Browse Items (11810 total)
Sort by:
-
Body mass index implications using data analysis in the soccer sports
Soccer is considered among the most popular sports in the world among the last few years. At the same time, it has become a prime target in developing countries like India and other Asian countries. As science and technology grow, we can see that sports also grow with science, and hence technology being used to determine the results sometime or sometimes it is used to grow the overall effect. This paper presents the attributes and the qualities which are necessary to develop in a player in order to play for the big-time leagues called Premier League, La Liga, Serie A, German Leagues and so on. Simple correlation and dependence techniques have been used in this paper in order to get proper relationship among the attributes. This paper also examines how the body mass index plays an effect on the presentation of soccer players with respect to their speed, increasing speed, work rate, aptitude moves and stamina. The point is likewise to discover the connection of the above credits concerning body mass index. As in universal exchange, football clubs can profit more in the event that they have practical experience in what they have or can make a similar bit of room to maneuver. In a universe of rare assets, clubs need to recognize what makes them effective and contribute in like manner. Springer Nature Singapore Pte Ltd 2021. -
Analysis of attention deficit hyperactivity disorder using various classifiers
Attention Deficit Hyperactivity Disorder (ADHD) is a neurobehavioral childhood impairment that wipes away the beauty of the individual from a very young age. Data mining classification techniques which are becoming a very important field in every sector play a vital role in the analysis and identification of these disorders. The objective of this paper is to analyze and evaluate ADHD by applying different classifiers like Nae Bayes, Bayes Net, Sequential Minimal Optimization, J48 decision tree, Random Forest, and Logistic Model Tree. The dataset employed in this paper is the first publicly obtainable dataset ADHD-200 and the instances of the dataset are classified into low, moderate, and high ADHD. The analysis of the performance metrics and therefore the results show that the Random Forest classifier offers the highest accuracy on ADHD dataset compared to alternative classifiers. With the current need to provide proper evaluation and management of this hyperactive disorder, this research would create awareness about the influence of ADHD and can help ensure the proper and timely treatment of the affected ones. Springer Nature Singapore Pte Ltd 2021. -
Ocr system framework for modi scripts using data augmentation and convolutional neural network
Character recognition is one of the most active research areas in the field of pattern recognition and machine intelligence. It is a technique of recognizing either printed or handwritten text from document images and converting it to a machine-readable form. Even though there is much advancement in the field of character recognition using machine learning techniques, recognition of handwritten MODI script, which is an ancient Indian script, is still in its infancy. It is due to the complex nature of the script that includes similar shapes of character and the absence of demarcation between words. MODI was an official language used to write Marathi. Deep learning-based models are very efficient in character recognition tasks and in this work an ACNN model is proposed using the on-the-fly data augmentation method and convolution neural network. The augmentation of the data will add variability and generalization to the data set. CNN has special convolution and pooling layers which have helped in better feature extraction of the characters. The performance of the proposed method is compared with the most accurate MODI character recognition method reported so far and it is found that the proposed method outperforms the other method. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021. -
Tag indicator: a new predictive tool for stock trading
In this paper, TAGan indicator for stock market prediction in which volume-based means for measuring potential trading and investing decision-making is introduced. This task has been in correlation of the changes in the volume with the changes in the actual trade volume. Using this, a concise trading strategy is formulated. Hoping to outperform the market and analyze the results by back testing across intraday, price data for the last 1 year, 2019, is performed. It was discovered that about 48.9% of the time, the volume-based trading strategy outperformed and the returns from market are also healthy enough to support the claim. Statistical methods like linear regression, mean square error in prediction and stochastic gradient descent are applied. Furthermore, while the scope of the study was limited to a few stocks in Nifty in order to mitigate selection bias, nonetheless, we hypothesize that numerous other assets that similarly possess a predictable correlation to volumes based on daily high and low are likely to exist. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021. -
Diabetic retinopathy detection using convolutional neural networka study
Detection and classification of Diabetic Retinopathy (DR) is a challenging task. Automation of the detection is an active research area in image processing and machine learning. Conventional preprocessing and feature extraction methods followed by classification of a suitable classifier algorithm are the common approaches followed by DR detection. With the advancement in deep learning and the evolution of Convolutional Neural Network (CNN), conventional preprocessing and feature extraction steps are rapidly being replaced by CNN. This paper reviews some of the recent contributions in diabetic retinopathy detection using deep architectures. Further, two architectures are implemented with minor modifications. Experiments are carried out with different sample sizes, and the detection accuracies of the two architectures are compared. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021. -
Toxic text classification
The users of the Internet increase every moment with increasing population and accessibility of the Internet. With the increase in the number of users of the Internet, the number of controversies, arguments and abuses of all kinds increases. It becomes necessary for social media and other sites to identify toxic content amongst a large number of content being posted by the users of the sites every second. The traditional algorithms that depend on users reporting toxic content for it to be deleted and necessary actions to be taken against the users posting the content would take a long time, within which it would have gained media attention and would have lead to huge fights over the content. Thus, it becomes important for the content to be evaluated for toxicity at the time it is posted in order to stop it from being posted. Therefore, we have designed and trained a deep learning model that can be read through the textual content given through it and determine if it is toxic or not. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021. -
Algorithms for the metric dimension of a simple graph
Let G = (V, E) be a connected, simple graph with n vertices and m edges. Let v1, v2 $$\in$$ V, d(v1, v2) is the number of edges in the shortest path from v1 to v2. A vertex v is said to distinguish two vertices x and y if d(v, x) and d(v, y) are different. D(v) as the set of all vertex pairs which are distinguished by v. A subset of V, S is a metric generator of the graph G if every pair of vertices from V is distinguished by some element of S. Trivially, the whole vertex set V is a metric generator of G. A metric generator with minimum cardinality is called a metric basis of the graph G. The cardinality of metric basis is called the metric dimension of G. In this paper, we develop algorithms to find the metric dimension and a metric basis of a simple graph. These algorithms have the worst-case complexity of O(nm). The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021. -
A Document Clustering Approach Using Shared Nearest Neighbour Affinity, TF-IDF and Angular Similarity
Quantum of data is increasing in an exponential order. Clustering is a major task in many text mining applications. Organizing text documents automatically, extracting topics from documents, retrieval of information and information filtering are considered as the applications of clustering. This task reveals identical patterns from a collection of documents. Understanding of the documents, representation of them and categorization of documents require various techniques. Text clustering process requires both natural language processing and machine learning techniques. An unsupervised spatial pattern identification approach is proposed for text data. A new algorithm for finding coherent patterns from a huge collection of text data is proposed, which is based on the shared nearest neighbour. The implementation followed by validation confirms that the proposed algorithm can cluster the text data for the identification of coherent patterns. The results are visualized using a graph. The results show the methodology works well for different text datasets. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Classifying bipolar personality disorder (bpd) using long short-term memory (lstm)
With the advancement in technology, we are offered new opportunities for long-term monitoring of health conditions. There are a tremendous amount of opportunities in psychiatry where the diagnosis relies on the historical data of patients as well as the states of mood that increase the complexity of distinguishing between bipolar disorder and borderline disorder during diagnosis. This paper is inspired by prior work where the symptoms were treated as a time series phenomenon to classify disorders. This paper introduces a signature-based machine learning model to extract unique temporal pattern that can be attributed as a specific disorder. This model uses sequential nature of data as one of the key features to identify the disorder. The cases of borderline disorder that are either passed down genetically from parents or stem from exposure to intense stress and fear during childhood are discussed in this study. The model is tested with the synthetic signature dataset provided by the Alan Turing Institute in signature-psychiatry repository. The end result has 0.95 AUC which is an improvement over the last result of 0.90 AUC. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021. -
Faulty Node Detection Using Vertex Magic Total Labelling in Distributed System
Distributed system consists of huge number of nodes that are connected to a network, which is mainly intended and predominantly used for information sharing. Large users are prone to share data through the network and the stability and reliability of the nodes are remaining as the major concern in this system. Therefore, the inconsistent message transmission causes the nodes in the network to act differently, which would not be acceptable. A rapid method of malfunctioning nodes detection can improve the QoS of distributed computing environment. In this paper, a novel algorithm is proposed based on the calculation of vertex magic total labelling (VMTL) value for each and every node in the network. Upon receiving the message from the sender node, the receiver node will quickly detect the faulty node by comparing the VMTL pivot value (Pv). Experimental results show that the proposed approach leads to high true fault rate (TFR) detection accuracy compared to the false fault rate (FFR) detection. Finally, all the information related to the faulty nodes will be sent to the server node for further investigation and action. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021. -
Recommendation of food items for thyroid patients using content-based knn method
Food recommendation system has become a recent topic of research due to increase use of web services. A balanced food intake is significant to maintain individuals physical health. Due to unhealthy eating patterns, it results in various diseases like diabetes, thyroid disorder, and even cancer. The choice of food items with proper nutritional values depends on individuals health conditions and food preferences. Therefore, personalized food recommendations are provided based on personal requirements. People can easily access a huge amount of food details from online sources like healthcare forums, dietitian blogs, and social media websites. Personal food preferences, health conditions, and reviews or ratings of food items are required to recommend diet for thyroid patients. We propose a unified food recommendation framework to identify food items by incorporating various content-based features. The framework uses the domain knowledge to build the private model to analyze unique food characteristics. The proposed recommender model generates diet recommendation list for thyroid patients using food items rating patterns and similarity scores. The experimental setup validated the proposed food recommender system with various evaluation criteria, and the proposed framework provides better results than conventional food recommender systems. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021. -
An iot-based fog computing approach for retrieval of patient vitals
Internet of Things (IoT) has been an interminable technology for providing real-time services to end users and has also been connected to various other technologies for an efficient use. Cloud computing has been a greater part in Internet of Things, since all the data from the sensors are stored in the cloud for later retrieval or comparison. To retrieve time-sensitive data to end users within a needed time, fog computing plays a vital role. Due to the necessity of fast retrieval of real-time data to end users, fog computing is coming into action. In this paper, a real-time data retrieval process has been done with minimal time delay using fog computing. The performance of data retrieval process using fog computing has been compared with that of cloud computing in terms of retrieval latency using parameters such as temperature, humidity, and heartbeat. With this experiment, it has been proved that fog computing performs better than cloud computing in terms of retrieval latency. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021. -
Distributed Maximum Power Point Tracking for Mismatched Modules of Photovoltaic Array
The multiple peaks in the output P-V characteristics of the photovoltaic (PV) module and the complete loss of shaded modules generation due to the existing bypass diode-based scheme are eliminated through the implementation of proven distributed maximum power point tracking (DMPPT). Considering the unique behavior of each PV Module, the artificial neural network is used in the DMPPT algorithm to track the MPP at every instant by learning the unique behavior of each PV module in this chapter. This eliminates the effect of manufacturing dispersion. Though the unique MPP is identified, the inability of the DMPPT algorithm in maintaining the PV modules in its own MPP is eliminated by the compensator circuits which are introduced in the array configuration along with the DMPPT in this chapter. These compensators enabled the maintenance of each PV module in its own MPP by providing the deficient current of each module and the deficient voltage of each string. So, this configuration increases the output power by including the generation of shaded modules instead of bypassing it. The results show that the proposed configuration avoids the multiple peak condition in P-V characteristics and improves the efficiency of the PV array under partially shaded conditions. 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Intelligent Wearable Electronics: A New Paradigm in Smart Electronics
In the last decade or so, the wearable electronics technology has seen an unprecedented growth which is expected to reach around USD 51.60 billion by the year 2022 with a CAGR of 15.51%. Intelligent wearable electronics is a combination of wide range of technologies like computation, communication, sensors, cloud computing, and display to cite a few. Integration of various technologies resultin systems which are multifunctional along with higher complexity of design presenting a unique challenge for the technologists. With Internet of Things (IoTs) becoming ubiquitous and 5G technologies around the corner, the wearable devices are no longer simple passive systems providing the user limited information, but rather they are multifunctional, powerful, and intelligent devices which make use of complex sensing and signal processing elements along with cloud computing and data analytics to provide real-time data interpretation. In this chapter, we review the recent developments of intelligent wearable electronics (WE) with emphasis on their working principle and design at various levels of abstraction, that includes material, device, and system levels, along with signal processing and communication protocol for external communication. Further, the design and development of smart wearable electronics which involves multivariant problem-solving at various abstraction levels is explained. In addition, we elucidate popular classes of smart wearables like wearable textiles, healthcare wearable electronics, and WE in education. Furthermore, we explore the primary performance constraints of typical WE systems such as battery life (energy), system architecture, communication protocols, and integration with cloud computing to, mention a few. This chapter concludes by elucidating various challenges in developing WE and the future directions of this industry. 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Pattern of Carbon Dioxide Emission, Economic Growth and Energy Consumption in South-Asian Countries: An Empirical Analysis
The main aim of this chapter is to analyse the pattern of environmental pollution as represented by per capita carbon dioxide emission (PCCO2), per capita gross domestic product (PCGDP) and per capita energy consumption (PCEC) and their nexus in case of South-Asian countries for the time period 19912014. Econometric tools such as panel co-integration and fully modified ordinary least squares have been used to study the relations. A positive significant relationship has been observed between PCGDP and PCCO2 emission. In addition, an increase in PCEC also has a positively significant impact on PCCO2 emission. Therefore, the governments of all the countries need to come together and take steps to curb the rising carbon emission since neither the problem nor the responsibility is restricted to one country alone. There is a need for countries to increase the consumption of renewable energy and explore alternate options that are fewer dependents on coal or any other fossil fuel. On priority, economies in South-Asian region should focus on sustainable economic activities by balancing growth of economy with clean environment. 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
An Empirical Study of Blockchain Technology, Innovation, Service Quality and Firm Performance in the Banking Industry
Despite the potential promises that blockchain technology (BT) offers to the financial services sector, its large-scale implementations are still in a nascent stage. There is no consensus on what benefits BT may bring, and there is always a possibility of difference between expected benefits and experienced real-world impact. Since the actual impact can be assessed only after large-scale implementations by financial institutions, there is little empirical evidence available in the literature. In this context, this research seeks to explore the potential impact of BT by developing and empirically testing a model. For this purpose, we have identified four dimensions of BT, namely, Decentralization, Transparency, Trustlessness, and Security. The impact of BT on innovation, service quality, and firm performance is assessed based on the extent to which these dimensions are present in the organization. The linkages of the latent constructs are estimated by analyzing the primary data collected from senior managers of various banks in India. The findings of this study provide several important considerations regarding the implementation of BT. The Author(s), under exclusive license to Springer Nature Switzerland AG 2021. -
A Study on Emotion Identification from Music Lyrics
The widespread availability of digital music on the internet has led to the development of intelligent tools for browsing and searching for music databases. Music emotion recognition (MER) is gaining significant attention nowadays in the scientific community. Emotion Analysis in music lyrics is analyzing a piece of text and determining the meaning or thought behind the songs. The focus of the paper is on Emotion Recognition from music lyrics through text processing. The fundamental concepts in emotion analysis from music lyrics (text) are described. An overview of emotion models, music features, and data sets used in different studies is given. The features of ANEW, a widely used corpus in emotion analysis, are highlighted and related to the music emotion analysis. A comprehensive review of some of the prominent work in emotion analysis from music lyrics is also included. 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Analytical Study of Security Enhancement Methods on Diverse Cloud Computing Platforms
Cloud storage is a convenient and virtually limitless storage option for the bulk of data technology is producing in recent times. Data security in cloud is not so robust as data owners need to depend upon the service providers for the safe storage. In this paper, we have identified few broadly used cloud computing paradigms: mobile cloud, cloud-based IoT and multi-tenant cloud. Mobile cloud helps reduce the data storage overhead on the mobile device and give users access to their personal data as and when required through cloud access. Cloud-based IoT helps the network of IoT devices, which is growing exponentially, to create on-demand cloud repositories. Multi-tenant cloud platforms are cloud environment accessed by more than one user. Few recent and related research work which aims at enhanced security from all these three paradigms is discussed and analysed. Encryption and similar network securing methods are used for mobile cloud and cloud-based IoT. For multi-tenant cloud, the objective is to keep the user spaces separate to keep their resources confidential. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Computational Aspects of Business Management with Special Reference to Monte Carlo Simulation
Business management is concerned with organizing and efficiently utilizing resources of a business, including people, in order to achieve required goals. One of the main aspects in this process is planning, which involves deciding operations of the future and consequently generating plans for action. Computational models, both theoretical and empirical, help in understanding and providing a framework for such a scenario. Statistics and probability can play an important role in empirical research as quantitative data is amenable for analysis. In business management, analysis of risk is crucial as there is uncertainty, vagueness, irregularity, and inconsistency. An alternative and improved approach to deterministic models is stochastic models like Monte Carlo simulations. There has been a considerable increase in application of this technique to business problems as it provides a stochastic approach and simulation process. In stochastic approach, we use random sampling to solve a problem statistically and in simulation, there is a representation of a problem using probability and random numbers. Monte Carlo simulation is used by professionals in fields like finance, portfolio management, project management, project appraisal, manufacturing, insurance and so on. It equips the decision-maker by providing a wide range of likely outcomes and their respective probabilities. This technique can be used to model projects which entail substantial amounts of funds and have financial implications in the future. The proposed chapter will deal with concepts of Monte Carlo simulation as applied to Business Management scenario. A few specific case studies will demonstrate its application and interpretation. 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Queering Doctor Who and Supernatural: An ecofeminist response to Bill Potts and Charlie Bradbury
Both Bill Potts from Doctor Who and Charlie Bradbury from Supernatural are iconic lesbian characters who have irreversibly changed the landscape of the long-running shows in which they are featured: the first queer character to appear on Doctor Who as a companion since Captain Jack Harkness, Bill Potts, is the shows first lesbian character to feature in a starring role. Her story arc is bookended by her relationship with Heather, who is first encountered in Bills first episode on the series and who returns to save Bills life at the end of her time as the Doctors companion. Heathers association with what appears to be water or oil-but is eventually revealed to be an alien life force resembling a liquid-is a significant factor in her transition from human to trans-human, and the elemental force that she becomes may be related to the transcendentalist roots of ecocritical discourse. Similarly, Charlie Bradburys role as the Queen of Moondor, a Live Action Role Playing arena, and her subsequent encounter with the faerie Gilda may be viewed in the context of the correlation of geek culture and the return to the natural, pre-industrial/pre-technological world of the episode LARP and the Real Girl (2013). These analyses are examined through an ecofeminist lens that consists primarily of approaches to ecofeminism in the twenty-first century. As Greta Gaard observes in her 2011 essay Ecofeminism Revisited: Rejecting Essentialism and Re-Placing Species in a Material Feminist Environmentalism, " ecofeminism in the late twentieth century declined because of charges of gender essentialism. However, given the emergence of areas such as animal studies, vegan studies, and speciesism, ecocriticism has again risen to prominence in the field of gender studies, and perhaps one way of avoiding the charge of essentialism is to place ecofeminist criticism within the larger framework of questions relating to a pluralistic and queer sense of gender and sexual identities. In this, both Bill and Charlie lend themselves to interpretations based on emerging discourses in ecocritical queer studies. 2021 selection and editorial matter, Douglas A. Vakoch.