Browse Items (11810 total)
Sort by:
-
An Automated Path-Focused Test Case Generation with Dynamic Parameterization Using Adaptive Genetic Algorithm (AGA) for Structural Program Testing
Various software engineering paradigms and real-time projects have proved that software testing is the most critical and highly important phase in the SDLC. In general, software testing takes approximately 4060% of the total effort and time involved in project development. Generating test cases is the most important process in software testing. There are many techniques involved in the automatic generation of these test cases which aim to find a smaller group of cases that could allow for an adequacy level to be achieved which will hence reduce the effort and cost involved in software testing. In the structural testing of a product, the auto-generation of test cases that are path focused in an efficient manner is a challenging process. These are often considered optimization problems and hence search-based methods such as genetic algorithm (GA) and swarm optimizations have been proposed to handle this issue. The significance of the study is to address the optimization problem of automatic test case generation in search-based software engineering. The proposed methodology aims to close the gap of genetic algorithms acquiring local minimum due to poor diversity. Here, dynamic adjustment of cross-over and mutation rate is achieved by calculating the individual measure of similarity and fitness and searching for the more global optimum. The proposed method is applied and experimented on a benchmark of five industrial projects. The results of the experiments have confirmed the efficiency of generating test cases that have optimum path coverage. 2023 by the authors. -
Deep learning for intelligent transportation: A method to detect traffic violation
Smart transportation is being envisaged as an important parameter in building smart cities. Although conceptualized to have major advantages, lack of intelligent systems makes more vulnerable for disasters. The number of fatality due to road accident has increased up to 12% in 2022 as that of previous year says the WHO report. There are large number of new vehicles plying on roads which makes space constraint for the commuters. This makes a large number of traffic violations happening in urban areas. The smart cities insist and tries to adopt AI based methods for identifying traffic violations. Computer Vision are predominant solution in detecting traffic violation. This paper proposes a Deep learning method using famous YOLOV technique for object detection for effectively determining the traffic violation. The violations such as signal cross are concentrated in this research. The experimental results prove that the proposed technique has 95.1% of classification accuracy in detecting signal crosses. 2023 Author(s). -
An Empirical Framework Using Weighted Feed Forward Neural Network for Supply Chain Resilience (SCR) Strategy Selection
Artificial intelligence (AI)-based systems are normally data driven applications, where the model is trained to think on its own based on the external circumstances. The power of AI has reached every facet of business and common life and is even being largely explored to be adopted in life sciences and medical domains. It supports the human in decision-making through the cognitive utilities which arises out of self-learning capabilities of a model. With the exponential growth of data, supply chain management and analytics have attracted a large community of researchers to build intelligent systems which can lead to re-invention of data-driven decision systems powered by AI. Systems and literature of the past shows that AI-based technologies are promising in intelligent supply chain management (SCM) and building resilient SCMs. There is a gap in literature which addresses on the framework for decision support systems in SCM and application of AI methods for building a robust supply chain resilience (SCR) leading to more exploration on the topic. In this paper, a decision framework is proposed by incorporating fuzzy logic and recurrent neural networks (RNN) for disclosing the patterns of various AI-enabled techniques for SCRs. The proposed analysis involved data from leading literatures to determine the most adoptable and significant applications of AI in SCRs. The analysis shows that techniques such as fuzzy programing, network based algorithms, and genetic algorithms have large impact on building SCRs. The results help in decision-making by exhibiting an integrated framework which can help the AI practitioners for developing SCRs. The Author(s), under exclusive licence to Springer Nature Switzerland AG 2024. -
Auto-encoder Convolut?onal Neural Network (AECNN) for Apple Fruit Flower Detection
The yield estimation task altogether relies upon the way toward identifying and checking the quantity of fruits on trees. In production of fruit, basic yield the board choices are guided through the bloom frequency, i.e., the quantity of the flowers that are present in a plantation. The intensity of bloom technique is still commonly assessed by methods for human visual investigation. Mechanized PC vision frameworks for flower recognizable proof depend closely on designed procedures which function just under explicit conditions and with restricted execution. This work comprises four significant advances, (I) system preparing for Fully Convolutional Network (FCN), (ii) preprocessing, (iii) component extraction, (iv) division. Initially, a strategy for assessing high-resolution pictures with deep FCN on Graphics Processing Unit (GPU). Then, non-linear and linear algorithms are presented for lessening the image noise, so the exact flower identification can be ensured. The next phase of the work handles the highlight extraction for diminishing the quality of the prime assets which are needed for handling without compromising on data applicable. By applying Local Binary Pattern (LBP), surface example likelihood can be summed up into a histogram. At last, isolate an image with high resolution into sub patches, assess all patches with the help of AECNN, at that point apply the refinement calculation on acquired score maps to figure out the final version of the mask segmentation. Trial results are led utilizing two datasets on flower pictures of AppleA and AppleB. Results are estimated regarding the measurements like Precision (P) and Recall (R). The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Trust Model for Cloud Using Weighted KNN Classification for Better User Access Control
The majority of the time, cloud computing is a service-based technology that provides Internet-based technological services. Cloud computing has had explosive growth since its debut, and it is now integrated into a wide variety of online services. These have the primary benefit of allowing thin clients to access the resources and services. Even while it could appear favorable, there are a lot of potential weak points for various types of assaults and cyber threats. Access control is one of the several protection layers that are available as part of cloud security solutions. In order to improve cloud security, this research introduces a unique access control mechanism. For granting users access to various resources, the suggested approach applies the trust concept. For the purpose of predicting trust, the KNN model was recently proposed, however the current approach for categorizing options is sensitive and unstable, particularly when an unbalanced data scenario occurs. Furthermore, it has been discovered that using the exponent distance as a weighting system improves classification performance and lowers variance. The prediction of the users trust levels using weighted K-means closest neighbors is presented in this research. According to the findings, the suggested approach is more effective in terms of throughput, cost, and delay. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
A Multilayered Feed-Forward Neural Network Architecture for Rainfall Forecasting
The amount of rain received in a particular demographic region in a given time interval is called the rainfall. Rainfall is a natural and complex process and has significance in different domains including agriculture, transport, disaster management, and natural calamities resilience [1]. Abnormal rainfall affects every facet of humans and all other living beings of the world and also has a great impact in wellbeing and financial disruptions of a country. Accurate rainfall predictions at regular time intervals are always important to issue warnings about likelihood of any disaster about to happen. This also provides people a time for strategic planning in their work and precautions at time of adversity [2]. It is worth noting that rainfall forecasting does not only have an impact in day-to-day life, but more importantly for tropical countries like India where the chief occupation being agriculture and also for various other industries. It largely helps in disaster management and recovery process as well. The rainfall being a variable over time, geography and atmospheric conditions makes the forecasting considerably difficult [3]. Rainfall forecasting keeps a person informed about the likelihood of rainfall the forthcoming day, week, or month which enable long-time planning and on the other way; hourly prediction helps for shortterm planning such as enforcing traffic measures. Literature has seen various studies in this domain using predictive machine learning (ML) algorithms such as neural networks (NNs), Genetic algorithms, and Fuzzy-based systems [4]. 2024 Sachi Nandan Mohanty, Preethi Nanjundan and Tejaswini Kar. -
A Gradational Approach for Auditing IoT Security Vulnerability: Case Study of Smart Home Devices
The world is experiencing a rapid convergence of physical and cyber systems, as objects used in day-to-day life are connected over the Internet. These Internet of Things (IoT) devices are mass produced, but ensure its usage in routine life. The impact of IoT in human life ranges from simple household equipment to life-critical devices. Owing to the diversity, both in application and nature, the security on these devices and their applications has become a major concern. In spite of having many security frameworks and compliance regulations, attacks on IoTs are exponentially growing. A handful of security frameworks are available for ensuring the security, there are very few frameworks proposed for auditing the security. Confidentiality, Integrity and Availability, which are the pillars of security in IoT, are found missing or found to have been implemented with flaws. An IoT security audit is one good solution that has proven a success in the literature but challenging as the high-level standards cannot be applied to low-level devices and applications. In addition, the challenges of audits include heterogeneity of IoT and lack of expert resources. IoT and related products reached market very quickly before it could be subjected to the complete audit procedures or, in other words, the time taken for a new IoT device or application to be developed is much less than the time taken for developing a security audit mechanism. Hence, to enable an efficient security auditing of IoT devices, a definite and dynamic framework is needed that can propose feasible policies, automatic collection and analysis of audit data and tailor-made procedures for risk assessment, risk control and risk mitigation. This chapter focuses on the auditing of security vulnerability in IoT devices. A gradational methodology is proposed for extracting the feasible security checks from leading standards and guidelines in the IoT domain. To exploit its efficiency, the proposed method is applied to a smart home with IoT enabled devices. Performance metrics such as efficiency, accuracy, and scalability are evaluated. The experiments were carried out in a simulated environment with IoT devices. The results were highly satisfying as the proposed method could do efficient and accurate auditing for seven hundred smart homes in a time of less than fifteen minutes. 2025 Taylor & Francis Group, LLC. -
Application of Artificial Intelligence in the Supply Chain Finance
Artificial intelligence (AI) has numerous applications in supply chain finance, including the ability to streamline processes, improve decision-making, and reduce costs. This abstract will discuss some of the key ways in which AI is being used in supply chain finance. One major Using AI in the Supply Chain finance is in risk management. By analyzing data from a variety of sources, including historical transaction data and external market data, AI can identify potential risks and suggest strategies for managing them. For example, AI can be used to predict which suppliers are at the greatest risk of financial distress, allowing companies to take proactive measures to minimize the impact of any disruptions. Another key Using AI in the Supply Chain finance is in fraud detection. By analyzing large volumes of data in real-time, AI can spot deviations from the norm that may point to fraud. This can help companies to prevent fraud and minimize losses. AI can also be used to optimize working capital management. By analyzing data on inventory levels, order volumes, and payment terms, AI can help companies to optimize their cash flow and improve their working capital position. For example, AI can help companies to identify opportunities to negotiate more favorable payment terms with suppliers or to optimize their inventory levels to minimize the amount of cash tied up in inventory. Finally, AI can be used to improve supply chain efficiency and reduce costs. By analyzing data on order volumes, shipping times, and other factors, A.I. may aid businesses in identify opportunities to their supply network needs improvement processes and reduce costs. For example, AI can aid businesses in determining opportunities to consolidate shipments or to optimize their routes to reduce transportation costs. Now a days AI has numerous applications in supply chain finance, including risk management, fraud detection, working capital management, and supply chain optimization. By leveraging the power of AI, companies can improve their financial performance, reduce costs, and enhance their overall competitiveness. 2023 IEEE. -
A novel technique for leaf disease classification using Legion Kernels with parallel support vector machine (LK-PSVM) and fuzzy C means image segmentation
Detection of plant disease and classificationare being investigated in many parts of the worldto save precious medical plants from becoming extinct.Major problem in this task, include the lack of advanced and technology driven solution. Manual identification is often time-consuming and prone to inaccuracies. Therefore, there is an urgent need for an automated and efficient method that can accurately identify and classify plant diseases. This article focuses on detecting the disease through classificationthrough a new technique using leaf images for automatic classification. This paper proposes a novel segmentation technique using Fuzzy C means and Particle Swarm Optimization for effective segmentation of leaf images and feature extraction that can help in classification of disease.The approach emphasizes on the integration of techniques such as image processing, segmentation and feature extraction and finally the classification, which offers a comprehensive solution for the disease detection. The work leverages on the advantages of Legion Kernels and Parallal support vector Machine (LK-PSVM) clubbed with fuzzy C means Image segmentation to offer a framework that can handle diverse leaf images and which can effectively differentiate the type of the disease.The proposed method LK-PSVM combined with Fuzzy C means presents a novel approach that is significantly deviated from the conventional methods of leaf disease classification.The proposed wok brings an integrated framework which can synergistically combine the Legion Kernels with the PSVM technique coupled with Fuzzy C Means Image segmentation which can handle the issue of overlapped data sets and support vector machines are used to handle the situation where the number of dimensions are more than the number of samples, which is more probable in the classification problem under consideration.By integrating these components, the proposed method achieves more accuracy and robustness when compared to the existing methods in the literature. The segmentation is carried out using PSO after pre-processing of images. The Gaussian functions are used to eliminate the background subtraction. Different features of the images are then computed. A total of 55,400 images were used for the experiment consisting of various plants leaves spreading across 38 labels. A classifier is then proposed using Machine learning methods for the detection of disease in apple fruit leaves. The experiments prove that the proposed method have high degree of classification accuracy when compared to existing methods. The proposed method not only cater to the need in terms of accuracy but also making it scalable for different types of leaves. 2024 The Authors -
Optimal Management of Resources in Cloud Infrastructure through Energy Aware Collaborative Model
As the infrastructures of cloud computing provides paramount services to worldwide users, persistent applications are congregated using large scale data centres at the customer sides. For such wide platforms, virtualization technique has been incorporated for multiplexing the essential sources available. Due to the extensive application variations in the workloads, it is significant to handle the resource allocation methodologies of the virtual machines (VM) for assuring the Quality of Service (QoS) of cloud. On concentrating this, the paper proposed a Decentralized Energy-Aware Collaborative Model (DEACM) for effectively managing the data centres in cloud infrastructures. Initially, the optimal model for system management and power management are declared. Then, functions of workload vectors and data collection about workloads has been carried out for optimal selection of virtual machines to migrate for balancing loads efficiently. This can be further applied for Target-based VM Migration Algorithm for determining the migrating target for VM. Moreover, the algorithm involved in energy utilization with managed QoS. The developed DEACM is evaluated using CloudSim platform and the results are discussed. The results exemplify that the DEACM can balance the workload across variety of machines optimally and provide reduced energy consumption to the complete system efficiently. 2024 IEEE. -
Artificial Intelligence & Data Warehouse Regional Human Resource Management Decision Support System
High-quality data is utilized to make informed decisions that effectively help to successfully safeguard our environment. When there is an abundance of information that is both heterogeneous in nature (coming from a wide variety of fields or sources) and of unknown quality, various problems may occur. Furthermore, the problem's dynamic nature also imposes some other complications. In order to deal with such complications, the central role played by supercomputers in the modern environment is to promote protection initiatives like monitoring, data analysis, communication, and information storage and retrieval. In current days, the higher dependency on the data management process forced the developers to integrate and enhance all these initiatives with Artificial Intelligence knowledge-based techniques so that smart systems can be utilized by a vast number of people. In this context, this study has illustrated how Artificial Intelligence methods have changed the nature of Environmental Decision Support Systems (EDSS) over the course of the last two decades. The strengths that an EDSS should exhibit have been emphasized in this review. In the final section, we look at some of the more innovative solutions used for various environmental issues. 2022 IEEE. -
Machine Learning Methods for Online Education Case
Online education has become a popular choice for learners of all ages and backgrounds due to its accessibility and flexibility. However, providing personalized learning experiences for a diverse range of students in online education can be challenging. Machine learning methods can be used to provide personalized learning experiences and improve student engagement in online education. In this case study, We're going to do some research on machine learning. methods in an online education platform. The platform provides courses in various subjects and is designed to be accessible to students from all over the world. The platform collects data on student behavior, such as the courses they enroll in, the time they spend on each course, and their performance on assignments and quizzes. We will explore several machine learning methods that can be applied to this data, including clustering, classification, and recommendation systems. Clustering algorithms can be used to group students based on their learning behavior and preferences, allowing instructors to provide personalized feedback and course recommendations. Classification algorithms can be used to predict student success in a particular course, allowing instructors to intervene and provide additional support if needed. Recommendation systems can be used to suggest courses to students based on their interests and past behavior. We will also discuss the potential benefits and challenges of using machine learning methods in online education. Benefits include increased student engagement, improved learning outcomes, and more efficient use of resources. Challenges include ensuring data privacy and security, preventing algorithmic bias, and maintaining transparency and fairness in the decision-making process. Overall, machine learning methods have the potential to transform online education by providing personalized learning experiences and improving student outcomes. By leveraging the vast amounts of data generated by online education platforms, we can create more effective and efficient learning experiences that meet the needs of students from diverse backgrounds and learning styles. 2023 IEEE. -
Power and Area Efficient Decimation Filter Architectures of Wireless Receivers
This paper reports on the synthesis and implementation of a digital decimation filter suitable for multi-standard transceivers. Decimation filter architectures used in transceivers must be capable of providing low power and less area. In this paper, three different architecture designs namely Decimation Filter with Conventional MAC Unit, Cascaded Multi-Standard decimation Chain and Hybrid structure are proposed to meet the demand of low power and area efficient digital decimation filter. The filter architectures are implemented using FPGA and its performances are tested. The architectures are tested using conventional number system and with two different encoding schemes of filter coefficients called canonic signed digit and minimum signed digit. The implementation results reflect that considerable reduction in area of 47.9% and power reduction of 28.6% are achieved using hybrid architecture, when compared with conventional MAC and cascaded chain architectures. 2016, The National Academy of Sciences, India. -
A novel approach in prediction of crop production using recurrent cuckoo search optimization neural networks
Data mining is an information exploration methodology with fascinating and understand-able patterns and informative models for vast volumes of data. Agricultural productivity growth is the key to poverty alleviation. However, due to a lack of proper technical guidance in the agriculture field, crop yield differs over different years. Mining techniques were implemented in different applications, such as soil classification, rainfall prediction, and weather forecast, separately. It is proposed that an Artificial Intelligence system can combine the mined extracts of various factors such as soil, rainfall, and crop production to predict the market value to be developed. Smart analysis and a comprehensive prediction model in agriculture helps the farmer to yield the right crops at the right time. The main benefits of the proposed system are as follows: Yielding the right crop at the right time, balancing crop production, economy growth, and planning to reduce crop scarcity. Initially, the database is collected, and the input dataset is preprocessed. Feature selection is carried out followed by feature extraction techniques. The best features were then optimized using the recurrent cuckoo search optimization algorithm, then the optimized output can be given as an input for the process of classification. The classification process is conducted using the Discrete DBN? VGGNet classifier. The performance estimation is made to prove the effectiveness of the proposed scheme. 2021 by the authors. Licensee MDPI, Basel, Switzerland. -
Filmic afterlives: Considerations on the uncanny
[No abstract available] -
An analysis of online marketing strategies used by maggi during the 2015 crisis /
Online marketing has become an integral part of branding, advertising and marketing communication for any brand today. Communicating with the consumers at the time of crisis using the right marketing mix is essential and that is exactly what Maggi did during the crisis that the brand faced in 2015. Maggi had used online marketing strategies to reach out to consumers belonging to various sections of the society during the crisis. -
An Energy Efficient Node Scheduling based Congestion Control Scheme for WSN Multicasting
Wireless Sensor Network (WSN) is the most preferred technology for communication in resource constrained environments. They offer high-quality data propagation with limited delay. Sensor Network can be established with the help of self-configurable nodes to monitor various physical phenomenon. Multicasting in WSN results in low communication control overhead but may lead to congestion, which results in data loss, redundant transmissions, poor throughput and reduced network lifetime. In this paper, we propose a protocol to estimate the Degree of Congestion (CD) at each node to ensure load balance and avoid further congestion within the network. It is demonstrated that the proposed scheme is better compared with existing congestion control schemes in terms of end-to-end delay and energy efficiency. 2020 G. Raja Vikram et al., licensed to EAI -
A novel congestion-aware approach for ECC based secured WSN multicasting
--Multicasting in Wireless Sensor Networks greatly reduces the communication complexity between The Base station and set of sensor nodes deployed in a given region. It reduces the number of packets to be sent thus minimizing the chance of congestion. Still the existence of congestion appears due to improper channel utilization resulting in low throughput. In this paper, we have addressed the issue of congestion with reference to WSN multicasting. The Simulation results have shown that our approach is better in terms of throughput and delay compared with existing approaches. 2018, Institute of Advanced Scientific Research, Inc.. All rights reserved. -
AI-Powered IoT Framework for Enhancing Building Safety through Stability Detection
The rapid urbanization and increasing structural complexities of modern buildings have heightened the need for advanced monitoring systems to ensure building safety. The research presents an AI-powered IoT framework that enhances building safety through advanced stability detection mechanisms. The proposed framework employs a novel algorithm, Ensemble Learning with IoT Sensor Data Aggregation (EnIoT-SDA), which integrates ensemble learning techniques with aggregated sensor data to provide accurate and real-time stability assessments of building structures. The effectiveness of EnIoT-SDA was evaluated through a comprehensive simulation analysis, comparing its performance against existing algorithms, including Support Vector Machine (SVM), Gradient Boosting Machines (GBM), and Fuzzy Logic Systems (FLS). Simulation metrics, such as accuracy, false positive rate, computational time, and detection latency, were used to assess and compare the algorithms' performance. The results demonstrated that EnIoT-SDA outperformed the existing methods in several key areas, offering improved accuracy and reduced detection latency, thus establishing its potential as a robust solution for building safety monitoring. The study underscores the significant advancements brought by integrating ensemble learning with IoT sensor data and highlights areas for future research and development in this domain. 2024 IEEE. -
Eccentric completion of a graph
The eccentric graph Ge of a graph G is a derived graph with the vertex set same as that of G and two vertices in Ge are adjacent if one of them is the eccentric vertex of the other. In this paper, the concepts of iterated eccentric graphs and eccentric completion of a graph are introduced and discussed. 2022 The authors.