Browse Items (11810 total)
Sort by:
-
Cognitive technology in human capital management: a decision analysis model in the banking sector during COVID-19 scenario
Cognitive technologies are products of the artificial intelligence (AI) domain which execute tasks that only humans used to perform. The impact of cognitive technologies on the management of human capital (HC) has a massive effect in the banking sector. This paper studies the transformation of cognitive technology to human capital management (HCM) in the banking sector during the COVID-19 pandemic. The study draws data from 201 bank employees working in private, public, and foreign banks using a multi-stage sampling method in India. A number of hypotheses were framed and tested using multivariate and regression analyses. The results from the study indicate a significant change in the performances of bank employees statistically during the transformation of cognitive technologies. Cognitive technologies such as payment, product customisation, self-services, workload alleviation, automated back-office function, and a personalised experience significantly contribute to the HCM. 2024 Inderscience Enterprises Ltd. -
CoInMPro: Confidential Inference and Model Protection Using Secure Multi-Party Computation
In the twenty-first century, machine learning has revolutionized insight generation by using historical data across domains like health care, finance, and pharma. The effectiveness of machine learning solutions depends largely on the collaboration between data owners, model owners, and ML clients, without privacy concerns. The existing privacy-preserving solutions lack efficient and confidential ML inference. This paper addresses this inefficiency by presenting the Confidential Inference and Model Protection, also known as the CoInMPro, to solve the privacy issue faced by model owners and ML clients. The CoInMPro technique is suggested with an aim to boost the privacy of model parameters and client input during ML inference, without affecting the accuracy and by paying a marginal performance cost. Secure multi-party computation (SMPC) techniques were used to calculate inference results confidentially after sharing client input and model parameters privately from different model owners. The technique was implemented in Python language using the open-source SyMPC library to support the SMPC function. The Boston Housing Dataset was used, and the experiments were run on Azure data science VM using Ubuntu OS. The result suggests CoInMPros effectiveness in addressing privacy concerns of model owners and inference clients, with no sizable impact on accuracy and trade-off. A linear impact on performance was noted with an increase of secure nodes in the SMPC cluster. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Cold spray deposition of hydroxyapatite powder onto magnesium substrates for biomaterial applications
A simple, modified, cold spray process was developed in which hydroxyapatite powder was coated onto pure magnesium substrates preheated to 350 or 550C and ground to either 240 or 2000 grit surface roughness, with stand-off distances of 20 or 40 mm. The procedure was repeated five and 10 times. The hydroxyapatite coatings did not show any phase changes. Atomic force microscopy revealed a uniform coating topography, and scanning electron microscopy revealed good bonding between the coated layers and the substrates. As the p values were < 0.05, all factors except the number of sprays were considered to be significant. The response optimiser indicated that a 22.7 mm stand-off distance, a 649.2 grit surface roughness and a 496C substrate heating temperature produced good hydroxyapatite coatings of 46.3 ?m thickness, 436.5 MPa nanohardness and 43.9 GPa elastic modulus. The modified cold spray technique with substrate heating showed promising results in terms of product coating thickness and mechanical properties. 2015 Institute of Materials, Minerals and Mining. -
Collaboration between gram panchayat and women self-help groups on rural development in karnataka
Mahatma Gandhi said, Indiaand#8223;s development relays on development in rural India. To see a developed India, we must develop villages in India. India is trying to improve the living standard of rural people since Independence. Government, Non-Government Organizations, Voluntary Groups, and many individuals are making continuous efforts for decades to improve rural condition. There is a positive change and growth, but the achieved results are not satisfactory in relation to need, the available resources, opportunities, and the efforts made. What are the root causes of failures? Are there necessary coordination and collaboration among the development efforts to optimize the fruits and minimize the loss of human and material resources? Gram Panchayat Institutions and Self-Help Groups by women are two of major efforts which became very powerful means to empower and develop rural people. The Constitution (73rd Amendment) Act, 1992 became a land-mark by establishing Panchayat Raj Institutions (PRI) in Indiaand#8223;s effort for rural development and reaching out the democracy to grass-root level by newlineforming Panchayat Raj Institutions with three tier system. The Reservation policy of 72nd newlineAmendment Act was another turning point in empowering effort. NGOs initiated Self-Help newlineGroups in India in early 1990s and later Government also supported and promoted the newlineinitiative. Will the Collaboration between the Gram Panchayat Institutions and Women SelfHelp Groups enhance development of rural area through higher level of Community newlineParticipation is the research question here. newlineThere are many writings, studies and evaluations on Gram Panchayat Institutions and SelfHelp Groups by women to assess the existing condition, and to make the efforts more efficient and effective towards rural empowerment and development. Still, studies on impact of collaboration between Gram Panchayat and Women Self-Help Groups on rural newlinedevelopment are missing. -
Collaborative intrusion detection system in cognitive smart city network (CSC-Net)
Smart environment is about incorporating smart thinking in the environment and implementing the technical intervention that improvise the city's environment. Artificial intelligence (AI) provides solutions in huge technological issues in various aspects of day-to-day life such as autonomous transportation, governance, healthcare, agriculture, maintenance, logistics, and education that are automated, managed, controlled, and accessed remotely with the aid of smart devices. Cognitive computing is denoted as a next-generation AI-dependent method that gives human-computer interactions with personalized services that replicate manual behavior. Simultaneously, massive data is generated from the applications of the smart city like smart transportation, retail industry, healthcare, and governance. It is necessary to obtain a reliable, sustainable, continuous, and secure framework in the cloud centralized infrastructure. In this research article, the authors proposed the architecture of cognitive smart city network (CSC-Net) that defines how data are collected from applications of smart city and scrutinized by cognitive computing. This research article predicts the mobile edge computing solution (MEC) that permits node collaboration between internet of things (IoT) devices for providing secure and reliable communication among smart devices and fog layer, conversely fog layer and cloud layer. This proposed work helps to reduce the excessive traffic flow in smart environment with the support of node to node communication protocols. Collaborative-dependent intrusion detection system (C-IDS) is proposed to solve the data security issues in fog and cloud layers. Copyright 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. -
Collision avoidance using gazebo simulator
Autonomous cars will make its complete presence on roads in the future. A major feature of autonomous cars currently under research is collision avoidance on roads. Better collision avoidance systems could result in a decrease in number of accidents. Smart collision avoidance systems could handle the increasing amount of vehicles on roads. Collision avoidance system provides alert to the autonomous vehicles if an unavoidable collision is detected. When the collision is definite to happen, collision avoidance system takes action by its own without any driver input (by braking or steering or both). Collision avoidance system does the obstacle avoidance by gathering information about the environment with the help of sensors embedded in the system. The effectiveness of collision avoidance system depends upon the speed at which the system reacts from the gathered inputs. This paper uses the Gazebo simulation to design and implement collision avoidance. This paper also present a simple and effective obstacle avoidance algorithm for a simulated robot. Turtlebots Obstacle Avoider algorithm is attached to the robot in the simulator with the support of ROS(Robotic operating system) to implement collision avoidance. BEIESP. -
Colonialism and Communalism: Religion and Changing Identities in Modern India
Christhu Doss examines how the colonial construct of communalism through the fault lines of the supposed religious neutrality, the hunger for the bread of life, the establishment of exclusive village settlements for the proselytes, the rhetoric of Victorian morality, the booby-traps of modernity, and the subversion of Indian cultural heritage resulted in a radical reorientation of religious allegiance that eventually created a perpetual detachment between proselytes and the others. Exploring the trajectories of communalism, Doss demonstrates how the multicultural Indian society, known widely for its composite culture, and secular convictions were categorized, compartmentalized, and communalized by the racialized religious pretensions. A vital read for historians, political scientists, sociologists, anthropologists, and all those who are interested in religions, cultures, identity politics, and decolonization in modern India. 2024 M. Christhu Doss. -
Colonoscopy contrast-enhanced by intuitionistic fuzzy soft sets for polyp cancer localization
Medical images often suffer from low contrast, irregular gray-level spacing and contain a lot of uncertainties due to constraints of imaging devices and environment (various lighting conditions) when capturing images. In order to achieve any clinical-diagnosis method for medical imaging with better comprehensibility, image contrast enhancement algorithms would be appropriate to improve the visual quality of medical images. In this paper, an automated image enhancement method is presented for colonoscopy images based on the intuitionistic fuzzy soft set. The fuzzy soft set is used to model the intuitionistic fuzzy soft image matrix based on a set of soft features of the colonoscopy images. The technique decomposes the fuzzy image into multiple blocks and estimates a soft-score based on an adaptive soft parametric hesitancy map by using the hesitant entropy for each block to quantify the uncertainties. In the processing stage, an adaptive intensity modification process is done for each block according to its soft-score. These scores are accurately addressed the gray-level ambiguities in colonoscopy images that lead to better results. Finally, the enhanced image achieved by performing a defuzzification together with all unprocessed blocks. Qualitative and quantitative assessments demonstrate that the proposed method improves image contrast and region-of-interest of polyps in colonogram. Experimental results on enhancing a large CVC-Clinic-DB and ASU-Mayo clinic colonoscopy benchmark datasets show that the proposed method outperforms the state-of-the-art medical image enhancement methods. 2020 Elsevier B.V. -
Color image segmentation based on improved sine cosine optimization algorithm
Segmentation refers to the process of dividing an image into multiple regions based on some criteria such as intensity and color. In recent years, color image segmentation has received considerable attention from the researchers. However, it is still a highly complicated task due to the presence of more attributes or components as compared to monochrome images. Numerous meta-heuristics algorithms are developed to determine the optimal threshold value for segmenting color images efficiently. This paper presents an enhanced sine cosine algorithm (ESCA) to seek threshold for segmenting color images. Sine cosine algorithm (SCA) is a population-based optimization algorithm which has the ability of preventing local minima problem. First an input image is transformed to CIE L*a*b* color reduced space. ESCA is applied to determine the optimal threshold values for segmentation. The performance of the proposed method is tested on color images from Berkeley database, and segmentation results are compared with two metaheuristic algorithms, namely particle swarm optimization (PSO) and standard SCA. Experimental results are validated by measuring peak signalnoise ratio (PSNR), structural similarity index and computation time for all the images investigated. Results revealed that the proposed method outperforms the other methods like PSO and SCA by achieving PSNR of 23dB and SSIM of 0.93 and also require less time for finding optimal threshold values than PSO and SCA. 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature. -
Colorimetric and theoretical investigation of coumarin based chemosensor for selective detection of fluoride
Coumarin based Sensor 1 has been designed and synthesized to recognize fluoride ion visually with high selectivity and sensitivity over other anionic analytes through color change from very faint yellow to pink in acetonitrile. The probable binding phenomenon in solution phase has been explained by 1H NMR study of sensor 1 with different concentration of fluoride ions. The binding constant of the sensor 1 with fluoride has been determined as 3.9 104 M?1 and the lower detection limit 6.5 M of the sensor 1 towards fluoride, which has made the sensor 1 as a promising backbone for selective detection of fluoride. For the practical application, test strips based on sensor 1 were fabricated, which could act as a convenient and efficient naked eye F?test kits. The experimentally observed absorption maxima along with its binding nature with fluoride ions also have been supported through theoretical calculations using density functional theory (DFT) calculations. 2022 -
Coloring of n-inordinate invariant intersection graphs
In the literature of algebraic graph theory, an algebraic intersection graph called the invariant intersection graph of a graph has been constructed from the automorphism group of a graph. A specific class of these invariant intersection graphs was identified as the n-inordinate invariant intersection graphs, and its structural properties has been studied. In this article, we study the different types of proper vertex coloring schemes of these n-inordinate invariant intersection graphs and their complements, by obtaining the coloring pattern and the chromatic number associated. 2024 The Author(s) -
Coloring of Non-zero Component Graphs
The non-zero component graph of a finite dimensional vector space V over a finite field F is the graph G(V?) = (V, E), where vertices of G(V?) are the non-zero vectors in V, two of which are adjacent if they share at least one basis vector with non-zero coefficient in their basic representation. In this paper, we study the various types of colorings of non-zero component graph. (2024), (Universidad Catolica del Norte). All rights reserved. -
Colouring of (P3? P2) -free graphs
The class of 2 K2-free graphs and its various subclasses have been studied in a variety of contexts. In this paper, we are concerned with the colouring of (P3? P2) -free graphs, a super class of 2 K2-free graphs. We derive a O(?3) upper bound for the chromatic number of (P3? P2) -free graphs, and sharper bounds for (P3? P2, diamond)-free graphs and for (2 K2, diamond)-free graphs, where ? denotes the clique number. The last two classes are perfect if ?? 5 and ? 4 respectively. 2017, Springer Japan KK, part of Springer Nature. -
COLPOUSIT: A Hybrid Model for Tourist Place Recommendation based on Machine Learning Algorithms
Tourism is an important sector for a country's economic growth. The travel recommendations should be made focused on better growth and attract more travelers. There is a huge amount of travel information and ideas available on the web that allows the users to make poor travel decisions. This paper focuses on building a hybrid travel recommender system by implementing collaborative-based, popularity-based, and nearby place weighted recommender system. The proposed system recommends the travel spots to the users based upon their interests and other criteria specified. In order to implement these methods, we applied a comparative study on different machine learning algorithms for collaborative-based approach and have performed weighted hybridization. These methods provide a personalized and customized list of similar places with respect to places of interest to the users. Thus, a hybrid system built using these methods provides a better recommendation of places with the advantages of these methods. The obtained results confirm that the hybrid method better than other recommender approaches when used separately. 2021 IEEE. -
Combatting Phishing Threats: An NLP-Based Programming Approach for Detection of Malicious Emails and Texts
Attackers are employing more advanced strategies to trick people into divulging private information or carrying out harmful deeds, and phishing is still a serious cybersecurity risk. We provide a new method in this study that combines algorithms based on AI-based expert systems and deep learning (ML) with the use of NLP-based programming (NLP) approaches to identify fraudulent emails and messages. Using a variety of datasets that include samples of both authentic and phishing messages, our approach preprocesses textual data, extracts relevant characteristics, and trains AI-based expert systems and deep learning models. Metrics including accuracy, precision, recall, and F1-score are used to assess the effectiveness of different AI-based expert systems and deep learning methods, such as logistic regression, random forests, decision trees, and neural networks, among others. To collect semantic information and increase detection accuracy, we also investigate the integration of sophisticated NLP-based techniques, such as word embeddings. The efficacy of our suggested strategy in reducing this common cybersecurity issue is highlighted by our results, which show promising performance in correctly recognizing phishing attempts. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Combinational edge detection using multiple color channels and GrabCut
Identification of edges is very important in feature extraction and pattern recognition. An edge of an image detected by converting it from RGB format to a Grayscale image and can sometimes be inefficient and inaccurate. This inefficiency is caused due to various color differences that get erased or rewritten during the process of grayscale conversion. Edge locations in a colored image are derived by analysing the variations in the multiple color channels and merging the gradients in these channels to compute a single edge snapping vector field, which is derived using the Euclidean distances between two distinct pixels in an image. This lets to retain the various multidimensional characterizations of color channels of an image as the color differences can be closely calculated using human perceptions. Hence this method is proved to provide more accuracy in edge detection. Furthermore, the results are improved when combined with a finer edge detection method GrabCut, which allows the user to detect the edges in an image using reduced iterations. The proposed paper uses a combinational approach to efficiently acquire edges in the image by enhancing the color properties of an image and then using the GrabCut method to retrieve the edges present in an image. IAEME Publication. -
Combined effect of channel to rib width ratio and gas diffusion layer deformation on high temperature Polymer electrolyte membrane fuel cell performance
The present study investigates the combined influence of Channel to Rib Width (CRW) ratio and clamping pressure on the structure and performance of High Temperature-Polymer Electrolyte Membrane Fuel Cell (HT-PEMFC) using a three-dimensional numerical model developed previously. It also considers the impact of interfacial contact resistance between the Gas Diffusion Layer (GDL) and Bipolar Plate (BPP). The structural analysis of the single straight channel HT-PEMFC geometry shows that the von-Mises stress greatly increases in the GDL under the ribs as the CRW ratio increases resulting in considerably high deformation. The cell performance analysis depicts the significance of ohmic resistance and concentration polarization for different CRW ratios, particularly at higher operating current densities. However, in low to medium current density regions, the CRW ratio has little influence on cell performance. A substantial impact on the species, overpotential, and current distributions is observed. The findings also reveal that the CRW ratio significantly affects the temperature distribution in the cell. 2022 Hydrogen Energy Publications LLC -
Combined weighted feature extraction and deep learning approach for chronic obstructive pulmonary disease classification using electromyography
The COVID-19 outbreak has led to a rise in respiratory disease-related deaths, including Chronic Obstructive Pulmonary Disease (COPD). Early diagnosis of COPD is crucial, but it can be challenging to distinguish between different chronic pulmonary diseases due to their similar symptoms, leading to misdiagnosis and time-consuming manual inspections. To address this issue, this paper explores the use of a deep learning model to differentiate COPD from other lung diseases using lung sound captured during Electromyography (EMG). The model includes steps such as noise removal, data augmentation, combined weighted feature extraction, and learning. The model's efficacy was evaluated using various metrics, including accuracy, precision, recall, F1-score, kappa coefficient, and Matthews correlation coefficient (MCC), with and without augmentation. The results show that the model achieved 93% accuracy and outperformed other existing state-of-the-art deep learning models, increasing the robustness of clinical decision-making. The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2023. -
Combining Text Information and Sentiment Dictionary for Sentiment Analysis on Twitter During Covid
Presence of heterogenous huge data leads towards the 'big data' era. Technique's proliferation is rapidly increasing data and making dynamic changes that results in 'big data' world. Progressive transition in technologies and adoption of social media in the society also stepped into the 'big data' epoch. Social media popularity is uprising attention in the community. This platform reduces the communication gap among people. Recently, tweeter use increased with unprecedented rate. Presence of social media like tweeter has broken the boundaries and touches the mountain in generating the unstructured data. It opened research gate with great opportunities for analyzing data and mining 'valuable information'. Sentiment analysis is the most demanding, versatile research to know user viewpoint. Society current trend can be easily observed through social network websites. These opportunities bring challenges that leads to proliferation of tools. This research works to analyze sentiments using tweeter data using Hadoop technology. This study explores the big data arduous tool called Hadoop. Further, it explains the need of Hadoop in present scenario and role of Hadoop in storing ample of data and analyzing it. Hadoop cluster, HDFS, and Hive are also discussed in detail. Researchers enthusiastic work is deeply studied and presented here. Dataset used in performing the experiment is explained briefly. Moreover, this research explains thoroughly the implementation work and provide workflow. Next session provides the experimental results and analyzes of result. Finally, last session concludes the paper, its purpose, and how it can be used in upcoming research. 2024 IEEE.