Browse Items (11858 total)
Sort by:
-
Enhancing Small and Medium OEMs' Adoption of IIoT Technologies
Small and Medium Original Equipment Manufacturers (SME OEMs) face challenges of high initial costs, lack of skilled workforce, data security concerns, and limited infrastructure for IIoT implementation. This research explores the crucial factors influencing the successful integration of Industry Internet of Things (IIoT) technologies into products and processes of SME OEMs. The study investigates the impact of IIOT Manufacturers' operational and business support, training effectiveness, and awareness of benefits on SME OEMs' adoption intention of IIoT solutions. A survey was conducted among 263 firms operating in 103 different equipment manufacturing operations across 67 cities, representing 11 industry sectors. The participants were SME OEMs, and data were collected to assess the influence of various factors on their willingness to adopt IIoT technologies. The study revealed significant insights into adopting IIoT solutions among SME OEMs. Training provided by IIoT manufacturers was found to have the most substantial impact on the adoption intention. Moreover, awareness of benefits and business and operational support had an equal and notable influence on the adoption intention of SME OEMs. These findings underline the importance of effective training programs and comprehensive support from IIoT manufacturers in facilitating successful IIoT integration. The study's outcomes emphasize the value of fostering strategic partnerships between Small and Medium Original Equipment Manufacturers and Industry IoT Manufacturers. Such collaborations can be pivotal in enhancing IIoT adoption rates among SME OEMs, enabling them to stay competitive in the fast-paced market. 2024 IEEE. -
Enhanced Multi-Model Approach for Motion and Violence Detection using Deep Learning Methods Using Open World Video Game Dataset
For today's environment, it is extremely important to understand hostility and motion in a variety of contexts, particularly where accidents are concerned. There's also a high safety risk in public places if there is no proper identification of suspicious activities that occur fast and cannot be accurately observed through traditional surveillance systems that rely on constant human monitoring. Although deep learning algorithms have proven useful for detecting anomalies such as fraud recently, there has been little research on real-time crime detection because of issues related privacy when using live data sets. To tackle the key problem of motion and violence detection with current deep learning methods, this work exploits the Open World Game Dataset which provides realistic activities. The reliance on only one technique undermined the previous models' accuracy while this study comes up with various models to raise the detection precision and real-time processing capability. This work applies MobileNet SSD, YOLOv8 (You Only Look Once), and SSD (Single Shot MultiBox Detector) techniques to create a more accurate movement detection system. To identify violent or illegal behavior from videos, 3D convolutional neural networks (3DCNN) will be used alongside attention approaches. A diverse inexpensive training environment that enables simulating. 2024 IEEE. -
Artificial Intelligence for Enhanced Anti-Money Laundering and Asset Recovery: A New Frontier in Financial Crime Prevention
The incorporation of artificial intelligence (AI) into asset recovery and anti-money laundering (AML) procedures signifies a revolutionary change in the handling of financial crime. This article investigates the use of AI techniques to improve AML compliance, detect suspicious activity, and improve transaction monitoring. Financial institutions can now analyze massive volumes of transaction data in real-time, find anomalies, and lower false positives thanks to AI-based solutions, which include machine learning algorithms and predictive modeling. The research also outlines the difficulties and advantages of implementing AI, such as enhancing the effectiveness and caliber of suspicious activity reports (SARs) while resolving security and privacy issues with data. The study makes the case that AI's capacity to offer collaborative analytics and dynamic risk assessments is essential for the development of AML frameworks and the overall effectiveness of financial crime prevention. 2024 IEEE. -
Industry Internet of Things (IIoT) Adoption Pressures in SME OEMs
Small and Medium Original Equipment Manufacturers (SME OEMs) face challenges in IIoT adoption due to a lack of technical expertise, additional costs, and preferences of the end-users and significant institutional pressures. This research investigates the influence of Environmental Attitude on the Adoption Intention of Industry Internet of Things (IIoT) technologies among Small and Medium Enterprises and Original Equipment Manufacturers (SME-OEMs). This research analyses the effects of End-user Pull and Institutional Pressure in this relationship. A survey of 263 SME OEMs from 11 industrial sectors across 67 cities was conducted using purposive sampling. Structural Equation Modeling (SEM) was used to analyze data, assessing direct and indirect effects. Results show a significant positive relationship between Environmental Attitude and IIoT Adoption Intention. Mediation analysis reveals significant indirect effects through End-user Pull and Institutional Pressure, with complete mediation as the direct effect becomes insignificant. Findings highlight the crucial role of environmental attitude in shaping IIoT adoption intentions among SMEs. A positive environmental attitude drives SMEs to explore IIoT benefits. End-user Pull and Institutional Pressure are key mediators in this process. These insights are valuable for industry stakeholders, policymakers, and SMEs aiming to promote IIoT adoption. Fostering a positive environmental attitude and leveraging End-user Pull and Institutional Pressure can facilitate IIoT adoption. Policymakers can create initiatives to raise environmental awareness and encourage sustainable practices through IIoT. Industry players can form strategic partnerships to support SME OEMs in IIoT adoption. 2024 IEEE. -
Fire Resistance of Concrete with Partial Replacement of Ceramic Waste and Carbon Fiber as Additives
One of the primary hazards that causes catastrophic damage to properties and peoples lives is fire. Although ceramic garbage is deposited on the land, it is a non-biodegradable waste that pollutes the environment. This study is based on the use of industrial waste products such as ceramic sanitary waste to improve the mechanical qualities of concrete that have been exposed to elevated temperatures. An experimental investigation was carried out on cubes, cylinders, and beams to assess compressive strength, split tensile strength, and flexural strength with fractional replacement of fine aggregates with 10, 20, and 30% of ceramic waste and 0, 1, and 2% of carbon fibers as additives at normal and elevated temperature as per ASTM code recommendations and the results shown as a significant improvement. The strength of M30 grade concrete with partial replacement of fine aggregate with ceramic waste up to 30% and carbon additives up to 2% shows an improvement of compressive strength by 17.56% than conventional concrete. It is also observed that normal M30 grade concrete loses its strength by 49.6% when it is exposed to 600C and with fractional replacement of fine aggregate by ceramic waste by up to 30% and carbon additives by up to 2% shows the loss of strength is decreased up to 22.67%. It shows that it is the probable substitute solution for the secure discarding of Ceramic waste. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Theoretical Framework for Blockchain Secured Predictive Maintenance Learning Model Using Digital Twin
The automotive sector benefits from Digital Twins (DTs), software replicas of physical assets or processes. DTs enable engineers and data scientists to obtain deeper insights into the system and solve the most difficult problems faster and more affordably. Blockchain technology is a developing and exciting technology that has the potential to offer DTs monitoring capabilities, strengthening security and enhancing DTs transparency, dependability, and immutability. Intelligent behavior can be integrated into blockchain-based DTs to foresee important maintenance tasks and successfully manage machine functions. Our research involves creating a theoretical framework that leverages emerging technologies such as blockchain, artificial intelligence and DTs to facilitate resolution in the predictive maintenance of industry machines with minimised governing cost. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Compact Dual-Band Millimeter Wave MIMO Antenna for Wireless Communication Systems
The article presents the compact dual-band MIMO antenna resonating at 27.5 and 32 GHz. The radiating structure is a rose-shape with elliptical slots and a horizontal slit to achieve the above resonances. The MIMO antenna dimension is 6.2 0 mm2, where an edge-to-edge distance of 1.82 mm separates radiating elements. The ground plane has simple slits to suppress the mutual coupling. The simulation results of the MIMO antenna is validated through measured and diversity parameter results. 2024 IEEE. -
A Novel Approach to Optimizing Third-Party Logistics Growth through IT, Big Data, and Machine Learning for Superior Supply Chain Management
The purpose of this research is to explore proper development prospects of 3PL business, particularly focusing on the utilization of Information Technology and big data technologies for improving the solidity of supply chains. The change of the industry that started from the provision of services and then became an integrated solution implies the rising role of IT as one of the means for supply chain improvement. Based on the market study and investigation of customers' behaviors, as well as the contexts of the 3PL industry of the India, this research outlines how the IT and big data analytics can contribute to the operations improvement and innovation of the 3PL. Besides, this paper aims at finding out whether the Big Data analytics can enhance the competitiveness of third party logistics providers in a volatile market. 2024 IEEE. -
Analysis on thermal sensitivity of 2D Profilometer used for TMT Glass Polishing
TMT adopts Stressed Mirror Polishing (SMP) technology for the polishing of mirror segments. In this process, the meniscus type spherical shape glass blanks are converted in to a desired aspheric shape by spherical grinding and polishing in the stressed condition. After each grinding and polishing activity metrological measurements are done using different metrology tools. The metrology tool named as 2D-Profilometer is used for low frequency error/foam measurements. It consists of 61 high precision length gauges attached to Carbon Fiber Reinforced Polymer (CFRP) sandwiched Aluminum panel of diameter 1.6 meter in spiral direction. The coefficient of thermal of CFRP is very low however, a small delta temperature variation between the top and bottom sheet of CFRP of the panel will lead to panel bowing which will result in increasing power error. Hence, the objective this work is to analyse the thermal sensitivity of the 2D Profilometer. 2024 SPIE. -
Dictionary-Based BPT Compression with Trimodal Encryption for Efficient Fiber-Optic Data Management and Security
Fiber-optic transmission systems are capable of carrying tens of terabits per second of traffic and thereby form the core infrastructure for all Internet-based services and applications. While fiber-optic communication provides rapid data transfer, it faces the challenge of managing the substantial data volumes generated, stored, or transmitted. In the realm of fiber-optic communication, data interception is straightforward, necessitating robust security measures. One effective solution is compression-based encryption, which combines security with data compression benefits. Encryption safeguards data by transforming it into ciphertext during transmission, rendering it unreadable to attackers without knowledge of the encryption method. Data compression enhances bandwidth efficiency, enabling the efficient transmission of large data volumes using limited bandwidth. In the event of data compromise, attackers must grasp both compression and encryption methods to decipher the information, adding an additional layer of security. In this paper, an encoding technique named the Bounded Probability-Based Textual Data Compression (BPT) algorithm is introduced with trimodal encryption method for securing the short textual data while transferring from source to the destination. The BPT algorithm creates a codeword using a dictionary that assigns binary codes according to character occurrence probabilities in the input data. To decompress, the coding table must be transmitted alongside the compressed data. The trimodal encryption is used as a second tier for securing the data that was compressed using BPT algorithm. The trimodal encryption employs three encryption methods, and data is encrypted using one of these methods during transmission to the destination. The BPT algorithms performance is evaluated using benchmark textual datasets from the Calgary Corpus and the Canterbury Corpus. The experimental results demonstrate the unique characteristics of the BPT algorithm, including compression ratio (CR), compression factor (CF), bits per character (BPC), and space savings. Additionally, the Trimodal encryption algorithm (TME) method is evaluated using end-to-end delay analysis, packet loss analysis, and packet delivery ratio assessment. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
A Secure Deep Q-Reinforcement Learning Framework for Network Intrusion Detection in IoT-Fog Systems
IoT-Fog system security depends on intrusion detection system (IDS) since the growing number of Internet-of-Things (IoT) devices has increased the attack surface for cyber threats. The dynamic nature of cyberattacks often makes it difficult for traditional IDS techniques to stay up to date. Because it can adapt to changing threat landscapes, deep Q-reinforcement learning (DQRL) has become a potential technique for ID in IoT-Fog situations. In this paper, an IDS system for IoT-Fog networks based on DQRL is proposed. The suggested solution makes use of fog nodes' distributed computing power to provide real-time IDS with excellent accuracy and minimal latency. With feedback from the network environment, the DQRL agent learns to recognize and categorize network traffic patterns as either normal or intrusive. Adaptive exploration techniques, effective reward functions, and deep neural networks for feature extraction are adopted by the system to improve predictive performance. The evaluation findings show that, in terms of detection accuracy, precision, recall and f-measure, the proposed DQRL provides flexibility to changing threat patterns as compared to conventional IDS techniques. A vast array of cyberattacks, such as malware infections, denial-of-service (DoS) attacks, and command-and-control communications, are successfully recognized and categorized by the system. It is possible that the suggested solution will be crucial in safeguarding IoT-Fog networks and preventing cyberattacks 2024 IEEE. -
Enhanced Lumpy Cattle Skin Disease Prognosis via Deep Learning Methods
Animal illness is growing in importance. Identification of the illness is important since various diseases may affect different animals, and immediate guidance will be provided. Cows with lumpy skin issues are caused by the Neethling infection. The affection of these diseases causes lasting injury to the cattle's skin. Reduced Poor growth, reversal, milk production, gravidity, and, in severe cases, mortality are the most common adverse consequences of the illness. We developed a deep learning-based architecture that can predict or recognize disease. A deep literacy system is required to identify the microorganism causing the lumpy skin disease. This system collects diverse cattle electronic medical records and uses data analysis to create an intelligent diagnosis system for cattle diseases. It involves text preprocessing to enhance data quality, and the ECLAT algorithm correlates disease names with probabilities, providing tailored treatment plans. The system ensures timely disease treatment, reducing herders' losses and promoting scientific intelligence in animal husbandry. 2024 IEEE. -
Safety of Unmanned Systems
The safety risk management process describes the systematic application of management policies, procedures and practices to the activities of communicating, consulting, establishing the context, and assessing, evaluating, treating, monitoring and reviewing risk. This process is undertaken to provide assurances that the risks associated with the operation of unmanned aircraft systems have been managed to acceptable levels. Active efforts should be made to develop rules to ensure the safe operation of unmanned aerial vehicles. For the safe integration of operations with unmanned aerial vehicles, it is important to take into account the influence of different levels of control and autonomous capabilities, as well as the source of movement monitoring in the system. This article discusses the security issues of unmanned systems, the main directions of ensuring the information security of unmanned systems, software and hardware vulnerabilities have been identified. The methods of information protection are given, the disadvantages are indicated. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Advancing Predictive Analytics in E-Learning Platform: The Dominance of Blended Models in Enrollment Forecasts
The rapid expansion of e-learning platforms has revolutionized the landscape of education, particularly highlighting the significance of online courses in contemporary learning environments. This research focuses on Udemy, a prominent online learning platform, and aims to enhance the predictability of course enrollments within its IT & Software category. The study's central purpose is to leverage advanced machine learning techniques to predict course subscriber numbers, a crucial indicator of a course's popularity and success. Employing an extensive dataset from (Kaggle DB)Udemy, encompassing various course attributes such as ratings, reviews, and pricing, the study explores multiple machine learning models. These include Linear Regression, Decision Tree, Random Forest, Gradient Boosting, and K-Nearest Neighbors Regression. A key innovation of this research is the application of ensemble methods, particularly a blended model approach, to integrate predictions from multiple models, thereby enhancing accuracy and reliability. The findings of this study are significant. The ensemble approach, notably the blended model, outperforms individual predictive models in accuracy. Among the single models, Gradient Boosting Regression shows the highest effectiveness in forecasting enrollments. The research highlights the vital role of course characteristics, including ratings and reviews, in determining course popularity. This study contributes to the field of e-learning by introducing a novel, data-driven approach to predict course enrollments. It offers valuable insights for educators, course creators, and platform developers, emphasizing the potential of machine learning in optimizing content strategy and marketing efforts in the digital education domain. The application of ensemble machine learning methods presents a new horizon in educational analytics, paving the way for more nuanced and effective strategies in online education delivery and promotion. 2024 IEEE. -
Transparency in Translation: A Deep Dive into Explainable AI Techniques for Bias Mitigation
In an era dominated by artificial intelligence (AI), concerns about bias and discrimination loom large. The quest for fairness and equity in AI-driven decision-making has led to the exploration of Explainable AI (XAI) as a viable solution. This paper undertakes a thorough examination of the bias ingrained within AI systems and posits XAI as a potent antidote. Beginning with an exploration of the origins and aftermath of bias in AI, the analysis traverses the evolution of XAI techniques, including SHAP, LIME, and counterfactual explanations, clearly stating their advantages and drawbacks. With each XAI method thoroughly inspected, the study unravels their applicability across diverse AI models and domains. Furthermore, a compelling case study is presented, showcasing XAI's practical application in a language translation app, where it guarantees transparency and equity in the translation process. This tangible example serves as a testament to XAI's efficacy in mitigating bias within real-world applications. As the analysis concludes, it underscores the pivotal role XAI plays in fostering accountability and trustworthiness in AI systems. By shedding light on how XAI mitigates bias and offering concrete examples of its utility, the paper advocates for its widespread adoption as an imperative step towards the development of ethically robust AI systems. In a landscape filled with concerns about bias, XAI emerges as a beacon of hope, promising a future where AI decisions are transparent, fair, and equitable for all. 2024 IEEE. -
Comparative Analysis Study of 43-point and 27-point Buyoff Stations for Stressed Mirror Polishing (SMP) Metrology
As a collaborative effort within the Thirty Meter Telescope (TMT) project, India is committed to supplying 84 polished segments for the primary mirror, employing the innovative Stressed Mirror Polishing (SMP) technology obtained from Coherent Inc., USA. SMP allows for the efficient polishing of highly aspheric non-axisymmetrical glass blanks at an accelerated rate. India-TMT (I-TMT) successfully applied SMP to qualify three glass roundels at Coherent's facility in Richmond, CA. The study focuses on a comparative analysis of Buyoff Stations (BOS) used in the SMP process. It contrasts results from the 43-point hydraulic-based BOS at Coherent with simulated outcomes from the 27-point whiffletree-based BOS at I-TMT. This analysis assesses efficacy and performance differences between the two BOS configurations, involving a comprehensive examination of a 1520mm diameter polished glass roundel. The study integrates Finite Element Method (FEM) simulations with experimental data, providing insights into the efficiency of the respective BOS setups. 2024 SPIE. -
Enhancing Human-Computer Interaction with a Low-Cost Air Mouse and Sign Language Recognition System
The purpose of this study is to investigate the development of assistive technologies that are designed to empower people with disabilities by increasing their level of freedom and accessibility. Voice assistants, air mice, and software that recognizes sign language are some of the topics that are specifically covered in this. Those who have impaired fine motor skills can benefit from using air mice since they allow controls to be made by hand gestures. Using machine learning algorithms, sign language recognition software is able to decipher signs with an accuracy rate of over 90 percent, making it easier for people who are deaf or hard of hearing to communicate themselves. By relying solely on vocal instructions, voice assistants like Alexa make it possible to control devices without using your hands. Not only do these technologies have the potential to be revolutionary, but they also confront obstacles in terms of improving identification accuracy and integrating them into common gadgets. In this study, the development and impact of voice assistants, sign language software, and air mice are discussed. More specifically, the paper highlights the potential for these technologies to help millions of people with disabilities all over the world. Additionally, it examines potential enhancements that could be made to these technologies in the future in order to further improve accessibility and inclusivity. This research integrates computer vision and machine learning to create a multimodal system blending air mouse functionality with real-time sign language translation. Achieving 95% accuracy in gesture recognition for air mouse control and 98% accuracy in sign language letter classification using a basic webcam, the system promotes accessible interaction without specialized hardware. Despite limitations in vocabulary and lighting sensitivity, future efforts aim to broaden data training and explore mobile deployment. These advancements hold promise for enhancing natural human-computer interaction, particularly for users with disabilities, by enabling intuitive, hands-free control and communication. 2024 IEEE. -
Assessing and Exploring Machine Learning Techniques for Cardiovascular Disease Prediction using Cleveland and Framingham Datasets
Heart disease prediction using machine learning has garnered significant attention due to its potential for early diagnosis and intervention. This study presents an analysis of various machine learning algorithms applied to HD prediction across multiple research papers. The goal of this study is to analyze the performance and predictive capabilities of various machine learning algorithms in predicting heart disease across different datasets and research papers. Algorithms such as Logistic Regression, Random Forest, Support Vector Machine, Decision Tree, Naive Bayes, and Gradient Boosting were evaluated using diverse datasets and parameters. In the Cleveland dataset, both Random Forest and Decision Tree classifiers achieved perfect accuracy 100%. Conversely, in the Framingham dataset, Random Forest exhibited the highest accuracy at 94%, followed by SVM at 87.45%, and Decision Tree at 85.23%. While specific algorithm performance varies depending on the dataset and parameters considered, ensemble methods like Random Forest often demonstrate superior performance. These findings underscore the effectiveness of machine learning in HD prediction and emphasize the significance of algorithm selection in developing accurate predictive models for cardiovascular health. 2024 IEEE. -
Advancements in Sybil Attack Detection: A Comprehensive Survey of Machine Learning-Based Approaches in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are used in various healthcare and military surveillance applications. As more sensitive data is transmitted across the network, achieving security becomes critical. Ensuring security is also challenging because most sensors are deployed in remote areas, making them vulnerable to many security attacks. Sybil attacks are one of the most destructive attacks. Security against Sybil attackers can be attained by implementing effective detection techniques to distinguish attackers from genuine nodes. This paper reviews existing machine learning-based approaches for detecting Sybil attacks, and their performance is compared based on different parameters. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Enhancing Patient Well-Being in Healthcare Through the Integration of IoT and Neural Network
This study analyses the revolutionary integration of Internet of Things (IoT) structures in healthcare through a complete examination of outstanding case research. The first case study focuses on real-time patient fitness monitoring in a clinic setting. The suggested device utilizes an Internet of Things-ready device that has many sensors, including oxygen, pressure, and temperature sensors. The issues of forecasting patient health in advance are handled with the deployment of machine learning models, notably Artificial Neural Networks (ANN), Decision Trees (DT), and Support Vector Machines (SVM). The second case study analyses IoT's effect on patient-precise medication identification and remote fitness monitoring, uncovering issues associated with accessibility, pricing, and human interfaces. Proposed alternatives, which incorporates greater education, increased accessibility, and user-pleasant interfaces with robust technical assistance, have been evaluated with 30 patients over a three-month duration. The results reveal a great growth in impacted person health, along with heightened attention of periodic health monitoring. The results highlight how IoT technologies may transform healthcare procedures by offering pro-active solutions for patients' well-being. This study offers insightful information that may be used to solve practical issues, promote patient-centered solutions, and broaden the scope of the healthcare period. A significant step towards a patient-centered and technologically advanced healthcare environment, the successful outcomes validate the capacity for sustained innovation, cooperation, and improvement in the integration of IoT systems for optimal patient care. 2024 IEEE.
