CINXE.COM
Grenze International Journal of Engineering and Technology GIJET - Academia.edu
<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Grenze International Journal of Engineering and Technology GIJET - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="MHLOhvGQovW1TY6LDxDMyn6VYPTiemZUTFFj1zO4QTdTclngS/43XOyU30i3t/+L2KAa8O76pBq33pHsnwq+Rw==" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/wow-77f7b87cb1583fc59aa8f94756ebfe913345937eb932042b4077563bebb5fb4b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/social/home-1c712297ae3ac71207193b1bae0ecf1aae125886850f62c9c0139dd867630797.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/heading-b2b823dd904da60a48fd1bfa1defd840610c2ff414d3f39ed3af46277ab8df3b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="author" content="grenze international journal of engineering and technology gijet" /> <meta name="description" content="Grenze International Journal of Engineering and Technology GIJET: 709 Followers, 486 Following, 803 Research papers. Research interests: AdHoc Networks,…" /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = '49879c2402910372f4abc62630a427bbe033d190'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15276,"monthly_visitors":"112 million","monthly_visitor_count":112794806,"monthly_visitor_count_in_millions":112,"user_count":277202685,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1732482064000); window.Aedu.timeDifference = new Date().getTime() - 1732482064000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-296162c7af6fd81dcdd76f1a94f1fad04fb5f647401337d136fe8b68742170b1.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-8d53a22151f33ab413d88fa1c02f979c3f8706d470fc1bced09852c72a9f3454.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-f8fe82512740391f81c9e8cc48220144024b425b359b08194e316f4de070b9e8.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://independent.academia.edu/IdesEditor" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&c2=26766707&cv=2.0&cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more <span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i> We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i> Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less <span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-9601d1cc3d68aa07c0a9901d03d3611aec04cc07d2a2039718ebef4ad4d148ca.js" defer="defer"></script><script>Aedu.rankings = { showPaperRankingsLink: false } $viewedUser = Aedu.User.set_viewed( {"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor","photo":"https://0.academia-photos.com/32919427/19089507/19039715/s65_grenze_international_journal_of_engineering_and_technology.gijet.jpg","has_photo":true,"is_analytics_public":false,"interests":[{"id":11701,"name":"AdHoc Networks","url":"https://www.academia.edu/Documents/in/AdHoc_Networks"},{"id":25122,"name":"Energy efficiency","url":"https://www.academia.edu/Documents/in/Energy_efficiency"},{"id":9136,"name":"Wireless Sensor Networks","url":"https://www.academia.edu/Documents/in/Wireless_Sensor_Networks"},{"id":2482,"name":"Database Systems","url":"https://www.academia.edu/Documents/in/Database_Systems"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = []</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{"inMailer":false,"i18nLocale":"en","i18nDefaultLocale":"en","href":"https://independent.academia.edu/IdesEditor","location":"/IdesEditor","scheme":"https","host":"independent.academia.edu","port":null,"pathname":"/IdesEditor","search":null,"httpAcceptLanguage":null,"serverSide":false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-5cea6928-b243-410c-b488-e7a663aab643"></div> <div id="ProfileCheckPaperUpdate-react-component-5cea6928-b243-410c-b488-e7a663aab643"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" alt="Grenze International Journal of Engineering and Technology GIJET" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/32919427/19089507/19039715/s200_grenze_international_journal_of_engineering_and_technology.gijet.jpg" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">Grenze International Journal of Engineering and Technology GIJET</h1><div class="affiliations-container fake-truncate js-profile-affiliations"></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="Grenze International Journal of Engineering and Technology" data-follow-user-id="32919427" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="32919427"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Followers</p><p class="data">709</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">486</p></div></a><a><div class="stat-container js-profile-coauthors" data-broccoli-component="user-info.coauthors-count" data-click-track="profile-expand-user-info-coauthors"><p class="label">Co-authors</p><p class="data">195</p></div></a><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div><div class="ri-section"><div class="ri-section-header"><span>Interests</span></div><div class="ri-tags-container"><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="32919427" href="https://www.academia.edu/Documents/in/AdHoc_Networks"><div id="js-react-on-rails-context" style="display:none" data-rails-context="{"inMailer":false,"i18nLocale":"en","i18nDefaultLocale":"en","href":"https://independent.academia.edu/IdesEditor","location":"/IdesEditor","scheme":"https","host":"independent.academia.edu","port":null,"pathname":"/IdesEditor","search":null,"httpAcceptLanguage":null,"serverSide":false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["AdHoc Networks"]}" data-trace="false" data-dom-id="Pill-react-component-ef2e6188-28ff-40f6-8ec9-a880b73a5ee9"></div> <div id="Pill-react-component-ef2e6188-28ff-40f6-8ec9-a880b73a5ee9"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="32919427" href="https://www.academia.edu/Documents/in/Energy_efficiency"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Energy efficiency"]}" data-trace="false" data-dom-id="Pill-react-component-e57dc2f0-0f6e-4265-8906-583d65e1c1d0"></div> <div id="Pill-react-component-e57dc2f0-0f6e-4265-8906-583d65e1c1d0"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="32919427" href="https://www.academia.edu/Documents/in/Wireless_Sensor_Networks"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Wireless Sensor Networks"]}" data-trace="false" data-dom-id="Pill-react-component-33c9b73b-8327-4efe-9f4f-3ad3537c269e"></div> <div id="Pill-react-component-33c9b73b-8327-4efe-9f4f-3ad3537c269e"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="32919427" href="https://www.academia.edu/Documents/in/Database_Systems"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Database Systems"]}" data-trace="false" data-dom-id="Pill-react-component-cce45150-d7dc-4f2b-be2a-f96770923654"></div> <div id="Pill-react-component-cce45150-d7dc-4f2b-be2a-f96770923654"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="32919427" href="https://www.academia.edu/Documents/in/Computer_Science"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Computer Science"]}" data-trace="false" data-dom-id="Pill-react-component-16cca25e-4dd3-495f-9118-ce954a5fde90"></div> <div id="Pill-react-component-16cca25e-4dd3-495f-9118-ce954a5fde90"></div> </a></div></div><div class="external-links-container"><ul class="profile-links new-profile js-UserInfo-social"><li class="profile-profiles js-social-profiles-container"><i class="fa fa-spin fa-spinner"></i></li></ul></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Conference Presentations" id="Conference Presentations"><h3 class="profile--tab_heading_container">Conference Presentations by Grenze International Journal of Engineering and Technology GIJET</h3></div><div class="js-work-strip profile--work_container" data-work-id="119809427"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119809427/Detection_of_Cataract_and_its_Level_based_on_Deep_Learning_using_Mobile_Application"><img alt="Research paper thumbnail of Detection of Cataract and its Level based on Deep Learning using Mobile Application" class="work-thumbnail" src="https://attachments.academia-assets.com/115146963/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119809427/Detection_of_Cataract_and_its_Level_based_on_Deep_Learning_using_Mobile_Application">Detection of Cataract and its Level based on Deep Learning using Mobile Application</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The human eye has a natural lens that refracts the incoming light rays to help us see objects. Ca...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The human eye has a natural lens that refracts the incoming light rays to help us see<br />objects. Cataracts could be the reason why the eye's natural lens becomes cloudy. When<br />proteins in the lens start breaking down, causing cataracts, objects may appear cloudy, fuzzy,<br />or even less colorful. If Cataract is not identified and treated in the early stages, it could lead to<br />complete blindness of the eye. It is mainly observed in older age groups than the younger age<br />group, however, there are cases witnessed even in young people. We are creating a mobile<br />application using AI and deep learning that can detect the existence of cataracts to help with<br />the scarcity of ophthalmologists. With this application, patients can use their smartphones to<br />click the photograph of a patient's eye and feed the data into this AI-based system that is<br />developed using deep learning technologies. The model then determines whether the eye has a<br />nuclear sclerotic, cortical, or posterior subcapsular. The effect of this system will result in far<br />improvement in the delivery of public services, diagnosis and treatment, prioritization of<br />patients, and ultimately, the prevention of blindness. This system will demonstrate encouraging<br />outcomes.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="25ad16a68e270905b894c7c210455887" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146963,"asset_id":119809427,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146963/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119809427"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119809427"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119809427; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119809427]").text(description); $(".js-view-count[data-work-id=119809427]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119809427; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119809427']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119809427, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "25ad16a68e270905b894c7c210455887" } } $('.js-work-strip[data-work-id=119809427]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119809427,"title":"Detection of Cataract and its Level based on Deep Learning using Mobile Application","translated_title":"","metadata":{"abstract":"The human eye has a natural lens that refracts the incoming light rays to help us see\nobjects. Cataracts could be the reason why the eye's natural lens becomes cloudy. When\nproteins in the lens start breaking down, causing cataracts, objects may appear cloudy, fuzzy,\nor even less colorful. If Cataract is not identified and treated in the early stages, it could lead to\ncomplete blindness of the eye. It is mainly observed in older age groups than the younger age\ngroup, however, there are cases witnessed even in young people. We are creating a mobile\napplication using AI and deep learning that can detect the existence of cataracts to help with\nthe scarcity of ophthalmologists. With this application, patients can use their smartphones to\nclick the photograph of a patient's eye and feed the data into this AI-based system that is\ndeveloped using deep learning technologies. The model then determines whether the eye has a\nnuclear sclerotic, cortical, or posterior subcapsular. The effect of this system will result in far\nimprovement in the delivery of public services, diagnosis and treatment, prioritization of\npatients, and ultimately, the prevention of blindness. This system will demonstrate encouraging\noutcomes.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"The human eye has a natural lens that refracts the incoming light rays to help us see\nobjects. Cataracts could be the reason why the eye's natural lens becomes cloudy. When\nproteins in the lens start breaking down, causing cataracts, objects may appear cloudy, fuzzy,\nor even less colorful. If Cataract is not identified and treated in the early stages, it could lead to\ncomplete blindness of the eye. It is mainly observed in older age groups than the younger age\ngroup, however, there are cases witnessed even in young people. We are creating a mobile\napplication using AI and deep learning that can detect the existence of cataracts to help with\nthe scarcity of ophthalmologists. With this application, patients can use their smartphones to\nclick the photograph of a patient's eye and feed the data into this AI-based system that is\ndeveloped using deep learning technologies. The model then determines whether the eye has a\nnuclear sclerotic, cortical, or posterior subcapsular. The effect of this system will result in far\nimprovement in the delivery of public services, diagnosis and treatment, prioritization of\npatients, and ultimately, the prevention of blindness. This system will demonstrate encouraging\noutcomes.","internal_url":"https://www.academia.edu/119809427/Detection_of_Cataract_and_its_Level_based_on_Deep_Learning_using_Mobile_Application","translated_internal_url":"","created_at":"2024-05-22T04:53:33.263-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[],"downloadable_attachments":[{"id":115146963,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146963/thumbnails/1.jpg","file_name":"512_3_2946_2951.pdf","download_url":"https://www.academia.edu/attachments/115146963/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Detection_of_Cataract_and_its_Level_base.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146963/512_3_2946_2951-libre.pdf?1716382652=\u0026response-content-disposition=attachment%3B+filename%3DDetection_of_Cataract_and_its_Level_base.pdf\u0026Expires=1732468482\u0026Signature=K6osJCGXTPHM732OikSDLpvfgdaFmlS1XW909wCD8Cr3VfIdUgFroxmgf-f-Mlior3lDP2OQc0peHCyIvFn2yNby7pmQ~uGuBe4NUlPcIzh9-QnfHBd~bG1CdSeU8eAhGgK~r257HHbUXDR-cjq9WaJJCkdLBs8nc~NQ0V-jSEe396ihllRLGKBFW7wDg~vZjbzgoE16813hk7vzvCjXI~AlG76mRYqOc3n3-RvPlbDCN9deTADvuZ9MryIvAL8DJTw16LOMAEbPo-XfN2aQm0lb3N8bziscDjDFP-WWb9KvfWbjrA8v5TxuQF82-D-~-wzPRajqnAgf9mFtN-e1Jg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Detection_of_Cataract_and_its_Level_based_on_Deep_Learning_using_Mobile_Application","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146963,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146963/thumbnails/1.jpg","file_name":"512_3_2946_2951.pdf","download_url":"https://www.academia.edu/attachments/115146963/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Detection_of_Cataract_and_its_Level_base.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146963/512_3_2946_2951-libre.pdf?1716382652=\u0026response-content-disposition=attachment%3B+filename%3DDetection_of_Cataract_and_its_Level_base.pdf\u0026Expires=1732468482\u0026Signature=K6osJCGXTPHM732OikSDLpvfgdaFmlS1XW909wCD8Cr3VfIdUgFroxmgf-f-Mlior3lDP2OQc0peHCyIvFn2yNby7pmQ~uGuBe4NUlPcIzh9-QnfHBd~bG1CdSeU8eAhGgK~r257HHbUXDR-cjq9WaJJCkdLBs8nc~NQ0V-jSEe396ihllRLGKBFW7wDg~vZjbzgoE16813hk7vzvCjXI~AlG76mRYqOc3n3-RvPlbDCN9deTADvuZ9MryIvAL8DJTw16LOMAEbPo-XfN2aQm0lb3N8bziscDjDFP-WWb9KvfWbjrA8v5TxuQF82-D-~-wzPRajqnAgf9mFtN-e1Jg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119809304"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119809304/Orthogonal_Frequency_Division_Multiplexing_A_Review"><img alt="Research paper thumbnail of Orthogonal Frequency Division Multiplexing: A Review" class="work-thumbnail" src="https://attachments.academia-assets.com/115146926/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119809304/Orthogonal_Frequency_Division_Multiplexing_A_Review">Orthogonal Frequency Division Multiplexing: A Review</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Orthogonal frequency-division multiplexing significantly reduces inter-symbol interference (I.S.I...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Orthogonal frequency-division multiplexing significantly reduces inter-symbol interference (I.S.I.) caused by the delayed propagation of wireless channels (OFDM). As a result, numerous standards have embraced it, and it is now utilized in various wireless systems. This paper will overview OFDM and how it can be used in wireless communications. The basics of OFDM and related modulations are covered, along with methods for enhancing OFDM's performance in wireless communications. Examples include channel estimation and signal detection, time and frequency offset estimation and correction, peak-to-average power ratio reduction PAPR, and inter-carrier interference. In wireless transmission, the fundamental concept of OFDM is gaining acceptance. OFDM is also one of the most often recommended techniques for usage in 4th Generation Wireless Systems. The cyclic extension of OFDM signals is a general principle rather than employing empty guard spaces in the frequency domain. OFDM is a modulation and multiplexing technology used in WiFi, Wi-MAX, and 3G/4G/5G mobile communication systems. A low bit rate at the subcarrier is desired to extend symbol duration and prevent multipath distortion in OFDM. This will also improve the (C.P.) interval, which is a good thing (multiple distortions and error reduction). Due to the larger C.P. interval, however, it will result in a better energy loss value. The duration of the OFDM symbol, the C.P. interval, and the permissible delay (environment) spread must all be balanced.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="a60bd08a2217293e28b7c5b73dc9647a" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146926,"asset_id":119809304,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146926/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119809304"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119809304"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119809304; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119809304]").text(description); $(".js-view-count[data-work-id=119809304]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119809304; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119809304']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119809304, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "a60bd08a2217293e28b7c5b73dc9647a" } } $('.js-work-strip[data-work-id=119809304]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119809304,"title":"Orthogonal Frequency Division Multiplexing: A Review","translated_title":"","metadata":{"abstract":"Orthogonal frequency-division multiplexing significantly reduces inter-symbol interference (I.S.I.) caused by the delayed propagation of wireless channels (OFDM). As a result, numerous standards have embraced it, and it is now utilized in various wireless systems. This paper will overview OFDM and how it can be used in wireless communications. The basics of OFDM and related modulations are covered, along with methods for enhancing OFDM's performance in wireless communications. Examples include channel estimation and signal detection, time and frequency offset estimation and correction, peak-to-average power ratio reduction PAPR, and inter-carrier interference. In wireless transmission, the fundamental concept of OFDM is gaining acceptance. OFDM is also one of the most often recommended techniques for usage in 4th Generation Wireless Systems. The cyclic extension of OFDM signals is a general principle rather than employing empty guard spaces in the frequency domain. OFDM is a modulation and multiplexing technology used in WiFi, Wi-MAX, and 3G/4G/5G mobile communication systems. A low bit rate at the subcarrier is desired to extend symbol duration and prevent multipath distortion in OFDM. This will also improve the (C.P.) interval, which is a good thing (multiple distortions and error reduction). Due to the larger C.P. interval, however, it will result in a better energy loss value. The duration of the OFDM symbol, the C.P. interval, and the permissible delay (environment) spread must all be balanced.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Orthogonal frequency-division multiplexing significantly reduces inter-symbol interference (I.S.I.) caused by the delayed propagation of wireless channels (OFDM). As a result, numerous standards have embraced it, and it is now utilized in various wireless systems. This paper will overview OFDM and how it can be used in wireless communications. The basics of OFDM and related modulations are covered, along with methods for enhancing OFDM's performance in wireless communications. Examples include channel estimation and signal detection, time and frequency offset estimation and correction, peak-to-average power ratio reduction PAPR, and inter-carrier interference. In wireless transmission, the fundamental concept of OFDM is gaining acceptance. OFDM is also one of the most often recommended techniques for usage in 4th Generation Wireless Systems. The cyclic extension of OFDM signals is a general principle rather than employing empty guard spaces in the frequency domain. OFDM is a modulation and multiplexing technology used in WiFi, Wi-MAX, and 3G/4G/5G mobile communication systems. A low bit rate at the subcarrier is desired to extend symbol duration and prevent multipath distortion in OFDM. This will also improve the (C.P.) interval, which is a good thing (multiple distortions and error reduction). Due to the larger C.P. interval, however, it will result in a better energy loss value. The duration of the OFDM symbol, the C.P. interval, and the permissible delay (environment) spread must all be balanced.","internal_url":"https://www.academia.edu/119809304/Orthogonal_Frequency_Division_Multiplexing_A_Review","translated_internal_url":"","created_at":"2024-05-22T04:51:43.368-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730577,"work_id":119809304,"tagging_user_id":32919427,"tagged_user_id":263970291,"co_author_invite_id":null,"email":"y***3@gmail.com","display_order":1,"name":"YOGITA KAPSE","title":"Orthogonal Frequency Division Multiplexing: A Review"},{"id":41730578,"work_id":119809304,"tagging_user_id":32919427,"tagged_user_id":165782498,"co_author_invite_id":null,"email":"s***i@gmail.com","display_order":2,"name":"SHRIPAD MOHANI","title":"Orthogonal Frequency Division Multiplexing: A Review"}],"downloadable_attachments":[{"id":115146926,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146926/thumbnails/1.jpg","file_name":"511_1_2941_2945.pdf","download_url":"https://www.academia.edu/attachments/115146926/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Orthogonal_Frequency_Division_Multiplexi.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146926/511_1_2941_2945-libre.pdf?1716382655=\u0026response-content-disposition=attachment%3B+filename%3DOrthogonal_Frequency_Division_Multiplexi.pdf\u0026Expires=1732468483\u0026Signature=YQfvg8Mha6ILQdtDOcc4OcozH19rlmqeER-SLdjJryxkVmElccKT5v4ORb6nnhvGscZyK4TacSb2zZYrHvrOvtxyUwKCeZtp1RHtXWP0MqKxC4sm4eepcsVQZ~8w1vrS~Y6eD~9~aoRBktyXy1mvJYbpLvTFQhrzVcUCR0kPHNP6PK7nC3Z6WFy6uhEoaistO-YmNEsbfkGXa0XDgx-aSTIKIACoXNrmpdX1f7ZqVetThuHiNubFhELeijpVHKviAt4cVHhJPfWl6Lhda1agZXH~DpAkgulEWir6lbeHaNJFrktGW2aKzNWvMI4aDtqKEqvDxy46PbDKEc~~nX8phA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Orthogonal_Frequency_Division_Multiplexing_A_Review","translated_slug":"","page_count":5,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146926,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146926/thumbnails/1.jpg","file_name":"511_1_2941_2945.pdf","download_url":"https://www.academia.edu/attachments/115146926/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Orthogonal_Frequency_Division_Multiplexi.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146926/511_1_2941_2945-libre.pdf?1716382655=\u0026response-content-disposition=attachment%3B+filename%3DOrthogonal_Frequency_Division_Multiplexi.pdf\u0026Expires=1732468483\u0026Signature=YQfvg8Mha6ILQdtDOcc4OcozH19rlmqeER-SLdjJryxkVmElccKT5v4ORb6nnhvGscZyK4TacSb2zZYrHvrOvtxyUwKCeZtp1RHtXWP0MqKxC4sm4eepcsVQZ~8w1vrS~Y6eD~9~aoRBktyXy1mvJYbpLvTFQhrzVcUCR0kPHNP6PK7nC3Z6WFy6uhEoaistO-YmNEsbfkGXa0XDgx-aSTIKIACoXNrmpdX1f7ZqVetThuHiNubFhELeijpVHKviAt4cVHhJPfWl6Lhda1agZXH~DpAkgulEWir6lbeHaNJFrktGW2aKzNWvMI4aDtqKEqvDxy46PbDKEc~~nX8phA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119809172"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119809172/An_Optimal_Selection_Scheme_for_Automation_Testing_Framework_with_Quality_Assurance"><img alt="Research paper thumbnail of An Optimal Selection Scheme for Automation Testing Framework with Quality Assurance" class="work-thumbnail" src="https://attachments.academia-assets.com/115146833/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119809172/An_Optimal_Selection_Scheme_for_Automation_Testing_Framework_with_Quality_Assurance">An Optimal Selection Scheme for Automation Testing Framework with Quality Assurance</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The world is fast changing due to digitalization and the disruption brought on by the use of digi...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The world is fast changing due to digitalization and the disruption brought on by the use of digital technology. All IT operations require a high level of speed, and this necessitates a paradigm shift in quality assurance (QA). Digital assurance places a strong emphasis on quality at high speed and businesses want to produce high-quality goods more quickly than ever. As a result, QA teams are turning to test automation. The industry is shifting from the initial automation of regression tests to progressive automation and day one automation. Automation testing has seen a number of developments. However, it is crucial that businesses pick the appropriate automation framework because it is thought to be a key component of success. The paper considers quality assurance parameters for automation testing framework by adopting digital transformation initiatives to achieve the desired business outcome. In the paper we proposes a model of optimal testing framework selection and we'll discuss the different automation framework types and how to pick one that will assist enterprises to achieve their digital assurance objectives.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="99c6318649d441de92799aa94ed8e459" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146833,"asset_id":119809172,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146833/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119809172"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119809172"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119809172; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119809172]").text(description); $(".js-view-count[data-work-id=119809172]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119809172; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119809172']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119809172, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "99c6318649d441de92799aa94ed8e459" } } $('.js-work-strip[data-work-id=119809172]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119809172,"title":"An Optimal Selection Scheme for Automation Testing Framework with Quality Assurance","translated_title":"","metadata":{"abstract":"The world is fast changing due to digitalization and the disruption brought on by the use of digital technology. All IT operations require a high level of speed, and this necessitates a paradigm shift in quality assurance (QA). Digital assurance places a strong emphasis on quality at high speed and businesses want to produce high-quality goods more quickly than ever. As a result, QA teams are turning to test automation. The industry is shifting from the initial automation of regression tests to progressive automation and day one automation. Automation testing has seen a number of developments. However, it is crucial that businesses pick the appropriate automation framework because it is thought to be a key component of success. The paper considers quality assurance parameters for automation testing framework by adopting digital transformation initiatives to achieve the desired business outcome. In the paper we proposes a model of optimal testing framework selection and we'll discuss the different automation framework types and how to pick one that will assist enterprises to achieve their digital assurance objectives.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"The world is fast changing due to digitalization and the disruption brought on by the use of digital technology. All IT operations require a high level of speed, and this necessitates a paradigm shift in quality assurance (QA). Digital assurance places a strong emphasis on quality at high speed and businesses want to produce high-quality goods more quickly than ever. As a result, QA teams are turning to test automation. The industry is shifting from the initial automation of regression tests to progressive automation and day one automation. Automation testing has seen a number of developments. However, it is crucial that businesses pick the appropriate automation framework because it is thought to be a key component of success. The paper considers quality assurance parameters for automation testing framework by adopting digital transformation initiatives to achieve the desired business outcome. In the paper we proposes a model of optimal testing framework selection and we'll discuss the different automation framework types and how to pick one that will assist enterprises to achieve their digital assurance objectives.","internal_url":"https://www.academia.edu/119809172/An_Optimal_Selection_Scheme_for_Automation_Testing_Framework_with_Quality_Assurance","translated_internal_url":"","created_at":"2024-05-22T04:49:32.192-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730564,"work_id":119809172,"tagging_user_id":32919427,"tagged_user_id":15782117,"co_author_invite_id":null,"email":"m***1@gmail.com","affiliation":"Indian Institute of Tropical Meteorology","display_order":1,"name":"Manmeet Singh","title":"An Optimal Selection Scheme for Automation Testing Framework with Quality Assurance"},{"id":41730565,"work_id":119809172,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154030,"email":"j***y@medicaps.ac.in","display_order":2,"name":"Jitendra Choudhary","title":"An Optimal Selection Scheme for Automation Testing Framework with Quality Assurance"},{"id":41730566,"work_id":119809172,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":5780066,"email":"l***i@gmail.com","display_order":3,"name":"Lokesh Laddhani","title":"An Optimal Selection Scheme for Automation Testing Framework with Quality Assurance"}],"downloadable_attachments":[{"id":115146833,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146833/thumbnails/1.jpg","file_name":"510_3_2935_2940.pdf","download_url":"https://www.academia.edu/attachments/115146833/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Optimal_Selection_Scheme_for_Automati.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146833/510_3_2935_2940-libre.pdf?1716378608=\u0026response-content-disposition=attachment%3B+filename%3DAn_Optimal_Selection_Scheme_for_Automati.pdf\u0026Expires=1732468483\u0026Signature=Bh3mNbqhTKlehFwyxTAl7ftOsDYU3AEMUIK9q7vEW67w8AX3pvAn2viGTqDgfTh-bZecqxBxZdJJ0-f8BxD1pin~-enKYvmG3YEUs1Wo02uO9c-YqJfyvnMYjFrD2itvBUZxGepSjnjgm~8lrvgqt8UOzjIBuhsS1I59gs~08tq4zgvamtNP~db-pMe1nPHgvkvIJ3MSnkPHBRPgeA-8qDX-Tx8yvUmwGzQxtAkPiizJwqvasFpO5PImvQxBDQM~9oVQnl0gc5ph66vbTELKgPo43teK28mS6tWhgKBEW6HMQDjLTg~WfCZXadaOzSGCKjD6kkmY2NnVoIiZw9sPmA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"An_Optimal_Selection_Scheme_for_Automation_Testing_Framework_with_Quality_Assurance","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146833,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146833/thumbnails/1.jpg","file_name":"510_3_2935_2940.pdf","download_url":"https://www.academia.edu/attachments/115146833/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Optimal_Selection_Scheme_for_Automati.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146833/510_3_2935_2940-libre.pdf?1716378608=\u0026response-content-disposition=attachment%3B+filename%3DAn_Optimal_Selection_Scheme_for_Automati.pdf\u0026Expires=1732468483\u0026Signature=Bh3mNbqhTKlehFwyxTAl7ftOsDYU3AEMUIK9q7vEW67w8AX3pvAn2viGTqDgfTh-bZecqxBxZdJJ0-f8BxD1pin~-enKYvmG3YEUs1Wo02uO9c-YqJfyvnMYjFrD2itvBUZxGepSjnjgm~8lrvgqt8UOzjIBuhsS1I59gs~08tq4zgvamtNP~db-pMe1nPHgvkvIJ3MSnkPHBRPgeA-8qDX-Tx8yvUmwGzQxtAkPiizJwqvasFpO5PImvQxBDQM~9oVQnl0gc5ph66vbTELKgPo43teK28mS6tWhgKBEW6HMQDjLTg~WfCZXadaOzSGCKjD6kkmY2NnVoIiZw9sPmA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808898"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808898/Trading_Secured_Information_in_Cloud_Utilizing_Record_Cryptography_and_Speedy_Reaction_OTP"><img alt="Research paper thumbnail of Trading Secured Information in Cloud Utilizing Record Cryptography and Speedy Reaction OTP" class="work-thumbnail" src="https://attachments.academia-assets.com/115146658/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808898/Trading_Secured_Information_in_Cloud_Utilizing_Record_Cryptography_and_Speedy_Reaction_OTP">Trading Secured Information in Cloud Utilizing Record Cryptography and Speedy Reaction OTP</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">CLOUD capacity is presently picking up notoriety since it offers a adaptable on-demand informatio...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">CLOUD capacity is presently picking up notoriety since it offers a adaptable on-demand information outsourcing benefit with engaging benefits: alleviation of the burden for capacity administration, widespread information get to with area freedom, and evasion of capital use on equipment, computer program, and individual maintenances. Be that as it may, existing arrangements in conventional information outsourcing situation are incapable to at the same time meet the taking after three security prerequisites for keys outsourcing: Privacy and protection of record capacity; Data security on personality properties tied to keys; Owner controllable authorization over user's shared keys. The proposed to begin with bound together key administration system that addresses all the three objectives over. This cloud framework permits the key proprietor can perform security and controllable authorization conjointly give implemented record encryption with least data spillage. To actualize Cloud Key Bank proficiently, this demonstrate proposes a unused calculation Halter kilter Calculation. Proposed exploratory comes about and security investigation will appear the productivity and security objectives are well accomplished. To unscramble the records we utilize QR OTP for security.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="a042f2f808d6a3006d7e9ddfc87afcd6" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146658,"asset_id":119808898,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146658/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808898"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808898"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808898; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808898]").text(description); $(".js-view-count[data-work-id=119808898]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808898; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808898']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808898, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "a042f2f808d6a3006d7e9ddfc87afcd6" } } $('.js-work-strip[data-work-id=119808898]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808898,"title":"Trading Secured Information in Cloud Utilizing Record Cryptography and Speedy Reaction OTP","translated_title":"","metadata":{"abstract":"CLOUD capacity is presently picking up notoriety since it offers a adaptable on-demand information outsourcing benefit with engaging benefits: alleviation of the burden for capacity administration, widespread information get to with area freedom, and evasion of capital use on equipment, computer program, and individual maintenances. Be that as it may, existing arrangements in conventional information outsourcing situation are incapable to at the same time meet the taking after three security prerequisites for keys outsourcing: Privacy and protection of record capacity; Data security on personality properties tied to keys; Owner controllable authorization over user's shared keys. The proposed to begin with bound together key administration system that addresses all the three objectives over. This cloud framework permits the key proprietor can perform security and controllable authorization conjointly give implemented record encryption with least data spillage. To actualize Cloud Key Bank proficiently, this demonstrate proposes a unused calculation Halter kilter Calculation. Proposed exploratory comes about and security investigation will appear the productivity and security objectives are well accomplished. To unscramble the records we utilize QR OTP for security.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"CLOUD capacity is presently picking up notoriety since it offers a adaptable on-demand information outsourcing benefit with engaging benefits: alleviation of the burden for capacity administration, widespread information get to with area freedom, and evasion of capital use on equipment, computer program, and individual maintenances. Be that as it may, existing arrangements in conventional information outsourcing situation are incapable to at the same time meet the taking after three security prerequisites for keys outsourcing: Privacy and protection of record capacity; Data security on personality properties tied to keys; Owner controllable authorization over user's shared keys. The proposed to begin with bound together key administration system that addresses all the three objectives over. This cloud framework permits the key proprietor can perform security and controllable authorization conjointly give implemented record encryption with least data spillage. To actualize Cloud Key Bank proficiently, this demonstrate proposes a unused calculation Halter kilter Calculation. Proposed exploratory comes about and security investigation will appear the productivity and security objectives are well accomplished. To unscramble the records we utilize QR OTP for security.","internal_url":"https://www.academia.edu/119808898/Trading_Secured_Information_in_Cloud_Utilizing_Record_Cryptography_and_Speedy_Reaction_OTP","translated_internal_url":"","created_at":"2024-05-22T04:47:18.673-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730558,"work_id":119808898,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154028,"email":"k***s@nct.ac.in","display_order":1,"name":"M. Kavitha","title":"Trading Secured Information in Cloud Utilizing Record Cryptography and Speedy Reaction OTP"}],"downloadable_attachments":[{"id":115146658,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146658/thumbnails/1.jpg","file_name":"509_3_2929_2934.pdf","download_url":"https://www.academia.edu/attachments/115146658/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Trading_Secured_Information_in_Cloud_Uti.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146658/509_3_2929_2934-libre.pdf?1716378619=\u0026response-content-disposition=attachment%3B+filename%3DTrading_Secured_Information_in_Cloud_Uti.pdf\u0026Expires=1732468483\u0026Signature=QJCST7qoKrLV3YZboK8hpdPLa~Gjagb~PCFYVaJcC1PIUK1omZjd3XckPX~G2hquUDw-izzQ7a14Fe8eVUc27THoFIcAu8DD1Rg5I1PN-q6DeOHSYA~~4zcjXaVkKb0rlstRz1hT6l5WUNd6-fKY05aTCL52UaJY0hikVzrgpen4sPOggxJj0jV7GNbsZht4sZqsZUu1SdruErXq7DSEU7ECIh~yx3JJvGkbgl2ObLSV4iWU7wnyV8SIEgp1Cgm~9W2-wFuN2ZWdBlFyTavihAL9Lmmw0V616-zUdoZSq-UQt~~71r8wi6fQJ1-EEOX2DMdrad4Ju5wEBsLyjUesbw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Trading_Secured_Information_in_Cloud_Utilizing_Record_Cryptography_and_Speedy_Reaction_OTP","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146658,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146658/thumbnails/1.jpg","file_name":"509_3_2929_2934.pdf","download_url":"https://www.academia.edu/attachments/115146658/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Trading_Secured_Information_in_Cloud_Uti.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146658/509_3_2929_2934-libre.pdf?1716378619=\u0026response-content-disposition=attachment%3B+filename%3DTrading_Secured_Information_in_Cloud_Uti.pdf\u0026Expires=1732468483\u0026Signature=QJCST7qoKrLV3YZboK8hpdPLa~Gjagb~PCFYVaJcC1PIUK1omZjd3XckPX~G2hquUDw-izzQ7a14Fe8eVUc27THoFIcAu8DD1Rg5I1PN-q6DeOHSYA~~4zcjXaVkKb0rlstRz1hT6l5WUNd6-fKY05aTCL52UaJY0hikVzrgpen4sPOggxJj0jV7GNbsZht4sZqsZUu1SdruErXq7DSEU7ECIh~yx3JJvGkbgl2ObLSV4iWU7wnyV8SIEgp1Cgm~9W2-wFuN2ZWdBlFyTavihAL9Lmmw0V616-zUdoZSq-UQt~~71r8wi6fQJ1-EEOX2DMdrad4Ju5wEBsLyjUesbw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808746"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808746/Qualitative_Comparison_of_Commercial_NO2_Sensors_and_Selection_Criteria_for_Various_Applications"><img alt="Research paper thumbnail of Qualitative Comparison of Commercial NO2 Sensors and Selection Criteria for Various Applications" class="work-thumbnail" src="https://attachments.academia-assets.com/115146568/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808746/Qualitative_Comparison_of_Commercial_NO2_Sensors_and_Selection_Criteria_for_Various_Applications">Qualitative Comparison of Commercial NO2 Sensors and Selection Criteria for Various Applications</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Gas sampling and sensing is a domain of great importance nowadays. Various gases play a vital rol...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Gas sampling and sensing is a domain of great importance nowadays. Various gases play a vital role in different industries ranging from process industries to bio medical engineering. The measurement of concentration of hazardous gas components like NO 2 is in high demand and hence many researchers are attracted towards the development of NO 2 sensors on the basis of various working principles. A single sensor cannot be the best sensor for all applications. This fact leads to in the need of selection criteria for the selection of the sensor for any industrial application. This paper presents a selection criterion for the selection of NO 2 sensor based on its important features and characteristics. Considering this one can select most suitable NO 2 sensor for a typical application. This paper also presents a qualitative comparison of commercially available NO 2 sensors which can be a handy tool for someone who is interested in the measurement of NO 2 concentration for certain application.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="93e1ed9cda7dcb3143e351ae574b3598" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146568,"asset_id":119808746,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146568/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808746"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808746"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808746; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808746]").text(description); $(".js-view-count[data-work-id=119808746]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808746; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808746']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808746, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "93e1ed9cda7dcb3143e351ae574b3598" } } $('.js-work-strip[data-work-id=119808746]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808746,"title":"Qualitative Comparison of Commercial NO2 Sensors and Selection Criteria for Various Applications","translated_title":"","metadata":{"abstract":"Gas sampling and sensing is a domain of great importance nowadays. Various gases play a vital role in different industries ranging from process industries to bio medical engineering. The measurement of concentration of hazardous gas components like NO 2 is in high demand and hence many researchers are attracted towards the development of NO 2 sensors on the basis of various working principles. A single sensor cannot be the best sensor for all applications. This fact leads to in the need of selection criteria for the selection of the sensor for any industrial application. This paper presents a selection criterion for the selection of NO 2 sensor based on its important features and characteristics. Considering this one can select most suitable NO 2 sensor for a typical application. This paper also presents a qualitative comparison of commercially available NO 2 sensors which can be a handy tool for someone who is interested in the measurement of NO 2 concentration for certain application.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Gas sampling and sensing is a domain of great importance nowadays. Various gases play a vital role in different industries ranging from process industries to bio medical engineering. The measurement of concentration of hazardous gas components like NO 2 is in high demand and hence many researchers are attracted towards the development of NO 2 sensors on the basis of various working principles. A single sensor cannot be the best sensor for all applications. This fact leads to in the need of selection criteria for the selection of the sensor for any industrial application. This paper presents a selection criterion for the selection of NO 2 sensor based on its important features and characteristics. Considering this one can select most suitable NO 2 sensor for a typical application. This paper also presents a qualitative comparison of commercially available NO 2 sensors which can be a handy tool for someone who is interested in the measurement of NO 2 concentration for certain application.","internal_url":"https://www.academia.edu/119808746/Qualitative_Comparison_of_Commercial_NO2_Sensors_and_Selection_Criteria_for_Various_Applications","translated_internal_url":"","created_at":"2024-05-22T04:45:05.863-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730548,"work_id":119808746,"tagging_user_id":32919427,"tagged_user_id":218889369,"co_author_invite_id":null,"email":"v***3@gmail.com","display_order":1,"name":"Vrund Shah","title":"Qualitative Comparison of Commercial NO2 Sensors and Selection Criteria for Various Applications"}],"downloadable_attachments":[{"id":115146568,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146568/thumbnails/1.jpg","file_name":"507_3_2924_2928.pdf","download_url":"https://www.academia.edu/attachments/115146568/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Qualitative_Comparison_of_Commercial_NO2.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146568/507_3_2924_2928-libre.pdf?1716378624=\u0026response-content-disposition=attachment%3B+filename%3DQualitative_Comparison_of_Commercial_NO2.pdf\u0026Expires=1732468483\u0026Signature=aPpmNxPftoXlxkd9V-vJ6biIXmbnyIMkhgeEv~v~p6agY-mHSEnArUmHUwNPV4y9F7ufXocwzxBy5Q4CJcJpVV3en-2v-Ya0u6mU5yhNE2Bx-UJPWpzp8YmjOewJ2lm8AWB0i52NmIwL9vR0rWx6~OruvQXcu5Tw5B1hDCJRKrDpmtyZcbmI9To-b0NYEXmXhc5NQBqrx0TAmSz8BL3o0h7g7zJCHI2dEqoehONm1K0BqqWluhMFiYn9P~jcV8Nq15X6pRDbACSTBOCJdPZUA5Jp4rH1kIWujQv23Doyl3nHlME5NZ5XuVnyNsFd8bEv4~ZdP19T0MT8gzhQW1Z5UQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Qualitative_Comparison_of_Commercial_NO2_Sensors_and_Selection_Criteria_for_Various_Applications","translated_slug":"","page_count":5,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146568,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146568/thumbnails/1.jpg","file_name":"507_3_2924_2928.pdf","download_url":"https://www.academia.edu/attachments/115146568/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Qualitative_Comparison_of_Commercial_NO2.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146568/507_3_2924_2928-libre.pdf?1716378624=\u0026response-content-disposition=attachment%3B+filename%3DQualitative_Comparison_of_Commercial_NO2.pdf\u0026Expires=1732468483\u0026Signature=aPpmNxPftoXlxkd9V-vJ6biIXmbnyIMkhgeEv~v~p6agY-mHSEnArUmHUwNPV4y9F7ufXocwzxBy5Q4CJcJpVV3en-2v-Ya0u6mU5yhNE2Bx-UJPWpzp8YmjOewJ2lm8AWB0i52NmIwL9vR0rWx6~OruvQXcu5Tw5B1hDCJRKrDpmtyZcbmI9To-b0NYEXmXhc5NQBqrx0TAmSz8BL3o0h7g7zJCHI2dEqoehONm1K0BqqWluhMFiYn9P~jcV8Nq15X6pRDbACSTBOCJdPZUA5Jp4rH1kIWujQv23Doyl3nHlME5NZ5XuVnyNsFd8bEv4~ZdP19T0MT8gzhQW1Z5UQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808623"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808623/A_Classification_of_COVID_19_Cases_using_Fine_Tune_Different_Model_of_Machine_Learning"><img alt="Research paper thumbnail of A Classification of COVID-19 Cases using Fine-Tune Different Model of Machine Learning" class="work-thumbnail" src="https://attachments.academia-assets.com/115146403/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808623/A_Classification_of_COVID_19_Cases_using_Fine_Tune_Different_Model_of_Machine_Learning">A Classification of COVID-19 Cases using Fine-Tune Different Model of Machine Learning</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The Machine Learning Techniques are used for finding upcoming or futuristic Prediction. It's very...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The Machine Learning Techniques are used for finding upcoming or futuristic Prediction. It's very powerful tools in finding of future prediction. From Last decade to recent days Data mining and Machine Learning play vital roles in many Industries. In last 2-3 Years overall World is suffering from a new Virus i.e., COVID-19. The first covid case was detected in Month of December. In very less time it spread out throughout the world. In 2-3 months, this illness is declared as Pandemic by WHO (World Health Organization). The behaviour of spreading of COVID-19 was very abnormal. it was growing Exponentially. Here In this Paper as a Researcher's we are trying to find out overall Analysis of COVID-19. Here our main motto to finding How many patients gets infected, how many of them get cure in sometimes & finally How many of them goes to death. Here our main concentration is to finding the features of the COVID. We will be applying Machine Learning Algorithms like LR, SVM, DT and many more. After applying the above methods, we will find the performance measures of each one and compare with their values. Finally, we will try to Implement some new Enhancement in Existing Algorithms.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="88d1e727a5f5390c19412e89bfa41d2b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146403,"asset_id":119808623,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146403/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808623"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808623"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808623; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808623]").text(description); $(".js-view-count[data-work-id=119808623]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808623; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808623']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808623, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "88d1e727a5f5390c19412e89bfa41d2b" } } $('.js-work-strip[data-work-id=119808623]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808623,"title":"A Classification of COVID-19 Cases using Fine-Tune Different Model of Machine Learning","translated_title":"","metadata":{"abstract":"The Machine Learning Techniques are used for finding upcoming or futuristic Prediction. It's very powerful tools in finding of future prediction. From Last decade to recent days Data mining and Machine Learning play vital roles in many Industries. In last 2-3 Years overall World is suffering from a new Virus i.e., COVID-19. The first covid case was detected in Month of December. In very less time it spread out throughout the world. In 2-3 months, this illness is declared as Pandemic by WHO (World Health Organization). The behaviour of spreading of COVID-19 was very abnormal. it was growing Exponentially. Here In this Paper as a Researcher's we are trying to find out overall Analysis of COVID-19. Here our main motto to finding How many patients gets infected, how many of them get cure in sometimes \u0026 finally How many of them goes to death. Here our main concentration is to finding the features of the COVID. We will be applying Machine Learning Algorithms like LR, SVM, DT and many more. After applying the above methods, we will find the performance measures of each one and compare with their values. Finally, we will try to Implement some new Enhancement in Existing Algorithms.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"The Machine Learning Techniques are used for finding upcoming or futuristic Prediction. It's very powerful tools in finding of future prediction. From Last decade to recent days Data mining and Machine Learning play vital roles in many Industries. In last 2-3 Years overall World is suffering from a new Virus i.e., COVID-19. The first covid case was detected in Month of December. In very less time it spread out throughout the world. In 2-3 months, this illness is declared as Pandemic by WHO (World Health Organization). The behaviour of spreading of COVID-19 was very abnormal. it was growing Exponentially. Here In this Paper as a Researcher's we are trying to find out overall Analysis of COVID-19. Here our main motto to finding How many patients gets infected, how many of them get cure in sometimes \u0026 finally How many of them goes to death. Here our main concentration is to finding the features of the COVID. We will be applying Machine Learning Algorithms like LR, SVM, DT and many more. After applying the above methods, we will find the performance measures of each one and compare with their values. Finally, we will try to Implement some new Enhancement in Existing Algorithms.","internal_url":"https://www.academia.edu/119808623/A_Classification_of_COVID_19_Cases_using_Fine_Tune_Different_Model_of_Machine_Learning","translated_internal_url":"","created_at":"2024-05-22T04:43:05.440-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[],"downloadable_attachments":[{"id":115146403,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146403/thumbnails/1.jpg","file_name":"503_4_2916_2923.pdf","download_url":"https://www.academia.edu/attachments/115146403/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Classification_of_COVID_19_Cases_using.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146403/503_4_2916_2923-libre.pdf?1716378633=\u0026response-content-disposition=attachment%3B+filename%3DA_Classification_of_COVID_19_Cases_using.pdf\u0026Expires=1732468483\u0026Signature=Nax6YSryZDE3u2f7YCWjDraAAaa~XIkawAEWLoMVKT43Yj1RhW65ocY~KM9rzqSAOCGwOaBuTWyyHMIUHPzggMVdhk4B4t38vsnsBcg5alVdd7zG1iByLCg7K~nOrRqBNa1IQZml19OwtLIj~kJnxHEllRgAEBjQSLaNBEcmxKr6qYgtpVIVqazoNMIT~~losruBO5Sd4ECvuAdhSxLj3Kbd12EPL5VYqIEHN5osCh91vsy07KA5T7Ljp17DfUlMQzRZbqIu6Vmv618MmIyOcbPEQyb-Si1fUTbWU5W1tOSf8j0r~nGNdctexI~KbgV7Yc5qPw~wZTnsDmkoIOD1Ug__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Classification_of_COVID_19_Cases_using_Fine_Tune_Different_Model_of_Machine_Learning","translated_slug":"","page_count":8,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146403,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146403/thumbnails/1.jpg","file_name":"503_4_2916_2923.pdf","download_url":"https://www.academia.edu/attachments/115146403/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Classification_of_COVID_19_Cases_using.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146403/503_4_2916_2923-libre.pdf?1716378633=\u0026response-content-disposition=attachment%3B+filename%3DA_Classification_of_COVID_19_Cases_using.pdf\u0026Expires=1732468483\u0026Signature=Nax6YSryZDE3u2f7YCWjDraAAaa~XIkawAEWLoMVKT43Yj1RhW65ocY~KM9rzqSAOCGwOaBuTWyyHMIUHPzggMVdhk4B4t38vsnsBcg5alVdd7zG1iByLCg7K~nOrRqBNa1IQZml19OwtLIj~kJnxHEllRgAEBjQSLaNBEcmxKr6qYgtpVIVqazoNMIT~~losruBO5Sd4ECvuAdhSxLj3Kbd12EPL5VYqIEHN5osCh91vsy07KA5T7Ljp17DfUlMQzRZbqIu6Vmv618MmIyOcbPEQyb-Si1fUTbWU5W1tOSf8j0r~nGNdctexI~KbgV7Yc5qPw~wZTnsDmkoIOD1Ug__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808414"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808414/An_Innovative_Blockchain_based_System_for_Employees_in_the_Healthcare_Industry"><img alt="Research paper thumbnail of An Innovative Blockchain-based System for Employees in the Healthcare Industry" class="work-thumbnail" src="https://attachments.academia-assets.com/115146333/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808414/An_Innovative_Blockchain_based_System_for_Employees_in_the_Healthcare_Industry">An Innovative Blockchain-based System for Employees in the Healthcare Industry</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The pandemic caused by the COVID-19 virus has unquestionably opened our eyes to the possibility t...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The pandemic caused by the COVID-19 virus has unquestionably opened our eyes to the possibility that we may run out of essential supplies, such as medications and medical equipment, which would result in people's deaths and increased anxiety. Insufficient funds and raw materials aren't the only factors contributing to this situation; there's also another factor that's much more discouraging. Even in the midst of these challenging circumstances, some individuals have been able to see an opportunity in the scenario that allows them to maintain and store vital equipment such as personal protective equipment kits, masks, sanitizers, and the like, and then start black-selling such items. This very problematic circumstance has arisen as a direct result of deficiencies in the supply chain's control, transparency, and traceability. Blockchain technology presents itself as a potentially useful answer to this issue. The information may be tracked and traced using blockchain technology, which can also be used to store the data in a decentralised and immutable manner, ensuring that it remains private and is protected from unauthorised users. This article discusses the many use cases for healthcare personnel as well as the various constraints of the present blockchain architecture for supply chain. [Citation needed] The shortcomings of the current blockchain framework for supply chains are then addressed via the proposal of a new framework.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="22b7b537e09c4de63ac03bb9322187eb" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146333,"asset_id":119808414,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146333/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808414"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808414"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808414; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808414]").text(description); $(".js-view-count[data-work-id=119808414]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808414; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808414']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808414, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "22b7b537e09c4de63ac03bb9322187eb" } } $('.js-work-strip[data-work-id=119808414]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808414,"title":"An Innovative Blockchain-based System for Employees in the Healthcare Industry","translated_title":"","metadata":{"abstract":"The pandemic caused by the COVID-19 virus has unquestionably opened our eyes to the possibility that we may run out of essential supplies, such as medications and medical equipment, which would result in people's deaths and increased anxiety. Insufficient funds and raw materials aren't the only factors contributing to this situation; there's also another factor that's much more discouraging. Even in the midst of these challenging circumstances, some individuals have been able to see an opportunity in the scenario that allows them to maintain and store vital equipment such as personal protective equipment kits, masks, sanitizers, and the like, and then start black-selling such items. This very problematic circumstance has arisen as a direct result of deficiencies in the supply chain's control, transparency, and traceability. Blockchain technology presents itself as a potentially useful answer to this issue. The information may be tracked and traced using blockchain technology, which can also be used to store the data in a decentralised and immutable manner, ensuring that it remains private and is protected from unauthorised users. This article discusses the many use cases for healthcare personnel as well as the various constraints of the present blockchain architecture for supply chain. [Citation needed] The shortcomings of the current blockchain framework for supply chains are then addressed via the proposal of a new framework.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"The pandemic caused by the COVID-19 virus has unquestionably opened our eyes to the possibility that we may run out of essential supplies, such as medications and medical equipment, which would result in people's deaths and increased anxiety. Insufficient funds and raw materials aren't the only factors contributing to this situation; there's also another factor that's much more discouraging. Even in the midst of these challenging circumstances, some individuals have been able to see an opportunity in the scenario that allows them to maintain and store vital equipment such as personal protective equipment kits, masks, sanitizers, and the like, and then start black-selling such items. This very problematic circumstance has arisen as a direct result of deficiencies in the supply chain's control, transparency, and traceability. Blockchain technology presents itself as a potentially useful answer to this issue. The information may be tracked and traced using blockchain technology, which can also be used to store the data in a decentralised and immutable manner, ensuring that it remains private and is protected from unauthorised users. This article discusses the many use cases for healthcare personnel as well as the various constraints of the present blockchain architecture for supply chain. [Citation needed] The shortcomings of the current blockchain framework for supply chains are then addressed via the proposal of a new framework.","internal_url":"https://www.academia.edu/119808414/An_Innovative_Blockchain_based_System_for_Employees_in_the_Healthcare_Industry","translated_internal_url":"","created_at":"2024-05-22T04:40:18.398-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730524,"work_id":119808414,"tagging_user_id":32919427,"tagged_user_id":827443,"co_author_invite_id":null,"email":"a***e@gmail.com","display_order":1,"name":"Anil Turukmane","title":"An Innovative Blockchain-based System for Employees in the Healthcare Industry"}],"downloadable_attachments":[{"id":115146333,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146333/thumbnails/1.jpg","file_name":"502_2_2909_2915.pdf","download_url":"https://www.academia.edu/attachments/115146333/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Innovative_Blockchain_based_System_fo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146333/502_2_2909_2915-libre.pdf?1716378641=\u0026response-content-disposition=attachment%3B+filename%3DAn_Innovative_Blockchain_based_System_fo.pdf\u0026Expires=1732468484\u0026Signature=XP0QrVhJeqOb7VsXcX54IAyxS~zBdTAZilUbZOUHEJ-YCOBskFqQGblW9h8RtzHAKfsIVaC2gL~~xfC9ZEdOjt5TxL0d2OiINgbGMQ0dJlfM8cTd6W6GkctytU2SQm-pcYak64fxu1y3yt3iUKxSCD9PMR0G0aGpppzC9qjxK532QbxE-6OiP6-pfA2o~eV6t3AqtR1VVAekdEn2CKFquigSrEV1tqHuk-vv9AK5X6Xr2vmgv1orhJ6ADyMPq09fK714FwjQaRCZWGuV7fkg4MNk-PpG-umnVtzoh0h6dIVhPX3S7Tzk08H0mtQn45P5LMuRpSIF-NIF5wf4S3yCnQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"An_Innovative_Blockchain_based_System_for_Employees_in_the_Healthcare_Industry","translated_slug":"","page_count":7,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146333,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146333/thumbnails/1.jpg","file_name":"502_2_2909_2915.pdf","download_url":"https://www.academia.edu/attachments/115146333/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Innovative_Blockchain_based_System_fo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146333/502_2_2909_2915-libre.pdf?1716378641=\u0026response-content-disposition=attachment%3B+filename%3DAn_Innovative_Blockchain_based_System_fo.pdf\u0026Expires=1732468484\u0026Signature=XP0QrVhJeqOb7VsXcX54IAyxS~zBdTAZilUbZOUHEJ-YCOBskFqQGblW9h8RtzHAKfsIVaC2gL~~xfC9ZEdOjt5TxL0d2OiINgbGMQ0dJlfM8cTd6W6GkctytU2SQm-pcYak64fxu1y3yt3iUKxSCD9PMR0G0aGpppzC9qjxK532QbxE-6OiP6-pfA2o~eV6t3AqtR1VVAekdEn2CKFquigSrEV1tqHuk-vv9AK5X6Xr2vmgv1orhJ6ADyMPq09fK714FwjQaRCZWGuV7fkg4MNk-PpG-umnVtzoh0h6dIVhPX3S7Tzk08H0mtQn45P5LMuRpSIF-NIF5wf4S3yCnQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808307"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808307/An_Overview_of_Speaker_Recognition_Conceptual_Framework_and_CNN_based_Identification_Technique"><img alt="Research paper thumbnail of An Overview of Speaker Recognition: Conceptual Framework and CNN based Identification Technique" class="work-thumbnail" src="https://attachments.academia-assets.com/115146209/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808307/An_Overview_of_Speaker_Recognition_Conceptual_Framework_and_CNN_based_Identification_Technique">An Overview of Speaker Recognition: Conceptual Framework and CNN based Identification Technique</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">One of the major characteristics of an individual is to recognize a human voice. He is capable to...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">One of the major characteristics of an individual is to recognize a human voice. He is capable to do so, via digital devices or over the telephone. Acquiring this human trait, multiple technologies based on voice recognition have been developed to fulfil the purpose of biometrics and authentication. One such speech analysing technology is automatic speaker recognition (ASR) method that has been introduced to extract characteristics from the speaker's voice and identify him as a genuine source of input. The primary aim of speaker recognition is to identify and verify a person using audio signals. Hence, this has become a dominating field of research in the domain of biometrics. However, several deep learning approaches based on convolutional neural networks have been adopted to enhance the overall system of biometrics. Therefore, in this paper we review feature components on speaker recognition using CNN and feature extraction methods such as MFCC. The major advantage of using this method over traditional identification is its representation ability to extract feature inputs including audio signals and networking structures. Further, we briefly describe all the main pieces of ASR related methodologies followed by evaluation metrics to enhance the overall recognition of the system. Finally, a few relatable challenges and future expansion of speaker recognition are mentioned at the closure of this review.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="cdd943a061de92f87c141919f83af63f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146209,"asset_id":119808307,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146209/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808307"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808307"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808307; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808307]").text(description); $(".js-view-count[data-work-id=119808307]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808307; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808307']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808307, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "cdd943a061de92f87c141919f83af63f" } } $('.js-work-strip[data-work-id=119808307]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808307,"title":"An Overview of Speaker Recognition: Conceptual Framework and CNN based Identification Technique","translated_title":"","metadata":{"abstract":"One of the major characteristics of an individual is to recognize a human voice. He is capable to do so, via digital devices or over the telephone. Acquiring this human trait, multiple technologies based on voice recognition have been developed to fulfil the purpose of biometrics and authentication. One such speech analysing technology is automatic speaker recognition (ASR) method that has been introduced to extract characteristics from the speaker's voice and identify him as a genuine source of input. The primary aim of speaker recognition is to identify and verify a person using audio signals. Hence, this has become a dominating field of research in the domain of biometrics. However, several deep learning approaches based on convolutional neural networks have been adopted to enhance the overall system of biometrics. Therefore, in this paper we review feature components on speaker recognition using CNN and feature extraction methods such as MFCC. The major advantage of using this method over traditional identification is its representation ability to extract feature inputs including audio signals and networking structures. Further, we briefly describe all the main pieces of ASR related methodologies followed by evaluation metrics to enhance the overall recognition of the system. Finally, a few relatable challenges and future expansion of speaker recognition are mentioned at the closure of this review.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"One of the major characteristics of an individual is to recognize a human voice. He is capable to do so, via digital devices or over the telephone. Acquiring this human trait, multiple technologies based on voice recognition have been developed to fulfil the purpose of biometrics and authentication. One such speech analysing technology is automatic speaker recognition (ASR) method that has been introduced to extract characteristics from the speaker's voice and identify him as a genuine source of input. The primary aim of speaker recognition is to identify and verify a person using audio signals. Hence, this has become a dominating field of research in the domain of biometrics. However, several deep learning approaches based on convolutional neural networks have been adopted to enhance the overall system of biometrics. Therefore, in this paper we review feature components on speaker recognition using CNN and feature extraction methods such as MFCC. The major advantage of using this method over traditional identification is its representation ability to extract feature inputs including audio signals and networking structures. Further, we briefly describe all the main pieces of ASR related methodologies followed by evaluation metrics to enhance the overall recognition of the system. Finally, a few relatable challenges and future expansion of speaker recognition are mentioned at the closure of this review.","internal_url":"https://www.academia.edu/119808307/An_Overview_of_Speaker_Recognition_Conceptual_Framework_and_CNN_based_Identification_Technique","translated_internal_url":"","created_at":"2024-05-22T04:37:37.435-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730518,"work_id":119808307,"tagging_user_id":32919427,"tagged_user_id":279999067,"co_author_invite_id":null,"email":"a***e@gmail.com","display_order":1,"name":"Avinash Dhole","title":"An Overview of Speaker Recognition: Conceptual Framework and CNN based Identification Technique"}],"downloadable_attachments":[{"id":115146209,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146209/thumbnails/1.jpg","file_name":"335_2901_2908.pdf","download_url":"https://www.academia.edu/attachments/115146209/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Overview_of_Speaker_Recognition_Conce.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146209/335_2901_2908-libre.pdf?1716378648=\u0026response-content-disposition=attachment%3B+filename%3DAn_Overview_of_Speaker_Recognition_Conce.pdf\u0026Expires=1732468484\u0026Signature=DNRSvGE0wijl4WnwHRgI6ClQpj1msBhMwAMYWSyxW1VR1dMq6SzqEjtfkh2h9pZsVwJ05E4Ew1LjyJePx40VGj~JVyAq-XqCGZNWwAREBqKn2gYzBaPkZ6RsnV~rXHcKYCtVg9XqzJt4QeD7HRkqUYJK4C8jz-Ueng23vOhWmc3jgNouuKfhT~Ju0bTf7dWEGsFelFpblb39veFGP16JP4Oa-0QWIxTc1YUwFn7MkDJWg~u57bz0ScqiplJpnWKThxhfkh7CqR-fb~jyf1cvjTmNhPqPa1XzkTjJMTEMzOq~D8hIHNIod4~Id85O6HAK0W5YOggFz~oOMcwnoaAT9g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"An_Overview_of_Speaker_Recognition_Conceptual_Framework_and_CNN_based_Identification_Technique","translated_slug":"","page_count":8,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146209,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146209/thumbnails/1.jpg","file_name":"335_2901_2908.pdf","download_url":"https://www.academia.edu/attachments/115146209/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Overview_of_Speaker_Recognition_Conce.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146209/335_2901_2908-libre.pdf?1716378648=\u0026response-content-disposition=attachment%3B+filename%3DAn_Overview_of_Speaker_Recognition_Conce.pdf\u0026Expires=1732468484\u0026Signature=DNRSvGE0wijl4WnwHRgI6ClQpj1msBhMwAMYWSyxW1VR1dMq6SzqEjtfkh2h9pZsVwJ05E4Ew1LjyJePx40VGj~JVyAq-XqCGZNWwAREBqKn2gYzBaPkZ6RsnV~rXHcKYCtVg9XqzJt4QeD7HRkqUYJK4C8jz-Ueng23vOhWmc3jgNouuKfhT~Ju0bTf7dWEGsFelFpblb39veFGP16JP4Oa-0QWIxTc1YUwFn7MkDJWg~u57bz0ScqiplJpnWKThxhfkh7CqR-fb~jyf1cvjTmNhPqPa1XzkTjJMTEMzOq~D8hIHNIod4~Id85O6HAK0W5YOggFz~oOMcwnoaAT9g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808176"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808176/Predicting_Dengue_using_Rule_based_Approach"><img alt="Research paper thumbnail of Predicting Dengue using Rule-based Approach" class="work-thumbnail" src="https://attachments.academia-assets.com/115146117/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808176/Predicting_Dengue_using_Rule_based_Approach">Predicting Dengue using Rule-based Approach</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/IdesEditor">Grenze International Journal of Engineering and Technology GIJET</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/SakshiShejwal3">Sakshi Shejwal</a></span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Dengue is the most common viral fever suffered by most people. It is also known as life-threateni...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Dengue is the most common viral fever suffered by most people. It is also known as life-threatening disease. It has taken many lives all over the world. Brisk forecast of dengue can save individual's life by warning them to take genuine conclusion and care. During the covid situation risk of dengue have reached at a larger scale with multiple symptoms. In this paper, selective symptoms are being considered to verify their impact on predicting the disease and the main motive is to predict dengue, how accurately it gives respond in advance that can save individual's life. For this a new approach has been introduced by applying Rule Fit or Rulebased algorithm and Feature transformation methods to get an accurate result which solve the interpretability and overfitting issue in each machine learning algorithm that have a huge impact on the prediction. Also results gained varies based on the selection of dataset, each algorithms results differs according to the dataset.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="3267692df34fb3e0110993fcb2152490" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146117,"asset_id":119808176,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146117/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808176"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808176"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808176; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808176]").text(description); $(".js-view-count[data-work-id=119808176]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808176; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808176']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808176, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "3267692df34fb3e0110993fcb2152490" } } $('.js-work-strip[data-work-id=119808176]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808176,"title":"Predicting Dengue using Rule-based Approach","translated_title":"","metadata":{"abstract":"Dengue is the most common viral fever suffered by most people. It is also known as life-threatening disease. It has taken many lives all over the world. Brisk forecast of dengue can save individual's life by warning them to take genuine conclusion and care. During the covid situation risk of dengue have reached at a larger scale with multiple symptoms. In this paper, selective symptoms are being considered to verify their impact on predicting the disease and the main motive is to predict dengue, how accurately it gives respond in advance that can save individual's life. For this a new approach has been introduced by applying Rule Fit or Rulebased algorithm and Feature transformation methods to get an accurate result which solve the interpretability and overfitting issue in each machine learning algorithm that have a huge impact on the prediction. Also results gained varies based on the selection of dataset, each algorithms results differs according to the dataset.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Dengue is the most common viral fever suffered by most people. It is also known as life-threatening disease. It has taken many lives all over the world. Brisk forecast of dengue can save individual's life by warning them to take genuine conclusion and care. During the covid situation risk of dengue have reached at a larger scale with multiple symptoms. In this paper, selective symptoms are being considered to verify their impact on predicting the disease and the main motive is to predict dengue, how accurately it gives respond in advance that can save individual's life. For this a new approach has been introduced by applying Rule Fit or Rulebased algorithm and Feature transformation methods to get an accurate result which solve the interpretability and overfitting issue in each machine learning algorithm that have a huge impact on the prediction. Also results gained varies based on the selection of dataset, each algorithms results differs according to the dataset.","internal_url":"https://www.academia.edu/119808176/Predicting_Dengue_using_Rule_based_Approach","translated_internal_url":"","created_at":"2024-05-22T04:36:03.876-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730516,"work_id":119808176,"tagging_user_id":32919427,"tagged_user_id":315700423,"co_author_invite_id":8154024,"email":"s***l@mitaoe.ac.in","display_order":1,"name":"Sakshi Shejwal","title":"Predicting Dengue using Rule-based Approach"},{"id":41730517,"work_id":119808176,"tagging_user_id":32919427,"tagged_user_id":298112011,"co_author_invite_id":null,"email":"p***r@mitaoe.ac.in","display_order":2,"name":"Pramod Ganjewar","title":"Predicting Dengue using Rule-based Approach"}],"downloadable_attachments":[{"id":115146117,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146117/thumbnails/1.jpg","file_name":"334_2893_2900.pdf","download_url":"https://www.academia.edu/attachments/115146117/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Predicting_Dengue_using_Rule_based_Appro.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146117/334_2893_2900-libre.pdf?1716378662=\u0026response-content-disposition=attachment%3B+filename%3DPredicting_Dengue_using_Rule_based_Appro.pdf\u0026Expires=1732468484\u0026Signature=HajxIEFAKKGyjfON~amlou3rwbBjyJCFZ2vf3g~hxzQ8~fy3m3mNAP68YD~b~rM3sTd-5J45-gx9jJ4nv0ITrznOEZzMxBKOpomxtRAZsn6SS0hsR2tlQ8hmJLBrva4MIoMoeSRL7AZa2AS274cG4rx2wwnL9tqDK9fbd~7sF-mGNbeGo9TLN4R9uMZtemZFZHunvzaUUDoBvU0XbtSlWlNULRxpKw5sgVM2ZWoccj58olWR6195zKL9FNiyUqOvuTbHxTrevKMnsAkfkpi5RpzjTROl4hk6Dseuv2Kcc4ur7xASHYd2DNFpqAQif2wQV6~Lqe8B2xnfCObGCGBkLQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Predicting_Dengue_using_Rule_based_Approach","translated_slug":"","page_count":8,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146117,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146117/thumbnails/1.jpg","file_name":"334_2893_2900.pdf","download_url":"https://www.academia.edu/attachments/115146117/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Predicting_Dengue_using_Rule_based_Appro.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146117/334_2893_2900-libre.pdf?1716378662=\u0026response-content-disposition=attachment%3B+filename%3DPredicting_Dengue_using_Rule_based_Appro.pdf\u0026Expires=1732468484\u0026Signature=HajxIEFAKKGyjfON~amlou3rwbBjyJCFZ2vf3g~hxzQ8~fy3m3mNAP68YD~b~rM3sTd-5J45-gx9jJ4nv0ITrznOEZzMxBKOpomxtRAZsn6SS0hsR2tlQ8hmJLBrva4MIoMoeSRL7AZa2AS274cG4rx2wwnL9tqDK9fbd~7sF-mGNbeGo9TLN4R9uMZtemZFZHunvzaUUDoBvU0XbtSlWlNULRxpKw5sgVM2ZWoccj58olWR6195zKL9FNiyUqOvuTbHxTrevKMnsAkfkpi5RpzjTROl4hk6Dseuv2Kcc4ur7xASHYd2DNFpqAQif2wQV6~Lqe8B2xnfCObGCGBkLQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808103"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808103/Hybrid_Recommender_System_for_E_Learning_Platforms"><img alt="Research paper thumbnail of Hybrid Recommender System for E-Learning Platforms" class="work-thumbnail" src="https://attachments.academia-assets.com/115146062/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808103/Hybrid_Recommender_System_for_E_Learning_Platforms">Hybrid Recommender System for E-Learning Platforms</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Internet use has steadily increased over the past 25 years. Numerous online services are improvin...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Internet use has steadily increased over the past 25 years. Numerous online services are improving and simplifying life for people. E-learning is one of these services, which makes the learning process simpler. In this work, a recommendation system will be presented that will assist online course providers in automating course suggestion. By finding patterns in courses based on some attributes like field of interest, skill set, educational qualification, course content, etc. of an individual and courses, this recommendation system is built using hybrid machine learning recommendation techniques, i.e., combination of Collaborative (item based) and content-based recommendation and KNN classifiers. Lastly, the recommendations are pooled from the two blocks of recommended courses (which were discovered using a collaborative technique), similar courses (which is found using content-based finding).</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="6adb9f5eeffce52269b704f4ed81903b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146062,"asset_id":119808103,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146062/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808103"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808103"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808103; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808103]").text(description); $(".js-view-count[data-work-id=119808103]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808103; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808103']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808103, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "6adb9f5eeffce52269b704f4ed81903b" } } $('.js-work-strip[data-work-id=119808103]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808103,"title":"Hybrid Recommender System for E-Learning Platforms","translated_title":"","metadata":{"abstract":"Internet use has steadily increased over the past 25 years. Numerous online services are improving and simplifying life for people. E-learning is one of these services, which makes the learning process simpler. In this work, a recommendation system will be presented that will assist online course providers in automating course suggestion. By finding patterns in courses based on some attributes like field of interest, skill set, educational qualification, course content, etc. of an individual and courses, this recommendation system is built using hybrid machine learning recommendation techniques, i.e., combination of Collaborative (item based) and content-based recommendation and KNN classifiers. Lastly, the recommendations are pooled from the two blocks of recommended courses (which were discovered using a collaborative technique), similar courses (which is found using content-based finding).","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Internet use has steadily increased over the past 25 years. Numerous online services are improving and simplifying life for people. E-learning is one of these services, which makes the learning process simpler. In this work, a recommendation system will be presented that will assist online course providers in automating course suggestion. By finding patterns in courses based on some attributes like field of interest, skill set, educational qualification, course content, etc. of an individual and courses, this recommendation system is built using hybrid machine learning recommendation techniques, i.e., combination of Collaborative (item based) and content-based recommendation and KNN classifiers. Lastly, the recommendations are pooled from the two blocks of recommended courses (which were discovered using a collaborative technique), similar courses (which is found using content-based finding).","internal_url":"https://www.academia.edu/119808103/Hybrid_Recommender_System_for_E_Learning_Platforms","translated_internal_url":"","created_at":"2024-05-22T04:34:14.895-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730510,"work_id":119808103,"tagging_user_id":32919427,"tagged_user_id":107260265,"co_author_invite_id":null,"email":"s***a@cit.edu.in","display_order":1,"name":"Sujithra M","title":"Hybrid Recommender System for E-Learning Platforms"},{"id":41730511,"work_id":119808103,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154022,"email":"r***i@cit.edu.in","display_order":2,"name":"K. Rajarajeshwari","title":"Hybrid Recommender System for E-Learning Platforms"}],"downloadable_attachments":[{"id":115146062,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146062/thumbnails/1.jpg","file_name":"332_2887_2892.pdf","download_url":"https://www.academia.edu/attachments/115146062/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hybrid_Recommender_System_for_E_Learning.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146062/332_2887_2892-libre.pdf?1716378658=\u0026response-content-disposition=attachment%3B+filename%3DHybrid_Recommender_System_for_E_Learning.pdf\u0026Expires=1732468484\u0026Signature=V~IbMULgekGGfyoPopZqIaqUs0CkxDfejfF2U~PN3yGkxwSgLmA~NvQx3MiPX6RpzkjuW1A6o9tWdlJ~dCgj-iIR~AcU7LefpWlO~GtrAJ16ErhtQnC-x8kPJOlVP4Tk8BUhskI10ixgxT1NQU2qt6G8kPu5sb9-9~~bOrZf6Bz0LBL6w6Jl1JvO1hu5UlsMobpxRfxoerUVpu6~4Aj7HRSJ588oONMxNb~g1oh77ERnSlPpvwOBMOgCehVd-KKN7KxA-Ht8yGXrO0wmhpJWncnyKbYVaB26iZVjffhgAAxBE7PJip9owiN5swpvwT88l6LPSoe2lzHABTKYhUCtbg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Hybrid_Recommender_System_for_E_Learning_Platforms","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146062,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146062/thumbnails/1.jpg","file_name":"332_2887_2892.pdf","download_url":"https://www.academia.edu/attachments/115146062/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hybrid_Recommender_System_for_E_Learning.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146062/332_2887_2892-libre.pdf?1716378658=\u0026response-content-disposition=attachment%3B+filename%3DHybrid_Recommender_System_for_E_Learning.pdf\u0026Expires=1732468484\u0026Signature=V~IbMULgekGGfyoPopZqIaqUs0CkxDfejfF2U~PN3yGkxwSgLmA~NvQx3MiPX6RpzkjuW1A6o9tWdlJ~dCgj-iIR~AcU7LefpWlO~GtrAJ16ErhtQnC-x8kPJOlVP4Tk8BUhskI10ixgxT1NQU2qt6G8kPu5sb9-9~~bOrZf6Bz0LBL6w6Jl1JvO1hu5UlsMobpxRfxoerUVpu6~4Aj7HRSJ588oONMxNb~g1oh77ERnSlPpvwOBMOgCehVd-KKN7KxA-Ht8yGXrO0wmhpJWncnyKbYVaB26iZVjffhgAAxBE7PJip9owiN5swpvwT88l6LPSoe2lzHABTKYhUCtbg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808045"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808045/An_Automatic_Extractive_Text_Summarization"><img alt="Research paper thumbnail of An Automatic Extractive Text Summarization" class="work-thumbnail" src="https://attachments.academia-assets.com/115146022/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808045/An_Automatic_Extractive_Text_Summarization">An Automatic Extractive Text Summarization</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/IdesEditor">Grenze International Journal of Engineering and Technology GIJET</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/ChandanYadav305">Chandan Yadav</a></span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In this new era of artificial intelligence and automation there is outburst in amount of data. It...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In this new era of artificial intelligence and automation there is outburst in amount of data. It is challenging for a person to dig into the content and bring the light on essential data. So, for such complexity there is need of developing a perfunctory task of automatic and precise text summary of data. Automatic text summarizer reduces reading time and make selection process easier. In recent years, there has been a little change in the text summarising research trend as well. New trends have evolved that show how to improve text summarization performance and achieve high accuracy. Hence, this project mainly focuses on designing an extractive summarizer of English text/document which generate abbreviated summary with the help of different algorithms.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="acf13df73f78c27c5dd7b5b0e5044a39" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146022,"asset_id":119808045,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146022/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808045"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808045"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808045; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808045]").text(description); $(".js-view-count[data-work-id=119808045]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808045; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808045']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808045, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "acf13df73f78c27c5dd7b5b0e5044a39" } } $('.js-work-strip[data-work-id=119808045]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808045,"title":"An Automatic Extractive Text Summarization","translated_title":"","metadata":{"abstract":"In this new era of artificial intelligence and automation there is outburst in amount of data. It is challenging for a person to dig into the content and bring the light on essential data. So, for such complexity there is need of developing a perfunctory task of automatic and precise text summary of data. Automatic text summarizer reduces reading time and make selection process easier. In recent years, there has been a little change in the text summarising research trend as well. New trends have evolved that show how to improve text summarization performance and achieve high accuracy. Hence, this project mainly focuses on designing an extractive summarizer of English text/document which generate abbreviated summary with the help of different algorithms.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"In this new era of artificial intelligence and automation there is outburst in amount of data. It is challenging for a person to dig into the content and bring the light on essential data. So, for such complexity there is need of developing a perfunctory task of automatic and precise text summary of data. Automatic text summarizer reduces reading time and make selection process easier. In recent years, there has been a little change in the text summarising research trend as well. New trends have evolved that show how to improve text summarization performance and achieve high accuracy. Hence, this project mainly focuses on designing an extractive summarizer of English text/document which generate abbreviated summary with the help of different algorithms.","internal_url":"https://www.academia.edu/119808045/An_Automatic_Extractive_Text_Summarization","translated_internal_url":"","created_at":"2024-05-22T04:32:55.183-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730498,"work_id":119808045,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154018,"email":"m***a@mitaoe.ac.in","display_order":1,"name":"Meet Bedhmutha","title":"An Automatic Extractive Text Summarization"},{"id":41730499,"work_id":119808045,"tagging_user_id":32919427,"tagged_user_id":315700413,"co_author_invite_id":8154019,"email":"c***v@mitaoe.ac.in","display_order":2,"name":"Chandan Yadav","title":"An Automatic Extractive Text Summarization"},{"id":41730500,"work_id":119808045,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154020,"email":"d***i@mitaoe.ac.in","display_order":3,"name":"Devashish Dani","title":"An Automatic Extractive Text Summarization"},{"id":41730501,"work_id":119808045,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154021,"email":"k***l@mitaoe.ac.in","display_order":4,"name":"Kshitij Patil","title":"An Automatic Extractive Text Summarization"}],"downloadable_attachments":[{"id":115146022,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146022/thumbnails/1.jpg","file_name":"332_1_2881_2886.pdf","download_url":"https://www.academia.edu/attachments/115146022/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Automatic_Extractive_Text_Summarizati.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146022/332_1_2881_2886-libre.pdf?1716378665=\u0026response-content-disposition=attachment%3B+filename%3DAn_Automatic_Extractive_Text_Summarizati.pdf\u0026Expires=1732468484\u0026Signature=T22m4ZdGNvVecrZE013F560kow414UrNR1ZtUhYQ46N0HjUVdZHk9eyfMWsTuj81punzDgwPZxeUVmmnsxtUS650iiv4bSWmScQlitT-GtF5vzYs4-QSKtnXAZn4gswKDysOGRQqycSU97oXp7JriPod85B0~FSlpaLa9aaqZrG6NiBr~uVu6Ut8kheBaNti5xDuxjr~1QRgkqLnueuXvT5bGg4iKvpqedQLH1o9h57rBjFfhfX6q98fptqlt0McexDumd~QWu0u-18o3sEMsuoQWVFtMC1r5o1inU7o7i2JwaBX6h2SGmg~CNVMVeF-V~NkPi87sL1YGXPARqJ95Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"An_Automatic_Extractive_Text_Summarization","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146022,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146022/thumbnails/1.jpg","file_name":"332_1_2881_2886.pdf","download_url":"https://www.academia.edu/attachments/115146022/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Automatic_Extractive_Text_Summarizati.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146022/332_1_2881_2886-libre.pdf?1716378665=\u0026response-content-disposition=attachment%3B+filename%3DAn_Automatic_Extractive_Text_Summarizati.pdf\u0026Expires=1732468484\u0026Signature=T22m4ZdGNvVecrZE013F560kow414UrNR1ZtUhYQ46N0HjUVdZHk9eyfMWsTuj81punzDgwPZxeUVmmnsxtUS650iiv4bSWmScQlitT-GtF5vzYs4-QSKtnXAZn4gswKDysOGRQqycSU97oXp7JriPod85B0~FSlpaLa9aaqZrG6NiBr~uVu6Ut8kheBaNti5xDuxjr~1QRgkqLnueuXvT5bGg4iKvpqedQLH1o9h57rBjFfhfX6q98fptqlt0McexDumd~QWu0u-18o3sEMsuoQWVFtMC1r5o1inU7o7i2JwaBX6h2SGmg~CNVMVeF-V~NkPi87sL1YGXPARqJ95Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807982"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807982/Hate_Speech_Detection_using_Logistic_Regression_on_Bag_of_Words_Model"><img alt="Research paper thumbnail of Hate Speech Detection using Logistic Regression on Bag of Words Model" class="work-thumbnail" src="https://attachments.academia-assets.com/115145935/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807982/Hate_Speech_Detection_using_Logistic_Regression_on_Bag_of_Words_Model">Hate Speech Detection using Logistic Regression on Bag of Words Model</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Hate speech is a conundrum that is spreading like wildfire. Social networks allow members to conn...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Hate speech is a conundrum that is spreading like wildfire. Social networks allow members to connect by a variety of common interests and share information. These channels create and also help communities engage in discussing specific topics related to said news. However, they are also used as a medium to spread hate and offensive news. News on social media spread like a forest fire. Not only social media, but other forms of online media and precedence may cause hate speech to spread. Therefore, trying to prevent it beforehand is much better than causing an outrage. The objective of this paper is to try to establish a reliable model to identify hate speech in sentences. The purpose of this project is to analyze the sentiments of speech used sentences using certain ML algorithms. The Bag of Words model and Document Frequency Inverse Term Frequency (TFIDF) are used to process the text in sentences. Then we use the Logistic Regression algorithm on our bag of words.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="8d94318221a89cc6ad18576a608b3524" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145935,"asset_id":119807982,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145935/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807982"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807982"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807982; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807982]").text(description); $(".js-view-count[data-work-id=119807982]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807982; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807982']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807982, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "8d94318221a89cc6ad18576a608b3524" } } $('.js-work-strip[data-work-id=119807982]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807982,"title":"Hate Speech Detection using Logistic Regression on Bag of Words Model","translated_title":"","metadata":{"abstract":"Hate speech is a conundrum that is spreading like wildfire. Social networks allow members to connect by a variety of common interests and share information. These channels create and also help communities engage in discussing specific topics related to said news. However, they are also used as a medium to spread hate and offensive news. News on social media spread like a forest fire. Not only social media, but other forms of online media and precedence may cause hate speech to spread. Therefore, trying to prevent it beforehand is much better than causing an outrage. The objective of this paper is to try to establish a reliable model to identify hate speech in sentences. The purpose of this project is to analyze the sentiments of speech used sentences using certain ML algorithms. The Bag of Words model and Document Frequency Inverse Term Frequency (TFIDF) are used to process the text in sentences. Then we use the Logistic Regression algorithm on our bag of words.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Hate speech is a conundrum that is spreading like wildfire. Social networks allow members to connect by a variety of common interests and share information. These channels create and also help communities engage in discussing specific topics related to said news. However, they are also used as a medium to spread hate and offensive news. News on social media spread like a forest fire. Not only social media, but other forms of online media and precedence may cause hate speech to spread. Therefore, trying to prevent it beforehand is much better than causing an outrage. The objective of this paper is to try to establish a reliable model to identify hate speech in sentences. The purpose of this project is to analyze the sentiments of speech used sentences using certain ML algorithms. The Bag of Words model and Document Frequency Inverse Term Frequency (TFIDF) are used to process the text in sentences. Then we use the Logistic Regression algorithm on our bag of words.","internal_url":"https://www.academia.edu/119807982/Hate_Speech_Detection_using_Logistic_Regression_on_Bag_of_Words_Model","translated_internal_url":"","created_at":"2024-05-22T04:30:45.590-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[],"downloadable_attachments":[{"id":115145935,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145935/thumbnails/1.jpg","file_name":"331_2875_2880.pdf","download_url":"https://www.academia.edu/attachments/115145935/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hate_Speech_Detection_using_Logistic_Reg.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145935/331_2875_2880-libre.pdf?1716378668=\u0026response-content-disposition=attachment%3B+filename%3DHate_Speech_Detection_using_Logistic_Reg.pdf\u0026Expires=1732468484\u0026Signature=UZSyCI9lz0~BOg4TDLwOgamFyoGu4W7Oeh1AhgGeykHfZIId9aBPKX5ZBbiM6jcvcQFja6K~pXBb5U14eAENF53JFj9gN40sdqtvhOYvwdA3Kfk1Gqbq6hcpjEiyOruMA9OyNeJqBmKPQqjyUy5rKDjt0MhUS99QSIcoYVGjP80fea9V4YatRV0BQrB7SUysQ7kild0fUzOwEvHgo~iPXKRICIc4Qb3-Sbvso29LdFddStUJRJv60sRO~o8qqwZ6SDkk~ThX5gsOumw6azQ3kpGxwujaIaeSedh1qC7020LVcU4euLyxmD0~rrVGuXWajqhPeCmFjQ2RxFvnT4ilYg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Hate_Speech_Detection_using_Logistic_Regression_on_Bag_of_Words_Model","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145935,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145935/thumbnails/1.jpg","file_name":"331_2875_2880.pdf","download_url":"https://www.academia.edu/attachments/115145935/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hate_Speech_Detection_using_Logistic_Reg.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145935/331_2875_2880-libre.pdf?1716378668=\u0026response-content-disposition=attachment%3B+filename%3DHate_Speech_Detection_using_Logistic_Reg.pdf\u0026Expires=1732468484\u0026Signature=UZSyCI9lz0~BOg4TDLwOgamFyoGu4W7Oeh1AhgGeykHfZIId9aBPKX5ZBbiM6jcvcQFja6K~pXBb5U14eAENF53JFj9gN40sdqtvhOYvwdA3Kfk1Gqbq6hcpjEiyOruMA9OyNeJqBmKPQqjyUy5rKDjt0MhUS99QSIcoYVGjP80fea9V4YatRV0BQrB7SUysQ7kild0fUzOwEvHgo~iPXKRICIc4Qb3-Sbvso29LdFddStUJRJv60sRO~o8qqwZ6SDkk~ThX5gsOumw6azQ3kpGxwujaIaeSedh1qC7020LVcU4euLyxmD0~rrVGuXWajqhPeCmFjQ2RxFvnT4ilYg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807898"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807898/A_Review_Paper_on_Cyclone_Intensity_Estimation_on_INSAT_3D_IR_Imagery_using_Deep_Learning_Algorithms"><img alt="Research paper thumbnail of A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms" class="work-thumbnail" src="https://attachments.academia-assets.com/115145874/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807898/A_Review_Paper_on_Cyclone_Intensity_Estimation_on_INSAT_3D_IR_Imagery_using_Deep_Learning_Algorithms">A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/IdesEditor">Grenze International Journal of Engineering and Technology GIJET</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/TejasAdsare">Tejas Adsare</a></span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Due to the various dangers involved, especially tropical cyclones, they are one of the most commo...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Due to the various dangers involved, especially tropical cyclones, they are one of the most common and deadly calamities in the world. The very important primary step in monitoring this destructive disaster is by estimating its intensity. The aim of this research is to determine intensity of cyclones. For the estimation of cyclones and determination of their intensity, various methods have been created. It is a difficult task which requires speed and efficiency. This paper shows comparison between various types of deep learning algorithms on infrared satellite imagery dataset for tropical cyclone intensity estimation. A side-by-side comparison research revealed that the detection of the tropical cyclone intensity evaluated via the models derived from different machine learning algorithms is significantly impacted by the use of various infrared (IR) channels.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="842448f416eab3c8288cf4c9dc4d1412" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145874,"asset_id":119807898,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145874/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807898"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807898"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807898; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807898]").text(description); $(".js-view-count[data-work-id=119807898]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807898; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807898']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807898, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "842448f416eab3c8288cf4c9dc4d1412" } } $('.js-work-strip[data-work-id=119807898]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807898,"title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms","translated_title":"","metadata":{"abstract":"Due to the various dangers involved, especially tropical cyclones, they are one of the most common and deadly calamities in the world. The very important primary step in monitoring this destructive disaster is by estimating its intensity. The aim of this research is to determine intensity of cyclones. For the estimation of cyclones and determination of their intensity, various methods have been created. It is a difficult task which requires speed and efficiency. This paper shows comparison between various types of deep learning algorithms on infrared satellite imagery dataset for tropical cyclone intensity estimation. A side-by-side comparison research revealed that the detection of the tropical cyclone intensity evaluated via the models derived from different machine learning algorithms is significantly impacted by the use of various infrared (IR) channels.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Due to the various dangers involved, especially tropical cyclones, they are one of the most common and deadly calamities in the world. The very important primary step in monitoring this destructive disaster is by estimating its intensity. The aim of this research is to determine intensity of cyclones. For the estimation of cyclones and determination of their intensity, various methods have been created. It is a difficult task which requires speed and efficiency. This paper shows comparison between various types of deep learning algorithms on infrared satellite imagery dataset for tropical cyclone intensity estimation. A side-by-side comparison research revealed that the detection of the tropical cyclone intensity evaluated via the models derived from different machine learning algorithms is significantly impacted by the use of various infrared (IR) channels.","internal_url":"https://www.academia.edu/119807898/A_Review_Paper_on_Cyclone_Intensity_Estimation_on_INSAT_3D_IR_Imagery_using_Deep_Learning_Algorithms","translated_internal_url":"","created_at":"2024-05-22T04:28:58.419-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730476,"work_id":119807898,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154013,"email":"k***e@gmail.com","display_order":1,"name":"Kuldeep Vayadande","title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms"},{"id":41730477,"work_id":119807898,"tagging_user_id":32919427,"tagged_user_id":315457875,"co_author_invite_id":8154014,"email":"t***0@vit.edu","display_order":2,"name":"Tejas Adsare","title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms"},{"id":41730478,"work_id":119807898,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154015,"email":"n***0@vit.edu","display_order":3,"name":"Neeraj Agrawal","title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms"},{"id":41730479,"work_id":119807898,"tagging_user_id":32919427,"tagged_user_id":246124228,"co_author_invite_id":null,"email":"t***0@vit.edu","display_order":4,"name":"Dharmik Tejas","title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms"},{"id":41730480,"work_id":119807898,"tagging_user_id":32919427,"tagged_user_id":306341251,"co_author_invite_id":null,"email":"a***0@vit.edu","display_order":5,"name":"Patil Aishwarya","title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms"},{"id":41730481,"work_id":119807898,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154016,"email":"s***0@vit.edu","display_order":6,"name":"Sakshi Zod","title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms"}],"downloadable_attachments":[{"id":115145874,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145874/thumbnails/1.jpg","file_name":"330_2869_2874.pdf","download_url":"https://www.academia.edu/attachments/115145874/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Review_Paper_on_Cyclone_Intensity_Esti.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145874/330_2869_2874-libre.pdf?1716378676=\u0026response-content-disposition=attachment%3B+filename%3DA_Review_Paper_on_Cyclone_Intensity_Esti.pdf\u0026Expires=1732468485\u0026Signature=Yh5V0yjk-je71rXDxEJjLHSJyeu~GIeLcLzOyQnETfnxnAq40QvnEQOrPPiBoILXBqaoZKcjGNu56-cFEELR68Eo5ETc1zuo1cyvRX4KN3cXzEBOchWjRAVw00EmOqkEmQSASAizRFOc07bvlEBwq~s0-QYzcHcefkKyTp00k28iCUCA1vZ5KMOxQfnzvdg4N-T3oG8xKbox0FRQCUPiGT0K6GaNwWGSbHNclAkcbGEec8M2R23VD6MOwR8aT7nnQr~lamiCf~aHIMS5K0ts5KRbxDfNDMZzSRN~svtxLeUjlVlB9w0FiHqFxMycscmVfWsNNSZb4FHKHfcANoxUig__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Review_Paper_on_Cyclone_Intensity_Estimation_on_INSAT_3D_IR_Imagery_using_Deep_Learning_Algorithms","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145874,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145874/thumbnails/1.jpg","file_name":"330_2869_2874.pdf","download_url":"https://www.academia.edu/attachments/115145874/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Review_Paper_on_Cyclone_Intensity_Esti.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145874/330_2869_2874-libre.pdf?1716378676=\u0026response-content-disposition=attachment%3B+filename%3DA_Review_Paper_on_Cyclone_Intensity_Esti.pdf\u0026Expires=1732468485\u0026Signature=Yh5V0yjk-je71rXDxEJjLHSJyeu~GIeLcLzOyQnETfnxnAq40QvnEQOrPPiBoILXBqaoZKcjGNu56-cFEELR68Eo5ETc1zuo1cyvRX4KN3cXzEBOchWjRAVw00EmOqkEmQSASAizRFOc07bvlEBwq~s0-QYzcHcefkKyTp00k28iCUCA1vZ5KMOxQfnzvdg4N-T3oG8xKbox0FRQCUPiGT0K6GaNwWGSbHNclAkcbGEec8M2R23VD6MOwR8aT7nnQr~lamiCf~aHIMS5K0ts5KRbxDfNDMZzSRN~svtxLeUjlVlB9w0FiHqFxMycscmVfWsNNSZb4FHKHfcANoxUig__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807803"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807803/Comparative_Study_on_Calculating_CPU_Burst_Time_using_Different_Machine_Learning_Algorithms"><img alt="Research paper thumbnail of Comparative Study on Calculating CPU Burst Time using Different Machine Learning Algorithms" class="work-thumbnail" src="https://attachments.academia-assets.com/115145790/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807803/Comparative_Study_on_Calculating_CPU_Burst_Time_using_Different_Machine_Learning_Algorithms">Comparative Study on Calculating CPU Burst Time using Different Machine Learning Algorithms</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This paper gives a thorough analysis of works on the subject of expert assessment of CPU burst ti...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This paper gives a thorough analysis of works on the subject of expert assessment of CPU burst time using various machine learning algorithms. Knowing how long the CPU bursts for the processes will last is necessary for some CPU scheduling algorithms like SJF and SRTF to function. In particular, the non-preemptive SJF scheduling algorithm estimates the process that will be performed by the CPU in the least amount of burst time. One effective way of predicting CPU burst duration is an ML-based algorithm that estimates the burst-time of the processes. Throughout the study, we discovered that the effectiveness of different machinelearning approaches relies on the applications to which they are put. Our examination of the literature not only argues that these methods are competitive with conventional estimators on a single data set, but also demonstrates that they are responsive to the training data.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="03b863c17cf89fa476303b67a467c260" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145790,"asset_id":119807803,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145790/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807803"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807803"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807803; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807803]").text(description); $(".js-view-count[data-work-id=119807803]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807803; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807803']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807803, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "03b863c17cf89fa476303b67a467c260" } } $('.js-work-strip[data-work-id=119807803]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807803,"title":"Comparative Study on Calculating CPU Burst Time using Different Machine Learning Algorithms","translated_title":"","metadata":{"abstract":"This paper gives a thorough analysis of works on the subject of expert assessment of CPU burst time using various machine learning algorithms. Knowing how long the CPU bursts for the processes will last is necessary for some CPU scheduling algorithms like SJF and SRTF to function. In particular, the non-preemptive SJF scheduling algorithm estimates the process that will be performed by the CPU in the least amount of burst time. One effective way of predicting CPU burst duration is an ML-based algorithm that estimates the burst-time of the processes. Throughout the study, we discovered that the effectiveness of different machinelearning approaches relies on the applications to which they are put. Our examination of the literature not only argues that these methods are competitive with conventional estimators on a single data set, but also demonstrates that they are responsive to the training data.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"This paper gives a thorough analysis of works on the subject of expert assessment of CPU burst time using various machine learning algorithms. Knowing how long the CPU bursts for the processes will last is necessary for some CPU scheduling algorithms like SJF and SRTF to function. In particular, the non-preemptive SJF scheduling algorithm estimates the process that will be performed by the CPU in the least amount of burst time. One effective way of predicting CPU burst duration is an ML-based algorithm that estimates the burst-time of the processes. Throughout the study, we discovered that the effectiveness of different machinelearning approaches relies on the applications to which they are put. Our examination of the literature not only argues that these methods are competitive with conventional estimators on a single data set, but also demonstrates that they are responsive to the training data.","internal_url":"https://www.academia.edu/119807803/Comparative_Study_on_Calculating_CPU_Burst_Time_using_Different_Machine_Learning_Algorithms","translated_internal_url":"","created_at":"2024-05-22T04:27:17.328-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730468,"work_id":119807803,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154012,"email":"k***e@vit.edu","display_order":1,"name":"Kuldeep Vayadande","title":"Comparative Study on Calculating CPU Burst Time using Different Machine Learning Algorithms"},{"id":41730469,"work_id":119807803,"tagging_user_id":32919427,"tagged_user_id":240068123,"co_author_invite_id":null,"email":"n***0@vit.edu","display_order":2,"name":"Agarwal Naman","title":"Comparative Study on Calculating CPU Burst Time using Different Machine Learning Algorithms"}],"downloadable_attachments":[{"id":115145790,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145790/thumbnails/1.jpg","file_name":"326_2863_2868.pdf","download_url":"https://www.academia.edu/attachments/115145790/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Comparative_Study_on_Calculating_CPU_Bur.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145790/326_2863_2868-libre.pdf?1716378682=\u0026response-content-disposition=attachment%3B+filename%3DComparative_Study_on_Calculating_CPU_Bur.pdf\u0026Expires=1732468485\u0026Signature=SQVJsRW6wmFyw1Mss4CFsbiy0NhOebDIWPIp3QoVJeUcUeCg2ogIJa6Kzad36bhrIU1dHTlJJvz4yf22wllgnzY8je~4YKITh5dXsKhBOzwZ5PjpdQRKI4AqWETmI2GiX0qR1taccLxmOqoGsGcvfDEcHLtakBIr7PkkP42s4YVIpKC8qXk0NoLzW9nmATLU-5YR969pX15JbKInQpYjfjJvfMTWlvJ0zB3vbRcwkkarbTF3C~E64bNtl1tgq1ckWnWvp6DWJP4QbmTp6w1gCGVqruWv1wu6flm4AEH0f1A7XmhWHjpp3SZIQMLTz-i3~U9-GUEiCSRjX-BMyw4TAw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Comparative_Study_on_Calculating_CPU_Burst_Time_using_Different_Machine_Learning_Algorithms","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145790,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145790/thumbnails/1.jpg","file_name":"326_2863_2868.pdf","download_url":"https://www.academia.edu/attachments/115145790/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Comparative_Study_on_Calculating_CPU_Bur.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145790/326_2863_2868-libre.pdf?1716378682=\u0026response-content-disposition=attachment%3B+filename%3DComparative_Study_on_Calculating_CPU_Bur.pdf\u0026Expires=1732468485\u0026Signature=SQVJsRW6wmFyw1Mss4CFsbiy0NhOebDIWPIp3QoVJeUcUeCg2ogIJa6Kzad36bhrIU1dHTlJJvz4yf22wllgnzY8je~4YKITh5dXsKhBOzwZ5PjpdQRKI4AqWETmI2GiX0qR1taccLxmOqoGsGcvfDEcHLtakBIr7PkkP42s4YVIpKC8qXk0NoLzW9nmATLU-5YR969pX15JbKInQpYjfjJvfMTWlvJ0zB3vbRcwkkarbTF3C~E64bNtl1tgq1ckWnWvp6DWJP4QbmTp6w1gCGVqruWv1wu6flm4AEH0f1A7XmhWHjpp3SZIQMLTz-i3~U9-GUEiCSRjX-BMyw4TAw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807669"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807669/_Turning_Straw_into_Gold_using_Semantic_and_Big_Data_Technologies_for_Competence_Mapping"><img alt="Research paper thumbnail of "Turning Straw into Gold", using Semantic and Big Data Technologies for Competence Mapping" class="work-thumbnail" src="https://attachments.academia-assets.com/115145702/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807669/_Turning_Straw_into_Gold_using_Semantic_and_Big_Data_Technologies_for_Competence_Mapping">"Turning Straw into Gold", using Semantic and Big Data Technologies for Competence Mapping</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The unstructured nature of Big Data poses several challenges to develop representations capable o...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The unstructured nature of Big Data poses several challenges to develop representations capable of handling such data. The work presented in this paper addresses the Competence Mapping problem. Semantic technologies such as Resource Description Framework and standard ontology enrich unstructured job data and enable retrieval of semantically relevant matches, as opposed to keyword based approaches.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0bc06037c45affd2ef73f6e56516575f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145702,"asset_id":119807669,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145702/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807669"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807669"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807669; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807669]").text(description); $(".js-view-count[data-work-id=119807669]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807669; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807669']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807669, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0bc06037c45affd2ef73f6e56516575f" } } $('.js-work-strip[data-work-id=119807669]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807669,"title":"\"Turning Straw into Gold\", using Semantic and Big Data Technologies for Competence Mapping","translated_title":"","metadata":{"abstract":"The unstructured nature of Big Data poses several challenges to develop representations capable of handling such data. The work presented in this paper addresses the Competence Mapping problem. Semantic technologies such as Resource Description Framework and standard ontology enrich unstructured job data and enable retrieval of semantically relevant matches, as opposed to keyword based approaches.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"The unstructured nature of Big Data poses several challenges to develop representations capable of handling such data. The work presented in this paper addresses the Competence Mapping problem. Semantic technologies such as Resource Description Framework and standard ontology enrich unstructured job data and enable retrieval of semantically relevant matches, as opposed to keyword based approaches.","internal_url":"https://www.academia.edu/119807669/_Turning_Straw_into_Gold_using_Semantic_and_Big_Data_Technologies_for_Competence_Mapping","translated_internal_url":"","created_at":"2024-05-22T04:25:18.601-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730464,"work_id":119807669,"tagging_user_id":32919427,"tagged_user_id":123453472,"co_author_invite_id":null,"email":"m***r@git.edu","affiliation":"Visvesvaraya Technological University","display_order":1,"name":"Manjula Ramannavar","title":"\"Turning Straw into Gold\", using Semantic and Big Data Technologies for Competence Mapping"},{"id":41730465,"work_id":119807669,"tagging_user_id":32919427,"tagged_user_id":10584588,"co_author_invite_id":null,"email":"m***h@git.edu","display_order":2,"name":"Mallikarjun Math","title":"\"Turning Straw into Gold\", using Semantic and Big Data Technologies for Competence Mapping"}],"downloadable_attachments":[{"id":115145702,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145702/thumbnails/1.jpg","file_name":"326_1_2852_2862.pdf","download_url":"https://www.academia.edu/attachments/115145702/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Turning_Straw_into_Gold_using_Semantic.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145702/326_1_2852_2862-libre.pdf?1716378694=\u0026response-content-disposition=attachment%3B+filename%3DTurning_Straw_into_Gold_using_Semantic.pdf\u0026Expires=1732468485\u0026Signature=FfX-i7m2s1TeXY5I4p1AXYVlGj7rkSZlJCfrOVBCajubM5adSwjgDcErS9xoaH1rSJqBhwwZ~wKr79POBkXt3ayyJvQWRKZbwfJxniD1oqsprzT5nDliHgyR2af~iXoBtqNPDLLGUxCDr9KQEPHlQ6tb-2UFhKllNpTzO3-9x0MwmjM-RKK5YLTdoVBeIlb8h-7LY6JPfP0F6IDPMf0UN8c7CSZkTVemzvwsYoC0z6tvZM1nsN2kkzKcDrUHuwHC2HhSW8HkA-fRcvrcQIc3k-wGyj6tOokPmYPQ9NkBDKSDCQAWX4pDSBgT5A38vs69sNC6OLWWFwu9F8bQRGqCpw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"_Turning_Straw_into_Gold_using_Semantic_and_Big_Data_Technologies_for_Competence_Mapping","translated_slug":"","page_count":11,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145702,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145702/thumbnails/1.jpg","file_name":"326_1_2852_2862.pdf","download_url":"https://www.academia.edu/attachments/115145702/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Turning_Straw_into_Gold_using_Semantic.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145702/326_1_2852_2862-libre.pdf?1716378694=\u0026response-content-disposition=attachment%3B+filename%3DTurning_Straw_into_Gold_using_Semantic.pdf\u0026Expires=1732468485\u0026Signature=FfX-i7m2s1TeXY5I4p1AXYVlGj7rkSZlJCfrOVBCajubM5adSwjgDcErS9xoaH1rSJqBhwwZ~wKr79POBkXt3ayyJvQWRKZbwfJxniD1oqsprzT5nDliHgyR2af~iXoBtqNPDLLGUxCDr9KQEPHlQ6tb-2UFhKllNpTzO3-9x0MwmjM-RKK5YLTdoVBeIlb8h-7LY6JPfP0F6IDPMf0UN8c7CSZkTVemzvwsYoC0z6tvZM1nsN2kkzKcDrUHuwHC2HhSW8HkA-fRcvrcQIc3k-wGyj6tOokPmYPQ9NkBDKSDCQAWX4pDSBgT5A38vs69sNC6OLWWFwu9F8bQRGqCpw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807617"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807617/Risk_Assessment_of_Stock_Market_Analysis_using_Time_Series_Analysis"><img alt="Research paper thumbnail of Risk Assessment of Stock Market Analysis using Time Series Analysis" class="work-thumbnail" src="https://attachments.academia-assets.com/115145653/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807617/Risk_Assessment_of_Stock_Market_Analysis_using_Time_Series_Analysis">Risk Assessment of Stock Market Analysis using Time Series Analysis</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Stock market forecasting and risk assessment heavily influence investors' financial decisions. Ma...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Stock market forecasting and risk assessment heavily influence investors' financial decisions. Many depend on news announcements to judge the purchase or sale of risky stocks. Due to the complexity and ambiguity of natural languages, however, reliable modeling and risk management of stock market patterns derived from news releases is challenging. In contrast to past work in this field, which generally uses bag-of-words to extract tens of thousands of characteristics to construct a prediction model, this study employs a novel approach that extracts tens of thousands of features directly from the text itself. We present a Time Series Forecasting based method for financial/stock market prediction with risk assessment using a histology dataset. In particular, Time Series Forecasting is performed at the pre-processing stage to extract time period-related characteristics from financial news. Using the collected features, a time seriesbased metaheuristic CNN (MCNN) model is used to construct a prediction with risk assessment. Using a model based on MCNN, we hope to get better outcomes than previous methods in terms of speed and precision while minimizing risk. The performance is attributable to the time analysis performed during the pre-processing step since it decreases the feature dimensions substantially. Using the suggested method, we aim to enhance the accuracy of stock price forecasts based on a selection of data sets.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="97b24fe9628e66e66dffef2df3959f73" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145653,"asset_id":119807617,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145653/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807617"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807617"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807617; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807617]").text(description); $(".js-view-count[data-work-id=119807617]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807617; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807617']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807617, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "97b24fe9628e66e66dffef2df3959f73" } } $('.js-work-strip[data-work-id=119807617]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807617,"title":"Risk Assessment of Stock Market Analysis using Time Series Analysis","translated_title":"","metadata":{"abstract":"Stock market forecasting and risk assessment heavily influence investors' financial decisions. Many depend on news announcements to judge the purchase or sale of risky stocks. Due to the complexity and ambiguity of natural languages, however, reliable modeling and risk management of stock market patterns derived from news releases is challenging. In contrast to past work in this field, which generally uses bag-of-words to extract tens of thousands of characteristics to construct a prediction model, this study employs a novel approach that extracts tens of thousands of features directly from the text itself. We present a Time Series Forecasting based method for financial/stock market prediction with risk assessment using a histology dataset. In particular, Time Series Forecasting is performed at the pre-processing stage to extract time period-related characteristics from financial news. Using the collected features, a time seriesbased metaheuristic CNN (MCNN) model is used to construct a prediction with risk assessment. Using a model based on MCNN, we hope to get better outcomes than previous methods in terms of speed and precision while minimizing risk. The performance is attributable to the time analysis performed during the pre-processing step since it decreases the feature dimensions substantially. Using the suggested method, we aim to enhance the accuracy of stock price forecasts based on a selection of data sets.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Stock market forecasting and risk assessment heavily influence investors' financial decisions. Many depend on news announcements to judge the purchase or sale of risky stocks. Due to the complexity and ambiguity of natural languages, however, reliable modeling and risk management of stock market patterns derived from news releases is challenging. In contrast to past work in this field, which generally uses bag-of-words to extract tens of thousands of characteristics to construct a prediction model, this study employs a novel approach that extracts tens of thousands of features directly from the text itself. We present a Time Series Forecasting based method for financial/stock market prediction with risk assessment using a histology dataset. In particular, Time Series Forecasting is performed at the pre-processing stage to extract time period-related characteristics from financial news. Using the collected features, a time seriesbased metaheuristic CNN (MCNN) model is used to construct a prediction with risk assessment. Using a model based on MCNN, we hope to get better outcomes than previous methods in terms of speed and precision while minimizing risk. The performance is attributable to the time analysis performed during the pre-processing step since it decreases the feature dimensions substantially. Using the suggested method, we aim to enhance the accuracy of stock price forecasts based on a selection of data sets.","internal_url":"https://www.academia.edu/119807617/Risk_Assessment_of_Stock_Market_Analysis_using_Time_Series_Analysis","translated_internal_url":"","created_at":"2024-05-22T04:23:41.442-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730445,"work_id":119807617,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154009,"email":"s***2@gmail.com","display_order":1,"name":"Sayem Patni","title":"Risk Assessment of Stock Market Analysis using Time Series Analysis"},{"id":41730446,"work_id":119807617,"tagging_user_id":32919427,"tagged_user_id":233740102,"co_author_invite_id":null,"email":"a***r@sandipuniversity.edu.in","display_order":2,"name":"Amit Gadekar","title":"Risk Assessment of Stock Market Analysis using Time Series Analysis"}],"downloadable_attachments":[{"id":115145653,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145653/thumbnails/1.jpg","file_name":"325_2847_2851.pdf","download_url":"https://www.academia.edu/attachments/115145653/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Risk_Assessment_of_Stock_Market_Analysis.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145653/325_2847_2851-libre.pdf?1716378696=\u0026response-content-disposition=attachment%3B+filename%3DRisk_Assessment_of_Stock_Market_Analysis.pdf\u0026Expires=1732468485\u0026Signature=bXg-br~kTT~LDPJYBJ7jeeQc2CGFnTbkBI8l15AoaqcWToAKuzI2xVQf3pURuWjbqg3Nfnl-n760IOR9xW2L6zW00VNwu5IiOzk35wOtqALmPM~0lJXOqLJFaLZGh1KbGh20-jbEJOobjzWkGltrK4EwmbtEiThtIQ6qxSqhVzQbGlrEuuMfc~YaOsCr4TnF3E-Dps8eqd9oG0tMNdd2wVIlxFKmZR9uD-WnyTAiZuiVZ~HX29XHjrvFO~SyxRO9xZ3ouvFq8AxyLOTjlC2440NMfgkq8jOEyKDKRwc8o9OvzuTxdIFCXN-P7jenut24uPQaG6b1pwOKScmNKS7Fsg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Risk_Assessment_of_Stock_Market_Analysis_using_Time_Series_Analysis","translated_slug":"","page_count":5,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145653,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145653/thumbnails/1.jpg","file_name":"325_2847_2851.pdf","download_url":"https://www.academia.edu/attachments/115145653/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Risk_Assessment_of_Stock_Market_Analysis.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145653/325_2847_2851-libre.pdf?1716378696=\u0026response-content-disposition=attachment%3B+filename%3DRisk_Assessment_of_Stock_Market_Analysis.pdf\u0026Expires=1732468485\u0026Signature=bXg-br~kTT~LDPJYBJ7jeeQc2CGFnTbkBI8l15AoaqcWToAKuzI2xVQf3pURuWjbqg3Nfnl-n760IOR9xW2L6zW00VNwu5IiOzk35wOtqALmPM~0lJXOqLJFaLZGh1KbGh20-jbEJOobjzWkGltrK4EwmbtEiThtIQ6qxSqhVzQbGlrEuuMfc~YaOsCr4TnF3E-Dps8eqd9oG0tMNdd2wVIlxFKmZR9uD-WnyTAiZuiVZ~HX29XHjrvFO~SyxRO9xZ3ouvFq8AxyLOTjlC2440NMfgkq8jOEyKDKRwc8o9OvzuTxdIFCXN-P7jenut24uPQaG6b1pwOKScmNKS7Fsg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807472"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807472/A_Study_on_Various_Sentiment_Analysis_for_Mixed_Transliterated_Indigenous_Language_using_Machine_Learning_Algorithms"><img alt="Research paper thumbnail of A Study on Various Sentiment Analysis for Mixed Transliterated Indigenous Language using Machine Learning Algorithms" class="work-thumbnail" src="https://attachments.academia-assets.com/115145567/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807472/A_Study_on_Various_Sentiment_Analysis_for_Mixed_Transliterated_Indigenous_Language_using_Machine_Learning_Algorithms">A Study on Various Sentiment Analysis for Mixed Transliterated Indigenous Language using Machine Learning Algorithms</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The evolution of Information Technology has led to the collection of large amounts of data, the v...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The evolution of Information Technology has led to the collection of large amounts of data, the volume of which has increased to the extent that in the last two years the data produced is greater than all the data ever recorded in human history. This has necessitated the use of machines to understand, interpret and apply data, without manual involvement. Sentiment Analysis has become the area of deep research due to the necessity wrought about by the advent of social media tools such as Twitter, Facebook, WhatsApp, and so on. In this survey, we will analyze 25 literature works concentrating on machine learning approaches associated with sentiment analysis for mixed transliterated languages, bringing into light the various shortcomings of the existing methodologies. Here, the analysis of various methods will be facilitated based on several factors, such as performance metrics, year of publication and journals, achievements of the techniques in numerical evaluations, and so on. On the other hand, the analysis of the methods with respect to the merits and demerits of the methods will be presented. Lastly, the paper discusses the potential future research directions and challenges in achieving better accuracy for sentiment analysis. The motivation of the research will be described in detail through the comparative discussion of the methods.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="367f5165c15428e8f34976a7c139d31b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145567,"asset_id":119807472,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145567/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807472"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807472"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807472; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807472]").text(description); $(".js-view-count[data-work-id=119807472]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807472; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807472']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807472, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "367f5165c15428e8f34976a7c139d31b" } } $('.js-work-strip[data-work-id=119807472]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807472,"title":"A Study on Various Sentiment Analysis for Mixed Transliterated Indigenous Language using Machine Learning Algorithms","translated_title":"","metadata":{"abstract":"The evolution of Information Technology has led to the collection of large amounts of data, the volume of which has increased to the extent that in the last two years the data produced is greater than all the data ever recorded in human history. This has necessitated the use of machines to understand, interpret and apply data, without manual involvement. Sentiment Analysis has become the area of deep research due to the necessity wrought about by the advent of social media tools such as Twitter, Facebook, WhatsApp, and so on. In this survey, we will analyze 25 literature works concentrating on machine learning approaches associated with sentiment analysis for mixed transliterated languages, bringing into light the various shortcomings of the existing methodologies. Here, the analysis of various methods will be facilitated based on several factors, such as performance metrics, year of publication and journals, achievements of the techniques in numerical evaluations, and so on. On the other hand, the analysis of the methods with respect to the merits and demerits of the methods will be presented. Lastly, the paper discusses the potential future research directions and challenges in achieving better accuracy for sentiment analysis. The motivation of the research will be described in detail through the comparative discussion of the methods.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"The evolution of Information Technology has led to the collection of large amounts of data, the volume of which has increased to the extent that in the last two years the data produced is greater than all the data ever recorded in human history. This has necessitated the use of machines to understand, interpret and apply data, without manual involvement. Sentiment Analysis has become the area of deep research due to the necessity wrought about by the advent of social media tools such as Twitter, Facebook, WhatsApp, and so on. In this survey, we will analyze 25 literature works concentrating on machine learning approaches associated with sentiment analysis for mixed transliterated languages, bringing into light the various shortcomings of the existing methodologies. Here, the analysis of various methods will be facilitated based on several factors, such as performance metrics, year of publication and journals, achievements of the techniques in numerical evaluations, and so on. On the other hand, the analysis of the methods with respect to the merits and demerits of the methods will be presented. Lastly, the paper discusses the potential future research directions and challenges in achieving better accuracy for sentiment analysis. The motivation of the research will be described in detail through the comparative discussion of the methods.","internal_url":"https://www.academia.edu/119807472/A_Study_on_Various_Sentiment_Analysis_for_Mixed_Transliterated_Indigenous_Language_using_Machine_Learning_Algorithms","translated_internal_url":"","created_at":"2024-05-22T04:21:44.985-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[],"downloadable_attachments":[{"id":115145567,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145567/thumbnails/1.jpg","file_name":"324_1_2838_2846.pdf","download_url":"https://www.academia.edu/attachments/115145567/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Study_on_Various_Sentiment_Analysis_fo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145567/324_1_2838_2846-libre.pdf?1716378705=\u0026response-content-disposition=attachment%3B+filename%3DA_Study_on_Various_Sentiment_Analysis_fo.pdf\u0026Expires=1732468486\u0026Signature=VF5M1u1Y9106Encb-4bZeFE2kIu7BhTuaEt1GmSdSeSx1E3OK34P4Hjj7BleVSMBSJURBC4v73Ka5tFj5---ID4Cfwxl8XkOWbPcHvwTZsd7JtodYuIcsIHfe87f~JIg-MHvTrefBd00~XWVIZ~EDCiciCbH8dvs7lm7HMZhNmG4f4a6mju9eol35~~nkFFOZtCO1lB~Sctp6axoKyLbVEElawv6S-ZCrFvNC1MlictkezMDr6EBKNPpM1XK8rGI7FBsePBRiWJzLhqYIy5PT477RsWQRRpxSxNF7tsTHGMHVwNG7HlhYhsoARsIE4Nm1f4WLuxyoUz6RXddGReM7g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Study_on_Various_Sentiment_Analysis_for_Mixed_Transliterated_Indigenous_Language_using_Machine_Learning_Algorithms","translated_slug":"","page_count":9,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145567,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145567/thumbnails/1.jpg","file_name":"324_1_2838_2846.pdf","download_url":"https://www.academia.edu/attachments/115145567/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Study_on_Various_Sentiment_Analysis_fo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145567/324_1_2838_2846-libre.pdf?1716378705=\u0026response-content-disposition=attachment%3B+filename%3DA_Study_on_Various_Sentiment_Analysis_fo.pdf\u0026Expires=1732468486\u0026Signature=VF5M1u1Y9106Encb-4bZeFE2kIu7BhTuaEt1GmSdSeSx1E3OK34P4Hjj7BleVSMBSJURBC4v73Ka5tFj5---ID4Cfwxl8XkOWbPcHvwTZsd7JtodYuIcsIHfe87f~JIg-MHvTrefBd00~XWVIZ~EDCiciCbH8dvs7lm7HMZhNmG4f4a6mju9eol35~~nkFFOZtCO1lB~Sctp6axoKyLbVEElawv6S-ZCrFvNC1MlictkezMDr6EBKNPpM1XK8rGI7FBsePBRiWJzLhqYIy5PT477RsWQRRpxSxNF7tsTHGMHVwNG7HlhYhsoARsIE4Nm1f4WLuxyoUz6RXddGReM7g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807397"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807397/Hybrid_Ensemble_based_Feature_Engineering_for_Detecting_Direct_DDOS_Flooding_Attack_in_Cloud"><img alt="Research paper thumbnail of Hybrid Ensemble based Feature Engineering for Detecting Direct DDOS Flooding Attack in Cloud" class="work-thumbnail" src="https://attachments.academia-assets.com/115145481/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807397/Hybrid_Ensemble_based_Feature_Engineering_for_Detecting_Direct_DDOS_Flooding_Attack_in_Cloud">Hybrid Ensemble based Feature Engineering for Detecting Direct DDOS Flooding Attack in Cloud</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In recent years, both the general public and commercial enterprises have grown more and more inte...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In recent years, both the general public and commercial enterprises have grown more and more interested in using cloud services. The majority of businesses use cloud computing technologies for production operations, which draws hackers. Nowadays, one of the most popular methods used to obstruct the availability of essential internet services is Distributed Denial of Service (DDoS) floods. These attacks either totally destroy the victim or overload it with a massive amount of traffic that prevents it from carrying out normal communication. The cloud's services are fully suspended if there are any delays in identifying flooding attacks. A preprocessing stage in cloud DDoS attack defence known as feature engineering has been recognized as having the potential to improve classification accuracy and lower computing complexity. In this article, we suggest a DDoS intrusion detection system for use in cloud environments. The application of filter and wrapper-based feature selection techniques along with machine learning is proposed as a hybrid ensemble-based feature engineering strategy. The benchmark dataset, which fills in the gaps in the current datasets and comprises a wide range of direct DDoS flooding attacks, is used to assess the model. To prevent data overfitting issues, area-user-curve analysis is also assessed. When compared to previous benchmarking techniques, the evaluation and findings revealed a considerable improvement in attack detection. This framework offers a high detection rate and classification accuracy when contrasted with the existing framework. Hence, it is more suitable for protecting the cloud.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="797712078080e32df95d10a87f475141" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145481,"asset_id":119807397,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145481/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807397"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807397"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807397; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807397]").text(description); $(".js-view-count[data-work-id=119807397]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807397; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807397']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807397, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "797712078080e32df95d10a87f475141" } } $('.js-work-strip[data-work-id=119807397]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807397,"title":"Hybrid Ensemble based Feature Engineering for Detecting Direct DDOS Flooding Attack in Cloud","translated_title":"","metadata":{"abstract":"In recent years, both the general public and commercial enterprises have grown more and more interested in using cloud services. The majority of businesses use cloud computing technologies for production operations, which draws hackers. Nowadays, one of the most popular methods used to obstruct the availability of essential internet services is Distributed Denial of Service (DDoS) floods. These attacks either totally destroy the victim or overload it with a massive amount of traffic that prevents it from carrying out normal communication. The cloud's services are fully suspended if there are any delays in identifying flooding attacks. A preprocessing stage in cloud DDoS attack defence known as feature engineering has been recognized as having the potential to improve classification accuracy and lower computing complexity. In this article, we suggest a DDoS intrusion detection system for use in cloud environments. The application of filter and wrapper-based feature selection techniques along with machine learning is proposed as a hybrid ensemble-based feature engineering strategy. The benchmark dataset, which fills in the gaps in the current datasets and comprises a wide range of direct DDoS flooding attacks, is used to assess the model. To prevent data overfitting issues, area-user-curve analysis is also assessed. When compared to previous benchmarking techniques, the evaluation and findings revealed a considerable improvement in attack detection. This framework offers a high detection rate and classification accuracy when contrasted with the existing framework. Hence, it is more suitable for protecting the cloud.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"In recent years, both the general public and commercial enterprises have grown more and more interested in using cloud services. The majority of businesses use cloud computing technologies for production operations, which draws hackers. Nowadays, one of the most popular methods used to obstruct the availability of essential internet services is Distributed Denial of Service (DDoS) floods. These attacks either totally destroy the victim or overload it with a massive amount of traffic that prevents it from carrying out normal communication. The cloud's services are fully suspended if there are any delays in identifying flooding attacks. A preprocessing stage in cloud DDoS attack defence known as feature engineering has been recognized as having the potential to improve classification accuracy and lower computing complexity. In this article, we suggest a DDoS intrusion detection system for use in cloud environments. The application of filter and wrapper-based feature selection techniques along with machine learning is proposed as a hybrid ensemble-based feature engineering strategy. The benchmark dataset, which fills in the gaps in the current datasets and comprises a wide range of direct DDoS flooding attacks, is used to assess the model. To prevent data overfitting issues, area-user-curve analysis is also assessed. When compared to previous benchmarking techniques, the evaluation and findings revealed a considerable improvement in attack detection. This framework offers a high detection rate and classification accuracy when contrasted with the existing framework. Hence, it is more suitable for protecting the cloud.","internal_url":"https://www.academia.edu/119807397/Hybrid_Ensemble_based_Feature_Engineering_for_Detecting_Direct_DDOS_Flooding_Attack_in_Cloud","translated_internal_url":"","created_at":"2024-05-22T04:18:08.294-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730375,"work_id":119807397,"tagging_user_id":32919427,"tagged_user_id":135736264,"co_author_invite_id":null,"email":"k***m@gmail.com","display_order":1,"name":"Kalaivani Marappan","title":"Hybrid Ensemble based Feature Engineering for Detecting Direct DDOS Flooding Attack in Cloud"}],"downloadable_attachments":[{"id":115145481,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145481/thumbnails/1.jpg","file_name":"323_2_2829_2837.pdf","download_url":"https://www.academia.edu/attachments/115145481/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hybrid_Ensemble_based_Feature_Engineerin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145481/323_2_2829_2837-libre.pdf?1716378717=\u0026response-content-disposition=attachment%3B+filename%3DHybrid_Ensemble_based_Feature_Engineerin.pdf\u0026Expires=1732468486\u0026Signature=gc~~mz--kdF6axB4lNllji9quNL6-U6sj8EeON68NGreQ7pLdi8ZEM3R6QA67SgYNB088vXlUP~xz6kk8x7yQ-uMarMlq-3MGp9c~OFVRq-IycvhbHP3Hn5nO3sVOMe3ofd7jCliZe2qf0rvVoXrMeEKHcUj7FPPNlNU5FpB6CI3L8~S~cnBLvhdQ6DAjWhqCtHYkOtzc6ZLDFrh4DE3BF9w~~ebGk0Vc5ykZJdMgVphrhVcDmmbTzcwGnifK3K-vjKdZF0~a9KvzsNs~Ia93gQiCMFwISFcNB6SZQpnuLd1PNOThaZXMgYSsP6FHy6M-dNOA82aX5~4Ls12A-6gyA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Hybrid_Ensemble_based_Feature_Engineering_for_Detecting_Direct_DDOS_Flooding_Attack_in_Cloud","translated_slug":"","page_count":9,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145481,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145481/thumbnails/1.jpg","file_name":"323_2_2829_2837.pdf","download_url":"https://www.academia.edu/attachments/115145481/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hybrid_Ensemble_based_Feature_Engineerin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145481/323_2_2829_2837-libre.pdf?1716378717=\u0026response-content-disposition=attachment%3B+filename%3DHybrid_Ensemble_based_Feature_Engineerin.pdf\u0026Expires=1732468486\u0026Signature=gc~~mz--kdF6axB4lNllji9quNL6-U6sj8EeON68NGreQ7pLdi8ZEM3R6QA67SgYNB088vXlUP~xz6kk8x7yQ-uMarMlq-3MGp9c~OFVRq-IycvhbHP3Hn5nO3sVOMe3ofd7jCliZe2qf0rvVoXrMeEKHcUj7FPPNlNU5FpB6CI3L8~S~cnBLvhdQ6DAjWhqCtHYkOtzc6ZLDFrh4DE3BF9w~~ebGk0Vc5ykZJdMgVphrhVcDmmbTzcwGnifK3K-vjKdZF0~a9KvzsNs~Ia93gQiCMFwISFcNB6SZQpnuLd1PNOThaZXMgYSsP6FHy6M-dNOA82aX5~4Ls12A-6gyA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807200"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807200/A_Neural_Attention_Models_Survey_for_Deep_Learning"><img alt="Research paper thumbnail of A Neural Attention Models Survey for Deep Learning" class="work-thumbnail" src="https://attachments.academia-assets.com/115145372/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807200/A_Neural_Attention_Models_Survey_for_Deep_Learning">A Neural Attention Models Survey for Deep Learning</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Attention is a fundamental component of all perceptual and cognitive processes in humans.This mec...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Attention is a fundamental component of all perceptual and cognitive processes in humans.This mechanism select, modify, and concentrate on the information that is most important to behaviour because of our limited capacity to interpret competing sources. For many years, researchers in the fields of philosophy, psychology, neuroscience, and computing have examined the notions and functions of attention.This characteristic has been thoroughly investigated in deep neural networks over the past six years. In many application domains, neural attention models currently represent the cutting edge of deep learning. A thorough overview and analysis of recent advancements in neural attention models are provided in this survey. In order to identify and examine the architectures where attention has had a notable impact, we thoroughly reviewed hundreds of them in the region. Additionally, we created and made available an automated approach to aid in the growth of reviews in the field. We discuss the main applications of attention in convolutional, recurrent networks, and generative models. We also identify common subgroups of uses and applications. Additionally, we discuss the effects of attention across various application areas and how they affect.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="b9f23f976fec434bb4cfb3e3f5bd48ef" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145372,"asset_id":119807200,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145372/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807200"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807200"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807200; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807200]").text(description); $(".js-view-count[data-work-id=119807200]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807200; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807200']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807200, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "b9f23f976fec434bb4cfb3e3f5bd48ef" } } $('.js-work-strip[data-work-id=119807200]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807200,"title":"A Neural Attention Models Survey for Deep Learning","translated_title":"","metadata":{"abstract":"Attention is a fundamental component of all perceptual and cognitive processes in humans.This mechanism select, modify, and concentrate on the information that is most important to behaviour because of our limited capacity to interpret competing sources. For many years, researchers in the fields of philosophy, psychology, neuroscience, and computing have examined the notions and functions of attention.This characteristic has been thoroughly investigated in deep neural networks over the past six years. In many application domains, neural attention models currently represent the cutting edge of deep learning. A thorough overview and analysis of recent advancements in neural attention models are provided in this survey. In order to identify and examine the architectures where attention has had a notable impact, we thoroughly reviewed hundreds of them in the region. Additionally, we created and made available an automated approach to aid in the growth of reviews in the field. We discuss the main applications of attention in convolutional, recurrent networks, and generative models. We also identify common subgroups of uses and applications. Additionally, we discuss the effects of attention across various application areas and how they affect.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Attention is a fundamental component of all perceptual and cognitive processes in humans.This mechanism select, modify, and concentrate on the information that is most important to behaviour because of our limited capacity to interpret competing sources. For many years, researchers in the fields of philosophy, psychology, neuroscience, and computing have examined the notions and functions of attention.This characteristic has been thoroughly investigated in deep neural networks over the past six years. In many application domains, neural attention models currently represent the cutting edge of deep learning. A thorough overview and analysis of recent advancements in neural attention models are provided in this survey. In order to identify and examine the architectures where attention has had a notable impact, we thoroughly reviewed hundreds of them in the region. Additionally, we created and made available an automated approach to aid in the growth of reviews in the field. We discuss the main applications of attention in convolutional, recurrent networks, and generative models. We also identify common subgroups of uses and applications. Additionally, we discuss the effects of attention across various application areas and how they affect.","internal_url":"https://www.academia.edu/119807200/A_Neural_Attention_Models_Survey_for_Deep_Learning","translated_internal_url":"","created_at":"2024-05-22T04:15:35.456-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730347,"work_id":119807200,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8153997,"email":"p***u@giet.edu","display_order":1,"name":"Padma Sahu","title":"A Neural Attention Models Survey for Deep Learning"},{"id":41730348,"work_id":119807200,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8153998,"email":"s***n@giet.edu","display_order":2,"name":"Subhrajit Pradhan","title":"A Neural Attention Models Survey for Deep Learning"},{"id":41730349,"work_id":119807200,"tagging_user_id":32919427,"tagged_user_id":35789232,"co_author_invite_id":null,"email":"r***h@gmail.com","display_order":3,"name":"Ratnakar Dash","title":"A Neural Attention Models Survey for Deep Learning"}],"downloadable_attachments":[{"id":115145372,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145372/thumbnails/1.jpg","file_name":"323_1_2821_2828.pdf","download_url":"https://www.academia.edu/attachments/115145372/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Neural_Attention_Models_Survey_for_Dee.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145372/323_1_2821_2828-libre.pdf?1716378726=\u0026response-content-disposition=attachment%3B+filename%3DA_Neural_Attention_Models_Survey_for_Dee.pdf\u0026Expires=1732468486\u0026Signature=TIXFpYSul7hjbdsilQit-DtBN3JKKhJJUe-Bz51qs7DWaG2f31-lts4bQpAwfg~lpHby15O~7SvZltJNbw0nRJT2OUO~HKdJAU7bjYnuPylnNg55HicGS7Z3Y0kaAANMF3jknSqggSKnxKi0khkjRv1-Ss0wlYUEcXh7kBtsw0IQiOnjQL23T8kAQ98UGAUBjeEe7oVSn7-vVIYSXbkCc9fJYu7l0FA7658Wx9fNvpFxVkE~xpQsyrJ4CUQULcnsvPI1SnT~9CwU9X404Ugtnjuytdj00KXyG6~wjYODXmsyH9~S7nXFnRs6R4lU0~9Ui01tUARQgQ~qoE1OxDm-zA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Neural_Attention_Models_Survey_for_Deep_Learning","translated_slug":"","page_count":8,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145372,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145372/thumbnails/1.jpg","file_name":"323_1_2821_2828.pdf","download_url":"https://www.academia.edu/attachments/115145372/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Neural_Attention_Models_Survey_for_Dee.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145372/323_1_2821_2828-libre.pdf?1716378726=\u0026response-content-disposition=attachment%3B+filename%3DA_Neural_Attention_Models_Survey_for_Dee.pdf\u0026Expires=1732468486\u0026Signature=TIXFpYSul7hjbdsilQit-DtBN3JKKhJJUe-Bz51qs7DWaG2f31-lts4bQpAwfg~lpHby15O~7SvZltJNbw0nRJT2OUO~HKdJAU7bjYnuPylnNg55HicGS7Z3Y0kaAANMF3jknSqggSKnxKi0khkjRv1-Ss0wlYUEcXh7kBtsw0IQiOnjQL23T8kAQ98UGAUBjeEe7oVSn7-vVIYSXbkCc9fJYu7l0FA7658Wx9fNvpFxVkE~xpQsyrJ4CUQULcnsvPI1SnT~9CwU9X404Ugtnjuytdj00KXyG6~wjYODXmsyH9~S7nXFnRs6R4lU0~9Ui01tUARQgQ~qoE1OxDm-zA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807145"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807145/Hand_Gesture_Recognition_An_Approach_of_Multiple_Object_Tracking"><img alt="Research paper thumbnail of Hand Gesture Recognition: An Approach of Multiple Object Tracking" class="work-thumbnail" src="https://attachments.academia-assets.com/115145306/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807145/Hand_Gesture_Recognition_An_Approach_of_Multiple_Object_Tracking">Hand Gesture Recognition: An Approach of Multiple Object Tracking</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In the recent year, Object Detection and Tracking technology is one of the challenging and most e...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In the recent year, Object Detection and Tracking technology is one of the<br />challenging and most emerging topic in Computer Vision. Multiple Object Tracking &<br />Detection (MOTD) has gained a lot of importance in various fields such as Autonomous driving,<br />Monitoring security, Surveillance, Health-care monitoring and Gesture recognition etc. Gesture<br />recognition is widely used in various fields of intelligent driving, Virtual reality, and Humancomputer<br />interaction. With the development in various technologies such as Deep Learning,<br />Artificial Intelligence and Human-Computer interaction a new revolution arise in field of<br />computer vision. We endeavor to provide a thorough review on the development of this gesture<br />recognition approach in recent decades. Here our major discussions are about the benefits and<br />limitations of existing approach where focus is on the method of feature extraction in<br />spatiotemporal structure .Various research difficulties that could be pursued will be the<br />research directions.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0640859bf601f1d773185cb92389d774" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145306,"asset_id":119807145,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145306/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807145"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807145"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807145; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807145]").text(description); $(".js-view-count[data-work-id=119807145]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807145; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807145']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807145, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0640859bf601f1d773185cb92389d774" } } $('.js-work-strip[data-work-id=119807145]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807145,"title":"Hand Gesture Recognition: An Approach of Multiple Object Tracking","translated_title":"","metadata":{"abstract":"In the recent year, Object Detection and Tracking technology is one of the\nchallenging and most emerging topic in Computer Vision. Multiple Object Tracking \u0026\nDetection (MOTD) has gained a lot of importance in various fields such as Autonomous driving,\nMonitoring security, Surveillance, Health-care monitoring and Gesture recognition etc. Gesture\nrecognition is widely used in various fields of intelligent driving, Virtual reality, and Humancomputer\ninteraction. With the development in various technologies such as Deep Learning,\nArtificial Intelligence and Human-Computer interaction a new revolution arise in field of\ncomputer vision. We endeavor to provide a thorough review on the development of this gesture\nrecognition approach in recent decades. Here our major discussions are about the benefits and\nlimitations of existing approach where focus is on the method of feature extraction in\nspatiotemporal structure .Various research difficulties that could be pursued will be the\nresearch directions.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"In the recent year, Object Detection and Tracking technology is one of the\nchallenging and most emerging topic in Computer Vision. Multiple Object Tracking \u0026\nDetection (MOTD) has gained a lot of importance in various fields such as Autonomous driving,\nMonitoring security, Surveillance, Health-care monitoring and Gesture recognition etc. Gesture\nrecognition is widely used in various fields of intelligent driving, Virtual reality, and Humancomputer\ninteraction. With the development in various technologies such as Deep Learning,\nArtificial Intelligence and Human-Computer interaction a new revolution arise in field of\ncomputer vision. We endeavor to provide a thorough review on the development of this gesture\nrecognition approach in recent decades. Here our major discussions are about the benefits and\nlimitations of existing approach where focus is on the method of feature extraction in\nspatiotemporal structure .Various research difficulties that could be pursued will be the\nresearch directions.","internal_url":"https://www.academia.edu/119807145/Hand_Gesture_Recognition_An_Approach_of_Multiple_Object_Tracking","translated_internal_url":"","created_at":"2024-05-22T04:12:39.916-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[],"downloadable_attachments":[{"id":115145306,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145306/thumbnails/1.jpg","file_name":"322_1_2817_2820.pdf","download_url":"https://www.academia.edu/attachments/115145306/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hand_Gesture_Recognition_An_Approach_of.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145306/322_1_2817_2820-libre.pdf?1716378729=\u0026response-content-disposition=attachment%3B+filename%3DHand_Gesture_Recognition_An_Approach_of.pdf\u0026Expires=1732468486\u0026Signature=GwF7CrNNT9LwjEiprVgrDdN6gPsB38YJshi8vvFUKC~4440cwhM9G3-8kwIi7-b63t2nybC2vGm7ND9R5Vep4kYaNwcKTfymKWTST3TzxAykmDhb1ee1Ur~RHrthAYVkkj6xj7wSzHzzjdkQcTVEFmAjWvlLrcFsXBuVUysdi0nvONxfMvz5qvnMmUgpz1nN0Mc4JV0uFYZvBSl6ab7Pu3fCTmRSDpJKVL-Wi97V1J09S3doPEmhMfme8A08AGFyyPJ7HuTFCJp6MP0qhsNCfOhJWInyD0dhtq6EgtEGndZLjrFArBZfHeuTQFvAavpH0q1Rof97OpKK9xIRzSfaNQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Hand_Gesture_Recognition_An_Approach_of_Multiple_Object_Tracking","translated_slug":"","page_count":4,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145306,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145306/thumbnails/1.jpg","file_name":"322_1_2817_2820.pdf","download_url":"https://www.academia.edu/attachments/115145306/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hand_Gesture_Recognition_An_Approach_of.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145306/322_1_2817_2820-libre.pdf?1716378729=\u0026response-content-disposition=attachment%3B+filename%3DHand_Gesture_Recognition_An_Approach_of.pdf\u0026Expires=1732468486\u0026Signature=GwF7CrNNT9LwjEiprVgrDdN6gPsB38YJshi8vvFUKC~4440cwhM9G3-8kwIi7-b63t2nybC2vGm7ND9R5Vep4kYaNwcKTfymKWTST3TzxAykmDhb1ee1Ur~RHrthAYVkkj6xj7wSzHzzjdkQcTVEFmAjWvlLrcFsXBuVUysdi0nvONxfMvz5qvnMmUgpz1nN0Mc4JV0uFYZvBSl6ab7Pu3fCTmRSDpJKVL-Wi97V1J09S3doPEmhMfme8A08AGFyyPJ7HuTFCJp6MP0qhsNCfOhJWInyD0dhtq6EgtEGndZLjrFArBZfHeuTQFvAavpH0q1Rof97OpKK9xIRzSfaNQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="8020084" id="conferencepresentations"><div class="js-work-strip profile--work_container" data-work-id="119809427"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119809427/Detection_of_Cataract_and_its_Level_based_on_Deep_Learning_using_Mobile_Application"><img alt="Research paper thumbnail of Detection of Cataract and its Level based on Deep Learning using Mobile Application" class="work-thumbnail" src="https://attachments.academia-assets.com/115146963/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119809427/Detection_of_Cataract_and_its_Level_based_on_Deep_Learning_using_Mobile_Application">Detection of Cataract and its Level based on Deep Learning using Mobile Application</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The human eye has a natural lens that refracts the incoming light rays to help us see objects. Ca...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The human eye has a natural lens that refracts the incoming light rays to help us see<br />objects. Cataracts could be the reason why the eye's natural lens becomes cloudy. When<br />proteins in the lens start breaking down, causing cataracts, objects may appear cloudy, fuzzy,<br />or even less colorful. If Cataract is not identified and treated in the early stages, it could lead to<br />complete blindness of the eye. It is mainly observed in older age groups than the younger age<br />group, however, there are cases witnessed even in young people. We are creating a mobile<br />application using AI and deep learning that can detect the existence of cataracts to help with<br />the scarcity of ophthalmologists. With this application, patients can use their smartphones to<br />click the photograph of a patient's eye and feed the data into this AI-based system that is<br />developed using deep learning technologies. The model then determines whether the eye has a<br />nuclear sclerotic, cortical, or posterior subcapsular. The effect of this system will result in far<br />improvement in the delivery of public services, diagnosis and treatment, prioritization of<br />patients, and ultimately, the prevention of blindness. This system will demonstrate encouraging<br />outcomes.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="25ad16a68e270905b894c7c210455887" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146963,"asset_id":119809427,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146963/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119809427"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119809427"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119809427; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119809427]").text(description); $(".js-view-count[data-work-id=119809427]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119809427; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119809427']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119809427, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "25ad16a68e270905b894c7c210455887" } } $('.js-work-strip[data-work-id=119809427]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119809427,"title":"Detection of Cataract and its Level based on Deep Learning using Mobile Application","translated_title":"","metadata":{"abstract":"The human eye has a natural lens that refracts the incoming light rays to help us see\nobjects. Cataracts could be the reason why the eye's natural lens becomes cloudy. When\nproteins in the lens start breaking down, causing cataracts, objects may appear cloudy, fuzzy,\nor even less colorful. If Cataract is not identified and treated in the early stages, it could lead to\ncomplete blindness of the eye. It is mainly observed in older age groups than the younger age\ngroup, however, there are cases witnessed even in young people. We are creating a mobile\napplication using AI and deep learning that can detect the existence of cataracts to help with\nthe scarcity of ophthalmologists. With this application, patients can use their smartphones to\nclick the photograph of a patient's eye and feed the data into this AI-based system that is\ndeveloped using deep learning technologies. The model then determines whether the eye has a\nnuclear sclerotic, cortical, or posterior subcapsular. The effect of this system will result in far\nimprovement in the delivery of public services, diagnosis and treatment, prioritization of\npatients, and ultimately, the prevention of blindness. This system will demonstrate encouraging\noutcomes.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"The human eye has a natural lens that refracts the incoming light rays to help us see\nobjects. Cataracts could be the reason why the eye's natural lens becomes cloudy. When\nproteins in the lens start breaking down, causing cataracts, objects may appear cloudy, fuzzy,\nor even less colorful. If Cataract is not identified and treated in the early stages, it could lead to\ncomplete blindness of the eye. It is mainly observed in older age groups than the younger age\ngroup, however, there are cases witnessed even in young people. We are creating a mobile\napplication using AI and deep learning that can detect the existence of cataracts to help with\nthe scarcity of ophthalmologists. With this application, patients can use their smartphones to\nclick the photograph of a patient's eye and feed the data into this AI-based system that is\ndeveloped using deep learning technologies. The model then determines whether the eye has a\nnuclear sclerotic, cortical, or posterior subcapsular. The effect of this system will result in far\nimprovement in the delivery of public services, diagnosis and treatment, prioritization of\npatients, and ultimately, the prevention of blindness. This system will demonstrate encouraging\noutcomes.","internal_url":"https://www.academia.edu/119809427/Detection_of_Cataract_and_its_Level_based_on_Deep_Learning_using_Mobile_Application","translated_internal_url":"","created_at":"2024-05-22T04:53:33.263-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[],"downloadable_attachments":[{"id":115146963,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146963/thumbnails/1.jpg","file_name":"512_3_2946_2951.pdf","download_url":"https://www.academia.edu/attachments/115146963/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Detection_of_Cataract_and_its_Level_base.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146963/512_3_2946_2951-libre.pdf?1716382652=\u0026response-content-disposition=attachment%3B+filename%3DDetection_of_Cataract_and_its_Level_base.pdf\u0026Expires=1732468482\u0026Signature=K6osJCGXTPHM732OikSDLpvfgdaFmlS1XW909wCD8Cr3VfIdUgFroxmgf-f-Mlior3lDP2OQc0peHCyIvFn2yNby7pmQ~uGuBe4NUlPcIzh9-QnfHBd~bG1CdSeU8eAhGgK~r257HHbUXDR-cjq9WaJJCkdLBs8nc~NQ0V-jSEe396ihllRLGKBFW7wDg~vZjbzgoE16813hk7vzvCjXI~AlG76mRYqOc3n3-RvPlbDCN9deTADvuZ9MryIvAL8DJTw16LOMAEbPo-XfN2aQm0lb3N8bziscDjDFP-WWb9KvfWbjrA8v5TxuQF82-D-~-wzPRajqnAgf9mFtN-e1Jg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Detection_of_Cataract_and_its_Level_based_on_Deep_Learning_using_Mobile_Application","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146963,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146963/thumbnails/1.jpg","file_name":"512_3_2946_2951.pdf","download_url":"https://www.academia.edu/attachments/115146963/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Detection_of_Cataract_and_its_Level_base.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146963/512_3_2946_2951-libre.pdf?1716382652=\u0026response-content-disposition=attachment%3B+filename%3DDetection_of_Cataract_and_its_Level_base.pdf\u0026Expires=1732468482\u0026Signature=K6osJCGXTPHM732OikSDLpvfgdaFmlS1XW909wCD8Cr3VfIdUgFroxmgf-f-Mlior3lDP2OQc0peHCyIvFn2yNby7pmQ~uGuBe4NUlPcIzh9-QnfHBd~bG1CdSeU8eAhGgK~r257HHbUXDR-cjq9WaJJCkdLBs8nc~NQ0V-jSEe396ihllRLGKBFW7wDg~vZjbzgoE16813hk7vzvCjXI~AlG76mRYqOc3n3-RvPlbDCN9deTADvuZ9MryIvAL8DJTw16LOMAEbPo-XfN2aQm0lb3N8bziscDjDFP-WWb9KvfWbjrA8v5TxuQF82-D-~-wzPRajqnAgf9mFtN-e1Jg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119809304"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119809304/Orthogonal_Frequency_Division_Multiplexing_A_Review"><img alt="Research paper thumbnail of Orthogonal Frequency Division Multiplexing: A Review" class="work-thumbnail" src="https://attachments.academia-assets.com/115146926/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119809304/Orthogonal_Frequency_Division_Multiplexing_A_Review">Orthogonal Frequency Division Multiplexing: A Review</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Orthogonal frequency-division multiplexing significantly reduces inter-symbol interference (I.S.I...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Orthogonal frequency-division multiplexing significantly reduces inter-symbol interference (I.S.I.) caused by the delayed propagation of wireless channels (OFDM). As a result, numerous standards have embraced it, and it is now utilized in various wireless systems. This paper will overview OFDM and how it can be used in wireless communications. The basics of OFDM and related modulations are covered, along with methods for enhancing OFDM's performance in wireless communications. Examples include channel estimation and signal detection, time and frequency offset estimation and correction, peak-to-average power ratio reduction PAPR, and inter-carrier interference. In wireless transmission, the fundamental concept of OFDM is gaining acceptance. OFDM is also one of the most often recommended techniques for usage in 4th Generation Wireless Systems. The cyclic extension of OFDM signals is a general principle rather than employing empty guard spaces in the frequency domain. OFDM is a modulation and multiplexing technology used in WiFi, Wi-MAX, and 3G/4G/5G mobile communication systems. A low bit rate at the subcarrier is desired to extend symbol duration and prevent multipath distortion in OFDM. This will also improve the (C.P.) interval, which is a good thing (multiple distortions and error reduction). Due to the larger C.P. interval, however, it will result in a better energy loss value. The duration of the OFDM symbol, the C.P. interval, and the permissible delay (environment) spread must all be balanced.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="a60bd08a2217293e28b7c5b73dc9647a" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146926,"asset_id":119809304,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146926/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119809304"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119809304"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119809304; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119809304]").text(description); $(".js-view-count[data-work-id=119809304]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119809304; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119809304']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119809304, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "a60bd08a2217293e28b7c5b73dc9647a" } } $('.js-work-strip[data-work-id=119809304]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119809304,"title":"Orthogonal Frequency Division Multiplexing: A Review","translated_title":"","metadata":{"abstract":"Orthogonal frequency-division multiplexing significantly reduces inter-symbol interference (I.S.I.) caused by the delayed propagation of wireless channels (OFDM). As a result, numerous standards have embraced it, and it is now utilized in various wireless systems. This paper will overview OFDM and how it can be used in wireless communications. The basics of OFDM and related modulations are covered, along with methods for enhancing OFDM's performance in wireless communications. Examples include channel estimation and signal detection, time and frequency offset estimation and correction, peak-to-average power ratio reduction PAPR, and inter-carrier interference. In wireless transmission, the fundamental concept of OFDM is gaining acceptance. OFDM is also one of the most often recommended techniques for usage in 4th Generation Wireless Systems. The cyclic extension of OFDM signals is a general principle rather than employing empty guard spaces in the frequency domain. OFDM is a modulation and multiplexing technology used in WiFi, Wi-MAX, and 3G/4G/5G mobile communication systems. A low bit rate at the subcarrier is desired to extend symbol duration and prevent multipath distortion in OFDM. This will also improve the (C.P.) interval, which is a good thing (multiple distortions and error reduction). Due to the larger C.P. interval, however, it will result in a better energy loss value. The duration of the OFDM symbol, the C.P. interval, and the permissible delay (environment) spread must all be balanced.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Orthogonal frequency-division multiplexing significantly reduces inter-symbol interference (I.S.I.) caused by the delayed propagation of wireless channels (OFDM). As a result, numerous standards have embraced it, and it is now utilized in various wireless systems. This paper will overview OFDM and how it can be used in wireless communications. The basics of OFDM and related modulations are covered, along with methods for enhancing OFDM's performance in wireless communications. Examples include channel estimation and signal detection, time and frequency offset estimation and correction, peak-to-average power ratio reduction PAPR, and inter-carrier interference. In wireless transmission, the fundamental concept of OFDM is gaining acceptance. OFDM is also one of the most often recommended techniques for usage in 4th Generation Wireless Systems. The cyclic extension of OFDM signals is a general principle rather than employing empty guard spaces in the frequency domain. OFDM is a modulation and multiplexing technology used in WiFi, Wi-MAX, and 3G/4G/5G mobile communication systems. A low bit rate at the subcarrier is desired to extend symbol duration and prevent multipath distortion in OFDM. This will also improve the (C.P.) interval, which is a good thing (multiple distortions and error reduction). Due to the larger C.P. interval, however, it will result in a better energy loss value. The duration of the OFDM symbol, the C.P. interval, and the permissible delay (environment) spread must all be balanced.","internal_url":"https://www.academia.edu/119809304/Orthogonal_Frequency_Division_Multiplexing_A_Review","translated_internal_url":"","created_at":"2024-05-22T04:51:43.368-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730577,"work_id":119809304,"tagging_user_id":32919427,"tagged_user_id":263970291,"co_author_invite_id":null,"email":"y***3@gmail.com","display_order":1,"name":"YOGITA KAPSE","title":"Orthogonal Frequency Division Multiplexing: A Review"},{"id":41730578,"work_id":119809304,"tagging_user_id":32919427,"tagged_user_id":165782498,"co_author_invite_id":null,"email":"s***i@gmail.com","display_order":2,"name":"SHRIPAD MOHANI","title":"Orthogonal Frequency Division Multiplexing: A Review"}],"downloadable_attachments":[{"id":115146926,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146926/thumbnails/1.jpg","file_name":"511_1_2941_2945.pdf","download_url":"https://www.academia.edu/attachments/115146926/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Orthogonal_Frequency_Division_Multiplexi.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146926/511_1_2941_2945-libre.pdf?1716382655=\u0026response-content-disposition=attachment%3B+filename%3DOrthogonal_Frequency_Division_Multiplexi.pdf\u0026Expires=1732468483\u0026Signature=YQfvg8Mha6ILQdtDOcc4OcozH19rlmqeER-SLdjJryxkVmElccKT5v4ORb6nnhvGscZyK4TacSb2zZYrHvrOvtxyUwKCeZtp1RHtXWP0MqKxC4sm4eepcsVQZ~8w1vrS~Y6eD~9~aoRBktyXy1mvJYbpLvTFQhrzVcUCR0kPHNP6PK7nC3Z6WFy6uhEoaistO-YmNEsbfkGXa0XDgx-aSTIKIACoXNrmpdX1f7ZqVetThuHiNubFhELeijpVHKviAt4cVHhJPfWl6Lhda1agZXH~DpAkgulEWir6lbeHaNJFrktGW2aKzNWvMI4aDtqKEqvDxy46PbDKEc~~nX8phA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Orthogonal_Frequency_Division_Multiplexing_A_Review","translated_slug":"","page_count":5,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146926,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146926/thumbnails/1.jpg","file_name":"511_1_2941_2945.pdf","download_url":"https://www.academia.edu/attachments/115146926/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Orthogonal_Frequency_Division_Multiplexi.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146926/511_1_2941_2945-libre.pdf?1716382655=\u0026response-content-disposition=attachment%3B+filename%3DOrthogonal_Frequency_Division_Multiplexi.pdf\u0026Expires=1732468483\u0026Signature=YQfvg8Mha6ILQdtDOcc4OcozH19rlmqeER-SLdjJryxkVmElccKT5v4ORb6nnhvGscZyK4TacSb2zZYrHvrOvtxyUwKCeZtp1RHtXWP0MqKxC4sm4eepcsVQZ~8w1vrS~Y6eD~9~aoRBktyXy1mvJYbpLvTFQhrzVcUCR0kPHNP6PK7nC3Z6WFy6uhEoaistO-YmNEsbfkGXa0XDgx-aSTIKIACoXNrmpdX1f7ZqVetThuHiNubFhELeijpVHKviAt4cVHhJPfWl6Lhda1agZXH~DpAkgulEWir6lbeHaNJFrktGW2aKzNWvMI4aDtqKEqvDxy46PbDKEc~~nX8phA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119809172"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119809172/An_Optimal_Selection_Scheme_for_Automation_Testing_Framework_with_Quality_Assurance"><img alt="Research paper thumbnail of An Optimal Selection Scheme for Automation Testing Framework with Quality Assurance" class="work-thumbnail" src="https://attachments.academia-assets.com/115146833/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119809172/An_Optimal_Selection_Scheme_for_Automation_Testing_Framework_with_Quality_Assurance">An Optimal Selection Scheme for Automation Testing Framework with Quality Assurance</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The world is fast changing due to digitalization and the disruption brought on by the use of digi...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The world is fast changing due to digitalization and the disruption brought on by the use of digital technology. All IT operations require a high level of speed, and this necessitates a paradigm shift in quality assurance (QA). Digital assurance places a strong emphasis on quality at high speed and businesses want to produce high-quality goods more quickly than ever. As a result, QA teams are turning to test automation. The industry is shifting from the initial automation of regression tests to progressive automation and day one automation. Automation testing has seen a number of developments. However, it is crucial that businesses pick the appropriate automation framework because it is thought to be a key component of success. The paper considers quality assurance parameters for automation testing framework by adopting digital transformation initiatives to achieve the desired business outcome. In the paper we proposes a model of optimal testing framework selection and we'll discuss the different automation framework types and how to pick one that will assist enterprises to achieve their digital assurance objectives.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="99c6318649d441de92799aa94ed8e459" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146833,"asset_id":119809172,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146833/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119809172"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119809172"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119809172; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119809172]").text(description); $(".js-view-count[data-work-id=119809172]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119809172; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119809172']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119809172, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "99c6318649d441de92799aa94ed8e459" } } $('.js-work-strip[data-work-id=119809172]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119809172,"title":"An Optimal Selection Scheme for Automation Testing Framework with Quality Assurance","translated_title":"","metadata":{"abstract":"The world is fast changing due to digitalization and the disruption brought on by the use of digital technology. All IT operations require a high level of speed, and this necessitates a paradigm shift in quality assurance (QA). Digital assurance places a strong emphasis on quality at high speed and businesses want to produce high-quality goods more quickly than ever. As a result, QA teams are turning to test automation. The industry is shifting from the initial automation of regression tests to progressive automation and day one automation. Automation testing has seen a number of developments. However, it is crucial that businesses pick the appropriate automation framework because it is thought to be a key component of success. The paper considers quality assurance parameters for automation testing framework by adopting digital transformation initiatives to achieve the desired business outcome. In the paper we proposes a model of optimal testing framework selection and we'll discuss the different automation framework types and how to pick one that will assist enterprises to achieve their digital assurance objectives.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"The world is fast changing due to digitalization and the disruption brought on by the use of digital technology. All IT operations require a high level of speed, and this necessitates a paradigm shift in quality assurance (QA). Digital assurance places a strong emphasis on quality at high speed and businesses want to produce high-quality goods more quickly than ever. As a result, QA teams are turning to test automation. The industry is shifting from the initial automation of regression tests to progressive automation and day one automation. Automation testing has seen a number of developments. However, it is crucial that businesses pick the appropriate automation framework because it is thought to be a key component of success. The paper considers quality assurance parameters for automation testing framework by adopting digital transformation initiatives to achieve the desired business outcome. In the paper we proposes a model of optimal testing framework selection and we'll discuss the different automation framework types and how to pick one that will assist enterprises to achieve their digital assurance objectives.","internal_url":"https://www.academia.edu/119809172/An_Optimal_Selection_Scheme_for_Automation_Testing_Framework_with_Quality_Assurance","translated_internal_url":"","created_at":"2024-05-22T04:49:32.192-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730564,"work_id":119809172,"tagging_user_id":32919427,"tagged_user_id":15782117,"co_author_invite_id":null,"email":"m***1@gmail.com","affiliation":"Indian Institute of Tropical Meteorology","display_order":1,"name":"Manmeet Singh","title":"An Optimal Selection Scheme for Automation Testing Framework with Quality Assurance"},{"id":41730565,"work_id":119809172,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154030,"email":"j***y@medicaps.ac.in","display_order":2,"name":"Jitendra Choudhary","title":"An Optimal Selection Scheme for Automation Testing Framework with Quality Assurance"},{"id":41730566,"work_id":119809172,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":5780066,"email":"l***i@gmail.com","display_order":3,"name":"Lokesh Laddhani","title":"An Optimal Selection Scheme for Automation Testing Framework with Quality Assurance"}],"downloadable_attachments":[{"id":115146833,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146833/thumbnails/1.jpg","file_name":"510_3_2935_2940.pdf","download_url":"https://www.academia.edu/attachments/115146833/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Optimal_Selection_Scheme_for_Automati.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146833/510_3_2935_2940-libre.pdf?1716378608=\u0026response-content-disposition=attachment%3B+filename%3DAn_Optimal_Selection_Scheme_for_Automati.pdf\u0026Expires=1732468483\u0026Signature=Bh3mNbqhTKlehFwyxTAl7ftOsDYU3AEMUIK9q7vEW67w8AX3pvAn2viGTqDgfTh-bZecqxBxZdJJ0-f8BxD1pin~-enKYvmG3YEUs1Wo02uO9c-YqJfyvnMYjFrD2itvBUZxGepSjnjgm~8lrvgqt8UOzjIBuhsS1I59gs~08tq4zgvamtNP~db-pMe1nPHgvkvIJ3MSnkPHBRPgeA-8qDX-Tx8yvUmwGzQxtAkPiizJwqvasFpO5PImvQxBDQM~9oVQnl0gc5ph66vbTELKgPo43teK28mS6tWhgKBEW6HMQDjLTg~WfCZXadaOzSGCKjD6kkmY2NnVoIiZw9sPmA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"An_Optimal_Selection_Scheme_for_Automation_Testing_Framework_with_Quality_Assurance","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146833,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146833/thumbnails/1.jpg","file_name":"510_3_2935_2940.pdf","download_url":"https://www.academia.edu/attachments/115146833/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Optimal_Selection_Scheme_for_Automati.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146833/510_3_2935_2940-libre.pdf?1716378608=\u0026response-content-disposition=attachment%3B+filename%3DAn_Optimal_Selection_Scheme_for_Automati.pdf\u0026Expires=1732468483\u0026Signature=Bh3mNbqhTKlehFwyxTAl7ftOsDYU3AEMUIK9q7vEW67w8AX3pvAn2viGTqDgfTh-bZecqxBxZdJJ0-f8BxD1pin~-enKYvmG3YEUs1Wo02uO9c-YqJfyvnMYjFrD2itvBUZxGepSjnjgm~8lrvgqt8UOzjIBuhsS1I59gs~08tq4zgvamtNP~db-pMe1nPHgvkvIJ3MSnkPHBRPgeA-8qDX-Tx8yvUmwGzQxtAkPiizJwqvasFpO5PImvQxBDQM~9oVQnl0gc5ph66vbTELKgPo43teK28mS6tWhgKBEW6HMQDjLTg~WfCZXadaOzSGCKjD6kkmY2NnVoIiZw9sPmA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808898"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808898/Trading_Secured_Information_in_Cloud_Utilizing_Record_Cryptography_and_Speedy_Reaction_OTP"><img alt="Research paper thumbnail of Trading Secured Information in Cloud Utilizing Record Cryptography and Speedy Reaction OTP" class="work-thumbnail" src="https://attachments.academia-assets.com/115146658/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808898/Trading_Secured_Information_in_Cloud_Utilizing_Record_Cryptography_and_Speedy_Reaction_OTP">Trading Secured Information in Cloud Utilizing Record Cryptography and Speedy Reaction OTP</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">CLOUD capacity is presently picking up notoriety since it offers a adaptable on-demand informatio...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">CLOUD capacity is presently picking up notoriety since it offers a adaptable on-demand information outsourcing benefit with engaging benefits: alleviation of the burden for capacity administration, widespread information get to with area freedom, and evasion of capital use on equipment, computer program, and individual maintenances. Be that as it may, existing arrangements in conventional information outsourcing situation are incapable to at the same time meet the taking after three security prerequisites for keys outsourcing: Privacy and protection of record capacity; Data security on personality properties tied to keys; Owner controllable authorization over user's shared keys. The proposed to begin with bound together key administration system that addresses all the three objectives over. This cloud framework permits the key proprietor can perform security and controllable authorization conjointly give implemented record encryption with least data spillage. To actualize Cloud Key Bank proficiently, this demonstrate proposes a unused calculation Halter kilter Calculation. Proposed exploratory comes about and security investigation will appear the productivity and security objectives are well accomplished. To unscramble the records we utilize QR OTP for security.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="a042f2f808d6a3006d7e9ddfc87afcd6" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146658,"asset_id":119808898,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146658/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808898"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808898"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808898; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808898]").text(description); $(".js-view-count[data-work-id=119808898]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808898; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808898']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808898, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "a042f2f808d6a3006d7e9ddfc87afcd6" } } $('.js-work-strip[data-work-id=119808898]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808898,"title":"Trading Secured Information in Cloud Utilizing Record Cryptography and Speedy Reaction OTP","translated_title":"","metadata":{"abstract":"CLOUD capacity is presently picking up notoriety since it offers a adaptable on-demand information outsourcing benefit with engaging benefits: alleviation of the burden for capacity administration, widespread information get to with area freedom, and evasion of capital use on equipment, computer program, and individual maintenances. Be that as it may, existing arrangements in conventional information outsourcing situation are incapable to at the same time meet the taking after three security prerequisites for keys outsourcing: Privacy and protection of record capacity; Data security on personality properties tied to keys; Owner controllable authorization over user's shared keys. The proposed to begin with bound together key administration system that addresses all the three objectives over. This cloud framework permits the key proprietor can perform security and controllable authorization conjointly give implemented record encryption with least data spillage. To actualize Cloud Key Bank proficiently, this demonstrate proposes a unused calculation Halter kilter Calculation. Proposed exploratory comes about and security investigation will appear the productivity and security objectives are well accomplished. To unscramble the records we utilize QR OTP for security.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"CLOUD capacity is presently picking up notoriety since it offers a adaptable on-demand information outsourcing benefit with engaging benefits: alleviation of the burden for capacity administration, widespread information get to with area freedom, and evasion of capital use on equipment, computer program, and individual maintenances. Be that as it may, existing arrangements in conventional information outsourcing situation are incapable to at the same time meet the taking after three security prerequisites for keys outsourcing: Privacy and protection of record capacity; Data security on personality properties tied to keys; Owner controllable authorization over user's shared keys. The proposed to begin with bound together key administration system that addresses all the three objectives over. This cloud framework permits the key proprietor can perform security and controllable authorization conjointly give implemented record encryption with least data spillage. To actualize Cloud Key Bank proficiently, this demonstrate proposes a unused calculation Halter kilter Calculation. Proposed exploratory comes about and security investigation will appear the productivity and security objectives are well accomplished. To unscramble the records we utilize QR OTP for security.","internal_url":"https://www.academia.edu/119808898/Trading_Secured_Information_in_Cloud_Utilizing_Record_Cryptography_and_Speedy_Reaction_OTP","translated_internal_url":"","created_at":"2024-05-22T04:47:18.673-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730558,"work_id":119808898,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154028,"email":"k***s@nct.ac.in","display_order":1,"name":"M. Kavitha","title":"Trading Secured Information in Cloud Utilizing Record Cryptography and Speedy Reaction OTP"}],"downloadable_attachments":[{"id":115146658,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146658/thumbnails/1.jpg","file_name":"509_3_2929_2934.pdf","download_url":"https://www.academia.edu/attachments/115146658/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Trading_Secured_Information_in_Cloud_Uti.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146658/509_3_2929_2934-libre.pdf?1716378619=\u0026response-content-disposition=attachment%3B+filename%3DTrading_Secured_Information_in_Cloud_Uti.pdf\u0026Expires=1732468483\u0026Signature=QJCST7qoKrLV3YZboK8hpdPLa~Gjagb~PCFYVaJcC1PIUK1omZjd3XckPX~G2hquUDw-izzQ7a14Fe8eVUc27THoFIcAu8DD1Rg5I1PN-q6DeOHSYA~~4zcjXaVkKb0rlstRz1hT6l5WUNd6-fKY05aTCL52UaJY0hikVzrgpen4sPOggxJj0jV7GNbsZht4sZqsZUu1SdruErXq7DSEU7ECIh~yx3JJvGkbgl2ObLSV4iWU7wnyV8SIEgp1Cgm~9W2-wFuN2ZWdBlFyTavihAL9Lmmw0V616-zUdoZSq-UQt~~71r8wi6fQJ1-EEOX2DMdrad4Ju5wEBsLyjUesbw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Trading_Secured_Information_in_Cloud_Utilizing_Record_Cryptography_and_Speedy_Reaction_OTP","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146658,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146658/thumbnails/1.jpg","file_name":"509_3_2929_2934.pdf","download_url":"https://www.academia.edu/attachments/115146658/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Trading_Secured_Information_in_Cloud_Uti.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146658/509_3_2929_2934-libre.pdf?1716378619=\u0026response-content-disposition=attachment%3B+filename%3DTrading_Secured_Information_in_Cloud_Uti.pdf\u0026Expires=1732468483\u0026Signature=QJCST7qoKrLV3YZboK8hpdPLa~Gjagb~PCFYVaJcC1PIUK1omZjd3XckPX~G2hquUDw-izzQ7a14Fe8eVUc27THoFIcAu8DD1Rg5I1PN-q6DeOHSYA~~4zcjXaVkKb0rlstRz1hT6l5WUNd6-fKY05aTCL52UaJY0hikVzrgpen4sPOggxJj0jV7GNbsZht4sZqsZUu1SdruErXq7DSEU7ECIh~yx3JJvGkbgl2ObLSV4iWU7wnyV8SIEgp1Cgm~9W2-wFuN2ZWdBlFyTavihAL9Lmmw0V616-zUdoZSq-UQt~~71r8wi6fQJ1-EEOX2DMdrad4Ju5wEBsLyjUesbw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808746"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808746/Qualitative_Comparison_of_Commercial_NO2_Sensors_and_Selection_Criteria_for_Various_Applications"><img alt="Research paper thumbnail of Qualitative Comparison of Commercial NO2 Sensors and Selection Criteria for Various Applications" class="work-thumbnail" src="https://attachments.academia-assets.com/115146568/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808746/Qualitative_Comparison_of_Commercial_NO2_Sensors_and_Selection_Criteria_for_Various_Applications">Qualitative Comparison of Commercial NO2 Sensors and Selection Criteria for Various Applications</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Gas sampling and sensing is a domain of great importance nowadays. Various gases play a vital rol...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Gas sampling and sensing is a domain of great importance nowadays. Various gases play a vital role in different industries ranging from process industries to bio medical engineering. The measurement of concentration of hazardous gas components like NO 2 is in high demand and hence many researchers are attracted towards the development of NO 2 sensors on the basis of various working principles. A single sensor cannot be the best sensor for all applications. This fact leads to in the need of selection criteria for the selection of the sensor for any industrial application. This paper presents a selection criterion for the selection of NO 2 sensor based on its important features and characteristics. Considering this one can select most suitable NO 2 sensor for a typical application. This paper also presents a qualitative comparison of commercially available NO 2 sensors which can be a handy tool for someone who is interested in the measurement of NO 2 concentration for certain application.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="93e1ed9cda7dcb3143e351ae574b3598" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146568,"asset_id":119808746,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146568/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808746"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808746"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808746; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808746]").text(description); $(".js-view-count[data-work-id=119808746]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808746; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808746']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808746, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "93e1ed9cda7dcb3143e351ae574b3598" } } $('.js-work-strip[data-work-id=119808746]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808746,"title":"Qualitative Comparison of Commercial NO2 Sensors and Selection Criteria for Various Applications","translated_title":"","metadata":{"abstract":"Gas sampling and sensing is a domain of great importance nowadays. Various gases play a vital role in different industries ranging from process industries to bio medical engineering. The measurement of concentration of hazardous gas components like NO 2 is in high demand and hence many researchers are attracted towards the development of NO 2 sensors on the basis of various working principles. A single sensor cannot be the best sensor for all applications. This fact leads to in the need of selection criteria for the selection of the sensor for any industrial application. This paper presents a selection criterion for the selection of NO 2 sensor based on its important features and characteristics. Considering this one can select most suitable NO 2 sensor for a typical application. This paper also presents a qualitative comparison of commercially available NO 2 sensors which can be a handy tool for someone who is interested in the measurement of NO 2 concentration for certain application.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Gas sampling and sensing is a domain of great importance nowadays. Various gases play a vital role in different industries ranging from process industries to bio medical engineering. The measurement of concentration of hazardous gas components like NO 2 is in high demand and hence many researchers are attracted towards the development of NO 2 sensors on the basis of various working principles. A single sensor cannot be the best sensor for all applications. This fact leads to in the need of selection criteria for the selection of the sensor for any industrial application. This paper presents a selection criterion for the selection of NO 2 sensor based on its important features and characteristics. Considering this one can select most suitable NO 2 sensor for a typical application. This paper also presents a qualitative comparison of commercially available NO 2 sensors which can be a handy tool for someone who is interested in the measurement of NO 2 concentration for certain application.","internal_url":"https://www.academia.edu/119808746/Qualitative_Comparison_of_Commercial_NO2_Sensors_and_Selection_Criteria_for_Various_Applications","translated_internal_url":"","created_at":"2024-05-22T04:45:05.863-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730548,"work_id":119808746,"tagging_user_id":32919427,"tagged_user_id":218889369,"co_author_invite_id":null,"email":"v***3@gmail.com","display_order":1,"name":"Vrund Shah","title":"Qualitative Comparison of Commercial NO2 Sensors and Selection Criteria for Various Applications"}],"downloadable_attachments":[{"id":115146568,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146568/thumbnails/1.jpg","file_name":"507_3_2924_2928.pdf","download_url":"https://www.academia.edu/attachments/115146568/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Qualitative_Comparison_of_Commercial_NO2.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146568/507_3_2924_2928-libre.pdf?1716378624=\u0026response-content-disposition=attachment%3B+filename%3DQualitative_Comparison_of_Commercial_NO2.pdf\u0026Expires=1732468483\u0026Signature=aPpmNxPftoXlxkd9V-vJ6biIXmbnyIMkhgeEv~v~p6agY-mHSEnArUmHUwNPV4y9F7ufXocwzxBy5Q4CJcJpVV3en-2v-Ya0u6mU5yhNE2Bx-UJPWpzp8YmjOewJ2lm8AWB0i52NmIwL9vR0rWx6~OruvQXcu5Tw5B1hDCJRKrDpmtyZcbmI9To-b0NYEXmXhc5NQBqrx0TAmSz8BL3o0h7g7zJCHI2dEqoehONm1K0BqqWluhMFiYn9P~jcV8Nq15X6pRDbACSTBOCJdPZUA5Jp4rH1kIWujQv23Doyl3nHlME5NZ5XuVnyNsFd8bEv4~ZdP19T0MT8gzhQW1Z5UQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Qualitative_Comparison_of_Commercial_NO2_Sensors_and_Selection_Criteria_for_Various_Applications","translated_slug":"","page_count":5,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146568,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146568/thumbnails/1.jpg","file_name":"507_3_2924_2928.pdf","download_url":"https://www.academia.edu/attachments/115146568/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Qualitative_Comparison_of_Commercial_NO2.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146568/507_3_2924_2928-libre.pdf?1716378624=\u0026response-content-disposition=attachment%3B+filename%3DQualitative_Comparison_of_Commercial_NO2.pdf\u0026Expires=1732468483\u0026Signature=aPpmNxPftoXlxkd9V-vJ6biIXmbnyIMkhgeEv~v~p6agY-mHSEnArUmHUwNPV4y9F7ufXocwzxBy5Q4CJcJpVV3en-2v-Ya0u6mU5yhNE2Bx-UJPWpzp8YmjOewJ2lm8AWB0i52NmIwL9vR0rWx6~OruvQXcu5Tw5B1hDCJRKrDpmtyZcbmI9To-b0NYEXmXhc5NQBqrx0TAmSz8BL3o0h7g7zJCHI2dEqoehONm1K0BqqWluhMFiYn9P~jcV8Nq15X6pRDbACSTBOCJdPZUA5Jp4rH1kIWujQv23Doyl3nHlME5NZ5XuVnyNsFd8bEv4~ZdP19T0MT8gzhQW1Z5UQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808623"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808623/A_Classification_of_COVID_19_Cases_using_Fine_Tune_Different_Model_of_Machine_Learning"><img alt="Research paper thumbnail of A Classification of COVID-19 Cases using Fine-Tune Different Model of Machine Learning" class="work-thumbnail" src="https://attachments.academia-assets.com/115146403/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808623/A_Classification_of_COVID_19_Cases_using_Fine_Tune_Different_Model_of_Machine_Learning">A Classification of COVID-19 Cases using Fine-Tune Different Model of Machine Learning</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The Machine Learning Techniques are used for finding upcoming or futuristic Prediction. It's very...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The Machine Learning Techniques are used for finding upcoming or futuristic Prediction. It's very powerful tools in finding of future prediction. From Last decade to recent days Data mining and Machine Learning play vital roles in many Industries. In last 2-3 Years overall World is suffering from a new Virus i.e., COVID-19. The first covid case was detected in Month of December. In very less time it spread out throughout the world. In 2-3 months, this illness is declared as Pandemic by WHO (World Health Organization). The behaviour of spreading of COVID-19 was very abnormal. it was growing Exponentially. Here In this Paper as a Researcher's we are trying to find out overall Analysis of COVID-19. Here our main motto to finding How many patients gets infected, how many of them get cure in sometimes & finally How many of them goes to death. Here our main concentration is to finding the features of the COVID. We will be applying Machine Learning Algorithms like LR, SVM, DT and many more. After applying the above methods, we will find the performance measures of each one and compare with their values. Finally, we will try to Implement some new Enhancement in Existing Algorithms.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="88d1e727a5f5390c19412e89bfa41d2b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146403,"asset_id":119808623,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146403/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808623"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808623"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808623; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808623]").text(description); $(".js-view-count[data-work-id=119808623]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808623; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808623']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808623, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "88d1e727a5f5390c19412e89bfa41d2b" } } $('.js-work-strip[data-work-id=119808623]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808623,"title":"A Classification of COVID-19 Cases using Fine-Tune Different Model of Machine Learning","translated_title":"","metadata":{"abstract":"The Machine Learning Techniques are used for finding upcoming or futuristic Prediction. It's very powerful tools in finding of future prediction. From Last decade to recent days Data mining and Machine Learning play vital roles in many Industries. In last 2-3 Years overall World is suffering from a new Virus i.e., COVID-19. The first covid case was detected in Month of December. In very less time it spread out throughout the world. In 2-3 months, this illness is declared as Pandemic by WHO (World Health Organization). The behaviour of spreading of COVID-19 was very abnormal. it was growing Exponentially. Here In this Paper as a Researcher's we are trying to find out overall Analysis of COVID-19. Here our main motto to finding How many patients gets infected, how many of them get cure in sometimes \u0026 finally How many of them goes to death. Here our main concentration is to finding the features of the COVID. We will be applying Machine Learning Algorithms like LR, SVM, DT and many more. After applying the above methods, we will find the performance measures of each one and compare with their values. Finally, we will try to Implement some new Enhancement in Existing Algorithms.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"The Machine Learning Techniques are used for finding upcoming or futuristic Prediction. It's very powerful tools in finding of future prediction. From Last decade to recent days Data mining and Machine Learning play vital roles in many Industries. In last 2-3 Years overall World is suffering from a new Virus i.e., COVID-19. The first covid case was detected in Month of December. In very less time it spread out throughout the world. In 2-3 months, this illness is declared as Pandemic by WHO (World Health Organization). The behaviour of spreading of COVID-19 was very abnormal. it was growing Exponentially. Here In this Paper as a Researcher's we are trying to find out overall Analysis of COVID-19. Here our main motto to finding How many patients gets infected, how many of them get cure in sometimes \u0026 finally How many of them goes to death. Here our main concentration is to finding the features of the COVID. We will be applying Machine Learning Algorithms like LR, SVM, DT and many more. After applying the above methods, we will find the performance measures of each one and compare with their values. Finally, we will try to Implement some new Enhancement in Existing Algorithms.","internal_url":"https://www.academia.edu/119808623/A_Classification_of_COVID_19_Cases_using_Fine_Tune_Different_Model_of_Machine_Learning","translated_internal_url":"","created_at":"2024-05-22T04:43:05.440-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[],"downloadable_attachments":[{"id":115146403,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146403/thumbnails/1.jpg","file_name":"503_4_2916_2923.pdf","download_url":"https://www.academia.edu/attachments/115146403/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Classification_of_COVID_19_Cases_using.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146403/503_4_2916_2923-libre.pdf?1716378633=\u0026response-content-disposition=attachment%3B+filename%3DA_Classification_of_COVID_19_Cases_using.pdf\u0026Expires=1732468483\u0026Signature=Nax6YSryZDE3u2f7YCWjDraAAaa~XIkawAEWLoMVKT43Yj1RhW65ocY~KM9rzqSAOCGwOaBuTWyyHMIUHPzggMVdhk4B4t38vsnsBcg5alVdd7zG1iByLCg7K~nOrRqBNa1IQZml19OwtLIj~kJnxHEllRgAEBjQSLaNBEcmxKr6qYgtpVIVqazoNMIT~~losruBO5Sd4ECvuAdhSxLj3Kbd12EPL5VYqIEHN5osCh91vsy07KA5T7Ljp17DfUlMQzRZbqIu6Vmv618MmIyOcbPEQyb-Si1fUTbWU5W1tOSf8j0r~nGNdctexI~KbgV7Yc5qPw~wZTnsDmkoIOD1Ug__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Classification_of_COVID_19_Cases_using_Fine_Tune_Different_Model_of_Machine_Learning","translated_slug":"","page_count":8,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146403,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146403/thumbnails/1.jpg","file_name":"503_4_2916_2923.pdf","download_url":"https://www.academia.edu/attachments/115146403/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Classification_of_COVID_19_Cases_using.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146403/503_4_2916_2923-libre.pdf?1716378633=\u0026response-content-disposition=attachment%3B+filename%3DA_Classification_of_COVID_19_Cases_using.pdf\u0026Expires=1732468483\u0026Signature=Nax6YSryZDE3u2f7YCWjDraAAaa~XIkawAEWLoMVKT43Yj1RhW65ocY~KM9rzqSAOCGwOaBuTWyyHMIUHPzggMVdhk4B4t38vsnsBcg5alVdd7zG1iByLCg7K~nOrRqBNa1IQZml19OwtLIj~kJnxHEllRgAEBjQSLaNBEcmxKr6qYgtpVIVqazoNMIT~~losruBO5Sd4ECvuAdhSxLj3Kbd12EPL5VYqIEHN5osCh91vsy07KA5T7Ljp17DfUlMQzRZbqIu6Vmv618MmIyOcbPEQyb-Si1fUTbWU5W1tOSf8j0r~nGNdctexI~KbgV7Yc5qPw~wZTnsDmkoIOD1Ug__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808414"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808414/An_Innovative_Blockchain_based_System_for_Employees_in_the_Healthcare_Industry"><img alt="Research paper thumbnail of An Innovative Blockchain-based System for Employees in the Healthcare Industry" class="work-thumbnail" src="https://attachments.academia-assets.com/115146333/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808414/An_Innovative_Blockchain_based_System_for_Employees_in_the_Healthcare_Industry">An Innovative Blockchain-based System for Employees in the Healthcare Industry</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The pandemic caused by the COVID-19 virus has unquestionably opened our eyes to the possibility t...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The pandemic caused by the COVID-19 virus has unquestionably opened our eyes to the possibility that we may run out of essential supplies, such as medications and medical equipment, which would result in people's deaths and increased anxiety. Insufficient funds and raw materials aren't the only factors contributing to this situation; there's also another factor that's much more discouraging. Even in the midst of these challenging circumstances, some individuals have been able to see an opportunity in the scenario that allows them to maintain and store vital equipment such as personal protective equipment kits, masks, sanitizers, and the like, and then start black-selling such items. This very problematic circumstance has arisen as a direct result of deficiencies in the supply chain's control, transparency, and traceability. Blockchain technology presents itself as a potentially useful answer to this issue. The information may be tracked and traced using blockchain technology, which can also be used to store the data in a decentralised and immutable manner, ensuring that it remains private and is protected from unauthorised users. This article discusses the many use cases for healthcare personnel as well as the various constraints of the present blockchain architecture for supply chain. [Citation needed] The shortcomings of the current blockchain framework for supply chains are then addressed via the proposal of a new framework.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="22b7b537e09c4de63ac03bb9322187eb" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146333,"asset_id":119808414,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146333/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808414"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808414"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808414; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808414]").text(description); $(".js-view-count[data-work-id=119808414]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808414; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808414']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808414, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "22b7b537e09c4de63ac03bb9322187eb" } } $('.js-work-strip[data-work-id=119808414]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808414,"title":"An Innovative Blockchain-based System for Employees in the Healthcare Industry","translated_title":"","metadata":{"abstract":"The pandemic caused by the COVID-19 virus has unquestionably opened our eyes to the possibility that we may run out of essential supplies, such as medications and medical equipment, which would result in people's deaths and increased anxiety. Insufficient funds and raw materials aren't the only factors contributing to this situation; there's also another factor that's much more discouraging. Even in the midst of these challenging circumstances, some individuals have been able to see an opportunity in the scenario that allows them to maintain and store vital equipment such as personal protective equipment kits, masks, sanitizers, and the like, and then start black-selling such items. This very problematic circumstance has arisen as a direct result of deficiencies in the supply chain's control, transparency, and traceability. Blockchain technology presents itself as a potentially useful answer to this issue. The information may be tracked and traced using blockchain technology, which can also be used to store the data in a decentralised and immutable manner, ensuring that it remains private and is protected from unauthorised users. This article discusses the many use cases for healthcare personnel as well as the various constraints of the present blockchain architecture for supply chain. [Citation needed] The shortcomings of the current blockchain framework for supply chains are then addressed via the proposal of a new framework.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"The pandemic caused by the COVID-19 virus has unquestionably opened our eyes to the possibility that we may run out of essential supplies, such as medications and medical equipment, which would result in people's deaths and increased anxiety. Insufficient funds and raw materials aren't the only factors contributing to this situation; there's also another factor that's much more discouraging. Even in the midst of these challenging circumstances, some individuals have been able to see an opportunity in the scenario that allows them to maintain and store vital equipment such as personal protective equipment kits, masks, sanitizers, and the like, and then start black-selling such items. This very problematic circumstance has arisen as a direct result of deficiencies in the supply chain's control, transparency, and traceability. Blockchain technology presents itself as a potentially useful answer to this issue. The information may be tracked and traced using blockchain technology, which can also be used to store the data in a decentralised and immutable manner, ensuring that it remains private and is protected from unauthorised users. This article discusses the many use cases for healthcare personnel as well as the various constraints of the present blockchain architecture for supply chain. [Citation needed] The shortcomings of the current blockchain framework for supply chains are then addressed via the proposal of a new framework.","internal_url":"https://www.academia.edu/119808414/An_Innovative_Blockchain_based_System_for_Employees_in_the_Healthcare_Industry","translated_internal_url":"","created_at":"2024-05-22T04:40:18.398-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730524,"work_id":119808414,"tagging_user_id":32919427,"tagged_user_id":827443,"co_author_invite_id":null,"email":"a***e@gmail.com","display_order":1,"name":"Anil Turukmane","title":"An Innovative Blockchain-based System for Employees in the Healthcare Industry"}],"downloadable_attachments":[{"id":115146333,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146333/thumbnails/1.jpg","file_name":"502_2_2909_2915.pdf","download_url":"https://www.academia.edu/attachments/115146333/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Innovative_Blockchain_based_System_fo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146333/502_2_2909_2915-libre.pdf?1716378641=\u0026response-content-disposition=attachment%3B+filename%3DAn_Innovative_Blockchain_based_System_fo.pdf\u0026Expires=1732468484\u0026Signature=XP0QrVhJeqOb7VsXcX54IAyxS~zBdTAZilUbZOUHEJ-YCOBskFqQGblW9h8RtzHAKfsIVaC2gL~~xfC9ZEdOjt5TxL0d2OiINgbGMQ0dJlfM8cTd6W6GkctytU2SQm-pcYak64fxu1y3yt3iUKxSCD9PMR0G0aGpppzC9qjxK532QbxE-6OiP6-pfA2o~eV6t3AqtR1VVAekdEn2CKFquigSrEV1tqHuk-vv9AK5X6Xr2vmgv1orhJ6ADyMPq09fK714FwjQaRCZWGuV7fkg4MNk-PpG-umnVtzoh0h6dIVhPX3S7Tzk08H0mtQn45P5LMuRpSIF-NIF5wf4S3yCnQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"An_Innovative_Blockchain_based_System_for_Employees_in_the_Healthcare_Industry","translated_slug":"","page_count":7,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146333,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146333/thumbnails/1.jpg","file_name":"502_2_2909_2915.pdf","download_url":"https://www.academia.edu/attachments/115146333/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Innovative_Blockchain_based_System_fo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146333/502_2_2909_2915-libre.pdf?1716378641=\u0026response-content-disposition=attachment%3B+filename%3DAn_Innovative_Blockchain_based_System_fo.pdf\u0026Expires=1732468484\u0026Signature=XP0QrVhJeqOb7VsXcX54IAyxS~zBdTAZilUbZOUHEJ-YCOBskFqQGblW9h8RtzHAKfsIVaC2gL~~xfC9ZEdOjt5TxL0d2OiINgbGMQ0dJlfM8cTd6W6GkctytU2SQm-pcYak64fxu1y3yt3iUKxSCD9PMR0G0aGpppzC9qjxK532QbxE-6OiP6-pfA2o~eV6t3AqtR1VVAekdEn2CKFquigSrEV1tqHuk-vv9AK5X6Xr2vmgv1orhJ6ADyMPq09fK714FwjQaRCZWGuV7fkg4MNk-PpG-umnVtzoh0h6dIVhPX3S7Tzk08H0mtQn45P5LMuRpSIF-NIF5wf4S3yCnQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808307"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808307/An_Overview_of_Speaker_Recognition_Conceptual_Framework_and_CNN_based_Identification_Technique"><img alt="Research paper thumbnail of An Overview of Speaker Recognition: Conceptual Framework and CNN based Identification Technique" class="work-thumbnail" src="https://attachments.academia-assets.com/115146209/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808307/An_Overview_of_Speaker_Recognition_Conceptual_Framework_and_CNN_based_Identification_Technique">An Overview of Speaker Recognition: Conceptual Framework and CNN based Identification Technique</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">One of the major characteristics of an individual is to recognize a human voice. He is capable to...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">One of the major characteristics of an individual is to recognize a human voice. He is capable to do so, via digital devices or over the telephone. Acquiring this human trait, multiple technologies based on voice recognition have been developed to fulfil the purpose of biometrics and authentication. One such speech analysing technology is automatic speaker recognition (ASR) method that has been introduced to extract characteristics from the speaker's voice and identify him as a genuine source of input. The primary aim of speaker recognition is to identify and verify a person using audio signals. Hence, this has become a dominating field of research in the domain of biometrics. However, several deep learning approaches based on convolutional neural networks have been adopted to enhance the overall system of biometrics. Therefore, in this paper we review feature components on speaker recognition using CNN and feature extraction methods such as MFCC. The major advantage of using this method over traditional identification is its representation ability to extract feature inputs including audio signals and networking structures. Further, we briefly describe all the main pieces of ASR related methodologies followed by evaluation metrics to enhance the overall recognition of the system. Finally, a few relatable challenges and future expansion of speaker recognition are mentioned at the closure of this review.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="cdd943a061de92f87c141919f83af63f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146209,"asset_id":119808307,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146209/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808307"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808307"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808307; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808307]").text(description); $(".js-view-count[data-work-id=119808307]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808307; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808307']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808307, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "cdd943a061de92f87c141919f83af63f" } } $('.js-work-strip[data-work-id=119808307]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808307,"title":"An Overview of Speaker Recognition: Conceptual Framework and CNN based Identification Technique","translated_title":"","metadata":{"abstract":"One of the major characteristics of an individual is to recognize a human voice. He is capable to do so, via digital devices or over the telephone. Acquiring this human trait, multiple technologies based on voice recognition have been developed to fulfil the purpose of biometrics and authentication. One such speech analysing technology is automatic speaker recognition (ASR) method that has been introduced to extract characteristics from the speaker's voice and identify him as a genuine source of input. The primary aim of speaker recognition is to identify and verify a person using audio signals. Hence, this has become a dominating field of research in the domain of biometrics. However, several deep learning approaches based on convolutional neural networks have been adopted to enhance the overall system of biometrics. Therefore, in this paper we review feature components on speaker recognition using CNN and feature extraction methods such as MFCC. The major advantage of using this method over traditional identification is its representation ability to extract feature inputs including audio signals and networking structures. Further, we briefly describe all the main pieces of ASR related methodologies followed by evaluation metrics to enhance the overall recognition of the system. Finally, a few relatable challenges and future expansion of speaker recognition are mentioned at the closure of this review.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"One of the major characteristics of an individual is to recognize a human voice. He is capable to do so, via digital devices or over the telephone. Acquiring this human trait, multiple technologies based on voice recognition have been developed to fulfil the purpose of biometrics and authentication. One such speech analysing technology is automatic speaker recognition (ASR) method that has been introduced to extract characteristics from the speaker's voice and identify him as a genuine source of input. The primary aim of speaker recognition is to identify and verify a person using audio signals. Hence, this has become a dominating field of research in the domain of biometrics. However, several deep learning approaches based on convolutional neural networks have been adopted to enhance the overall system of biometrics. Therefore, in this paper we review feature components on speaker recognition using CNN and feature extraction methods such as MFCC. The major advantage of using this method over traditional identification is its representation ability to extract feature inputs including audio signals and networking structures. Further, we briefly describe all the main pieces of ASR related methodologies followed by evaluation metrics to enhance the overall recognition of the system. Finally, a few relatable challenges and future expansion of speaker recognition are mentioned at the closure of this review.","internal_url":"https://www.academia.edu/119808307/An_Overview_of_Speaker_Recognition_Conceptual_Framework_and_CNN_based_Identification_Technique","translated_internal_url":"","created_at":"2024-05-22T04:37:37.435-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730518,"work_id":119808307,"tagging_user_id":32919427,"tagged_user_id":279999067,"co_author_invite_id":null,"email":"a***e@gmail.com","display_order":1,"name":"Avinash Dhole","title":"An Overview of Speaker Recognition: Conceptual Framework and CNN based Identification Technique"}],"downloadable_attachments":[{"id":115146209,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146209/thumbnails/1.jpg","file_name":"335_2901_2908.pdf","download_url":"https://www.academia.edu/attachments/115146209/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Overview_of_Speaker_Recognition_Conce.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146209/335_2901_2908-libre.pdf?1716378648=\u0026response-content-disposition=attachment%3B+filename%3DAn_Overview_of_Speaker_Recognition_Conce.pdf\u0026Expires=1732468484\u0026Signature=DNRSvGE0wijl4WnwHRgI6ClQpj1msBhMwAMYWSyxW1VR1dMq6SzqEjtfkh2h9pZsVwJ05E4Ew1LjyJePx40VGj~JVyAq-XqCGZNWwAREBqKn2gYzBaPkZ6RsnV~rXHcKYCtVg9XqzJt4QeD7HRkqUYJK4C8jz-Ueng23vOhWmc3jgNouuKfhT~Ju0bTf7dWEGsFelFpblb39veFGP16JP4Oa-0QWIxTc1YUwFn7MkDJWg~u57bz0ScqiplJpnWKThxhfkh7CqR-fb~jyf1cvjTmNhPqPa1XzkTjJMTEMzOq~D8hIHNIod4~Id85O6HAK0W5YOggFz~oOMcwnoaAT9g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"An_Overview_of_Speaker_Recognition_Conceptual_Framework_and_CNN_based_Identification_Technique","translated_slug":"","page_count":8,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146209,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146209/thumbnails/1.jpg","file_name":"335_2901_2908.pdf","download_url":"https://www.academia.edu/attachments/115146209/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Overview_of_Speaker_Recognition_Conce.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146209/335_2901_2908-libre.pdf?1716378648=\u0026response-content-disposition=attachment%3B+filename%3DAn_Overview_of_Speaker_Recognition_Conce.pdf\u0026Expires=1732468484\u0026Signature=DNRSvGE0wijl4WnwHRgI6ClQpj1msBhMwAMYWSyxW1VR1dMq6SzqEjtfkh2h9pZsVwJ05E4Ew1LjyJePx40VGj~JVyAq-XqCGZNWwAREBqKn2gYzBaPkZ6RsnV~rXHcKYCtVg9XqzJt4QeD7HRkqUYJK4C8jz-Ueng23vOhWmc3jgNouuKfhT~Ju0bTf7dWEGsFelFpblb39veFGP16JP4Oa-0QWIxTc1YUwFn7MkDJWg~u57bz0ScqiplJpnWKThxhfkh7CqR-fb~jyf1cvjTmNhPqPa1XzkTjJMTEMzOq~D8hIHNIod4~Id85O6HAK0W5YOggFz~oOMcwnoaAT9g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808176"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808176/Predicting_Dengue_using_Rule_based_Approach"><img alt="Research paper thumbnail of Predicting Dengue using Rule-based Approach" class="work-thumbnail" src="https://attachments.academia-assets.com/115146117/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808176/Predicting_Dengue_using_Rule_based_Approach">Predicting Dengue using Rule-based Approach</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/IdesEditor">Grenze International Journal of Engineering and Technology GIJET</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/SakshiShejwal3">Sakshi Shejwal</a></span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Dengue is the most common viral fever suffered by most people. It is also known as life-threateni...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Dengue is the most common viral fever suffered by most people. It is also known as life-threatening disease. It has taken many lives all over the world. Brisk forecast of dengue can save individual's life by warning them to take genuine conclusion and care. During the covid situation risk of dengue have reached at a larger scale with multiple symptoms. In this paper, selective symptoms are being considered to verify their impact on predicting the disease and the main motive is to predict dengue, how accurately it gives respond in advance that can save individual's life. For this a new approach has been introduced by applying Rule Fit or Rulebased algorithm and Feature transformation methods to get an accurate result which solve the interpretability and overfitting issue in each machine learning algorithm that have a huge impact on the prediction. Also results gained varies based on the selection of dataset, each algorithms results differs according to the dataset.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="3267692df34fb3e0110993fcb2152490" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146117,"asset_id":119808176,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146117/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808176"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808176"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808176; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808176]").text(description); $(".js-view-count[data-work-id=119808176]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808176; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808176']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808176, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "3267692df34fb3e0110993fcb2152490" } } $('.js-work-strip[data-work-id=119808176]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808176,"title":"Predicting Dengue using Rule-based Approach","translated_title":"","metadata":{"abstract":"Dengue is the most common viral fever suffered by most people. It is also known as life-threatening disease. It has taken many lives all over the world. Brisk forecast of dengue can save individual's life by warning them to take genuine conclusion and care. During the covid situation risk of dengue have reached at a larger scale with multiple symptoms. In this paper, selective symptoms are being considered to verify their impact on predicting the disease and the main motive is to predict dengue, how accurately it gives respond in advance that can save individual's life. For this a new approach has been introduced by applying Rule Fit or Rulebased algorithm and Feature transformation methods to get an accurate result which solve the interpretability and overfitting issue in each machine learning algorithm that have a huge impact on the prediction. Also results gained varies based on the selection of dataset, each algorithms results differs according to the dataset.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Dengue is the most common viral fever suffered by most people. It is also known as life-threatening disease. It has taken many lives all over the world. Brisk forecast of dengue can save individual's life by warning them to take genuine conclusion and care. During the covid situation risk of dengue have reached at a larger scale with multiple symptoms. In this paper, selective symptoms are being considered to verify their impact on predicting the disease and the main motive is to predict dengue, how accurately it gives respond in advance that can save individual's life. For this a new approach has been introduced by applying Rule Fit or Rulebased algorithm and Feature transformation methods to get an accurate result which solve the interpretability and overfitting issue in each machine learning algorithm that have a huge impact on the prediction. Also results gained varies based on the selection of dataset, each algorithms results differs according to the dataset.","internal_url":"https://www.academia.edu/119808176/Predicting_Dengue_using_Rule_based_Approach","translated_internal_url":"","created_at":"2024-05-22T04:36:03.876-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730516,"work_id":119808176,"tagging_user_id":32919427,"tagged_user_id":315700423,"co_author_invite_id":8154024,"email":"s***l@mitaoe.ac.in","display_order":1,"name":"Sakshi Shejwal","title":"Predicting Dengue using Rule-based Approach"},{"id":41730517,"work_id":119808176,"tagging_user_id":32919427,"tagged_user_id":298112011,"co_author_invite_id":null,"email":"p***r@mitaoe.ac.in","display_order":2,"name":"Pramod Ganjewar","title":"Predicting Dengue using Rule-based Approach"}],"downloadable_attachments":[{"id":115146117,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146117/thumbnails/1.jpg","file_name":"334_2893_2900.pdf","download_url":"https://www.academia.edu/attachments/115146117/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Predicting_Dengue_using_Rule_based_Appro.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146117/334_2893_2900-libre.pdf?1716378662=\u0026response-content-disposition=attachment%3B+filename%3DPredicting_Dengue_using_Rule_based_Appro.pdf\u0026Expires=1732468484\u0026Signature=HajxIEFAKKGyjfON~amlou3rwbBjyJCFZ2vf3g~hxzQ8~fy3m3mNAP68YD~b~rM3sTd-5J45-gx9jJ4nv0ITrznOEZzMxBKOpomxtRAZsn6SS0hsR2tlQ8hmJLBrva4MIoMoeSRL7AZa2AS274cG4rx2wwnL9tqDK9fbd~7sF-mGNbeGo9TLN4R9uMZtemZFZHunvzaUUDoBvU0XbtSlWlNULRxpKw5sgVM2ZWoccj58olWR6195zKL9FNiyUqOvuTbHxTrevKMnsAkfkpi5RpzjTROl4hk6Dseuv2Kcc4ur7xASHYd2DNFpqAQif2wQV6~Lqe8B2xnfCObGCGBkLQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Predicting_Dengue_using_Rule_based_Approach","translated_slug":"","page_count":8,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146117,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146117/thumbnails/1.jpg","file_name":"334_2893_2900.pdf","download_url":"https://www.academia.edu/attachments/115146117/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Predicting_Dengue_using_Rule_based_Appro.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146117/334_2893_2900-libre.pdf?1716378662=\u0026response-content-disposition=attachment%3B+filename%3DPredicting_Dengue_using_Rule_based_Appro.pdf\u0026Expires=1732468484\u0026Signature=HajxIEFAKKGyjfON~amlou3rwbBjyJCFZ2vf3g~hxzQ8~fy3m3mNAP68YD~b~rM3sTd-5J45-gx9jJ4nv0ITrznOEZzMxBKOpomxtRAZsn6SS0hsR2tlQ8hmJLBrva4MIoMoeSRL7AZa2AS274cG4rx2wwnL9tqDK9fbd~7sF-mGNbeGo9TLN4R9uMZtemZFZHunvzaUUDoBvU0XbtSlWlNULRxpKw5sgVM2ZWoccj58olWR6195zKL9FNiyUqOvuTbHxTrevKMnsAkfkpi5RpzjTROl4hk6Dseuv2Kcc4ur7xASHYd2DNFpqAQif2wQV6~Lqe8B2xnfCObGCGBkLQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808103"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808103/Hybrid_Recommender_System_for_E_Learning_Platforms"><img alt="Research paper thumbnail of Hybrid Recommender System for E-Learning Platforms" class="work-thumbnail" src="https://attachments.academia-assets.com/115146062/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808103/Hybrid_Recommender_System_for_E_Learning_Platforms">Hybrid Recommender System for E-Learning Platforms</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Internet use has steadily increased over the past 25 years. Numerous online services are improvin...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Internet use has steadily increased over the past 25 years. Numerous online services are improving and simplifying life for people. E-learning is one of these services, which makes the learning process simpler. In this work, a recommendation system will be presented that will assist online course providers in automating course suggestion. By finding patterns in courses based on some attributes like field of interest, skill set, educational qualification, course content, etc. of an individual and courses, this recommendation system is built using hybrid machine learning recommendation techniques, i.e., combination of Collaborative (item based) and content-based recommendation and KNN classifiers. Lastly, the recommendations are pooled from the two blocks of recommended courses (which were discovered using a collaborative technique), similar courses (which is found using content-based finding).</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="6adb9f5eeffce52269b704f4ed81903b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146062,"asset_id":119808103,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146062/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808103"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808103"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808103; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808103]").text(description); $(".js-view-count[data-work-id=119808103]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808103; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808103']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808103, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "6adb9f5eeffce52269b704f4ed81903b" } } $('.js-work-strip[data-work-id=119808103]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808103,"title":"Hybrid Recommender System for E-Learning Platforms","translated_title":"","metadata":{"abstract":"Internet use has steadily increased over the past 25 years. Numerous online services are improving and simplifying life for people. E-learning is one of these services, which makes the learning process simpler. In this work, a recommendation system will be presented that will assist online course providers in automating course suggestion. By finding patterns in courses based on some attributes like field of interest, skill set, educational qualification, course content, etc. of an individual and courses, this recommendation system is built using hybrid machine learning recommendation techniques, i.e., combination of Collaborative (item based) and content-based recommendation and KNN classifiers. Lastly, the recommendations are pooled from the two blocks of recommended courses (which were discovered using a collaborative technique), similar courses (which is found using content-based finding).","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Internet use has steadily increased over the past 25 years. Numerous online services are improving and simplifying life for people. E-learning is one of these services, which makes the learning process simpler. In this work, a recommendation system will be presented that will assist online course providers in automating course suggestion. By finding patterns in courses based on some attributes like field of interest, skill set, educational qualification, course content, etc. of an individual and courses, this recommendation system is built using hybrid machine learning recommendation techniques, i.e., combination of Collaborative (item based) and content-based recommendation and KNN classifiers. Lastly, the recommendations are pooled from the two blocks of recommended courses (which were discovered using a collaborative technique), similar courses (which is found using content-based finding).","internal_url":"https://www.academia.edu/119808103/Hybrid_Recommender_System_for_E_Learning_Platforms","translated_internal_url":"","created_at":"2024-05-22T04:34:14.895-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730510,"work_id":119808103,"tagging_user_id":32919427,"tagged_user_id":107260265,"co_author_invite_id":null,"email":"s***a@cit.edu.in","display_order":1,"name":"Sujithra M","title":"Hybrid Recommender System for E-Learning Platforms"},{"id":41730511,"work_id":119808103,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154022,"email":"r***i@cit.edu.in","display_order":2,"name":"K. Rajarajeshwari","title":"Hybrid Recommender System for E-Learning Platforms"}],"downloadable_attachments":[{"id":115146062,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146062/thumbnails/1.jpg","file_name":"332_2887_2892.pdf","download_url":"https://www.academia.edu/attachments/115146062/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hybrid_Recommender_System_for_E_Learning.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146062/332_2887_2892-libre.pdf?1716378658=\u0026response-content-disposition=attachment%3B+filename%3DHybrid_Recommender_System_for_E_Learning.pdf\u0026Expires=1732468484\u0026Signature=V~IbMULgekGGfyoPopZqIaqUs0CkxDfejfF2U~PN3yGkxwSgLmA~NvQx3MiPX6RpzkjuW1A6o9tWdlJ~dCgj-iIR~AcU7LefpWlO~GtrAJ16ErhtQnC-x8kPJOlVP4Tk8BUhskI10ixgxT1NQU2qt6G8kPu5sb9-9~~bOrZf6Bz0LBL6w6Jl1JvO1hu5UlsMobpxRfxoerUVpu6~4Aj7HRSJ588oONMxNb~g1oh77ERnSlPpvwOBMOgCehVd-KKN7KxA-Ht8yGXrO0wmhpJWncnyKbYVaB26iZVjffhgAAxBE7PJip9owiN5swpvwT88l6LPSoe2lzHABTKYhUCtbg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Hybrid_Recommender_System_for_E_Learning_Platforms","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146062,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146062/thumbnails/1.jpg","file_name":"332_2887_2892.pdf","download_url":"https://www.academia.edu/attachments/115146062/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hybrid_Recommender_System_for_E_Learning.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146062/332_2887_2892-libre.pdf?1716378658=\u0026response-content-disposition=attachment%3B+filename%3DHybrid_Recommender_System_for_E_Learning.pdf\u0026Expires=1732468484\u0026Signature=V~IbMULgekGGfyoPopZqIaqUs0CkxDfejfF2U~PN3yGkxwSgLmA~NvQx3MiPX6RpzkjuW1A6o9tWdlJ~dCgj-iIR~AcU7LefpWlO~GtrAJ16ErhtQnC-x8kPJOlVP4Tk8BUhskI10ixgxT1NQU2qt6G8kPu5sb9-9~~bOrZf6Bz0LBL6w6Jl1JvO1hu5UlsMobpxRfxoerUVpu6~4Aj7HRSJ588oONMxNb~g1oh77ERnSlPpvwOBMOgCehVd-KKN7KxA-Ht8yGXrO0wmhpJWncnyKbYVaB26iZVjffhgAAxBE7PJip9owiN5swpvwT88l6LPSoe2lzHABTKYhUCtbg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119808045"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119808045/An_Automatic_Extractive_Text_Summarization"><img alt="Research paper thumbnail of An Automatic Extractive Text Summarization" class="work-thumbnail" src="https://attachments.academia-assets.com/115146022/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119808045/An_Automatic_Extractive_Text_Summarization">An Automatic Extractive Text Summarization</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/IdesEditor">Grenze International Journal of Engineering and Technology GIJET</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/ChandanYadav305">Chandan Yadav</a></span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In this new era of artificial intelligence and automation there is outburst in amount of data. It...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In this new era of artificial intelligence and automation there is outburst in amount of data. It is challenging for a person to dig into the content and bring the light on essential data. So, for such complexity there is need of developing a perfunctory task of automatic and precise text summary of data. Automatic text summarizer reduces reading time and make selection process easier. In recent years, there has been a little change in the text summarising research trend as well. New trends have evolved that show how to improve text summarization performance and achieve high accuracy. Hence, this project mainly focuses on designing an extractive summarizer of English text/document which generate abbreviated summary with the help of different algorithms.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="acf13df73f78c27c5dd7b5b0e5044a39" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115146022,"asset_id":119808045,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115146022/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119808045"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119808045"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119808045; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119808045]").text(description); $(".js-view-count[data-work-id=119808045]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119808045; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119808045']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119808045, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "acf13df73f78c27c5dd7b5b0e5044a39" } } $('.js-work-strip[data-work-id=119808045]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119808045,"title":"An Automatic Extractive Text Summarization","translated_title":"","metadata":{"abstract":"In this new era of artificial intelligence and automation there is outburst in amount of data. It is challenging for a person to dig into the content and bring the light on essential data. So, for such complexity there is need of developing a perfunctory task of automatic and precise text summary of data. Automatic text summarizer reduces reading time and make selection process easier. In recent years, there has been a little change in the text summarising research trend as well. New trends have evolved that show how to improve text summarization performance and achieve high accuracy. Hence, this project mainly focuses on designing an extractive summarizer of English text/document which generate abbreviated summary with the help of different algorithms.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"In this new era of artificial intelligence and automation there is outburst in amount of data. It is challenging for a person to dig into the content and bring the light on essential data. So, for such complexity there is need of developing a perfunctory task of automatic and precise text summary of data. Automatic text summarizer reduces reading time and make selection process easier. In recent years, there has been a little change in the text summarising research trend as well. New trends have evolved that show how to improve text summarization performance and achieve high accuracy. Hence, this project mainly focuses on designing an extractive summarizer of English text/document which generate abbreviated summary with the help of different algorithms.","internal_url":"https://www.academia.edu/119808045/An_Automatic_Extractive_Text_Summarization","translated_internal_url":"","created_at":"2024-05-22T04:32:55.183-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730498,"work_id":119808045,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154018,"email":"m***a@mitaoe.ac.in","display_order":1,"name":"Meet Bedhmutha","title":"An Automatic Extractive Text Summarization"},{"id":41730499,"work_id":119808045,"tagging_user_id":32919427,"tagged_user_id":315700413,"co_author_invite_id":8154019,"email":"c***v@mitaoe.ac.in","display_order":2,"name":"Chandan Yadav","title":"An Automatic Extractive Text Summarization"},{"id":41730500,"work_id":119808045,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154020,"email":"d***i@mitaoe.ac.in","display_order":3,"name":"Devashish Dani","title":"An Automatic Extractive Text Summarization"},{"id":41730501,"work_id":119808045,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154021,"email":"k***l@mitaoe.ac.in","display_order":4,"name":"Kshitij Patil","title":"An Automatic Extractive Text Summarization"}],"downloadable_attachments":[{"id":115146022,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146022/thumbnails/1.jpg","file_name":"332_1_2881_2886.pdf","download_url":"https://www.academia.edu/attachments/115146022/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Automatic_Extractive_Text_Summarizati.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146022/332_1_2881_2886-libre.pdf?1716378665=\u0026response-content-disposition=attachment%3B+filename%3DAn_Automatic_Extractive_Text_Summarizati.pdf\u0026Expires=1732468484\u0026Signature=T22m4ZdGNvVecrZE013F560kow414UrNR1ZtUhYQ46N0HjUVdZHk9eyfMWsTuj81punzDgwPZxeUVmmnsxtUS650iiv4bSWmScQlitT-GtF5vzYs4-QSKtnXAZn4gswKDysOGRQqycSU97oXp7JriPod85B0~FSlpaLa9aaqZrG6NiBr~uVu6Ut8kheBaNti5xDuxjr~1QRgkqLnueuXvT5bGg4iKvpqedQLH1o9h57rBjFfhfX6q98fptqlt0McexDumd~QWu0u-18o3sEMsuoQWVFtMC1r5o1inU7o7i2JwaBX6h2SGmg~CNVMVeF-V~NkPi87sL1YGXPARqJ95Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"An_Automatic_Extractive_Text_Summarization","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115146022,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115146022/thumbnails/1.jpg","file_name":"332_1_2881_2886.pdf","download_url":"https://www.academia.edu/attachments/115146022/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"An_Automatic_Extractive_Text_Summarizati.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115146022/332_1_2881_2886-libre.pdf?1716378665=\u0026response-content-disposition=attachment%3B+filename%3DAn_Automatic_Extractive_Text_Summarizati.pdf\u0026Expires=1732468484\u0026Signature=T22m4ZdGNvVecrZE013F560kow414UrNR1ZtUhYQ46N0HjUVdZHk9eyfMWsTuj81punzDgwPZxeUVmmnsxtUS650iiv4bSWmScQlitT-GtF5vzYs4-QSKtnXAZn4gswKDysOGRQqycSU97oXp7JriPod85B0~FSlpaLa9aaqZrG6NiBr~uVu6Ut8kheBaNti5xDuxjr~1QRgkqLnueuXvT5bGg4iKvpqedQLH1o9h57rBjFfhfX6q98fptqlt0McexDumd~QWu0u-18o3sEMsuoQWVFtMC1r5o1inU7o7i2JwaBX6h2SGmg~CNVMVeF-V~NkPi87sL1YGXPARqJ95Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807982"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807982/Hate_Speech_Detection_using_Logistic_Regression_on_Bag_of_Words_Model"><img alt="Research paper thumbnail of Hate Speech Detection using Logistic Regression on Bag of Words Model" class="work-thumbnail" src="https://attachments.academia-assets.com/115145935/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807982/Hate_Speech_Detection_using_Logistic_Regression_on_Bag_of_Words_Model">Hate Speech Detection using Logistic Regression on Bag of Words Model</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Hate speech is a conundrum that is spreading like wildfire. Social networks allow members to conn...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Hate speech is a conundrum that is spreading like wildfire. Social networks allow members to connect by a variety of common interests and share information. These channels create and also help communities engage in discussing specific topics related to said news. However, they are also used as a medium to spread hate and offensive news. News on social media spread like a forest fire. Not only social media, but other forms of online media and precedence may cause hate speech to spread. Therefore, trying to prevent it beforehand is much better than causing an outrage. The objective of this paper is to try to establish a reliable model to identify hate speech in sentences. The purpose of this project is to analyze the sentiments of speech used sentences using certain ML algorithms. The Bag of Words model and Document Frequency Inverse Term Frequency (TFIDF) are used to process the text in sentences. Then we use the Logistic Regression algorithm on our bag of words.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="8d94318221a89cc6ad18576a608b3524" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145935,"asset_id":119807982,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145935/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807982"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807982"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807982; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807982]").text(description); $(".js-view-count[data-work-id=119807982]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807982; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807982']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807982, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "8d94318221a89cc6ad18576a608b3524" } } $('.js-work-strip[data-work-id=119807982]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807982,"title":"Hate Speech Detection using Logistic Regression on Bag of Words Model","translated_title":"","metadata":{"abstract":"Hate speech is a conundrum that is spreading like wildfire. Social networks allow members to connect by a variety of common interests and share information. These channels create and also help communities engage in discussing specific topics related to said news. However, they are also used as a medium to spread hate and offensive news. News on social media spread like a forest fire. Not only social media, but other forms of online media and precedence may cause hate speech to spread. Therefore, trying to prevent it beforehand is much better than causing an outrage. The objective of this paper is to try to establish a reliable model to identify hate speech in sentences. The purpose of this project is to analyze the sentiments of speech used sentences using certain ML algorithms. The Bag of Words model and Document Frequency Inverse Term Frequency (TFIDF) are used to process the text in sentences. Then we use the Logistic Regression algorithm on our bag of words.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Hate speech is a conundrum that is spreading like wildfire. Social networks allow members to connect by a variety of common interests and share information. These channels create and also help communities engage in discussing specific topics related to said news. However, they are also used as a medium to spread hate and offensive news. News on social media spread like a forest fire. Not only social media, but other forms of online media and precedence may cause hate speech to spread. Therefore, trying to prevent it beforehand is much better than causing an outrage. The objective of this paper is to try to establish a reliable model to identify hate speech in sentences. The purpose of this project is to analyze the sentiments of speech used sentences using certain ML algorithms. The Bag of Words model and Document Frequency Inverse Term Frequency (TFIDF) are used to process the text in sentences. Then we use the Logistic Regression algorithm on our bag of words.","internal_url":"https://www.academia.edu/119807982/Hate_Speech_Detection_using_Logistic_Regression_on_Bag_of_Words_Model","translated_internal_url":"","created_at":"2024-05-22T04:30:45.590-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[],"downloadable_attachments":[{"id":115145935,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145935/thumbnails/1.jpg","file_name":"331_2875_2880.pdf","download_url":"https://www.academia.edu/attachments/115145935/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hate_Speech_Detection_using_Logistic_Reg.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145935/331_2875_2880-libre.pdf?1716378668=\u0026response-content-disposition=attachment%3B+filename%3DHate_Speech_Detection_using_Logistic_Reg.pdf\u0026Expires=1732468484\u0026Signature=UZSyCI9lz0~BOg4TDLwOgamFyoGu4W7Oeh1AhgGeykHfZIId9aBPKX5ZBbiM6jcvcQFja6K~pXBb5U14eAENF53JFj9gN40sdqtvhOYvwdA3Kfk1Gqbq6hcpjEiyOruMA9OyNeJqBmKPQqjyUy5rKDjt0MhUS99QSIcoYVGjP80fea9V4YatRV0BQrB7SUysQ7kild0fUzOwEvHgo~iPXKRICIc4Qb3-Sbvso29LdFddStUJRJv60sRO~o8qqwZ6SDkk~ThX5gsOumw6azQ3kpGxwujaIaeSedh1qC7020LVcU4euLyxmD0~rrVGuXWajqhPeCmFjQ2RxFvnT4ilYg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Hate_Speech_Detection_using_Logistic_Regression_on_Bag_of_Words_Model","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145935,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145935/thumbnails/1.jpg","file_name":"331_2875_2880.pdf","download_url":"https://www.academia.edu/attachments/115145935/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hate_Speech_Detection_using_Logistic_Reg.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145935/331_2875_2880-libre.pdf?1716378668=\u0026response-content-disposition=attachment%3B+filename%3DHate_Speech_Detection_using_Logistic_Reg.pdf\u0026Expires=1732468484\u0026Signature=UZSyCI9lz0~BOg4TDLwOgamFyoGu4W7Oeh1AhgGeykHfZIId9aBPKX5ZBbiM6jcvcQFja6K~pXBb5U14eAENF53JFj9gN40sdqtvhOYvwdA3Kfk1Gqbq6hcpjEiyOruMA9OyNeJqBmKPQqjyUy5rKDjt0MhUS99QSIcoYVGjP80fea9V4YatRV0BQrB7SUysQ7kild0fUzOwEvHgo~iPXKRICIc4Qb3-Sbvso29LdFddStUJRJv60sRO~o8qqwZ6SDkk~ThX5gsOumw6azQ3kpGxwujaIaeSedh1qC7020LVcU4euLyxmD0~rrVGuXWajqhPeCmFjQ2RxFvnT4ilYg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807898"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807898/A_Review_Paper_on_Cyclone_Intensity_Estimation_on_INSAT_3D_IR_Imagery_using_Deep_Learning_Algorithms"><img alt="Research paper thumbnail of A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms" class="work-thumbnail" src="https://attachments.academia-assets.com/115145874/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807898/A_Review_Paper_on_Cyclone_Intensity_Estimation_on_INSAT_3D_IR_Imagery_using_Deep_Learning_Algorithms">A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/IdesEditor">Grenze International Journal of Engineering and Technology GIJET</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/TejasAdsare">Tejas Adsare</a></span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Due to the various dangers involved, especially tropical cyclones, they are one of the most commo...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Due to the various dangers involved, especially tropical cyclones, they are one of the most common and deadly calamities in the world. The very important primary step in monitoring this destructive disaster is by estimating its intensity. The aim of this research is to determine intensity of cyclones. For the estimation of cyclones and determination of their intensity, various methods have been created. It is a difficult task which requires speed and efficiency. This paper shows comparison between various types of deep learning algorithms on infrared satellite imagery dataset for tropical cyclone intensity estimation. A side-by-side comparison research revealed that the detection of the tropical cyclone intensity evaluated via the models derived from different machine learning algorithms is significantly impacted by the use of various infrared (IR) channels.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="842448f416eab3c8288cf4c9dc4d1412" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145874,"asset_id":119807898,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145874/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807898"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807898"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807898; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807898]").text(description); $(".js-view-count[data-work-id=119807898]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807898; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807898']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807898, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "842448f416eab3c8288cf4c9dc4d1412" } } $('.js-work-strip[data-work-id=119807898]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807898,"title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms","translated_title":"","metadata":{"abstract":"Due to the various dangers involved, especially tropical cyclones, they are one of the most common and deadly calamities in the world. The very important primary step in monitoring this destructive disaster is by estimating its intensity. The aim of this research is to determine intensity of cyclones. For the estimation of cyclones and determination of their intensity, various methods have been created. It is a difficult task which requires speed and efficiency. This paper shows comparison between various types of deep learning algorithms on infrared satellite imagery dataset for tropical cyclone intensity estimation. A side-by-side comparison research revealed that the detection of the tropical cyclone intensity evaluated via the models derived from different machine learning algorithms is significantly impacted by the use of various infrared (IR) channels.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Due to the various dangers involved, especially tropical cyclones, they are one of the most common and deadly calamities in the world. The very important primary step in monitoring this destructive disaster is by estimating its intensity. The aim of this research is to determine intensity of cyclones. For the estimation of cyclones and determination of their intensity, various methods have been created. It is a difficult task which requires speed and efficiency. This paper shows comparison between various types of deep learning algorithms on infrared satellite imagery dataset for tropical cyclone intensity estimation. A side-by-side comparison research revealed that the detection of the tropical cyclone intensity evaluated via the models derived from different machine learning algorithms is significantly impacted by the use of various infrared (IR) channels.","internal_url":"https://www.academia.edu/119807898/A_Review_Paper_on_Cyclone_Intensity_Estimation_on_INSAT_3D_IR_Imagery_using_Deep_Learning_Algorithms","translated_internal_url":"","created_at":"2024-05-22T04:28:58.419-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730476,"work_id":119807898,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154013,"email":"k***e@gmail.com","display_order":1,"name":"Kuldeep Vayadande","title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms"},{"id":41730477,"work_id":119807898,"tagging_user_id":32919427,"tagged_user_id":315457875,"co_author_invite_id":8154014,"email":"t***0@vit.edu","display_order":2,"name":"Tejas Adsare","title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms"},{"id":41730478,"work_id":119807898,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154015,"email":"n***0@vit.edu","display_order":3,"name":"Neeraj Agrawal","title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms"},{"id":41730479,"work_id":119807898,"tagging_user_id":32919427,"tagged_user_id":246124228,"co_author_invite_id":null,"email":"t***0@vit.edu","display_order":4,"name":"Dharmik Tejas","title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms"},{"id":41730480,"work_id":119807898,"tagging_user_id":32919427,"tagged_user_id":306341251,"co_author_invite_id":null,"email":"a***0@vit.edu","display_order":5,"name":"Patil Aishwarya","title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms"},{"id":41730481,"work_id":119807898,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154016,"email":"s***0@vit.edu","display_order":6,"name":"Sakshi Zod","title":"A Review Paper on Cyclone Intensity Estimation on INSAT 3D IR Imagery using Deep Learning Algorithms"}],"downloadable_attachments":[{"id":115145874,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145874/thumbnails/1.jpg","file_name":"330_2869_2874.pdf","download_url":"https://www.academia.edu/attachments/115145874/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Review_Paper_on_Cyclone_Intensity_Esti.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145874/330_2869_2874-libre.pdf?1716378676=\u0026response-content-disposition=attachment%3B+filename%3DA_Review_Paper_on_Cyclone_Intensity_Esti.pdf\u0026Expires=1732468485\u0026Signature=Yh5V0yjk-je71rXDxEJjLHSJyeu~GIeLcLzOyQnETfnxnAq40QvnEQOrPPiBoILXBqaoZKcjGNu56-cFEELR68Eo5ETc1zuo1cyvRX4KN3cXzEBOchWjRAVw00EmOqkEmQSASAizRFOc07bvlEBwq~s0-QYzcHcefkKyTp00k28iCUCA1vZ5KMOxQfnzvdg4N-T3oG8xKbox0FRQCUPiGT0K6GaNwWGSbHNclAkcbGEec8M2R23VD6MOwR8aT7nnQr~lamiCf~aHIMS5K0ts5KRbxDfNDMZzSRN~svtxLeUjlVlB9w0FiHqFxMycscmVfWsNNSZb4FHKHfcANoxUig__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Review_Paper_on_Cyclone_Intensity_Estimation_on_INSAT_3D_IR_Imagery_using_Deep_Learning_Algorithms","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145874,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145874/thumbnails/1.jpg","file_name":"330_2869_2874.pdf","download_url":"https://www.academia.edu/attachments/115145874/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Review_Paper_on_Cyclone_Intensity_Esti.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145874/330_2869_2874-libre.pdf?1716378676=\u0026response-content-disposition=attachment%3B+filename%3DA_Review_Paper_on_Cyclone_Intensity_Esti.pdf\u0026Expires=1732468485\u0026Signature=Yh5V0yjk-je71rXDxEJjLHSJyeu~GIeLcLzOyQnETfnxnAq40QvnEQOrPPiBoILXBqaoZKcjGNu56-cFEELR68Eo5ETc1zuo1cyvRX4KN3cXzEBOchWjRAVw00EmOqkEmQSASAizRFOc07bvlEBwq~s0-QYzcHcefkKyTp00k28iCUCA1vZ5KMOxQfnzvdg4N-T3oG8xKbox0FRQCUPiGT0K6GaNwWGSbHNclAkcbGEec8M2R23VD6MOwR8aT7nnQr~lamiCf~aHIMS5K0ts5KRbxDfNDMZzSRN~svtxLeUjlVlB9w0FiHqFxMycscmVfWsNNSZb4FHKHfcANoxUig__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807803"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807803/Comparative_Study_on_Calculating_CPU_Burst_Time_using_Different_Machine_Learning_Algorithms"><img alt="Research paper thumbnail of Comparative Study on Calculating CPU Burst Time using Different Machine Learning Algorithms" class="work-thumbnail" src="https://attachments.academia-assets.com/115145790/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807803/Comparative_Study_on_Calculating_CPU_Burst_Time_using_Different_Machine_Learning_Algorithms">Comparative Study on Calculating CPU Burst Time using Different Machine Learning Algorithms</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This paper gives a thorough analysis of works on the subject of expert assessment of CPU burst ti...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This paper gives a thorough analysis of works on the subject of expert assessment of CPU burst time using various machine learning algorithms. Knowing how long the CPU bursts for the processes will last is necessary for some CPU scheduling algorithms like SJF and SRTF to function. In particular, the non-preemptive SJF scheduling algorithm estimates the process that will be performed by the CPU in the least amount of burst time. One effective way of predicting CPU burst duration is an ML-based algorithm that estimates the burst-time of the processes. Throughout the study, we discovered that the effectiveness of different machinelearning approaches relies on the applications to which they are put. Our examination of the literature not only argues that these methods are competitive with conventional estimators on a single data set, but also demonstrates that they are responsive to the training data.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="03b863c17cf89fa476303b67a467c260" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145790,"asset_id":119807803,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145790/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807803"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807803"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807803; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807803]").text(description); $(".js-view-count[data-work-id=119807803]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807803; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807803']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807803, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "03b863c17cf89fa476303b67a467c260" } } $('.js-work-strip[data-work-id=119807803]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807803,"title":"Comparative Study on Calculating CPU Burst Time using Different Machine Learning Algorithms","translated_title":"","metadata":{"abstract":"This paper gives a thorough analysis of works on the subject of expert assessment of CPU burst time using various machine learning algorithms. Knowing how long the CPU bursts for the processes will last is necessary for some CPU scheduling algorithms like SJF and SRTF to function. In particular, the non-preemptive SJF scheduling algorithm estimates the process that will be performed by the CPU in the least amount of burst time. One effective way of predicting CPU burst duration is an ML-based algorithm that estimates the burst-time of the processes. Throughout the study, we discovered that the effectiveness of different machinelearning approaches relies on the applications to which they are put. Our examination of the literature not only argues that these methods are competitive with conventional estimators on a single data set, but also demonstrates that they are responsive to the training data.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"This paper gives a thorough analysis of works on the subject of expert assessment of CPU burst time using various machine learning algorithms. Knowing how long the CPU bursts for the processes will last is necessary for some CPU scheduling algorithms like SJF and SRTF to function. In particular, the non-preemptive SJF scheduling algorithm estimates the process that will be performed by the CPU in the least amount of burst time. One effective way of predicting CPU burst duration is an ML-based algorithm that estimates the burst-time of the processes. Throughout the study, we discovered that the effectiveness of different machinelearning approaches relies on the applications to which they are put. Our examination of the literature not only argues that these methods are competitive with conventional estimators on a single data set, but also demonstrates that they are responsive to the training data.","internal_url":"https://www.academia.edu/119807803/Comparative_Study_on_Calculating_CPU_Burst_Time_using_Different_Machine_Learning_Algorithms","translated_internal_url":"","created_at":"2024-05-22T04:27:17.328-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730468,"work_id":119807803,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154012,"email":"k***e@vit.edu","display_order":1,"name":"Kuldeep Vayadande","title":"Comparative Study on Calculating CPU Burst Time using Different Machine Learning Algorithms"},{"id":41730469,"work_id":119807803,"tagging_user_id":32919427,"tagged_user_id":240068123,"co_author_invite_id":null,"email":"n***0@vit.edu","display_order":2,"name":"Agarwal Naman","title":"Comparative Study on Calculating CPU Burst Time using Different Machine Learning Algorithms"}],"downloadable_attachments":[{"id":115145790,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145790/thumbnails/1.jpg","file_name":"326_2863_2868.pdf","download_url":"https://www.academia.edu/attachments/115145790/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Comparative_Study_on_Calculating_CPU_Bur.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145790/326_2863_2868-libre.pdf?1716378682=\u0026response-content-disposition=attachment%3B+filename%3DComparative_Study_on_Calculating_CPU_Bur.pdf\u0026Expires=1732468485\u0026Signature=SQVJsRW6wmFyw1Mss4CFsbiy0NhOebDIWPIp3QoVJeUcUeCg2ogIJa6Kzad36bhrIU1dHTlJJvz4yf22wllgnzY8je~4YKITh5dXsKhBOzwZ5PjpdQRKI4AqWETmI2GiX0qR1taccLxmOqoGsGcvfDEcHLtakBIr7PkkP42s4YVIpKC8qXk0NoLzW9nmATLU-5YR969pX15JbKInQpYjfjJvfMTWlvJ0zB3vbRcwkkarbTF3C~E64bNtl1tgq1ckWnWvp6DWJP4QbmTp6w1gCGVqruWv1wu6flm4AEH0f1A7XmhWHjpp3SZIQMLTz-i3~U9-GUEiCSRjX-BMyw4TAw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Comparative_Study_on_Calculating_CPU_Burst_Time_using_Different_Machine_Learning_Algorithms","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145790,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145790/thumbnails/1.jpg","file_name":"326_2863_2868.pdf","download_url":"https://www.academia.edu/attachments/115145790/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Comparative_Study_on_Calculating_CPU_Bur.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145790/326_2863_2868-libre.pdf?1716378682=\u0026response-content-disposition=attachment%3B+filename%3DComparative_Study_on_Calculating_CPU_Bur.pdf\u0026Expires=1732468485\u0026Signature=SQVJsRW6wmFyw1Mss4CFsbiy0NhOebDIWPIp3QoVJeUcUeCg2ogIJa6Kzad36bhrIU1dHTlJJvz4yf22wllgnzY8je~4YKITh5dXsKhBOzwZ5PjpdQRKI4AqWETmI2GiX0qR1taccLxmOqoGsGcvfDEcHLtakBIr7PkkP42s4YVIpKC8qXk0NoLzW9nmATLU-5YR969pX15JbKInQpYjfjJvfMTWlvJ0zB3vbRcwkkarbTF3C~E64bNtl1tgq1ckWnWvp6DWJP4QbmTp6w1gCGVqruWv1wu6flm4AEH0f1A7XmhWHjpp3SZIQMLTz-i3~U9-GUEiCSRjX-BMyw4TAw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807669"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807669/_Turning_Straw_into_Gold_using_Semantic_and_Big_Data_Technologies_for_Competence_Mapping"><img alt="Research paper thumbnail of "Turning Straw into Gold", using Semantic and Big Data Technologies for Competence Mapping" class="work-thumbnail" src="https://attachments.academia-assets.com/115145702/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807669/_Turning_Straw_into_Gold_using_Semantic_and_Big_Data_Technologies_for_Competence_Mapping">"Turning Straw into Gold", using Semantic and Big Data Technologies for Competence Mapping</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The unstructured nature of Big Data poses several challenges to develop representations capable o...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The unstructured nature of Big Data poses several challenges to develop representations capable of handling such data. The work presented in this paper addresses the Competence Mapping problem. Semantic technologies such as Resource Description Framework and standard ontology enrich unstructured job data and enable retrieval of semantically relevant matches, as opposed to keyword based approaches.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0bc06037c45affd2ef73f6e56516575f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145702,"asset_id":119807669,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145702/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807669"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807669"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807669; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807669]").text(description); $(".js-view-count[data-work-id=119807669]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807669; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807669']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807669, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0bc06037c45affd2ef73f6e56516575f" } } $('.js-work-strip[data-work-id=119807669]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807669,"title":"\"Turning Straw into Gold\", using Semantic and Big Data Technologies for Competence Mapping","translated_title":"","metadata":{"abstract":"The unstructured nature of Big Data poses several challenges to develop representations capable of handling such data. The work presented in this paper addresses the Competence Mapping problem. Semantic technologies such as Resource Description Framework and standard ontology enrich unstructured job data and enable retrieval of semantically relevant matches, as opposed to keyword based approaches.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"The unstructured nature of Big Data poses several challenges to develop representations capable of handling such data. The work presented in this paper addresses the Competence Mapping problem. Semantic technologies such as Resource Description Framework and standard ontology enrich unstructured job data and enable retrieval of semantically relevant matches, as opposed to keyword based approaches.","internal_url":"https://www.academia.edu/119807669/_Turning_Straw_into_Gold_using_Semantic_and_Big_Data_Technologies_for_Competence_Mapping","translated_internal_url":"","created_at":"2024-05-22T04:25:18.601-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730464,"work_id":119807669,"tagging_user_id":32919427,"tagged_user_id":123453472,"co_author_invite_id":null,"email":"m***r@git.edu","affiliation":"Visvesvaraya Technological University","display_order":1,"name":"Manjula Ramannavar","title":"\"Turning Straw into Gold\", using Semantic and Big Data Technologies for Competence Mapping"},{"id":41730465,"work_id":119807669,"tagging_user_id":32919427,"tagged_user_id":10584588,"co_author_invite_id":null,"email":"m***h@git.edu","display_order":2,"name":"Mallikarjun Math","title":"\"Turning Straw into Gold\", using Semantic and Big Data Technologies for Competence Mapping"}],"downloadable_attachments":[{"id":115145702,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145702/thumbnails/1.jpg","file_name":"326_1_2852_2862.pdf","download_url":"https://www.academia.edu/attachments/115145702/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Turning_Straw_into_Gold_using_Semantic.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145702/326_1_2852_2862-libre.pdf?1716378694=\u0026response-content-disposition=attachment%3B+filename%3DTurning_Straw_into_Gold_using_Semantic.pdf\u0026Expires=1732468485\u0026Signature=FfX-i7m2s1TeXY5I4p1AXYVlGj7rkSZlJCfrOVBCajubM5adSwjgDcErS9xoaH1rSJqBhwwZ~wKr79POBkXt3ayyJvQWRKZbwfJxniD1oqsprzT5nDliHgyR2af~iXoBtqNPDLLGUxCDr9KQEPHlQ6tb-2UFhKllNpTzO3-9x0MwmjM-RKK5YLTdoVBeIlb8h-7LY6JPfP0F6IDPMf0UN8c7CSZkTVemzvwsYoC0z6tvZM1nsN2kkzKcDrUHuwHC2HhSW8HkA-fRcvrcQIc3k-wGyj6tOokPmYPQ9NkBDKSDCQAWX4pDSBgT5A38vs69sNC6OLWWFwu9F8bQRGqCpw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"_Turning_Straw_into_Gold_using_Semantic_and_Big_Data_Technologies_for_Competence_Mapping","translated_slug":"","page_count":11,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145702,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145702/thumbnails/1.jpg","file_name":"326_1_2852_2862.pdf","download_url":"https://www.academia.edu/attachments/115145702/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Turning_Straw_into_Gold_using_Semantic.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145702/326_1_2852_2862-libre.pdf?1716378694=\u0026response-content-disposition=attachment%3B+filename%3DTurning_Straw_into_Gold_using_Semantic.pdf\u0026Expires=1732468485\u0026Signature=FfX-i7m2s1TeXY5I4p1AXYVlGj7rkSZlJCfrOVBCajubM5adSwjgDcErS9xoaH1rSJqBhwwZ~wKr79POBkXt3ayyJvQWRKZbwfJxniD1oqsprzT5nDliHgyR2af~iXoBtqNPDLLGUxCDr9KQEPHlQ6tb-2UFhKllNpTzO3-9x0MwmjM-RKK5YLTdoVBeIlb8h-7LY6JPfP0F6IDPMf0UN8c7CSZkTVemzvwsYoC0z6tvZM1nsN2kkzKcDrUHuwHC2HhSW8HkA-fRcvrcQIc3k-wGyj6tOokPmYPQ9NkBDKSDCQAWX4pDSBgT5A38vs69sNC6OLWWFwu9F8bQRGqCpw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807617"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807617/Risk_Assessment_of_Stock_Market_Analysis_using_Time_Series_Analysis"><img alt="Research paper thumbnail of Risk Assessment of Stock Market Analysis using Time Series Analysis" class="work-thumbnail" src="https://attachments.academia-assets.com/115145653/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807617/Risk_Assessment_of_Stock_Market_Analysis_using_Time_Series_Analysis">Risk Assessment of Stock Market Analysis using Time Series Analysis</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Stock market forecasting and risk assessment heavily influence investors' financial decisions. Ma...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Stock market forecasting and risk assessment heavily influence investors' financial decisions. Many depend on news announcements to judge the purchase or sale of risky stocks. Due to the complexity and ambiguity of natural languages, however, reliable modeling and risk management of stock market patterns derived from news releases is challenging. In contrast to past work in this field, which generally uses bag-of-words to extract tens of thousands of characteristics to construct a prediction model, this study employs a novel approach that extracts tens of thousands of features directly from the text itself. We present a Time Series Forecasting based method for financial/stock market prediction with risk assessment using a histology dataset. In particular, Time Series Forecasting is performed at the pre-processing stage to extract time period-related characteristics from financial news. Using the collected features, a time seriesbased metaheuristic CNN (MCNN) model is used to construct a prediction with risk assessment. Using a model based on MCNN, we hope to get better outcomes than previous methods in terms of speed and precision while minimizing risk. The performance is attributable to the time analysis performed during the pre-processing step since it decreases the feature dimensions substantially. Using the suggested method, we aim to enhance the accuracy of stock price forecasts based on a selection of data sets.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="97b24fe9628e66e66dffef2df3959f73" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145653,"asset_id":119807617,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145653/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807617"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807617"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807617; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807617]").text(description); $(".js-view-count[data-work-id=119807617]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807617; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807617']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807617, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "97b24fe9628e66e66dffef2df3959f73" } } $('.js-work-strip[data-work-id=119807617]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807617,"title":"Risk Assessment of Stock Market Analysis using Time Series Analysis","translated_title":"","metadata":{"abstract":"Stock market forecasting and risk assessment heavily influence investors' financial decisions. Many depend on news announcements to judge the purchase or sale of risky stocks. Due to the complexity and ambiguity of natural languages, however, reliable modeling and risk management of stock market patterns derived from news releases is challenging. In contrast to past work in this field, which generally uses bag-of-words to extract tens of thousands of characteristics to construct a prediction model, this study employs a novel approach that extracts tens of thousands of features directly from the text itself. We present a Time Series Forecasting based method for financial/stock market prediction with risk assessment using a histology dataset. In particular, Time Series Forecasting is performed at the pre-processing stage to extract time period-related characteristics from financial news. Using the collected features, a time seriesbased metaheuristic CNN (MCNN) model is used to construct a prediction with risk assessment. Using a model based on MCNN, we hope to get better outcomes than previous methods in terms of speed and precision while minimizing risk. The performance is attributable to the time analysis performed during the pre-processing step since it decreases the feature dimensions substantially. Using the suggested method, we aim to enhance the accuracy of stock price forecasts based on a selection of data sets.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Stock market forecasting and risk assessment heavily influence investors' financial decisions. Many depend on news announcements to judge the purchase or sale of risky stocks. Due to the complexity and ambiguity of natural languages, however, reliable modeling and risk management of stock market patterns derived from news releases is challenging. In contrast to past work in this field, which generally uses bag-of-words to extract tens of thousands of characteristics to construct a prediction model, this study employs a novel approach that extracts tens of thousands of features directly from the text itself. We present a Time Series Forecasting based method for financial/stock market prediction with risk assessment using a histology dataset. In particular, Time Series Forecasting is performed at the pre-processing stage to extract time period-related characteristics from financial news. Using the collected features, a time seriesbased metaheuristic CNN (MCNN) model is used to construct a prediction with risk assessment. Using a model based on MCNN, we hope to get better outcomes than previous methods in terms of speed and precision while minimizing risk. The performance is attributable to the time analysis performed during the pre-processing step since it decreases the feature dimensions substantially. Using the suggested method, we aim to enhance the accuracy of stock price forecasts based on a selection of data sets.","internal_url":"https://www.academia.edu/119807617/Risk_Assessment_of_Stock_Market_Analysis_using_Time_Series_Analysis","translated_internal_url":"","created_at":"2024-05-22T04:23:41.442-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730445,"work_id":119807617,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8154009,"email":"s***2@gmail.com","display_order":1,"name":"Sayem Patni","title":"Risk Assessment of Stock Market Analysis using Time Series Analysis"},{"id":41730446,"work_id":119807617,"tagging_user_id":32919427,"tagged_user_id":233740102,"co_author_invite_id":null,"email":"a***r@sandipuniversity.edu.in","display_order":2,"name":"Amit Gadekar","title":"Risk Assessment of Stock Market Analysis using Time Series Analysis"}],"downloadable_attachments":[{"id":115145653,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145653/thumbnails/1.jpg","file_name":"325_2847_2851.pdf","download_url":"https://www.academia.edu/attachments/115145653/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Risk_Assessment_of_Stock_Market_Analysis.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145653/325_2847_2851-libre.pdf?1716378696=\u0026response-content-disposition=attachment%3B+filename%3DRisk_Assessment_of_Stock_Market_Analysis.pdf\u0026Expires=1732468485\u0026Signature=bXg-br~kTT~LDPJYBJ7jeeQc2CGFnTbkBI8l15AoaqcWToAKuzI2xVQf3pURuWjbqg3Nfnl-n760IOR9xW2L6zW00VNwu5IiOzk35wOtqALmPM~0lJXOqLJFaLZGh1KbGh20-jbEJOobjzWkGltrK4EwmbtEiThtIQ6qxSqhVzQbGlrEuuMfc~YaOsCr4TnF3E-Dps8eqd9oG0tMNdd2wVIlxFKmZR9uD-WnyTAiZuiVZ~HX29XHjrvFO~SyxRO9xZ3ouvFq8AxyLOTjlC2440NMfgkq8jOEyKDKRwc8o9OvzuTxdIFCXN-P7jenut24uPQaG6b1pwOKScmNKS7Fsg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Risk_Assessment_of_Stock_Market_Analysis_using_Time_Series_Analysis","translated_slug":"","page_count":5,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145653,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145653/thumbnails/1.jpg","file_name":"325_2847_2851.pdf","download_url":"https://www.academia.edu/attachments/115145653/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Risk_Assessment_of_Stock_Market_Analysis.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145653/325_2847_2851-libre.pdf?1716378696=\u0026response-content-disposition=attachment%3B+filename%3DRisk_Assessment_of_Stock_Market_Analysis.pdf\u0026Expires=1732468485\u0026Signature=bXg-br~kTT~LDPJYBJ7jeeQc2CGFnTbkBI8l15AoaqcWToAKuzI2xVQf3pURuWjbqg3Nfnl-n760IOR9xW2L6zW00VNwu5IiOzk35wOtqALmPM~0lJXOqLJFaLZGh1KbGh20-jbEJOobjzWkGltrK4EwmbtEiThtIQ6qxSqhVzQbGlrEuuMfc~YaOsCr4TnF3E-Dps8eqd9oG0tMNdd2wVIlxFKmZR9uD-WnyTAiZuiVZ~HX29XHjrvFO~SyxRO9xZ3ouvFq8AxyLOTjlC2440NMfgkq8jOEyKDKRwc8o9OvzuTxdIFCXN-P7jenut24uPQaG6b1pwOKScmNKS7Fsg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807472"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807472/A_Study_on_Various_Sentiment_Analysis_for_Mixed_Transliterated_Indigenous_Language_using_Machine_Learning_Algorithms"><img alt="Research paper thumbnail of A Study on Various Sentiment Analysis for Mixed Transliterated Indigenous Language using Machine Learning Algorithms" class="work-thumbnail" src="https://attachments.academia-assets.com/115145567/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807472/A_Study_on_Various_Sentiment_Analysis_for_Mixed_Transliterated_Indigenous_Language_using_Machine_Learning_Algorithms">A Study on Various Sentiment Analysis for Mixed Transliterated Indigenous Language using Machine Learning Algorithms</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The evolution of Information Technology has led to the collection of large amounts of data, the v...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The evolution of Information Technology has led to the collection of large amounts of data, the volume of which has increased to the extent that in the last two years the data produced is greater than all the data ever recorded in human history. This has necessitated the use of machines to understand, interpret and apply data, without manual involvement. Sentiment Analysis has become the area of deep research due to the necessity wrought about by the advent of social media tools such as Twitter, Facebook, WhatsApp, and so on. In this survey, we will analyze 25 literature works concentrating on machine learning approaches associated with sentiment analysis for mixed transliterated languages, bringing into light the various shortcomings of the existing methodologies. Here, the analysis of various methods will be facilitated based on several factors, such as performance metrics, year of publication and journals, achievements of the techniques in numerical evaluations, and so on. On the other hand, the analysis of the methods with respect to the merits and demerits of the methods will be presented. Lastly, the paper discusses the potential future research directions and challenges in achieving better accuracy for sentiment analysis. The motivation of the research will be described in detail through the comparative discussion of the methods.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="367f5165c15428e8f34976a7c139d31b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145567,"asset_id":119807472,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145567/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807472"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807472"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807472; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807472]").text(description); $(".js-view-count[data-work-id=119807472]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807472; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807472']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807472, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "367f5165c15428e8f34976a7c139d31b" } } $('.js-work-strip[data-work-id=119807472]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807472,"title":"A Study on Various Sentiment Analysis for Mixed Transliterated Indigenous Language using Machine Learning Algorithms","translated_title":"","metadata":{"abstract":"The evolution of Information Technology has led to the collection of large amounts of data, the volume of which has increased to the extent that in the last two years the data produced is greater than all the data ever recorded in human history. This has necessitated the use of machines to understand, interpret and apply data, without manual involvement. Sentiment Analysis has become the area of deep research due to the necessity wrought about by the advent of social media tools such as Twitter, Facebook, WhatsApp, and so on. In this survey, we will analyze 25 literature works concentrating on machine learning approaches associated with sentiment analysis for mixed transliterated languages, bringing into light the various shortcomings of the existing methodologies. Here, the analysis of various methods will be facilitated based on several factors, such as performance metrics, year of publication and journals, achievements of the techniques in numerical evaluations, and so on. On the other hand, the analysis of the methods with respect to the merits and demerits of the methods will be presented. Lastly, the paper discusses the potential future research directions and challenges in achieving better accuracy for sentiment analysis. The motivation of the research will be described in detail through the comparative discussion of the methods.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"The evolution of Information Technology has led to the collection of large amounts of data, the volume of which has increased to the extent that in the last two years the data produced is greater than all the data ever recorded in human history. This has necessitated the use of machines to understand, interpret and apply data, without manual involvement. Sentiment Analysis has become the area of deep research due to the necessity wrought about by the advent of social media tools such as Twitter, Facebook, WhatsApp, and so on. In this survey, we will analyze 25 literature works concentrating on machine learning approaches associated with sentiment analysis for mixed transliterated languages, bringing into light the various shortcomings of the existing methodologies. Here, the analysis of various methods will be facilitated based on several factors, such as performance metrics, year of publication and journals, achievements of the techniques in numerical evaluations, and so on. On the other hand, the analysis of the methods with respect to the merits and demerits of the methods will be presented. Lastly, the paper discusses the potential future research directions and challenges in achieving better accuracy for sentiment analysis. The motivation of the research will be described in detail through the comparative discussion of the methods.","internal_url":"https://www.academia.edu/119807472/A_Study_on_Various_Sentiment_Analysis_for_Mixed_Transliterated_Indigenous_Language_using_Machine_Learning_Algorithms","translated_internal_url":"","created_at":"2024-05-22T04:21:44.985-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[],"downloadable_attachments":[{"id":115145567,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145567/thumbnails/1.jpg","file_name":"324_1_2838_2846.pdf","download_url":"https://www.academia.edu/attachments/115145567/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Study_on_Various_Sentiment_Analysis_fo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145567/324_1_2838_2846-libre.pdf?1716378705=\u0026response-content-disposition=attachment%3B+filename%3DA_Study_on_Various_Sentiment_Analysis_fo.pdf\u0026Expires=1732468486\u0026Signature=VF5M1u1Y9106Encb-4bZeFE2kIu7BhTuaEt1GmSdSeSx1E3OK34P4Hjj7BleVSMBSJURBC4v73Ka5tFj5---ID4Cfwxl8XkOWbPcHvwTZsd7JtodYuIcsIHfe87f~JIg-MHvTrefBd00~XWVIZ~EDCiciCbH8dvs7lm7HMZhNmG4f4a6mju9eol35~~nkFFOZtCO1lB~Sctp6axoKyLbVEElawv6S-ZCrFvNC1MlictkezMDr6EBKNPpM1XK8rGI7FBsePBRiWJzLhqYIy5PT477RsWQRRpxSxNF7tsTHGMHVwNG7HlhYhsoARsIE4Nm1f4WLuxyoUz6RXddGReM7g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Study_on_Various_Sentiment_Analysis_for_Mixed_Transliterated_Indigenous_Language_using_Machine_Learning_Algorithms","translated_slug":"","page_count":9,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145567,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145567/thumbnails/1.jpg","file_name":"324_1_2838_2846.pdf","download_url":"https://www.academia.edu/attachments/115145567/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Study_on_Various_Sentiment_Analysis_fo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145567/324_1_2838_2846-libre.pdf?1716378705=\u0026response-content-disposition=attachment%3B+filename%3DA_Study_on_Various_Sentiment_Analysis_fo.pdf\u0026Expires=1732468486\u0026Signature=VF5M1u1Y9106Encb-4bZeFE2kIu7BhTuaEt1GmSdSeSx1E3OK34P4Hjj7BleVSMBSJURBC4v73Ka5tFj5---ID4Cfwxl8XkOWbPcHvwTZsd7JtodYuIcsIHfe87f~JIg-MHvTrefBd00~XWVIZ~EDCiciCbH8dvs7lm7HMZhNmG4f4a6mju9eol35~~nkFFOZtCO1lB~Sctp6axoKyLbVEElawv6S-ZCrFvNC1MlictkezMDr6EBKNPpM1XK8rGI7FBsePBRiWJzLhqYIy5PT477RsWQRRpxSxNF7tsTHGMHVwNG7HlhYhsoARsIE4Nm1f4WLuxyoUz6RXddGReM7g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807397"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807397/Hybrid_Ensemble_based_Feature_Engineering_for_Detecting_Direct_DDOS_Flooding_Attack_in_Cloud"><img alt="Research paper thumbnail of Hybrid Ensemble based Feature Engineering for Detecting Direct DDOS Flooding Attack in Cloud" class="work-thumbnail" src="https://attachments.academia-assets.com/115145481/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807397/Hybrid_Ensemble_based_Feature_Engineering_for_Detecting_Direct_DDOS_Flooding_Attack_in_Cloud">Hybrid Ensemble based Feature Engineering for Detecting Direct DDOS Flooding Attack in Cloud</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In recent years, both the general public and commercial enterprises have grown more and more inte...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In recent years, both the general public and commercial enterprises have grown more and more interested in using cloud services. The majority of businesses use cloud computing technologies for production operations, which draws hackers. Nowadays, one of the most popular methods used to obstruct the availability of essential internet services is Distributed Denial of Service (DDoS) floods. These attacks either totally destroy the victim or overload it with a massive amount of traffic that prevents it from carrying out normal communication. The cloud's services are fully suspended if there are any delays in identifying flooding attacks. A preprocessing stage in cloud DDoS attack defence known as feature engineering has been recognized as having the potential to improve classification accuracy and lower computing complexity. In this article, we suggest a DDoS intrusion detection system for use in cloud environments. The application of filter and wrapper-based feature selection techniques along with machine learning is proposed as a hybrid ensemble-based feature engineering strategy. The benchmark dataset, which fills in the gaps in the current datasets and comprises a wide range of direct DDoS flooding attacks, is used to assess the model. To prevent data overfitting issues, area-user-curve analysis is also assessed. When compared to previous benchmarking techniques, the evaluation and findings revealed a considerable improvement in attack detection. This framework offers a high detection rate and classification accuracy when contrasted with the existing framework. Hence, it is more suitable for protecting the cloud.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="797712078080e32df95d10a87f475141" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145481,"asset_id":119807397,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145481/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807397"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807397"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807397; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807397]").text(description); $(".js-view-count[data-work-id=119807397]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807397; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807397']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807397, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "797712078080e32df95d10a87f475141" } } $('.js-work-strip[data-work-id=119807397]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807397,"title":"Hybrid Ensemble based Feature Engineering for Detecting Direct DDOS Flooding Attack in Cloud","translated_title":"","metadata":{"abstract":"In recent years, both the general public and commercial enterprises have grown more and more interested in using cloud services. The majority of businesses use cloud computing technologies for production operations, which draws hackers. Nowadays, one of the most popular methods used to obstruct the availability of essential internet services is Distributed Denial of Service (DDoS) floods. These attacks either totally destroy the victim or overload it with a massive amount of traffic that prevents it from carrying out normal communication. The cloud's services are fully suspended if there are any delays in identifying flooding attacks. A preprocessing stage in cloud DDoS attack defence known as feature engineering has been recognized as having the potential to improve classification accuracy and lower computing complexity. In this article, we suggest a DDoS intrusion detection system for use in cloud environments. The application of filter and wrapper-based feature selection techniques along with machine learning is proposed as a hybrid ensemble-based feature engineering strategy. The benchmark dataset, which fills in the gaps in the current datasets and comprises a wide range of direct DDoS flooding attacks, is used to assess the model. To prevent data overfitting issues, area-user-curve analysis is also assessed. When compared to previous benchmarking techniques, the evaluation and findings revealed a considerable improvement in attack detection. This framework offers a high detection rate and classification accuracy when contrasted with the existing framework. Hence, it is more suitable for protecting the cloud.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"In recent years, both the general public and commercial enterprises have grown more and more interested in using cloud services. The majority of businesses use cloud computing technologies for production operations, which draws hackers. Nowadays, one of the most popular methods used to obstruct the availability of essential internet services is Distributed Denial of Service (DDoS) floods. These attacks either totally destroy the victim or overload it with a massive amount of traffic that prevents it from carrying out normal communication. The cloud's services are fully suspended if there are any delays in identifying flooding attacks. A preprocessing stage in cloud DDoS attack defence known as feature engineering has been recognized as having the potential to improve classification accuracy and lower computing complexity. In this article, we suggest a DDoS intrusion detection system for use in cloud environments. The application of filter and wrapper-based feature selection techniques along with machine learning is proposed as a hybrid ensemble-based feature engineering strategy. The benchmark dataset, which fills in the gaps in the current datasets and comprises a wide range of direct DDoS flooding attacks, is used to assess the model. To prevent data overfitting issues, area-user-curve analysis is also assessed. When compared to previous benchmarking techniques, the evaluation and findings revealed a considerable improvement in attack detection. This framework offers a high detection rate and classification accuracy when contrasted with the existing framework. Hence, it is more suitable for protecting the cloud.","internal_url":"https://www.academia.edu/119807397/Hybrid_Ensemble_based_Feature_Engineering_for_Detecting_Direct_DDOS_Flooding_Attack_in_Cloud","translated_internal_url":"","created_at":"2024-05-22T04:18:08.294-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730375,"work_id":119807397,"tagging_user_id":32919427,"tagged_user_id":135736264,"co_author_invite_id":null,"email":"k***m@gmail.com","display_order":1,"name":"Kalaivani Marappan","title":"Hybrid Ensemble based Feature Engineering for Detecting Direct DDOS Flooding Attack in Cloud"}],"downloadable_attachments":[{"id":115145481,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145481/thumbnails/1.jpg","file_name":"323_2_2829_2837.pdf","download_url":"https://www.academia.edu/attachments/115145481/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hybrid_Ensemble_based_Feature_Engineerin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145481/323_2_2829_2837-libre.pdf?1716378717=\u0026response-content-disposition=attachment%3B+filename%3DHybrid_Ensemble_based_Feature_Engineerin.pdf\u0026Expires=1732468486\u0026Signature=gc~~mz--kdF6axB4lNllji9quNL6-U6sj8EeON68NGreQ7pLdi8ZEM3R6QA67SgYNB088vXlUP~xz6kk8x7yQ-uMarMlq-3MGp9c~OFVRq-IycvhbHP3Hn5nO3sVOMe3ofd7jCliZe2qf0rvVoXrMeEKHcUj7FPPNlNU5FpB6CI3L8~S~cnBLvhdQ6DAjWhqCtHYkOtzc6ZLDFrh4DE3BF9w~~ebGk0Vc5ykZJdMgVphrhVcDmmbTzcwGnifK3K-vjKdZF0~a9KvzsNs~Ia93gQiCMFwISFcNB6SZQpnuLd1PNOThaZXMgYSsP6FHy6M-dNOA82aX5~4Ls12A-6gyA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Hybrid_Ensemble_based_Feature_Engineering_for_Detecting_Direct_DDOS_Flooding_Attack_in_Cloud","translated_slug":"","page_count":9,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145481,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145481/thumbnails/1.jpg","file_name":"323_2_2829_2837.pdf","download_url":"https://www.academia.edu/attachments/115145481/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hybrid_Ensemble_based_Feature_Engineerin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145481/323_2_2829_2837-libre.pdf?1716378717=\u0026response-content-disposition=attachment%3B+filename%3DHybrid_Ensemble_based_Feature_Engineerin.pdf\u0026Expires=1732468486\u0026Signature=gc~~mz--kdF6axB4lNllji9quNL6-U6sj8EeON68NGreQ7pLdi8ZEM3R6QA67SgYNB088vXlUP~xz6kk8x7yQ-uMarMlq-3MGp9c~OFVRq-IycvhbHP3Hn5nO3sVOMe3ofd7jCliZe2qf0rvVoXrMeEKHcUj7FPPNlNU5FpB6CI3L8~S~cnBLvhdQ6DAjWhqCtHYkOtzc6ZLDFrh4DE3BF9w~~ebGk0Vc5ykZJdMgVphrhVcDmmbTzcwGnifK3K-vjKdZF0~a9KvzsNs~Ia93gQiCMFwISFcNB6SZQpnuLd1PNOThaZXMgYSsP6FHy6M-dNOA82aX5~4Ls12A-6gyA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807200"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807200/A_Neural_Attention_Models_Survey_for_Deep_Learning"><img alt="Research paper thumbnail of A Neural Attention Models Survey for Deep Learning" class="work-thumbnail" src="https://attachments.academia-assets.com/115145372/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807200/A_Neural_Attention_Models_Survey_for_Deep_Learning">A Neural Attention Models Survey for Deep Learning</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Attention is a fundamental component of all perceptual and cognitive processes in humans.This mec...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Attention is a fundamental component of all perceptual and cognitive processes in humans.This mechanism select, modify, and concentrate on the information that is most important to behaviour because of our limited capacity to interpret competing sources. For many years, researchers in the fields of philosophy, psychology, neuroscience, and computing have examined the notions and functions of attention.This characteristic has been thoroughly investigated in deep neural networks over the past six years. In many application domains, neural attention models currently represent the cutting edge of deep learning. A thorough overview and analysis of recent advancements in neural attention models are provided in this survey. In order to identify and examine the architectures where attention has had a notable impact, we thoroughly reviewed hundreds of them in the region. Additionally, we created and made available an automated approach to aid in the growth of reviews in the field. We discuss the main applications of attention in convolutional, recurrent networks, and generative models. We also identify common subgroups of uses and applications. Additionally, we discuss the effects of attention across various application areas and how they affect.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="b9f23f976fec434bb4cfb3e3f5bd48ef" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145372,"asset_id":119807200,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145372/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807200"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807200"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807200; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807200]").text(description); $(".js-view-count[data-work-id=119807200]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807200; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807200']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807200, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "b9f23f976fec434bb4cfb3e3f5bd48ef" } } $('.js-work-strip[data-work-id=119807200]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807200,"title":"A Neural Attention Models Survey for Deep Learning","translated_title":"","metadata":{"abstract":"Attention is a fundamental component of all perceptual and cognitive processes in humans.This mechanism select, modify, and concentrate on the information that is most important to behaviour because of our limited capacity to interpret competing sources. For many years, researchers in the fields of philosophy, psychology, neuroscience, and computing have examined the notions and functions of attention.This characteristic has been thoroughly investigated in deep neural networks over the past six years. In many application domains, neural attention models currently represent the cutting edge of deep learning. A thorough overview and analysis of recent advancements in neural attention models are provided in this survey. In order to identify and examine the architectures where attention has had a notable impact, we thoroughly reviewed hundreds of them in the region. Additionally, we created and made available an automated approach to aid in the growth of reviews in the field. We discuss the main applications of attention in convolutional, recurrent networks, and generative models. We also identify common subgroups of uses and applications. Additionally, we discuss the effects of attention across various application areas and how they affect.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"Attention is a fundamental component of all perceptual and cognitive processes in humans.This mechanism select, modify, and concentrate on the information that is most important to behaviour because of our limited capacity to interpret competing sources. For many years, researchers in the fields of philosophy, psychology, neuroscience, and computing have examined the notions and functions of attention.This characteristic has been thoroughly investigated in deep neural networks over the past six years. In many application domains, neural attention models currently represent the cutting edge of deep learning. A thorough overview and analysis of recent advancements in neural attention models are provided in this survey. In order to identify and examine the architectures where attention has had a notable impact, we thoroughly reviewed hundreds of them in the region. Additionally, we created and made available an automated approach to aid in the growth of reviews in the field. We discuss the main applications of attention in convolutional, recurrent networks, and generative models. We also identify common subgroups of uses and applications. Additionally, we discuss the effects of attention across various application areas and how they affect.","internal_url":"https://www.academia.edu/119807200/A_Neural_Attention_Models_Survey_for_Deep_Learning","translated_internal_url":"","created_at":"2024-05-22T04:15:35.456-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[{"id":41730347,"work_id":119807200,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8153997,"email":"p***u@giet.edu","display_order":1,"name":"Padma Sahu","title":"A Neural Attention Models Survey for Deep Learning"},{"id":41730348,"work_id":119807200,"tagging_user_id":32919427,"tagged_user_id":null,"co_author_invite_id":8153998,"email":"s***n@giet.edu","display_order":2,"name":"Subhrajit Pradhan","title":"A Neural Attention Models Survey for Deep Learning"},{"id":41730349,"work_id":119807200,"tagging_user_id":32919427,"tagged_user_id":35789232,"co_author_invite_id":null,"email":"r***h@gmail.com","display_order":3,"name":"Ratnakar Dash","title":"A Neural Attention Models Survey for Deep Learning"}],"downloadable_attachments":[{"id":115145372,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145372/thumbnails/1.jpg","file_name":"323_1_2821_2828.pdf","download_url":"https://www.academia.edu/attachments/115145372/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Neural_Attention_Models_Survey_for_Dee.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145372/323_1_2821_2828-libre.pdf?1716378726=\u0026response-content-disposition=attachment%3B+filename%3DA_Neural_Attention_Models_Survey_for_Dee.pdf\u0026Expires=1732468486\u0026Signature=TIXFpYSul7hjbdsilQit-DtBN3JKKhJJUe-Bz51qs7DWaG2f31-lts4bQpAwfg~lpHby15O~7SvZltJNbw0nRJT2OUO~HKdJAU7bjYnuPylnNg55HicGS7Z3Y0kaAANMF3jknSqggSKnxKi0khkjRv1-Ss0wlYUEcXh7kBtsw0IQiOnjQL23T8kAQ98UGAUBjeEe7oVSn7-vVIYSXbkCc9fJYu7l0FA7658Wx9fNvpFxVkE~xpQsyrJ4CUQULcnsvPI1SnT~9CwU9X404Ugtnjuytdj00KXyG6~wjYODXmsyH9~S7nXFnRs6R4lU0~9Ui01tUARQgQ~qoE1OxDm-zA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Neural_Attention_Models_Survey_for_Deep_Learning","translated_slug":"","page_count":8,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145372,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145372/thumbnails/1.jpg","file_name":"323_1_2821_2828.pdf","download_url":"https://www.academia.edu/attachments/115145372/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Neural_Attention_Models_Survey_for_Dee.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145372/323_1_2821_2828-libre.pdf?1716378726=\u0026response-content-disposition=attachment%3B+filename%3DA_Neural_Attention_Models_Survey_for_Dee.pdf\u0026Expires=1732468486\u0026Signature=TIXFpYSul7hjbdsilQit-DtBN3JKKhJJUe-Bz51qs7DWaG2f31-lts4bQpAwfg~lpHby15O~7SvZltJNbw0nRJT2OUO~HKdJAU7bjYnuPylnNg55HicGS7Z3Y0kaAANMF3jknSqggSKnxKi0khkjRv1-Ss0wlYUEcXh7kBtsw0IQiOnjQL23T8kAQ98UGAUBjeEe7oVSn7-vVIYSXbkCc9fJYu7l0FA7658Wx9fNvpFxVkE~xpQsyrJ4CUQULcnsvPI1SnT~9CwU9X404Ugtnjuytdj00KXyG6~wjYODXmsyH9~S7nXFnRs6R4lU0~9Ui01tUARQgQ~qoE1OxDm-zA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="119807145"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/119807145/Hand_Gesture_Recognition_An_Approach_of_Multiple_Object_Tracking"><img alt="Research paper thumbnail of Hand Gesture Recognition: An Approach of Multiple Object Tracking" class="work-thumbnail" src="https://attachments.academia-assets.com/115145306/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/119807145/Hand_Gesture_Recognition_An_Approach_of_Multiple_Object_Tracking">Hand Gesture Recognition: An Approach of Multiple Object Tracking</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In the recent year, Object Detection and Tracking technology is one of the challenging and most e...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In the recent year, Object Detection and Tracking technology is one of the<br />challenging and most emerging topic in Computer Vision. Multiple Object Tracking &<br />Detection (MOTD) has gained a lot of importance in various fields such as Autonomous driving,<br />Monitoring security, Surveillance, Health-care monitoring and Gesture recognition etc. Gesture<br />recognition is widely used in various fields of intelligent driving, Virtual reality, and Humancomputer<br />interaction. With the development in various technologies such as Deep Learning,<br />Artificial Intelligence and Human-Computer interaction a new revolution arise in field of<br />computer vision. We endeavor to provide a thorough review on the development of this gesture<br />recognition approach in recent decades. Here our major discussions are about the benefits and<br />limitations of existing approach where focus is on the method of feature extraction in<br />spatiotemporal structure .Various research difficulties that could be pursued will be the<br />research directions.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0640859bf601f1d773185cb92389d774" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":115145306,"asset_id":119807145,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/115145306/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="119807145"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="119807145"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 119807145; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=119807145]").text(description); $(".js-view-count[data-work-id=119807145]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 119807145; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='119807145']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 119807145, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0640859bf601f1d773185cb92389d774" } } $('.js-work-strip[data-work-id=119807145]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":119807145,"title":"Hand Gesture Recognition: An Approach of Multiple Object Tracking","translated_title":"","metadata":{"abstract":"In the recent year, Object Detection and Tracking technology is one of the\nchallenging and most emerging topic in Computer Vision. Multiple Object Tracking \u0026\nDetection (MOTD) has gained a lot of importance in various fields such as Autonomous driving,\nMonitoring security, Surveillance, Health-care monitoring and Gesture recognition etc. Gesture\nrecognition is widely used in various fields of intelligent driving, Virtual reality, and Humancomputer\ninteraction. With the development in various technologies such as Deep Learning,\nArtificial Intelligence and Human-Computer interaction a new revolution arise in field of\ncomputer vision. We endeavor to provide a thorough review on the development of this gesture\nrecognition approach in recent decades. Here our major discussions are about the benefits and\nlimitations of existing approach where focus is on the method of feature extraction in\nspatiotemporal structure .Various research difficulties that could be pursued will be the\nresearch directions.","publication_date":{"day":null,"month":null,"year":2023,"errors":{}}},"translated_abstract":"In the recent year, Object Detection and Tracking technology is one of the\nchallenging and most emerging topic in Computer Vision. Multiple Object Tracking \u0026\nDetection (MOTD) has gained a lot of importance in various fields such as Autonomous driving,\nMonitoring security, Surveillance, Health-care monitoring and Gesture recognition etc. Gesture\nrecognition is widely used in various fields of intelligent driving, Virtual reality, and Humancomputer\ninteraction. With the development in various technologies such as Deep Learning,\nArtificial Intelligence and Human-Computer interaction a new revolution arise in field of\ncomputer vision. We endeavor to provide a thorough review on the development of this gesture\nrecognition approach in recent decades. Here our major discussions are about the benefits and\nlimitations of existing approach where focus is on the method of feature extraction in\nspatiotemporal structure .Various research difficulties that could be pursued will be the\nresearch directions.","internal_url":"https://www.academia.edu/119807145/Hand_Gesture_Recognition_An_Approach_of_Multiple_Object_Tracking","translated_internal_url":"","created_at":"2024-05-22T04:12:39.916-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":32919427,"coauthors_can_edit":true,"document_type":"conference_presentation","co_author_tags":[],"downloadable_attachments":[{"id":115145306,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145306/thumbnails/1.jpg","file_name":"322_1_2817_2820.pdf","download_url":"https://www.academia.edu/attachments/115145306/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hand_Gesture_Recognition_An_Approach_of.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145306/322_1_2817_2820-libre.pdf?1716378729=\u0026response-content-disposition=attachment%3B+filename%3DHand_Gesture_Recognition_An_Approach_of.pdf\u0026Expires=1732468486\u0026Signature=GwF7CrNNT9LwjEiprVgrDdN6gPsB38YJshi8vvFUKC~4440cwhM9G3-8kwIi7-b63t2nybC2vGm7ND9R5Vep4kYaNwcKTfymKWTST3TzxAykmDhb1ee1Ur~RHrthAYVkkj6xj7wSzHzzjdkQcTVEFmAjWvlLrcFsXBuVUysdi0nvONxfMvz5qvnMmUgpz1nN0Mc4JV0uFYZvBSl6ab7Pu3fCTmRSDpJKVL-Wi97V1J09S3doPEmhMfme8A08AGFyyPJ7HuTFCJp6MP0qhsNCfOhJWInyD0dhtq6EgtEGndZLjrFArBZfHeuTQFvAavpH0q1Rof97OpKK9xIRzSfaNQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Hand_Gesture_Recognition_An_Approach_of_Multiple_Object_Tracking","translated_slug":"","page_count":4,"language":"en","content_type":"Work","owner":{"id":32919427,"first_name":"Grenze International Journal of Engineering and Technology","middle_initials":"","last_name":"GIJET","page_name":"IdesEditor","domain_name":"independent","created_at":"2015-07-08T20:53:07.213-07:00","display_name":"Grenze International Journal of Engineering and Technology GIJET","url":"https://independent.academia.edu/IdesEditor"},"attachments":[{"id":115145306,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/115145306/thumbnails/1.jpg","file_name":"322_1_2817_2820.pdf","download_url":"https://www.academia.edu/attachments/115145306/download_file?st=MTczMjQ4MjA2NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Hand_Gesture_Recognition_An_Approach_of.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/115145306/322_1_2817_2820-libre.pdf?1716378729=\u0026response-content-disposition=attachment%3B+filename%3DHand_Gesture_Recognition_An_Approach_of.pdf\u0026Expires=1732468486\u0026Signature=GwF7CrNNT9LwjEiprVgrDdN6gPsB38YJshi8vvFUKC~4440cwhM9G3-8kwIi7-b63t2nybC2vGm7ND9R5Vep4kYaNwcKTfymKWTST3TzxAykmDhb1ee1Ur~RHrthAYVkkj6xj7wSzHzzjdkQcTVEFmAjWvlLrcFsXBuVUysdi0nvONxfMvz5qvnMmUgpz1nN0Mc4JV0uFYZvBSl6ab7Pu3fCTmRSDpJKVL-Wi97V1J09S3doPEmhMfme8A08AGFyyPJ7HuTFCJp6MP0qhsNCfOhJWInyD0dhtq6EgtEGndZLjrFArBZfHeuTQFvAavpH0q1Rof97OpKK9xIRzSfaNQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 1 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "7221dbe2ae2a63b91cf6775b95481d816b845dded0e183758185c202d86fe67b", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="4k30riijEarnqL6cLF2n2FazZZBWZgmqfdmDIURO7d+BTWPIks2EA75x71+U+pSZ8IYflFrmy+SGVnEa6PwSrw==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://independent.academia.edu/IdesEditor" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="Q0Tu+co9YagBQOvZibJr7nreuAH/5vdBi8QG8EuzDbcgRHmfcFP0AViZuhoxFViv3OvCBfNmNQ9wS/TL5wHyxw==" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>