Browse Items (11858 total)
Sort by:
-
An Analysis of Grimms' Transmedia Storytelling in the Age of Technology
This research paper delves into an intersection of traditional literature and transmedia storytelling, with particular emphasis on Grimms' tales and its television series adaptation. Providing young audiences with engaging and dynamic experiences, transmedia storytelling involves delivering a single story across numerous platforms. Utilizing narrative analysis, this research seeks to uncover hidden themes, character growth, and story dynamics by breaking down the complex presentation and structure of stories in diverse media. Natural Language Processing (NLP) techniques like thematic analysis, sentiment analysis, keyword sentiment analysis have been employed to examine the differences between the presentation of these stories in varied formats as well as evaluating audience reception. It also assesses the degree to which transmedia adaptations support the resuscitation of beloved children's books in popular culture. By incorporating digital surrealism and aspects of technology, this paper enhances our understanding of how traditional stories captivate audiences across various media forms while maintaining their timeless quality. 2024 IEEE. -
An Analysis of Financial and Technological Factors Influencing AgriTech Acceptance in Bengaluru Division, Karnataka
In 2023, India surpassed China to become the world's most populated nation. This demographic surge has precipitated an escalating exigency for sustenance as populace burgeons unabatedly. To satiate this burgeoning demand there arises an imperative to augment yield of agriculture commensurately. It is pertinent to acknowledge that as per Global Hunger Index of 2019, India occupies disconcerting rank of 102 amongst consortium of 117 nations when gauged by severity of hunger quantified through Hunger Severity Scale with disquieting score of 30.3. Aspiration of attaining utopian objective of zero hunger by 2030 as promulgated by Sustainable Development Goals appears to be quixotic endeavor seemingly beyond realm of plausibility. In this milieu agricultural technology (AgriTech) enterprises within India present veritable opportunity to invigorate agricultural sector. Agrarian landscape of India has been undergoing profound metamorphosis owing to technological renaissance that has permeated nation facilitated by innovative solutions proffered by nascent corporate entities. State of Karnataka stands as an epicenter of sorts for AgriTech enterprises within India. In this study we meticulously scrutinize impact wielded by financial factors on adoption of AgriTech solutions by agrarian stakeholders and elucidate technological determinants that actuate embracement of AgriTech within this demographic. The study uses descriptive statistics and chi-square analyses to rigorously assess predefined objectives. Geographic ambit of this inquiry encompasses regions of Chikkaballapura and Doddaballapura Taluks situated within Bengaluru division of Karnataka in 2022. The empirical revelations distinctly illuminate that individuals vested with access to technological and financial resources exemplified by parameters such as annual household income, accessibility to commercial banking services, cooperative financial institutions, mobile telephony, internet connectivity and Global Positioning System (GPS) technology exhibit palpable predilection for integration of AgriTech solutions into their agrarian practices. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
An analysis of factors associated with employee satisfaction in information technology companies
BACKGROUND AND OBJECTIVES: An employees satisfaction and performance are linked to the companys work discipline, personal factors, and organizational culture. This paper studies these three factors in the context of Information Technology companies and their connection to employee satisfaction. Job satisfaction is a significant issue in Information Technology Companies, leading to increased labour turnover in Information Technology Companies. The study highlights the relevance of Information Technology companies to understanding the reasons behind their employees satisfaction. Until now, little is known concerning the variants of job satisfaction among Information Technology employees, enriching the understanding in this particular professional area. The study was conducted to assess the job satisfaction needs of the employees in major Information Technology companies. The study helps to know the preferences and problems of the employees. METHODS: In this study, data was collected from employees from various Information Technology companies to uncover the factors that impact the satisfaction of employees. Considering the studys goal and the literature review, the technique was analytical and interpretive. Due to large populations random sampling method is convenient for the study. The studys objectives were achieved explicitly via the questionnaires design. To test the proposed hypotheses, all data were processed using the Structural Equation Modelling, Statistical Package for Social Science (SPSS) and Analysis of Moment Structures. FINDINGS: Information Technology companies need their employees to feel satisfied to achieve the overall objectives and remain loyal to the company to achieve company success. From the responses, we learned that 31% of the respondents were satisfied with their employer about the various allowances and benefits they receive. Also, we knew that around 50% of the respondents were happy with their choice of the company because of its future commitments. 102 of the respondents highly disagreed that they were satisfied with the attitude and nature of their employees. Also, 22.26% of the male respondents have said they are only sometimes motivated to go to work. The limitation of this study was that the collected data was only of the general employees of the Indian Information Technology companies and not to specific departments of those companies. Also, no categories of companies were defined as per turnover. CONCLUSION: By recognizing the importance of job satisfaction, managers can create an environment that motivates and engages employees, leading to better performance, increased productivity and reduced employee turnover 2024 Tehran Urban Research and Planning Center. All Rights Reserved. -
An Analysis Conducted Retrospectively on the Use: Artificial Intelligence in the Detection of Uterine Fibroid
The most frequent benign pelvic tumors in women of age of conception are uterine fibroids, sometimes referred to as leiomyomas. Ultrasonography is presently the first imaging modality utilized as clinical identification of uterine fibroids since it has a high degree of specificity and sensitivity and is less expensive and more widely accessible than CT and MRI examination. However, certain issues with ultrasound based uterine fibroid diagnosis persist. The main problem is the misunderstanding of pelvic and adnexal masses, as well as subplasmic and large fibroids. The specificity of fibroid detection is impacted by the existing absence of standardized image capture views and the variations in performance amongst various ultrasound machines. Furthermore, the proficiency and expertise of ultra sonographers determines the accuracy of the ultrasound diagnosis of uterine fibroids. In this work, we created a Deep convolutional neural networks (DCNN) model that automatically identifies fibroids in the uterus in ultrasound pictures, distinguishes between their presence and absence, and has been internally as well as externally validated in order to increase the reliability of the ultrasound examinations for uterine fibroids. Additionally, we investigated whether Deep convolutional neural networks model may help junior ultrasound practitioners perform better diagnostically by comparing it to eight ultrasound practitioners at different levels of experience. 2024 IEEE. -
An analogical study of the narrative techniques used in the film Paradesi (2013) an adaptation of Tamil translation (Yerium Panikkadu) of the novel 'Red Tea' /
International Journal Of Humanities and Social Science Invention, Vol.5, Issue 3, pp.1-6, ISSN: 2319-7722 (Online) 2319-7714 (Print). -
An Alternative Deep Learning Approach for Early Diagnosis of Malaria
Considering the malaria disease-related moralities prevailing mainly in underdeveloped countries, early detection and treatment of malaria must be an essential strategy for lowering morbidity and fatality rates. Detection of Malaria using traditional investigation methods through blood samples and expert judgments was found to be time-consuming. In this paper, the authors introduced a Machine Learning automated system to eliminate the need for human intervention, which in turn enables early detection of malaria. The study has used various Deep Learning techniques such as traditional Convolutional Neural Network (CNN), VGG19, ConvNeXtXLarge, ConvNeXtBase, ConvNeXtSmall, ConvNeXtTiny, InceptionResnetv2, Xception, DenseNet169, EfficientNetB7, MobileNet, ResNet50, and NasNetLarge as base models. These models have been trained and tested with microscopic blood smear images dataset and observed that ConvNeXtXLarge detects malarial parasites with an accuracy of 96%. The proposed method outperforms the existing approaches in terms of both accuracy and speed. The findings of this work can contribute to the development of more accurate and efficient automated systems for early detection of Malaria. 2024 IEEE. -
An algorithm to detect an object in a confined space by using improved fingerprinting approach
The rapid evolution of location-based services has made tremendous changes in the society. In this paper, Trilateration method is implemented in fingerprinting methodology to obtain very precise and low error position details of the client portable device. Trilateration is a method in which the portable device is determined by the received signal strength intersecting at one position from the three reference points. Fingerprinting method involves several steps like training stage and positioning stage in which the training stage consists of the creation of the database of the signal strengths along with its associated location measurements. In the positioning step where effective and efficient received signal strength collected from the portable device is matched with the data saved into the database to get the position information of the client. The position of the user is estimated by collecting the received signal strengths from three reference points by using the concepts of trilateration approach in fingerprinting methodology to obtain more precise and accurate information. 2005 - ongoing JATIT & LLS. -
An algorithm for IoT based vehicle verification system using RFID
The verification of vehicle documents is an important role of transport department which is rising day by day due to the mass registration of the vehicles. An automated vehicle verification system can improve the efficiency of this process. In this paper, we propose an IOT based vehicle verification system using RFID technology. As a result, the vehicle checking which is done now manually can be replaced by automation. There is a loss of a significant amount of time when the normal vehicle checking is done manually. The proposed system will make this process automated. The present verification process is using inductive loops that are placed in a roadbed for detecting vehicles as they pass through the loop of the magnetic field. Similarly, the sensing devices spread along the road can detect passing vehicles through the Bluetooth mechanism. The fixed audio detection devices that can be used to identify the type of vehicles on the road. Other measurements are fixed cameras installed in specific points of roads for categorising the vehicles. But all these mechanisms cannot verify the documents and certificates of the vehicles. In our work, we have suggested an algorithm using RFID technology to automate the documentation verification process of the vehicles like Pollution, Insurance, Rc book etc with the help of RFID reader placed at road checking areas. This documents will be updated by the motor vehicle department at specific periods. Copyright 2019 Institute of Advanced Engineering and Science. All rights reserved. -
An AI-enabled research support tool for the classification system of COVID-19
The outbreak of COVID-19, a little more than 2 years ago, drastically affected all segments of society throughout the world. While at one end, the microbiologists, virologists, and medical practitioners were trying to find the cure for the infection; the Governments were laying emphasis on precautionary measures like lockdowns to lower the spread of the virus. This pandemic is perhaps also the first one of its kind in history that has research articles in all possible areas as like: medicine, sociology, psychology, supply chain management, mathematical modeling, etc. A lot of work is still continuing in this area, which is very important also for better preparedness if such a situation arises in future. The objective of the present study is to build a research support tool that will help the researchers swiftly identify the relevant literature on a specific field or topic regarding COVID-19 through a hierarchical classification system. The three main tasks done during this study are data preparation, data annotation and text data classification through bi-directional long short-term memory (bi-LSTM). Copyright 2023 Tiwari, Bhattacharjee, Pant, Srivastava and Snasel. -
An AI-Based Forensic Model for Online Social Networks
With the growth of social media usage, social media crimes are also creeping sprightly. Investigation of such crimes involves the thorough examination of data like user, activity, network, and content. Although investigating social media looks quite straight forward process, it is always challenging for the investigators due to the complex process involved in it. Due to the immense growth of social media content, manual processing of data for investigation is not possible. Most of the works from this area provide an automatic model or semi-automated, and much of the contributions lacks the logical reasoning and explainability of the evidence extracted. Searching techniques like entity-based search and explainable AI add value to the quick retrieval within appropriate scope and explain the results to the court of law. This paper provides a model by adding these new techniques to the basic forensic process. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
An AI Approach to Pose-based Sports Activity Classification
Artificial intelligence systems have permeated into all spheres of our life-impacting everything from our food habits to our sleep patterns. One untouched area where such intelligent systems are still in their infancy is sports. There has not been enough indulgence of AI techniques in sports, and most of the works are carried on manually by coaching staff and human appointees. We believe that intelligent systems can make coaching staff's work easier and produce findings that the human eye can often overlook. Here, we have proposed an intelligent system to analyze the beautiful game of tennis. With the use of computer vision architecture Detectron2 and activity-based pose estimation and subsequent classification, it can identify an action from a tennis shot (activity). It can produce a performance score for the player based on pose and movement like forehand and backhand. It can also be used to understand and evaluate the strengths and weaknesses of the player. The proposed approach provides a piece of valuable information for a player's performance and activity detection to be used for better coaching. The study achieves a classification accuracy of 98.60% and outperforms other SOTA CNN models. 2021 IEEE -
An AHP-TOPSIS Approach for Optimizing the Mechanical Performance of Natural Fiber-Based Green Composites
Natural fibers have emerged as an effective replacement for synthetic fibers in the fabrication of green composites to be used for producing various components in automotive, aerospace, and other applications. In this proposed study, the mechanical properties of banana and coir fiber-based green composites have been optimized by using a hybrid AHP-TOPSIS approach. Corn starch along with glycerol has been used as the matrix material for fabricating the green composites. The mechanical properties such as tensile strength, flexural strength, and impact strength of the developed green composite have been optimized with a focus on the utilization of this composite in automotive and aerospace applications. Three different weight percentages (0%, 5%, and 10%) of banana and coir fibers was considered for the fabrication of green composites. The constituents of the green composite have been taken as the input variables whereas the mechanical properties of the green composite are considered as the output variables for designing the experiment. The design of the experiment consisted of nine different combinations of input and output variables. Results of the study revealed that 5 wt.% of banana fiber, 10 wt.% of coir fiber, and 85 wt.% of corn starch provide the optimum mechanical performance of the developed green composites. 2022 A. N. Shankar et al. -
An advanced variable temperature refrigerator for preservation and management of food items
All food items will have shelf life period. The main aim of food preservation is to maximize the shelf life period and preservation of nutrients for a long period. One of the preservation methods is refrigeration. Each food item will have its own optimum storage temperature to maximize the shelf life period. Normal refrigerators have fixed temperature. The work proposes a refrigerator with six compartments which is equipped with temperature sensors to maintain the fixed temperature for that compartment and with weighing sensors to monitor the depleting food items with the help of a controller. 2019, Institute of Advanced Scientific Research, Inc. All rights reserved. -
An advanced machine learning framework for cybersecurity
The world is turning out to be progressively digitalized raising security concerns and the urgent requirement for strong and propelled security innovations and procedures to battle the expanding complex nature of digital assaults. This paper examines how AI is being utilized in digital security in both resistance and offense exercises, remembering exchanges for digital attacks focused on AI models. Digital security is the assortment of approaches, systems, advancements, and procedures that work together to ensure the confidentiality, trustworthiness, and accessibility of processing assets, systems, programming projects, and information from attacks. Machine learning-based examination for cybersecurity is the following rising pattern in digital security, planned for mining security information to reveal progressed focused on digital threats and limiting the operational overheads of keeping up static relationship rules. In this paper, we are mainly focusing on the detection and diagnosis of various cyber threats based on machine learning. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021. -
An Advanced and Ideal Method for Tumor Detection and Classification from MRI Image Using Gamma Distribution and Support Vector Machine
As indicated by a measurable report distributed by the registry of central brain tumor at United States (CBTRUS), roughly 59,550 individuals were recently diagnosed to have essential benign and essential harmful brain tumors in 2017. Besides, in excess of 91,000 individuals, in the United States alone, were living with an essential harmful cerebrum tumor and 367,000 were living with an essential kind brain tumor. The task of detecting the position of the tumor in the body of the patient is the starting point for a medical treatment in the diagnosis process. The main aim of this study is to design a computer system, which is able to detect the tumor presence in the digital images of the brain in the patient and to accurately define its borderline. In this proposed model, gamma distribution method is used for training, testing, and for the feature extraction process, while SVM, support vector machine is used for the classification process. Most of the algorithms find it difficult to segment the tumors that were present in the edges. But with the help of gamma distribution along with the use of edge analysis, it is easier to identify those tumor areas that are present in the edges, thus making it easier for the preprocessing process. Gamma distribution also provides us with high accuracy, and it can also point the exact location of the tumor than compared to other algorithms. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
An Adoptable Multi-Criteria Decision-Making Analysis to Select a Best Hair Mask Product-Extended Weighted Aggregated Sum Product Assessment Method
Hair masks (HMs) act as one of the solutions for most of the hair problems like dandruff, frizziness, breakage, premature- greying and so on. Due to its various benefits, HM products are acquiring more popularity among the individuals. As there are different varieties of HM products available in the market, the confusion arises in choosing a HM which suits the individuals hair profile and causes less side effects. Here, we have employed multi-criteria decision-making (MCDM) combined with fuzzy set theory to obtain better results. We used the extended Weighted Aggregated Sum Product Assessment (WASPAS) method based on trapezoidal interval type-2 fuzzy set (TIT2FS) in this research paper to handle vagueness and complexity in real-world problems. For determining the objective weights of the criteria, we used the entropy method of weight finding. An example of selecting a hair mask product (HMP) among four alternatives based on five criteria is provided to illustrate the applicability of the proposed method. In comparison to other MCDM methods, the approach yielded more practical results. By doing a sensitive study, the methods stability is also assessed. 2021, The Author(s). -
An adept approach to ascertain and elude probable social bots attacks on twitter and twitch employing machine learning approach
There has been a tremendous increase in the popularity of social media such as blogs, Instagram, twitter, online websites etc. The increasing utilization of these platforms have enabled the users to share information on a regular basis and also publicize social events. Nevertheless, most of the multimedia events are filled with social bots which raise concerns on the authenticity of the information shared in these events. With the increasing advancements of social bots, the complexity of detecting and fact-checking is also increasing. This is mainly due to the similarity between authorized users and social bots. Several researchers have introduced different models for detecting social bots and fact checking. However, these models suffer from various challenges. In most of the cases, these bots become indistinguishable from existing users and it is challenging to extract relevant attributes of the bots. In addition, it is also challenging to collect large scale data and label them for training the bot detection models. The performance of existing traditional classifiers used for bot detection processes is not satisfactory. This paper presents: A machine learning based adaptive fuzzy neuro model integrated with a hist gradient boosting (HGB) classifier for identifying the persisting pattern of social bots for fake news detection. And Harris Hawk optimization with Bi-LSTM for social bot prediction. Results validate the efficacy of the HGB classifier which achieves a phenomenal accuracy of 95.64 % for twitter bot and 98.98 % for twitch bot dataset. 2023 -
An adaptive inertia weight teachinglearning-based optimization for optimal energy balance in microgrid considering islanded conditions
The energy balance in islanded microgrids is a complex task due to various operational constraints. This paper proposes a new approach to multi-objective optimization for achieving energy balance in aMicrogrid(MG) in both islanded and normal modes. Optimal load control (OLC)is achallenge, due to a lack of capacity to generate the global optimum after each run. The latest variant of Teaching Learning Based Optimization (TLBO), known as Adaptive-TLBO, includes both modifications during exploitation and exploration stages (ATLBO). The results achievedwith the proposed method are exceptional on a modified IEEE 33-bus system. In addition to the improvement of the voltage profile and the decrease of the distribution losses, the energy balance improves with the method. The proposed ATLBO algorithm overrides any proposed other algorithm, as shown by comparison with PSO, base TLBO, Backtrackingsearch algorithm (BSA) and cuckoo search algorithms, etc. (CSA). The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022. -
An Adaptive Cluster based Vehicular Routing Protocol for Secure Communication
In todays scenario, Vehicular Ad-hoc Network (VANET) is one of the modern fields in vehicle communication; it includes a large number of nodes that can be changed arbitrarily with the ability to link or exit the system anytime. Moreover, it has various complexities because of the attacks model in the transmission and communication channel. Besides, most of the attacks are known as black hole attack and wormhole attack. The presence of these attacks causes large damage in the data broadcasting region that ends in data drops or collapses. To defeat these problems, a novel Clustered Vehicle Location protocol for Hybrid Krill Herd and Bat Optimization (CVL-HKH-BO) technique is proposed. Thus, the proposed mechanism of hybrid krill herd and bat optimization is to detect and prevent attacks based on the fitness function. Moreover, secure communication can be enhanced by the proposed technique. Consequently, the solution to energy consumption and packet delay issues are solved using the CVL protocol. The projected strategy is implemented in the Network simulator (Ns-2) platform, and the outcomes show the node energy, overload and delay are minimized by increasing the quantity of packets transmitted in the network. Sequentially, the proposed technique is compared with existing techniques in terms of throughput, packet loss, delay time and data broadcasting ratio. Therefore, the duration of the node can be enhanced and can attain high energy capable data transmission. 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.


