other existing methods. 2020 Elsevier Inc. -
An introductory illustration of medical image analysis
The medical imaging field has evolved into an enormous scientific discipline since the last decade of the 19th century. The analysis of medical data obtained by current image modalities such as positron emission tomography, magnetic resonance imaging, computed tomography, and ultrasound comes to the aid of the fruitful diagnosis, appropriate planning, and assessment of therapy for patients treatment and much more. Medical image analysis is crucial to grip this huge amount of data and to investigate and present the appropriate information for any particular medical task. In this chapter, different aspects with regard to medical image analysis are exhaustively explored. In particular, issues and challenges in connection with this task are investigated and described. In addition, a brief summary of the contributory chapters is presented to trace the challenges and findings of each. 2020 Elsevier Inc. All rights reserved. -
Mobile-Based Indian Currency Detection Model for the Visually Impaired
According to surveys held in 2019, India holds the largest population standing just after China, but when it comes to visually impaired people, India ranks number one. There are approximately 37 million people across India who are suffering from visual impairment. Special care and measures are taken to help these people live a peaceful life as any other citizen of India, but with the demonetization that happened in the recent years, the Indian economy was replaced with newer currency notes as an attempt to stop black money and fight corruption. Even though the objectives were clear and attainable, with the newer currency notes, the visually impaired people are facing various problems, as there is no provision for them to actually check the currency as the notes are not equipped with Braille system and the sizes of each and every currency is also the same in many cases. To counteract this problem, a mobile-based Indian currency detection model would be a better solution as it enables a visually impaired person to identify the value of specific currency he is holding. The mobile-based Indian currency detection model is the proposed model which will be using image processing for feature extraction and a basic CNN (convolutional neural network) for identification of currency with the given feature inputs. This model is being made into a mobile-based application so as to enable a visually impaired person to check for any possible frauds as fast as possible. 2020, Springer Nature Switzerland AG. -
Gut Microbiota and Cancer Correlates
The human microbiota is a concoction of bacteria, archaea, fungi, and other microorganisms. It is necessary to maintain a partnership between the host and the microbiota in order to maintain the different aspects of human physiology, such as nutrient absorption, immune function and metabolism. The microbiota can contribute to both progression and suppression of the disease, including cancer. A disturbance in this interspecies balance called microbiome dysbiosis becomes a reason for the host to be more prone to issues such as immunodeficiency and cancer. Gut microbiota could potentially influence the factors that govern cancer susceptibility and progression through mechanisms such as immunomodulation, by producing metabolites, such as, bacteriocins, antimicrobial peptides involved in tumor suppression, and short-chain fatty acids (SCFA), and through enzymatic degradation. It is now an established fact that the host physiology as well as risk of diseases such as cancer could be greatly modulated by these commensal microbes and the regulation of cancer development, progression as well as response to anticancer therapy is greatly dependent on the host microbiota. Therefore, it is being envisaged that by the involvement of microbiome in augmenting antitumor responses to therapeutic approaches, potentially a new era of research with potentially broad implication on cancer treatment could be established. Better cancer treatment responsiveness can be achieved by understanding the role of the tumor microbiome in shaping the tumor microenvironment. This will help us to develop personalized anticancer solution with the goal to discover a bacterial species or a combination of species that decreases systemic toxicity and helps in anticancer therapy. This chapter is written in same context, which focuses on the association of the gut microbiome with the suppression and progression of cancers, the role of the immune system in this interaction, the utilization of these organisms for the treatment of cancers, and future perspectives. Springer Nature Singapore Pte Ltd. 2021, corrected publication 2021. -
Optimization of Friction Stir Welding Parameters Using Taguchi Method for Aerospace Applications
The current research work investigated the optimization of the input parameters for the friction stir welding of AA3103 and AA7075 aluminum alloys for its applications in aerospace components. Friction stir welding is rapidly growing welding process which is being widely used in aerospace industries due to the added advantage of strong strengths without any residual stresses and minimal weld defects, in addition to its flexibility with respect to the position and direction of welding. Thus, the demand for this type of welding is very high; however, the welding of aluminum alloys is a key aspect for its use in aircraft components, particularly with respect to bracket mounting frames, braces and wing components. Henceforth in the current work, research is focused on optimization of welding of aluminum alloys, viz. AA 3103 and AA 7075; AA 3103 is a non-heat treatable alloy which is having good weldability, while AA 7075 is having higher strength. Therefore, the welding of these aluminum alloys will produce superior mechanical properties. The optimization of input parameters was accomplished in this work based on L9 orthogonal array designed in accordance with Taguchi methodusing which the friction stir welding experiment was conducted. There were nine experimental runs in total after formulating the L9 orthogonal array table in Minitab software. The input parameters which were selected for optimization weretool rotation speed, feed rate, tool pin profile. The output parameters which were optimized were hardness, tensile strength and impact strength. In addition, the microstructure of the fractured surfaces of the friction stir welded joint was analyzed. It was found from the optimization of the process parameters that strong friction stir welded joints for aerospace applications can be produced at an optimized set of parameters of tool rotational speed of 1100rpm, traverse speed of 15mm/min with a FSW tool of triangular pin profile of H13 tool steel material. 2020, Springer Nature Singapore Pte Ltd. -
Haptics: Prominence and Challenges
Derived from a Greek word meaning sense of touch, Haptic is a communication technology which applies tactile sensation for human-computer interaction with computers. Haptic technology, or haptics, is a tangible feedback technology that takes benefit of a users sense of touch by applying forces, sensations, or motions to the user. These objects are used to methodically probe human haptic capabilities, which would be complex to achieve without them. This innovative research tool gives an understanding of how touch and its core functions work. The article will provide a detailed insight into the working principles, uniqueness of the technology, its advantages and disadvantages along with some of its devices and notable applications. Future challenges and opportunities in the field will also be addressed. 2020, Springer Nature Switzerland AG. -
Detection and Behavioral Analysis of Preschoolers with Dyscalculia
Human behaviours are influenced by various factors that might impact their thought process. The way human beings response in situations have a strong connection with genetic makeup, cultural values and experiences from the past. Behaviour Analysis discusses the effect of human response to external/internal stimuli. This study helps in understanding behaviour changes among individuals suffering from various psychological disorders. Dyscalculia is one similar type of learning disorder [LD] which is commonly found among individuals and goes undetected for years. It is a lifelong condition which causes difficulty for people to perform mathematics-related tasks. Dyscalculia is quite eminent at every age. Since the symptoms are prominent from a young age, it can be detected at the earliest. Dyscalculia has no medical treatment but can be minimized by getting involved in some brain exercises especially created for children with Learning Disabilities. The chapter deals with minor research and the behaviour analysis for the above-mentioned disorder among pre-schoolers. In this chapter, a study of the behavioural patterns of pre-schoolers with dyscalculia is performed. This chapter also attempts to propose a model that can detect and predict the possibility of a child suffering from dyscalculia. It also includes a number of brain training activities that can help them to improve and enhance their confidence in mathematics. 2020, Springer Nature Switzerland AG. -
Embarrassment in the Context of Negative Emotions and Its Effects on Information Processing
Negative emotions are feelings of sadness arising out of negative evaluation of oneself by self or others. Embarrassment is characterized as a negative emotion which is experienced as a threat to ones social identity. This chapter discusses the differences between embarrassment and related negative emotions, namely shame, guilt and humiliation and its effects on information processing. Around 45 articles have been reviewed in the process, which were selected based on their relation to either negative emotions in general or specifically to one or more of them. The study uses the interactional (bio-psycho-social) approach to determine the antecedents and consequences of experiencing embarrassment and how it affects information processing. It further explores gender differences in the experience of negative emotions. Given that the existing evidence reveals many contradictory findings in the experience of negative emotions, this chapter conceptualizes certain factors that might influence this experience. It also provides some reasons for variations in experience of embarrassment and related negative emotions, on the basis of gender. This chapter concludes by proposing the complexity of embarrassment as an emotion and a conceptual framework of a continuum on which the experiences of embarrassment may lie and the factors determining the placement of these experiences with their cognitive implications. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2020, Corrected Publication 2020. -
Phytochemistry and antigenotoxic properties of six ethnobotanically important members from the family Zingiberaceae
Genotoxicity is considered as a potential cause of various diseases including cancer. During the last decade, herbal extracts attained a great deal of attention due to its safe and effective applications against various DNA damaging agents. However, the mechanism of DNA strand breaks by various mutagens and genotoxins is often correlated with the generation of Reactive Oxygen Species (ROS). Herbal extracts constitute a number of phytochemicals and those are reported to have considerable antioxidant properties, which are in turn capable of neutralizing ROS mediated DNA damage. The botanical family Zingiberaceae is reported to have significant antioxidant and antigenotoxic potential by various researchers. Among a number of species belonging to this family, six species, namely Alpinia galanga, A. zerumbet, Curcuma amada, C. caesia, Zingiber officinale, and Z. zerumbet, attract notable attention due to their remarkable ethnobotanical and medicinal importance. This chapter deals with phytochemical composition, antioxidant, and antigenotoxic properties of these six Zingiberaceous plant extracts. 2020 by IGI Global. All rights reserved. -
Impact of Meltdown and Spectre Threats in Parallel Processing
Threat characterization is critical for associations, as it is an imperative move towards execution of data security. Vast majority of the current threat characterizations recorded threats in static courses without connecting risks to information system zones. The aim of this paper is to represent each threat in different areas of the information system the methodology to solve the problem. Data security is habitually represented to different kinds of threats which may cause distinctive types of harms that can prompt to critical monetary losses. Data security problems can go from small losses to entire data framework destruction. The effect of various threats vary extensively: some manipulate the integrity or confidentiality of information while others manipulate the accessibility of a framework. At present, associations are trying to comprehend what are the threats to their data resources are and what are the ways to get the significant intends to combat them which keep on representing a challenge. Springer Nature Switzerland AG 2020. -
Quantum optimization for machine learning
Machine learning is a branch of Artificial Intelligence that seeks to make machines learn from data. It is being applied for solving real world problems with huge amount of data. Though, Machine Learning is receiving wide acceptance, however, execution time is one of the major concerns in practical implementations of Machine Learning techniques. It largely comprises of a set of techniques that trains a model by reducing the error between the desired or actual outcome and an estimated or predicted outcome, which is often called as loss function. Thus, training in machine learning techniques often requires solving a difficult optimization problem, which is the most expensive step in the entire model-building process and its applications. One of the possible solutions in near future for reducing execution time of training process in Machine learning techniques is to implement them on quantum computers instead of classical computers. It is conjectured that quantum computers may be exponentially faster than classical computers for solving problems which involve matrix operations. Some of the machine learning techniques like support vector machines make extensive use of matrices, which can be made faster by implementing them on quantum computers. However, their efficient implementation is non-trivial and requires existence of quantum memories. Thus, another possible solution in near term is to use a hybrid of Classical Quantum approach, where a machine learning model is implemented in classical computer but the optimization of loss function during training is performed on quantum computer instead of classical computer. Several Quantum optimization algorithms have been proposed in recent years, which can be classified as gradient based and gradient free optimization techniques. Gradient based techniques require the nature of optimization problem being solved to be convex, continuous and differentiable otherwise if the problem is non-convex then they can find local optima only whereas gradient free optimization techniques work well even with non-continuous, non-linear and nonconvex optimization problems. This chapter discusses a global optimization technique based on Adiabatic Quantum Computation (AQC) to solve minimization of loss function without any restriction on its structure and the underlying model, which is being learned. Further, it is also shown that in the proposed framework, AQC based approach would be superior to circuit-based approach in solving global optimization problems. 2020 Walter de Gruyter GmbH, Berlin/Boston. All rights reserved. -
Quantum inspired automatic clustering algorithms: A comparative study of genetic algorithm and bat algorithm
This article is intendant to present two automatic clustering techniques of image datasets, based on quantum inspired framework with two different metaheuristic algorithms, viz., Genetic Algorithm (GA) and Bat Algorithm (BA). This work provides two novel techniques to automatically find out the optimum clusters present in images and also provides a comparative study between the Quantum Inspired Genetic Algorithm (QIGA) and Quantum Inspired Bat Algorithm (QIBA). A comparison is also presented between these quantum inspired algorithms with their analogous classical counterparts. During the experiment, it was perceived that the quantum inspired techniques beat their classical techniques. The comparison was prepared based on the mean values of the fitness, standard deviation, standard error of the computed fitness of the cluster validity index and the optimal computational time. Finally, the supremacy of the algorithms was verified in terms of the p-value which was computed by t-test (statistical superiority test) and ranking of the proposed procedures was produced by the Friedman test. During the computation, the betterment of the fitness was judge by a well-known cluster validity index, named, DB index. The experiments were carried out on four Berkeley image and two real life grey scale images. 2020 Walter de Gruyter GmbH, Berlin/Boston. All rights reserved. -
Supply chain leadership in emerging markets: Understanding the role of trust, information management, and collaboration
The massive growth of emerging economies in last two decades has attracted many global companies to expand their physical presence in these countries. But the ability to take advantage of those opportunities is only available to companies that appreciate the environmental challenges and complexity of the region. The lexicon of extant literature focuses on enhancing supply chain leadership and development of efficient and effective strategies in developed economies, yet the corresponding literature in emerging economies is very fragmented. The aim of this chapter is to synthesize the current literature to understand the phenomenon including its definitions, dimensions, and constructs and to propose a conceptual model for successful supply chain leadership in emerging markets. The study tries to understand and establish the impact of various factors of supply chain leadership, which leads to sustainable supply chain performance. Collaboration and information management emerge as the major drivers for supply chain leadership in emerging markets and identifies trust as a mediating factor. 2020 by IGI Global. All rights reserved. -
Introduction to quantum machine learning
Quantum Machine Learning (QML) is popularly known to be an integrative approach to learning of the Quantum Physics (QP) and Machine Learning (ML). In this chapter, an outline of the fundamental ideas and features related to quantum machine learning is laid out. The different facets of quantum algorithms are discussed in this chapter. In addition to this, the basic features of quantum reinforcement learning and quantum annealing are also provided in this chapter. Finally, the chapter deliberates about the advancement of quantum neural networks to through light in the direction of QML. 2020 Walter de Gruyter GmbH, Berlin/Boston. All rights reserved. -
Modeling destination competitiveness: The unfamiliar shift for destination rebranding, restructuring, and repositioning with DMOs
Tourism is a tactical economic practice across the globe, but the urban and provincial transformations in the industry are strongly contemplated in the light of an unfamiliar shift in tourism business. This chapter discusses an integrated concept with a framework relating systematic approach of managing the destination and its competitiveness. An investigation on the impact on tourism and the recent narrative of national, regional, and local planning approach directs towards efficient destination management organizations (DMO) in practice for future development. This has proceeded by the formation of a competitive approach, emphasizing on the DMO roles and responsibilities helpful for a destination management during an unfamiliar business trend. Modeling destination competitiveness demands an absolute mechanism through destination rebranding, restructuring, and repositioning with DMOs for enabling competency. 2018, IGI Global. -
Handwritten digit recognition using convolutional neural networks
Optical character recognition (OCR) systems have been used for extraction of text contained in scanned documents or images. This system consists of two steps: character detection and recognition. One classification algorithm is required for character recognition by their features. Character can be recognized using neural networks. The multilayer perceptron (MLP) provides acceptable recognition accuracy for character classification. Moreover, the convolutional neural network (CNN) and the recurrent neural network (RNN) are providing character recognition with high accuracy. MLP, RNN, and CNN may suffer from the large amount of computation in the training phase. MLP solves different types of problems with good accuracy but it takes huge amount of time due to its dense network connection. RNNs are suitable for sequence data, while CNNs are suitable for spatial data. In this chapter, a CNN is implemented for recognition of digits from MNIST database and a comparative study is established between MLP, RNN, and CNN. The CNN provides the higher accuracy for digit recognition and takes lowest amount of time for training the system with respect to MLP and RNN. The CNN gives better result with accuracy up to 98.92% as the MNIST digit dataset is used, which is spatial data. 2020 Walter de Gruyter GmbH, Berlin/Boston. All rights reserved. -
Towards connected government services: A cloud software engineering framework
Cloud computing technologies are being used highly successfully in large-scale businesses. Therefore, it is useful for governments to adopt cloud-driven multi-channel, and multiple devices to offer their services such as e-tax, e-vote, e-health, etc. Since these applications require open, flexible, interoperable, collaborative, and integrated architecture, service-oriented architecture approach can be usefully adopted to achieve flexibility and multi-platform and multi-channel integration. However, its adoption needs to be systematic, secure, and privacy-driven. In this context, micro services architecture (MSA), a direct offshoot of SOA, is also a highly attractive mechanism for building and deploying enterprise-scale applications. This chapter proposes a systematic framework for cloud e-government services based on the cloud software engineering approach and suggests a cloud adoption model for e-government, leveraging the benefits of MSA patterns. The proposed model is based on a set of evaluated application characteristics that, in turn, support emerging IT-based technologies. 2021 by IGI Global. All rights reserved. -
Does fdi intensify economic growth? Evidence from china and India
[No abstract available] -
Trade in renewable energy technologies: A comparison of India and China
[No abstract available] -
Security mechanisms in cloud computing-based big data
In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes. 2021, IGI Global.