Browse Items (11808 total)
Sort by:
-
Machine Learning Based recommendation system Using User-Item Interaction
Electronic commerce, or e-commerce, is the activity of trading services and commodities through the internet. Identifying the item that the consumer may buy from the enormous number of possibilities accessible to solve this difficulty is now one of the key difficulties encountered by most E-commerce businesses. Recommender systems have been implemented. Recommender systems (RS) are systems that collect information from users about their preferences and allow them to make decisions from the available options. Today, various recommender systems are growing with the advent of web-based information. As you can see from various articles, such recommender systems are used in a variety of industries, from simple objects to more sophisticated objects.RS has gained popularity in the previous decade, particularly in the realm of E-Commerce and related sectors. This report aims to identify recent developments as well as their potential for improvement. It is intended to elaborate on a number of points. And also work more on user-item based recommendation. These types of user-item based recommendation will be more effective in fashion area. 2022 IEEE. -
Analysis of MRI Images to Discover Brain Tumor Detection Using CNN and VGG-16
Brain tumor is a malignant illness where irregular cells, excess cells and uncontrollable cells are grown inside the brain. Now-a-days Image processing plays a main role in discovery of breast cancer, lung cancer and brain tumor in initial stage. In Image processing even the smallest part of tumor is sensed and can be cured in early stage for giving the suitable treatment. Bio-medical Image processing is a rising arena it consists of many types of imaging approaches like CT scans, X-Ray and MRI. Medical image processing may be the challenging and complex field which is rising nowadays. CNN is known as convolutional neural network it used for image recognition and that is exactly intended for progression pixel data. The performance of model is measured using two different datasets which is merged as one. In this paper two models are used CNN and VGG-16 and finding the best model using their accuracy. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Diagnosis of Osteoporosis from X-ray Images using Automated Techniques
Osteoporosis is Bone Disease most commonly seen in aged people due to various food habits and life style habits. The bone becomes so brittle and weak which may break just from a fall. So, it is required to attend this Issue as there are various challenges faced by medical domain to identify and treat Osteoporosis. In this paper we focus on identifying and detecting osteoporosis using X-ray images using modified U-net Architecture using Residual Block and skip connections and done comparison study with existing models, as per state-of-art our model outcomes issues in existing model and obtain better accuracy. 2022 IEEE. -
COVID-19 Pandemic: Review on Emerging Technology Involvement with Cloud Computing
Cloud computing is the latest technology that has a significant influence on everyones life. During the COVID-19 crisis, cloud computing aids cooperation, communication, and vital Internet services. The pandemic situation made the people switch to online mode. The technology helped to bridge the gap between the work space and personal space. A quick evaluation of cloud computing services to health care is conducted through this study in COVID situation. A short overview on how cloud computing technologies are critical for addressing the current predicament has been held. The paper also discusses distant working of cloud computing in health care. Moreover, cloud infrastructure provides a way to connect with different aid personnel. The patient data can be transferred to the cloud for monitoring, surveillance, and diagnosis. Thus, health care is provided instantaneously to all the individuals. Additionally, the study addresses the privacy and security-related issues with appropriate solutions. The paper also briefs on the different kind of services are provided by different CSPs that are cloud service providers to confront this epidemic. This article primarily focuses on cloud computing technology involvement in COVID, and secondary focus is on other technology like blockchain, drones, machine learning and Internet of things in COVID-19. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
5G Planning and QoE Management Using Mathematical Benchmarking Techniques for Europe and Middle Eastern Countries
This paper analyses performance of Europe and Middle Eastern (EMEA) countries over 5G networks across eight key QoE metrics using robust and sophisticated mathematical techniques. The current position of the countries is realized along with feasible benchmarks/targets for metrics that need improvement. The benchmark countries and stretch goals are also presented. 2022 IEEE. -
Impact of Prolonged Screen Time on the Mental Health of Students During COVID-19
The COVID-19 pandemic has struck every sector around the world, including the education sector. The pandemic has forced educational institutions around the world to close, putting academic calendars in jeopardy. To keep academic activities going, most educational institutes have switched to online learning platforms. However, the lack of e-learning readiness and the current crisis has taken a toll on students mental health significantly. In this study, we hope to understand better students impressions of online education and the impact of prolonged screen time on students mental health. From the responses of 438 students, our study aims to identify the causes of stress in students due to the online mode of education. From eye stress to limited social interaction, all factors leading to poor mental health are considered. Suggestions for addressing the challenges of online education and approaches to create a more successful online learning environment are also provided. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Applying Ensemble Techniques for the Prediction of Alcoholic Liver Cirrhosis
More than fifty percent of all liver cognate deaths are caused by alcoholic liver disease (ALD). Excessive drinking over the time leads to alcohol-related steatohepatitis and fatty liver, this in turn can lead to alcoholic liver fibrosis (ALF) and in due course alcohol-related liver cirrhosis (ALC). Detecting ALD at an early stage will reduce the treatment cost to the patient and reduce mortality. In this research, a two-step model is developed for predicting the liver cirrhosis using different ensemble classifiers. Among 41 features recorded during data collection, only 15 features arefound to be effective determinants of the class variable. The proposed stacked ensemble technique for ALD prediction is compared with other ensemble models such as random forest, AdaBoost, and bagging. Through experimentation, it is observed that the proposed model with XGBoost and decision tree as base models and logistic regression as Meta model exhibits prediction accuracy of 93.86%. The prediction accuracy of theproposed stacked ensemble technique is 0.2% better in prediction accuracy and 0.3% reduced error rate in comparison with random forest classifier. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
A Multi Objective Artificial Eco-System Based Optimization Technique Integrating Solar Photovoltaic System In Distribution Network
Agricultural sector contributes 6.4% of total economic generation across the world. Notably, the utilization of technology to improve the yield and economy is rapidly increasing. To provide continuous supply to the residential customers, the agricultural feeder grid-dependency has to be integrated with Solar Photo Voltaic (SPV) systems. In this paper, an Artificial Eco-System based Optimization (AEO) algorithm is proposed for simultaneously identifying the locations and quantifying the sizes of SPV systems. A practical distribution system feeder 'Racheruvu 11kV agricultural feeder' Andhra Pradesh, India is considered for simulation purpose and the performance is compared with the standard IEEE-33 radial distribution system. 2022 IEEE. -
An Efficient Face Recognition System using Deep Transfer Learning
Face recognition is an AI-based innovation used to find and recognize human appearances in videos and images. Organizations can apply face recognition to many different kinds of fields which may include biometrics, regulation of law, security and individual wellbeing; so as to take observation of individuals in any scenario. Face recognition has advanced from simple vision methods to progress in ML; and further to progressively refined neural networks (ANN) and related advances. It currently assumes an indispensable part as the initial phase in numerous basic applications, including the task of tracking a face. Face recognition is utilized to focus cameras or count the number of individuals present in a particular region. The innovation likewise has showcasing applications, for instance, showing recommended promotions when a specific user is detected. 2022 IEEE. -
One Time Password-Based Two Channel Authentication MechanismUsing Blockchain
Using Fog Nodes, also known as IOT devices are increasing everyday with more and more home automation, industry automation, automobile automation, etc. Security threats for these devices are also increasing. One of the threats is impersonating one fog node, stealing data and taking control of the network which is also known as the Sybil attack. To provide security, most fog devices use one step or two step authentication and sometimes use encryption. With static passwords, there is a chance of compromise by password sharing and leaking. Some weak encryption algorithms used are also compromised. Data about fog nodes in the network is stored in a weak database and is tampered. OTP-based Two Channel Authentication Mechanism (OTPTAM) to authenticate the fog nodes with metadata stored in Blockchain Database and communicate using channels encrypted with Elliptical Ciphers can solve the majority of these problems. Metadata of the nodes like Bluetooth MAC address, network mac address, telephone number are all stored in the blockchain and the OTP is exchanged via these channels to ensure the authenticity of the fog nodes. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
CoInMPro: Confidential Inference and Model Protection Using Secure Multi-Party Computation
In the twenty-first century, machine learning has revolutionized insight generation by using historical data across domains like health care, finance, and pharma. The effectiveness of machine learning solutions depends largely on the collaboration between data owners, model owners, and ML clients, without privacy concerns. The existing privacy-preserving solutions lack efficient and confidential ML inference. This paper addresses this inefficiency by presenting the Confidential Inference and Model Protection, also known as the CoInMPro, to solve the privacy issue faced by model owners and ML clients. The CoInMPro technique is suggested with an aim to boost the privacy of model parameters and client input during ML inference, without affecting the accuracy and by paying a marginal performance cost. Secure multi-party computation (SMPC) techniques were used to calculate inference results confidentially after sharing client input and model parameters privately from different model owners. The technique was implemented in Python language using the open-source SyMPC library to support the SMPC function. The Boston Housing Dataset was used, and the experiments were run on Azure data science VM using Ubuntu OS. The result suggests CoInMPros effectiveness in addressing privacy concerns of model owners and inference clients, with no sizable impact on accuracy and trade-off. A linear impact on performance was noted with an increase of secure nodes in the SMPC cluster. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Machine Learning based Loan Eligibility Prediction using Random Forest Model
When one or more people, organizations, or other entities lend money to other people, organizations, or entities, it is known as a loan. The recipient (that is the borrower) takes on a debt for which he or she is normally accountable for interest payments until the loan is repaid. The major goal of this proposed model is to ensure that an individual, institution, or organization seeking for a loan is properly verified before granting them the loan they require. Before authorizing a loan for any individual or business several factors must be considered. That including gender, education, and the number of dependents. The goal of proposed model is to automate the method, which will save time and energy while improving the efficiency of the process. This particular process input is having two different kind of data set. First one is train data set and second set is test data set. The first date set that is train data set is generally used to train and assess the machine learning model accuracy. The loan eligibility predictions are generated using the test data set. To forecast loan eligibility and train this random forest, machine learning method called Random Forest. The proposed random forest model is providing higher accuracy level. This model is providing 28 % higher accuracy level compare to regular prediction. 2022 IEEE. -
An Analytical Study on the influence of using Trimmed Gait Energy Images for Human Gait Biometrics using Deep Learning
Gait based human recognition is founded on the principle that every human being has a distinctive style of walking. With the rise in the use of video surveillance devices, gait is one of the most convenient biometrics to use, in forensics. This paper is an analytical study of the effect of using trimmed Gait Energy Images (GEI) for Human Recognition using different deep learning techniques. Gait energy images are a spatiotemporal, silhouette-based representation of the human gait. GEIs from the CASIA B Multiview dataset was used to build two other sets of data by subtracting the upper body Deep learning and transfer learning techniques including Convolution Neural Networks (CNN) and VGG16 algorithms had been implemented to carry out the recognition. Results showed that the performance of the model using upper body images gives a greater accuracy than the lower body images. It has also been observed that the accuracy of recognition provided by the upper part of the body is almost the same as that achieved by the whole body, which brings forth the idea that the upper part of the body is the most pertinent in Human Identification using Gait as a biometric. 2022 IEEE. -
CNN-RNN based Hybrid Machine Learning Model to Predict the Currency Exchange Rate: USD to INR
Foreign currency exchange plays an imperative part in the global business and in monetary market. It is also an opportunity for many traders as an investment option and the advance knowledge of fluctuation helps the investors making right decision on time. However, due to its volatile nature, prediction of foreign currency exchange is a challenging task. This paper implements two models based on machine learning, namely Recurrent Neural Networks (RNN) and a Hybrid model of Convolutional Neural Networks (CNN) with RNN known as CNN-RNN to assess the accuracy in predicting the conversion rate of US Dollar (USD) to Indian Rupees (INR). The data set used to verify and validate the models is the daily currency exchange rate (USD to INR) available in public domain. The experimental results show that the simple RNN model performs slightly better than the hybrid model in this particular case. Though the accuracy of the hybrid model is very high in terms of error calculation still the single RNN model is the better performer. This does not straight away reject the hybrid model rather needs more experimental analysis with changing architecture and data set. 2022 IEEE. -
Machine Learning Techniques in Predicting Heart Disease a Survey
The heart serves an important role in living creatures. Diagnosis and forecast of cardiac illnesses demand greater precision, perfection, and accuracy because such tiny mistakes can lead to weariness and death. Numerous heart-related deaths have occurred, and the incidence rates have been rising over time. Predicting the development of heart disorders is important to work in the medical industry. Every month, many databases related to the patient are kept. The information gathered can be used to predict the occurrence of future diseases. This article gives an outline of cardiovascular diseases and modern treatments. Also, the focus of this research is to outline some current research on applying machine learning techniques to predict heart disease, analyze the many machine learning algorithms employed, and determine which technique(s) are useful and efficient. Artificial neural network (ANN), decision tree (DT), fuzzy logic, K-nearest neighbor (KNN), Naive bayes (NB), and support vector machine (SVM) are data mining and machine learning approaches used to predict cardiac disease. This paper includes an overview of the present method based on features, the algorithms are compared, and the most accurate algorithm is analyzed. 2022 IEEE. -
Improvement to Recommendation system using Hybrid techniques
Currently, recommendation systems are a common tool for providing individualized recommendations and item information to users. For personalization in the recommendation system, there are a variety of strategies that can be used. To improve system performance and offset the shortcomings of individual recommendation strategies, a hybrid recommender system integrates two or even more recommendation techniques. The demand to summarize all of the knowledge on actual methods and algorithms utilized in hybrid recommended systems necessitates the need for a systematic review in the domain. These materials will be employed to aid in the development of an auto-switching hybrid recommender system. In the content-based filtering technique, the algorithm is based on the contents of items and the collaborative filtering technique algorithm combines the relationship between user and item. Both of the approaches of recommendation system are suffers from some limitations, this is a big issue to predict better recommendations to the user. Hybrid systems are introduced to overcome the main limitations of both techniques. These systems are made with a combination of content-based and collaborative filtering techniques and have advantages of both techniques. With the use of hybrid systems, the quality of recommendations is improved. Hybrid recommendation systems use previous data of a user to find his/her interest and then they target the set of an adjacent user which is similar with that user and according to adjacent user recommend things to the user. Hybrid systems offer the items that share the common things that a user rated highly (Content-based filtering) and make suggestions by comparing the interest of a similar user (Collaborative filtering). 2022 IEEE. -
A Survey on Adaptive Authentication Using Machine Learning Techniques
Adaptive authentication is a reliable technique to dynamically select the best mechanisms among multiple modalities to authenticate a user based on the users risk profile generated using behavior and context-based information. Websites or enterprise applications enabled with adaptive authentication will have a more robust security system as analyzing the large volume of the user, device, and browser data in real time generates a risk score that decides the appropriate level of security. Though a significant amount of research is being carried out on adaptive authentication, no single model is suitable for a global attack. This paper provides a structured (extensive) survey of current adaptive authentication techniques available in the literature to identify the challenges which demand future research. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Customer Behavior Analysis Using Unsupervised Clustering and Profiling: A Machine Learning Approach
Now-a-days, client conduct models are reliably established on information mining of client information, and each model is supposed to answer one solicitation at one point on schedule. Anticipating client conduct is a problematic and irksome task. Thus, making client conduct models requires the right strategy and approach. Right when an estimate model has been fabricated, it is challenging to restrict it for the motivations driving the advertiser, to pick the very thing displaying moves to make for every client or for the party of clients. Notwithstanding the multifaceted nature of this arrangement, most client models are completely fundamental. As the need might arise, most client conduct investigation models ignore such endless proper factors that the gauges they make are overall not altogether strong. This paper plans to encourage a connection rule mining model to expect client conduct using a typical electronic retail store for data combination and concentrate critical examples from the client conduct data. In this undertaking, a solo grouping of information on the customer's records from a regular food item company's data set will be played out. Customer segmentation is the act of clustering customers into bunches that reflect likenesses among customers in each group. Customers are separated into sections to advance the meaning of every customer to the business. To change items as indicated by unmistakable requirements and practices of the customers. It additionally assists the business with obliging the worries of various kinds of customers. Customers were clustered using a technique known as agglomerative clustering, which is a type of hierarchical clustering. Agglomerative clustering is a method for clustering data in a hierarchical order. It entails merging cases until you reach the appropriate number of clusters. The number of clusters to be produced is determined using the Elbow Method. 2022 IEEE. -
Machine Learning Methods leveraging ADFA-LD Dataset for Anomaly Detection in Linux Host Systems
Advancement in network technology and revolution in the global internet transformed the overall Information Technology (IT) infrastructure and its usage. In the era of the Internet of Things (IoT) and the Internet of Everything (IoE), most everyday gadgets and electronic devices are IT-enabled and can be connected over the internet. With the advancements in IT technologies, operating systems also evolved to leverage these advancements. Today's operating systems are more user-friendly and feature-rich to support current IT requirements and provide sophisticated functionalities. On the one hand, these features enabled operating systems accomplish all current requirements, but on the other hand, these modern operating systems increased their attack surface considerably. Intrusion detection systems play a significant role in providing security against the broad spectrum of attacks on host systems. Intrusion detection systems based on anomaly detection have become a prominent research area among diverse areas of cyber security. The traditional approaches for anomaly detection are inadequate to discover the operating system level anomalies. The advancement and research in Machine Learning (ML) based anomaly detection open new opportunities to tackle this challenge. The dataset plays a significant role in ML-based system efficacy. The Australian Defence Force Academy Linux Dataset (ADFA-LD) comprises thousands of normal and attack processes system call traces for the Linux platform. It is the benchmark dataset used for dynamic approach-based anomaly detection. This paper provided a comprehensive and structured study of various research works based on the ADFA-LD for host-based anomaly detection and presented a comparative analysis. 2022 IEEE. -
Pulse Shaper Design for UWB-Based Medical Imaging Applications
In this paper, a pulse shaping filter is designed to shape the higher-order derivatives of the basic UWB Gaussian pulse for efficient pulse transmission through human tissues for medical imaging applications. The shaped pulse for the desired center frequency fits the FCC mask and power spectral density (PSD) specifications with higher spectral efficiency being achieved. It is observed that the ringing effect of Gaussian pulse is reduced by using the proposed bandpass FIR shaping filter. The low ringing effect observed in the shaped pulse ensures better antenna power distribution and improved location accuracy which is critical factor for medical imaging applications. The pulses synthesized are highly orthogonal which aids in multi-access communication, improved bit error rate (BER) performance and short duration UWB pulses leading to higher data rate transmission. The drooping frequency response characteristics of the synthesized pulse have reduced clutter hence tightly focused image obtained for imaging applications. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.