Browse Items (11807 total)
Sort by:
-
A new stepwise method for selection of input and output variables in data envelopment analysis
Data envelopment analysis (DEA) is one of the widely accepted optimization technique uses to measure the relative efficiency of organizational units where multiple inputs and outputs are present. The significance of DEA results depends on the variables selected for DEA modelling. One of the main challenges in data envelopment analysis modelling is of identify the significant input and output variables for DEA modelling. In this study, we propose an enhanced stepwise method to identify the significant and insignificant input and output variable by reducing the iterations process in stepwise method. The statistical significance of the input and output variables evaluated using the statistical methods: Least significance difference (LSD), and Welchs statistics. The proposed method applied to the Indian banking sector and the results have shown that the proposed model significantly identified the significant and insignificant input and output variables with least loss of information. 2021 the author(s). -
A new trained ECG signal Classification method using Modified Spline Activated Neural Network
An ECG (Electrocardiogram) records the electrical activity of the heart and assess heart arrhythmia. Cardiac arrhythmia is an irregular heartbeat caused by unbalanced rhythm. In the past, several works were developed to produce automatic ECG-based heartbeat classification methods. In this work, a modified spline activated neural network, a new approach for cardiac arrhythmia classification by presenting the ECG signal preprocessing, the heartbeat segmentation techniques, the feature description methods and the learning algorithms used. The MIT-BIH arrhythmia database was used and experimented for testing and training. 2018 IEEE. -
A node deployment mechanism for energy-efficient routing in heterogeneous wireless sensor networks
Military applications are the primary concern of the wireless sensor networks (WSNs). Efficient target object/event monitoring is a primary goal of military systems in unattended and unmanned areas. Heterogeneous wireless sensor network (HTWSN) is an emerging network for efficient enemy object monitoring in sensitive areas of low cost. The performance of HTWSN is mainly depends on the quality of data transmission and better network lifetime. However, after deployment of HTWSN, the network can experience a serious problem known as path failure. Path failure occurs due to high route overhead, which result poor-quality data transmission and increase the node energy consumption. Path failure results route rediscovery and data packet retransmission. The proposed node deployment mechanism for HTWSN has been minimized the route overhead and improved the path quality, quality data packet transmission by avoid the path failure. The proposed node deployment strategy has given better results in terms of 20 % low node energy consumption, 56 % lower route overhead, 22 % higher network lifetime and 17 % higher data packet delivery ratio than the existing node deployment mechanism of IMCC protocol. 2005 - 2016 JATIT & LLS. All rights reserved. -
A Non-Linear Approach to Predict the Salary of NBA Athletes using Machine Learning Technique
Every sportsman traded/drafted receives monetary compensation in accordance with their contract. In this study, we propose a nonlinear approach based on performance and other aspects to determine the salary of a basketball player. We estimate the salary based on four regressive models. Whilst predicting we also Figure out the important features impacting the salary. Comparatively speaking, random forest outperformed other algorithms. Furthermore, we consider that our findings might benefit discussions between basketball teams and players. This model can also help set a benchmark for salary expectations by the players in accordance. 2022 IEEE. -
A note on ?(k)-colouring of the Cartesian product of some graphs
The chromatic number, x(G) of a graph G is the minimum number of colours used in a proper colouring of G. In an improper colouring, an edge uv is bad if the colours assigned to the end vertices of the edge is the same. Now, if the available colours are less than that of the chromatic number of graph G, then colouring the graph with the available colours lead to bad edges in G. The number of bad edges resulting from a ? (k)-colouring of G is denoted by bk(G). In this paper, we use the concept of (k)-colouring and determine the number of bad edges in Cartesian product of some graphs. 2022 by the authors. -
A Note on J-colouring of Jahangir Graphs
In this paper, we discuss J-colouring of the family of Jahangir graphs.Note that the family of Jahangir graphs is a wide ranging family of graphs which by a generalised definition includes wheel graphs. We characterise the subset of Jahangir graphs which admit a J-colouring. 2019, The National Academy of Sciences, India. -
A note on perfect lucky k-colourable graphs
This paper presents the notion of perfect Lucky k-colouring. Basic conditions for a perfect Lucky k-colourable graph are presented. Application thereof is then presented by obtaining the Lucky 4-polynomials for all connected graphs G on six vertices with ten edges. The chromatic number of these connected graphs is ?(G) = 3 or 4. For k = max{?(G): 3 or 4g = 4, it is possible to find Lucky 4-polynomials for all graphs on six vertices and ten edges. The methodology improves substantially on the fundamental methodology such that, vertex partitions begin with Lucky partition forms immediately. Finally, further problems for research related to this study are presented. 2020, International Scientific Research Publications. All rights reserved. -
A Note on the Rainbow Neighbourhood Number of Certain Graph Classes
A rainbow neighbourhood of a graph G is the closed neighbourhood N[v] of a vertex v? V(G) which contains at least one colored vertex of each color in the chromatic coloring C of G. Let G be a graph with a chromatic coloring C defined on it. The number of vertices in G yielding rainbow neighbourhoods is called the rainbow neighbourhood number of the graph G, denoted by r ? (G). In this paper, rainbow neighbourhood number of certain graph classes are discussed. 2018, The National Academy of Sciences, India. -
A Note on the Significance of Quartic Autocatalysis Chemical Reaction on the Motion of Air Conveying Dust Particles
Little is known on the significance of fluid-particle interaction for velocity and temperature as in the case of centrifuge for separating particles of different types, launching of rockets, and motion of space shuttle through the air when there exist chemical reactions between the flow and the wall. The aim of this study is not only to explore the significance of quartic autocatalytic chemical reaction on the flow of dusty fluid in which the transmission of energy in form of electromagnetic is nonlinear but also to unravel the effects of buoyancy on the velocity of the dust and temperature of the dust. The nonlinear partial differential equations that model the transport phenomenon was transformed, nondimensionalised, and parameterised using suitable variables. The corresponding boundary value problems were converted to an initial value problem using the method of superposition and solved numerically. The outcome of the study indicates that enhancement of buoyancy is a yardstick to increase the vertical velocity, horizontal velocity, and shear stress within the fluid domain; increase the velocity of the dust particles; increase the temperature distribution across the flow of dusty fluid; increase the concentration of dusty fluid; and decrease the concentration of the catalyst. It is worth noticing that utmost velocity of the dust occurs at a minimum value of fluid-particle interaction for velocity in the flow over a larger thickness of paraboloid of revolution. 2019 Walter de Gruyter GmbH, Berlin/Boston 2019. -
A novel African buffalo based greedy routing technique for infrastructure and cluster based communication in vehicular ad-hoc network
In this modern era, the wire free replica is utilized Vehicular Ad hoc Networks (VANETs) to converse each other. Also, the VANET paradigm not required any specific fixed infrastructure. Furthermore, the vehicle in VANET framework is movable like as mobile nodes. Also, the wireless connectivity between the vehicular nodes is not stable in all cases, it often changes their structure. Research have recommended various responses to control these issues and furthermore to lessen blockage in VANET environment. Therefore, the infrastructure of a network changes frequently which results in communication overheads, energy consumption and lifetime of the nodes. Consequently, in this paper a novel African Buffalo based Greedy Routing (ABGR) technique is to improve the performance of infrastructure and cluster based communication of the node. Moreover, the routing overhead and infrastructure communication can be enhanced by this proposed protocol. Consequently, the energy consumption solution is enhanced based on the CH. Sequentially, the proposed routing protocol is compared with existing protocols in terms of end-to-end delay, throughput, Data transmission Ratio (DTR), and energy consumption and so on. Therefore, it shows that the energy utilization and lifetime of the nodes in the proposed network has been enhanced. 2021 Little Lion Scientific. -
A novel AI model for the extraction and prediction of Alzheimer disease from electronic health record
Dark data is an emerging concept, with its existence, identification, and utilization being key areas of research. This study examines various aspects and impacts of dark data in the healthcare domain and designs a model to extract essential clinical parameters for Alzheimer's from electronic health records (EHR). The novelty of dark data lies in its significant impact across sectors. In healthcare, even the smallest data points are crucial for diagnosis, prediction, and treatment. Thus, identifying and extracting dark data from medical data corpora enhances decision-making. In this research, a natural language processing (NLP) model is employed to extract clinical information related to Alzheimer's disease, and a machine learning algorithm is used for prediction. Named entity recognition (NER) with SpaCy is utilized to extract clinical departments from doctors' descriptions stored in EHRs. This NER model is trained on custom data containing processed EHR text and associated entity annotations. The extracted clinical departments can then be used for future Alzheimer's diagnosis via support vector machine (SVM) algorithms. Results show improved accuracy with the use of extracted dark data, highlighting its importance in predicting Alzheimer's disease. This research also explores the presence of dark data in various domains and proposes a dark data extraction model for the clinical domain using NLP. 2025 Institute of Advanced Engineering and Science. All rights reserved. -
A Novel AI-Based Stock Market Prediction Using Machine Learning Algorithm
The time series forecasting system can be used for investments in a safe environment with minimized chances of loss. The Holt-Winters algorithm followed various procedures and observed the multiple factors applied to the neural network. The final module helps filter the system to predict the various factors and provides a rating for the system. This research work uses real-time dataset of fifteen stocks as input into the system and, based on the data, predicts or forecasts future stock prices of different companies belonging to different sectors. The dataset includes approximately fifteen companies from different sectors and forecasts their results based on which the user can decide whether to invest in the particular company or not; the forecasting will give an accurate result for the customer investments. 2022 Iyyappan. M et al. -
A novel and secured bitcoin method for identification of counterfeit goods in logistics supply management within online shopping
Counterfeit merchandise poses significant challenges for both consumers and retailers. When counterfeit goods infiltrate the market, they damage the trustworthiness and reputation of legitimate companies, leading to negative publicity. Furthermore, these imitations can be harmful, especially in critical sectors like food and pharmaceuticals. To address this issue, it is essential to identify and prevent counterfeit products from reaching consumers. Our proposed solution leverages blockchain technology to authenticate products. Blockchains decentralized database securely stores all transaction data, ensuring transparency and traceability. Additionally, we introduce a tool that records ownership and product details. By utilizing a Quick Response (QR) code, consumers can easily verify the authenticity of a product, thus accessing its manufacturing and ownership information. This approach not only safeguards consumer safety but also protects the reputation and financial performance of legitimate business. Bharati Vidyapeeth's Institute of Computer Applications and Management 2024. -
A Novel Approach for Detection and Recognition of Traffic Signs for Automatic Driver Assistance System Under Cluttered Background
Traffic sign detection and recognition is a core phase of Driver Assistance and Monitoring System. This paper focuses on the development of an intelligent driver assistance system there by achieving road safty. In this paper a novel system is proposed to detect and classify traffic signs such as warning and compulsory signs even for occluded and angular tilt images using Support Vector Machines. Exhaustive experiments are performed in order to demonstrate the efficiency of proposed method. 2019, Springer Nature Singapore Pte Ltd. -
A Novel Approach for Fractional (1 + 1 ) -Dimensional BiswasMilovic Equation
In this paper, we find the solution for (1 + 1 ) -dimensional fractional Biswas-Milovic (FBM) equation using the q-homotopy analysis transform method (q-HATM). The Biswas-Milovic equation is a generalization of the nonlinear Schringer (NLS) equation. The future scheme is the elegant mixture of q-homotopy analysis scheme with Laplace transform technique and fractional derivative considered in Caputo sense. To validate and illustrate the competence of the method, we examine the projected model in terms of arbitrary order. Moreover, the nature of the attained results have been presented in 3D plots and contour plots for different value of the order. The gained consequences show that, the hired algorithm is highly accurate, easy to implement, and very operative to investigate the nature of complex nonlinear models ascended in science and engineering. 2021, The Author(s), under exclusive licence to Springer Nature India Private Limited. -
A Novel Approach for Implementing Conventional LBIST by High Execution Microprocessors
The major VLS I circuits like sequential circuits, linear chips and op amps are very important elements to provide many logic functions. Today's competitive devices like cell phone, tabs and note pads are most prominent and those are used to get function the 5G related operations. In this work lower built-in self-test (LBIS T) mechanism is used to designing a microprocessor. The proposed methodology is giving performance measure like power efficiency 97.5%, improvement of delay is 2.5% and 32% development of area had been attained. This methodology attains more out performance and compete with present technology. The proposed equipment and execution for our approach requiring a constrained range overhead (lower than 3% power) over conventional LBIS T. 2022 IEEE -
A novel approach for integrating cryptography and blockchain into IoT system
The quick advancement of Internet of Things (IoT) emphasizes the significance of cryptography and blockchain ensuring the security of sensitive data and connected devices. Blockchain technology and encryption play key roles in ensuring the security of the expansive IoT network. Blockchain offers decentralized trust, immutability, and transparency to IoT networks and transactions, while encryption serves to protect IoT data from unauthorized access. It is a novel approach for integrating cryptography and blockchain into IoT System, cryptography and blockchain stand out as robust technologies that enhance the security of IoT systems. The implementation of an integrated architecture, along with a strategic integration approach, further strengthens the security measures. This methodology proves valuable for managing and validating digital transactions on decentralized, immutable networks. This work also explores the potential significance of integrating cryptography and blockchain into IoT System, this functions and applications in enhancing IoT security. This methodology introduces encryption techniques tailored for resource-constrained IoT devices, which are essential for ensuring end-to-end security. 2024, Taru Publications. All rights reserved. -
A Novel Approach for Linguistic Steganography Evaluation Based on Artificial Neural Networks
Increasing prevalence and simplicity of using Artificial Intelligence (AI) techniques, Steganography is shifting from conventional model building to AI model building. AI enables computers to learn from their mistakes, adapt to emerging inputs, and carry out human-like activities. Traditional Linguistic Steganographic approaches lack automation, analysis of Cover text and hidden text volume and accuracy. A formal methodology is used in only a few Steganographic approaches. In the vast majority of situations, traditional approaches fail to survive third-party vulnerability. This study looks at evaluation of an AI-based statistical language model for text Steganography. Since the advent of Natural Language Processing (NLP) into the research field, linguistic Steganography has superseded other types of Steganography. This paper proposes the positive aspects of NLP-based Markov chain model for an auto-generative cover text. The embedding rate, volume, and other attributes of Recurrent Neural Networks (RNN) Steganographic schemes are contrasted in this article between RNN-Stega and RNN-generated Lyrics, two RNN methods. Here the RNN model follows Long Short Term Memory (LSTM) neural network. The paper also includes a case study on Artificial Intelligence and Information Security, which discusses history, applications, AI challenges, and how AI can help with security threats and vulnerabilities. The final portion is dedicated to the study's shortcomings, which may be the subject of future research. 2013 IEEE. -
A Novel Approach for Machine Reading Comprehension using BERT-based Large Language Models
Teaching machines to learn the information from the natural language documents remains an arduous task because it involves natural language understanding of contexts, excerpting the meaningful insights, and deliver the answer to the questions. Machine Reading Comprehension (MRC) tasks can identify and understand the content from the natural language documents by asking the model to answer questions. The model can extract the answer from the given context or other external repositories. This article proposes a novel Context Minimization method for MRC Span Extraction tasks to improve the accuracy of the models. The Context Minimization method constitutes two subprocedures, Context Reduction and Sentence Aggregation. The proposed model reduced the context with the most relevant sequences for answering by estimating the sentence embedding between the question and the sequences involved in the context. The Context Reduction facilitates the model to retrieve the answer efficiently from the minimal context. The Sentence Aggregation improves the quality of answers by aggregating the most relevant shreds of evidence from the context. Both methods have been developed from the two notable observations from the empirical analysis of existing models. First, the models with minimal context with efficient masking can improve the accuracy and the second is the issue with the scatted sequences on the context that may lead to partial or incomplete answering. The Context Minimization method with Fine-Tuned BERT model compared with the ALBERT, DistilBERT, and Longformer models and the experiments with these models have shown significant improvement in results. 2024 IEEE. -
A Novel Approach for Segmenting Coronary Artery from Angiogram Videos
This paper addresses the research focuses on coronary artery disease; it is one of the major heart diseases affecting the people all around the world in the recent era. This heart disease is primarily diagnosed using a medical test called angiogram test. During the angiogram procedure the cardiologist often physically selects the frame from the angiogram video to diagnose the coronary artery disease. Due to the waning and waxing changeover in the angiogram video, its hard for the cardiologist to identify the artery structure from the frame. So, finding the keyframe which has a complete artery structure is difficult for the cardiologist. To help the cardiologist a method is proposed, to detect the keyframe which has segmented artery from the angiogram video. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.