Puli Venkatesh Kumar, Shunmugathammal M, Puli Nitish Kumar, Dharaneesh V, Kanagasabapathi M G
{"title":"Enhancing Transmission of Voice in Real-Time Applications","authors":"Puli Venkatesh Kumar, Shunmugathammal M, Puli Nitish Kumar, Dharaneesh V, Kanagasabapathi M G","doi":"10.47392/irjash.2023.s037","DOIUrl":"https://doi.org/10.47392/irjash.2023.s037","url":null,"abstract":"In today’s telecommunication world sharing the data becomes very easy. It is a bit-complicated in converting the text documents to voice assistance even proposed a lot of resources. Giving the correct information to the right person in the right way is essential on both a personal and professional level. Numerous applications have developed with the purpose of enabling two individu-als to communicate instantly. The major objective of this effort is to address the issues that dysarthria, business meetings, and regular travelers face. To solve this issue, proposing a gadget that will aid in the translation of written language into speech. The majority of these applications include, language translation, signal conversion from text to synthetic voice, and articulators. In this project, proposing the development in a wide range of strategies and algorithms needed to make text to speech a reality (TTS).","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116728623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Approach for Crack Detection in Solar Panels using Convolutional Neural Networks","authors":"Vithun V C, M. S, P. V, A. R.","doi":"10.47392/irjash.2023.s043","DOIUrl":"https://doi.org/10.47392/irjash.2023.s043","url":null,"abstract":"The utilization of solar panels, which are effective power sources for producing electrical energy, allows for the widespread application of solar energy, a clean and renewable substitute for conventional fuels. However, there is a chance that manufacturing, delivery, and installation errors will lower the effectiveness of power generation. Moreover, detecting surface cracks on solar panels is crucial to ensure the durability and effectiveness of photovoltaic systems. By instructing the network to find flaws in photos of solar panels, convolutional neural networks provide a practical way to address this problem. During training, the CNN gains the ability to distinguish between patterns that are normal and those that indicate a fault. After being trained, the network can accurately and effectively detect fractures in recent data.","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Phreaking Website Using Various Algorithms","authors":"Maneesha K, Rajasekhar K, P. K, Venkata Prasad N","doi":"10.47392/irjash.2023.s041","DOIUrl":"https://doi.org/10.47392/irjash.2023.s041","url":null,"abstract":"A big concern to the Internet nowadays is phishing, a crime that involves exploiting technological tools to steal sensitive consumer data. Phishing losses are also rising quickly. The importance of feature engineering in solutions for detection of phishing websites, however the precision of detection is crucial and it depends on the features you know already. Additionally, although features retrieved from multiple dimensions are more thorough, extracting these characteristics has the downside of taking a long time. To address these, we proposed a new approach in which dataset contains millions of URLs by this approach we can identify the URL which is attacked by the phisher. To deter-mine whether the URL has been targeted by the phisher, some of the Convolutional Neural Network algorithms like CNN-LSTM, CNN BI-LSTM, Logistic Regression, and XG Boost are utilized and resulting in the correctness of the graph between the two machine learning methods by using trained dataset and more likely to produce sensitivity, specificity, precision, recall, and f1-score along with accuracy graph, confusion matrices and also along","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"652 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133314047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bio inspired Approach for Load Balancing in Container as a Service Cloud Computing Model","authors":"Kodanda Dhar Naik, R. R. Sahoo, S. K. Kuanar","doi":"10.47392/irjash.2023.s058","DOIUrl":"https://doi.org/10.47392/irjash.2023.s058","url":null,"abstract":"In recent years, container-based virtualization has gained popularity due to its ease of deployment and agility in cloud resource provisioning. The traditional virtual machine (VM) is based on modern innovation, has superseded technology in cloud computing which is known as containerization technology, and it is superior in terms of overall performance, reliability and efficiency. Containerized clouds deliver superior performance because they make the most of the resources available at the host level and make use of a load-balancing strategy. In order to accomplish this goal, the focus of this article is on equitably dividing of the workload across all of the available servers. In this research, we proposed a Honeybee Mating Algorithm (HBMA) to combat the issue of load balancing in the container-based cloud environment by considering the deadline of tasks. We compared our findings to those of the Grey Wolf Optimization (GWO), Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) Algorithms. We assessed the performance of the proposed methods by considering the impact of parameters such as load variation and makespan. According to the findings of our proposed method, almost the tasks were com-pleted within the deadline, and the HBMA performed significantly better than any of the other strategies in terms of load variance and makespan.","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124516617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. D. Krishna, Alivelu Vaishnavi Lingam, Medapati Navya Sri, Lanka Vatapatra Sai Pathrudu, Manas Kumar Yogi
{"title":"Design of Relaxed Greedy Approach based Threat Detection Framework for Smart Grid Systems","authors":"A. D. Krishna, Alivelu Vaishnavi Lingam, Medapati Navya Sri, Lanka Vatapatra Sai Pathrudu, Manas Kumar Yogi","doi":"10.47392/irjash.2023.s019","DOIUrl":"https://doi.org/10.47392/irjash.2023.s019","url":null,"abstract":"Cyber-attacks represent a huge danger to Smart Grid infrastructure, causing substantial interruptions in electricity supply as well as severe economic and social consequences. As a result, there is a need for an efficient and effective threat detection mechanism for security of the Smart Grid infrastructure. In this research, we offer a design for a threat detection system based on the Relaxed Greedy Method for Smart Grid architecture. The suggested framework is based on the Relaxed Greedy algorithm, a heuristic-based technique to optimising problems. This approach is well-known for its efficiency, efficacy, and simplicity in tackling large-scale optimization problems to detect possible dangers in the Smart Grid infrastructure based on the collected attributes. The suggested system is tested using a real-world dataset taken from a Smart Grid testbed. The experimental findings suggest that the proposed framework can identify various forms of threat detections in the Smart Grid infrastructure.","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115325651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outlier Detection in Single Universal Set using Intuitionistic Fuzzy Proximity Relation based on A Rough Entropy-Based Weighted Density Method","authors":"G. A., Sangeetha T","doi":"10.47392/irjash.2023.s067","DOIUrl":"https://doi.org/10.47392/irjash.2023.s067","url":null,"abstract":"Data mining is a technique for analyzing larger datasets to identify patterns, information, and relationships that may be used to solve challenging problems. Identifying outliers has attracted the focus of researchers working on a variety of areas. Outliers are things that behave differently from other objects. With real-world data, rough set theory can cope with ambiguity and uncertainty. So far, the study has solely focused on spotting outliers using the membership function. Outliers may be recognized using membership and non-membership values, however, utilizing the principle of intuitionistic fuzzy proximity relation. At this step, the indiscernibility of objects is discovered, and the quantitative data is then converted to qualitative data. This article proposes outlier detection in single universal sets using an intuitionistic fuzzy proximity relation with a rough set based on complement entropy and weighted density approach. The empirical study has been considered for ranking the colleges based on the parameters evaluated.","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Annie Jerusha Y, Syed Ibrahim S P, V. Varadharajan
{"title":"An Effective Network Intrusion Detection Model for Coarse-to-Fine Attack Classification of Imbalanced Network Traffic","authors":"Annie Jerusha Y, Syed Ibrahim S P, V. Varadharajan","doi":"10.47392/irjash.2023.s072","DOIUrl":"https://doi.org/10.47392/irjash.2023.s072","url":null,"abstract":"In the present day, cyber security is facing numerous attacks that are causing substantial damage to users. Recent intrusion detection systems are employing advanced methods like deep learning to create effective and efficient intrusion detection systems in order to address these new and intricate attacks. Even the recent benchmark datasets are facing the trouble of detection and prediction of minority attack classes leading the way to missed and false alarms extensively. Hence, these detection systems are biased toward coarse attack classes (majority classes) over fine classes (minority classes). This problem is referred to as Coarse to Fine-Attack Classification (C-FAC). To overcome this challenge and boost the multi-attack classification, a novel approach has been proposed which takes the advantage of ensemble model in phase 1 and Generative Adversarial Networks (GAN) in phase 2. We used classical machine learning and deep learning classification models: Extreme Gradient Boosting (XGBoost), Decision Tress (DT), and Deep Neural Networks (DNN). GAN is cast as an over-sampling method in this model which enhances the classification accuracy of attacks. The effectiveness of our proposed model was evaluated using the two benchmark datasets for intrusions, namely NSL-KDD and CSE-CIC-IDS2018. Based on the experimental results, it was found that our method improved the detection performance and even reduced the false alarm rate of the deep learning network intrusion detection model significantly.","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114286061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Recommendation Systems: A Survey on the Impact of Auxiliary Information","authors":"Navansh Goel, Suganeshwari G","doi":"10.47392/irjash.2023.s073","DOIUrl":"https://doi.org/10.47392/irjash.2023.s073","url":null,"abstract":"In the age of big data, recommendation systems have become a critical tool for helping users navigate the overwhelming amount of online information. Enhanced recommendation systems take this one step further, leveraging the latest algorithms and data-driven insights to deliver highly personalized and relevant recommendations. This research paper provides a comprehensive overview of the recent progress in enhanced recommendation systems, covering the current state-of-the-art techniques and discussing the opportunities and challenges practitioners face. The article explores a range of approaches, including deep learning techniques and hybrid models that integrate both user and item data, and presents the essential concepts, methods, and applications driving the advancement of recommendation systems. We recognize the pressing hurdles in the field as sparsity and diversity, thereby focusing on intent-based models that exploit the additional/auxiliary information by aggregating implicit feedback from user-item interactions. We have gone one step further by compiling the benchmarks in the field, enabling new researchers to explore and innovate at a much more thoughtful and faster pace .","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129810438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RF Technologies for Connecting Various Constrained Devices in IoT System","authors":"Aurangjeb Khan, J. K","doi":"10.47392/irjash.2023.s034","DOIUrl":"https://doi.org/10.47392/irjash.2023.s034","url":null,"abstract":"In IoT systems various sensors, actuators and smart objects are used for different purposes, some smart objects require high bandwidth, some may need very low bandwidth. Some objects need to communicate over a long range, some objects need to consume very low power, so that its battery life should be long. To cater to these IoT system’s requirements there is a lot of research on communication technologies by IEEE, resulting in the development of various Radio Frequency (RF) standards for the different types of smart objects and sensors. IEEE 802.15.4 standards are mostly used for the constrained devices with low power consumption and low data rate, at the same time 4G/5G are being used in sensors like cameras with edge nodes at high data rate to process high volume of images and videos with various image processing algorithms. In this paper we are classifying the different RF technologies and its features best suited for the specific sensor in an IoT system as well as classification of RF modules (like Zigbee, 6LoWPAN, and LoRa) for connecting different types of constrained devices for different IoT projects. At the same time 4G/5G sim-based Wi-Fi modules will be used for integrating cameras like sensors which run on AC/DC power, to process high volume of data using various image processing algorithms at the edge node which further transfer the processed information to the cloud for further analysis and future use. Main objective of this paper is to classify and analyse the best suited RF standards for various constrained devices on low data rate, as well as for power full smart objects at high data rate in IoT systems.","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129910592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robotic Process Automation ( RPA) in Healthcare","authors":"S. R, Pavithra P, Prathiksha S, Selvakanmani S","doi":"10.47392/irjash.2023.s030","DOIUrl":"https://doi.org/10.47392/irjash.2023.s030","url":null,"abstract":"Robotic process automation (RPA), a forthcoming technology revolution, intends to reduce people’s daily workloads by getting rid of tedious and repetitive tasks. The scientific community is now able to conduct a wide range of new types of study in this area, which opens up a whole new universe of possibilities. Compared to robotics, it is a very different kind of technology. RPA is a rela-tively new and quickly growing sub-field of robotics. The healthcare and phar-maceutical industries produce a large amount of data, or what we may refer to as ”medical big data,” making it all the more important to analyse and assess this data when it comes from different sources. The main features would include managing appointments, patient scheduling, managing claims and automating medical claims, Invoice Processing, Healthcare Inventory Management, personalized healthcare, Automation in the contact centre and Management of the Treatment Cycle. The extra feature proposed in this model is the mental","PeriodicalId":244861,"journal":{"name":"International Research Journal on Advanced Science Hub","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127648898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}