International Journal of Scientific Research in Science, Engineering and Technology最新文献

筛选
英文 中文
Machine Learning for the Diagnosis and Prognosis of Chronic Illnesses 用于慢性疾病诊断和预后的机器学习
Kajal, Kanchan Saini, Dr. Nikhat Akhtar, Prof. (Dr.) Devendra Agarwal, Ms. Sana Rabbani, Dr. Yusuf Perwej
{"title":"Machine Learning for the Diagnosis and Prognosis of Chronic Illnesses","authors":"Kajal, Kanchan Saini, Dr. Nikhat Akhtar, Prof. (Dr.) Devendra Agarwal, Ms. Sana Rabbani, Dr. Yusuf Perwej","doi":"10.32628/ijsrset24113100","DOIUrl":"https://doi.org/10.32628/ijsrset24113100","url":null,"abstract":"An essential part of healthcare is disease prediction, which seeks to identify people who are at risk of getting certain diseases. Because of their superior capacity to sift through massive datasets in search of intricate patterns, machine learning algorithms have recently become useful instruments in the fight against illness prediction. The goal of this project is to make it easier for people to diagnose their own health problems using just their symptoms and precise vital signs. Due to excessive medical expenditures, many people put off taking care of their health, which can result in worsening symptoms or even death. Medical expenses can be overwhelming for people without health insurance. Using machine learning methods like ExtRa Trees, the suggested system provides a general illness forecast based on patients' symptoms. The algorithm provides a possible diagnosis based on the user's age, gender, and symptoms, suggesting that the user may be experiencing a certain illness. The system also suggests healthy eating and exercise routines to help lessen the impact of the condition, depending on how bad it is. Lastly, this article has shown a comparison examination of the suggested system using several algorithms including logistic regression, decision tree, and Naïve Bayes. The efficiency and accuracy of illness prediction are both enhanced by the suggested model.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"102 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141125045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive Music Based on Mood 基于情绪的预测音乐
Ganesh B. Regulwar, Nikhila Kathirisetty
{"title":"Predictive Music Based on Mood","authors":"Ganesh B. Regulwar, Nikhila Kathirisetty","doi":"10.32628/ijsrset2411310","DOIUrl":"https://doi.org/10.32628/ijsrset2411310","url":null,"abstract":"It is often difficult for a person to choose which mu- sic to listen to from a vast array of available options. Relatively, this paper focuses on building an efficient music recommendation system based on the user’s mood which determines the emotion of user using Facial Recognition technique. The model is build using the transfer learning approach for which MobileNet model and Cascade classifier are used. Analyzing the user’s face expression might help you better comprehend their current emotional or mental condition. Music and video are one area where there is a lot of potential to present clients with a variety of options depending on their interests and data. More than 60% of users anticipate that the number of songs in their music collection will grow to the point where they will be unable to find the song they need to play at some point in the future. The user would save time by not having to search for or look up tunes. The image of the user is captured using a webcam. Then, depending on the user’s mood, an appropriate song from the user’s playlist or a movie is shown.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"121 45","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141125101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced Real Time Bone Fracture Monitoring with Pain Control Mechanism 先进的实时骨折监测与疼痛控制机制
Logasundari.T, Gopika.TP, Swathe. L, Saathvika. R
{"title":"Advanced Real Time Bone Fracture Monitoring with Pain Control Mechanism","authors":"Logasundari.T, Gopika.TP, Swathe. L, Saathvika. R","doi":"10.32628/ijsrset2411280","DOIUrl":"https://doi.org/10.32628/ijsrset2411280","url":null,"abstract":"Bones provide structural aid to the frame, and bone fracture recuperation is crucial for regaining functionality and mobility. The boundaries of traditional external fixators in bone fracture remedy, characterized by a loss of actual-time monitoring and capability complications, necessitate a paradigm shift. To clear up this trouble, a clever fixator design imbued with the transformative energy of Aware, Sensing, Smart, and Active (ASSA) technology has been developed. This fixator transcends its passive role, evolving into a wise IoT gateway. It continuously gathers and analyses facts from numerous incorporated sensors, supplying real-time insights into the tricky dance of fracture healing. Its analytical prowess fosters computerized identification of vital activities and milestones within the affected person's recuperation journey, empowering well-timed interventions and knowledgeable scientific selection-making. Furthermore, the fixator vigilantly monitors patient compliance, making sure adherence to prescribed behaviours and nipping non-compliance in the bud. However, its innovation extends beyond mere monitoring. Embedded within its smart framework lies a modern pain manipulation mechanism powered through a thermoelectric generator (TEG).","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"119 52","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141125198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging P2P Architecture and Semantic Web for Enhanced Resource Discovery 利用 P2P 架构和语义网增强资源发现功能
Leonard K. Kirui, Samuel M. Mbuguah, Richard K. Ronoh
{"title":"Leveraging P2P Architecture and Semantic Web for Enhanced Resource Discovery","authors":"Leonard K. Kirui, Samuel M. Mbuguah, Richard K. Ronoh","doi":"10.32628/ijsrset2411278","DOIUrl":"https://doi.org/10.32628/ijsrset2411278","url":null,"abstract":"Web 4.0, also known as the next generation, intelligent internet, possesses the potential to become a widely and universally used communication medium for various types of information. However, its decentralized architecture lacks strong semantic support, resulting in an internet that is disorganized. The current system lacks the capacity to facilitate users' effective information discovery, extraction, and integration from multiple sources. Additionally, it fails to give consumers efficient tools for manipulating and turning acquired data into knowledge that is useful. Peer-to-peer (P2P) overlay technologies have recently come to light as a way to improve resource discovery on the internet. In dynamic and large-scale situations, these technologies provide a scalable framework for allocating, sharing, and gaining access to resources. The purpose of this research is to discuss on semantically enabled web architecture that makes use of P2P overlay technology. This architecture aims to facilitate structured and precise access to internet resources and promote knowledge sharing among community members who share similar interests. The paper examines the core elements of the semantic web architecture, which encompass the services and protocols responsible for resource advertising, discovery, and management, methods and material. It then delve into the hybrid peer-to-peer (P2P) overlay structure, specifically focusing on indexing and resource location, and explores the mechanisms necessary to facilitate scalable routing within a distributed environment.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":" 59","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141128256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Networking in Cloud Computing: Embracing Contests and Seizing Prospects 云计算中的联网:迎接竞争,把握前景
Yasodha K, M. Shabitha Sree, Krishna Sri. S, Kirubha Shakthi. J, Karthick. K, Kanishka. N
{"title":"Networking in Cloud Computing: Embracing Contests and Seizing Prospects","authors":"Yasodha K, M. Shabitha Sree, Krishna Sri. S, Kirubha Shakthi. J, Karthick. K, Kanishka. N","doi":"10.32628/ijsrset241138","DOIUrl":"https://doi.org/10.32628/ijsrset241138","url":null,"abstract":"Cloud computing presents the concept of utility computing, which allows users to access computing, storage, and networking resources as needed, with a usage-based pricing model. However, consumers have limited control over network resources, and cloud-computing providers confront a number of issues when operating infrastructure as a service (IaaS) environments. This research investigates the networking difficulties and federation challenges inherent in IaaS, as well as unique software-defined networking (SDN) concepts that could provide efficient solutions for future deployments.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"51 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140973768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Performance and Challenges of Machine Learning Models in Network Anomaly Detection 评估网络异常检测中机器学习模型的性能和挑战
Sakshi Bakhare, Dr. Sudhir W. Mohod
{"title":"Evaluating the Performance and Challenges of Machine Learning Models in Network Anomaly Detection","authors":"Sakshi Bakhare, Dr. Sudhir W. Mohod","doi":"10.32628/ijsrset5241134","DOIUrl":"https://doi.org/10.32628/ijsrset5241134","url":null,"abstract":"The application of machine learning algorithms for anomaly detection in network traffic data is examined in this study. Using a collection of network flow records that includes attributes such as IP addresses, ports, protocols, and timestamps, the study makes use of correlation heatmaps, box plots, and data visualization to identify trends in numerical characteristics. After preprocessing, which includes timestamp conversion to Unix format, three machine learning models Support Vector Machine (SVM), Gaussian Naive Bayes, and Random Forest are used for anomaly identification. The Random Forest Classifier outperforms SVM and Naive Bayes classifiers with better precision and recall for anomaly diagnosis, achieving an accuracy of 87%. Confusion matrices and classification reports are used to evaluate the models, and they show that the Random Forest Classifier performs better than the other models in identifying abnormalities in network traffic. These results provide significant value to the field of cybersecurity by highlighting the effectiveness of machine learning models specifically, the Random Forest Classifier in boosting anomaly detection capacities for network environment security.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"103 49","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140987232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convolutional Neural Network Technology and Deep Learning for X-ray Image-Based Pneumonia Identification 基于卷积神经网络技术和深度学习的 X 射线图像肺炎识别技术
E. Thenmozhi, Bharath R. K., Gokulselvam R, Anbarasu K
{"title":"Convolutional Neural Network Technology and Deep Learning for X-ray Image-Based Pneumonia Identification","authors":"E. Thenmozhi, Bharath R. K., Gokulselvam R, Anbarasu K","doi":"10.32628/ijsrset241132","DOIUrl":"https://doi.org/10.32628/ijsrset241132","url":null,"abstract":"Pneumatic systems, which transfer power through compressed air or gas, are used in pneumatic detection to identify certain events or situations. Pneumatic detection systems can benefit from the integration of deep learning, a kind of artificial intelligence, to increase their capabilities in a number of ways. Pneumatic data may be used to train deep learning algorithms to identify patterns. Through the examination of these departures from typical behaviour, anomalies that point to malfunctions or irregularities in pneumatic systems may be identified. Pneumatic data from the past may be used by deep learning algorithms to understand when parts are likely to break. This makes preventative maintenance possible, which lowers downtime and keeps expensive malfunctions at bay. By evaluating sensor data in real-time, deep learning algorithms are able to identify the underlying causes of pneumatic system malfunctions. This can enhance system performance and dependability by assisting professionals in promptly identifying and resolving problems. Pneumatic system characteristics may be optimised using deep learning approaches to increase effectiveness and performance. They are able to instantly adjust system settings to changing operating circumstances by evaluating data from several sensors. Pneumatic data may be analysed by deep learning models to guarantee product quality throughout production operations. They enable early intervention to uphold product standards by detecting flaws or variations from specifications. Huge X-ray image collections are gathered and classified as either normal or pneumonia-infected. To improve the variability of the training set, preprocessing operations may include augmentation methods, normalisation, and picture shrinking to a uniform size. Because CNNs can automatically extract hierarchical characteristics from pictures, they are commonly employed. Variants of VGG, ResNet, Inception, and AlexNet are examples of common designs. These architectures are frequently adjusted or changed to meet the particular needs of the job. Using supervised learning, the CNN model is trained on the labelled dataset. By modifying its parameters to minimise a loss function, usually cross-entropy loss, the model learns to map input X-ray pictures to their corresponding classes (normal or pneumonia-infected) during training.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"322 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141012496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crime Prediction Using Machine Learning and Deep Learning 利用机器学习和深度学习进行犯罪预测
P. Karthik, P. Jayanth, K. Tharun Nayak, K. Anil Kumar
{"title":"Crime Prediction Using Machine Learning and Deep Learning","authors":"P. Karthik, P. Jayanth, K. Tharun Nayak, K. Anil Kumar","doi":"10.32628/ijsrset241134","DOIUrl":"https://doi.org/10.32628/ijsrset241134","url":null,"abstract":"The utilization of machine learning and deep learning methods for crime prediction has become a focal point for researchers, aiming to decipher the complex patterns and occurrences of crime. This review scrutinizes an extensive collection of over 150 scholarly articles to delve into the assortment of machine learning and deep learning techniques employed in forecasting criminal behaviour. It grants access to the datasets leveraged by researchers for crime forecasting and delves into the key methodologies utilized in these predictive algorithms. The study sheds light on the various trends and elements associated with criminal behaviour and underscores the existing deficiencies and prospective avenues for advancing crime prediction precision. This thorough examination of the current research on crime forecasting through machine learning and deep learning serves as an essential resource for scholars in the domain. A more profound comprehension of these predictive methods will empower law enforcement to devise more effective prevention and response strategies against crime.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"22 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141014282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Shortest Path Algorithms 实现最短路径算法
Amruta Amruta, Sneha Pawar, Bharati Bhamare
{"title":"Implementation of Shortest Path Algorithms","authors":"Amruta Amruta, Sneha Pawar, Bharati Bhamare","doi":"10.32628/ijsrset2411261","DOIUrl":"https://doi.org/10.32628/ijsrset2411261","url":null,"abstract":"An important area of study that models the relationships between items is called graph theory. The shortest path between two objects is one of the most important concepts in graph theory. Many algorithms, such as Dijkstra's Algorithm, Prim’s Algorithm, Floyd Warshall Algorithm have been created for this purpose.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"52 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140675630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3 Phase Motor Water Management System using GSM 使用 GSM 的三相电机水管理系统
Prof. Dr. V. S. Ubale, Kanawade Ravindra, Dongare Aniket, Gore Rohan
{"title":"3 Phase Motor Water Management System using GSM","authors":"Prof. Dr. V. S. Ubale, Kanawade Ravindra, Dongare Aniket, Gore Rohan","doi":"10.32628/ijsrset2411254","DOIUrl":"https://doi.org/10.32628/ijsrset2411254","url":null,"abstract":"The greenhouse based modern agriculture industries are the recent requirement in every part of agriculture in India. In this technology, the humidity and temperature of plants are precisely controlled. Due to the variable atmospheric circumstances these conditions sometimes may vary from place to place in large farmhouse, which makes very difficult to maintain the uniformity at all the places in the farmhouse manually. It is observed that for the first time an android phone-control the Irrigation system, which could give the facilities of maintaining uniform environmental conditions are proposed. The Android Software Development Kit provides the tools and Application Programmable Interface necessary to begin developing applications on the Android platform using the Java programming language. Mobile phones have almost become an integral part of human life serving multiple needs of humans. This application makes use of the GPRS [General Packet Radio Service] feature of mobile phone as a solution for irrigation control system. In India agricultural field play a crucial role in economic development. That is the way to concentrate on that point.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"1 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140675375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信