首页 > 最新文献

International Journal Of Scientific Research In Engineering & Technology最新文献

英文 中文
A Genetic Algorithm Based Hybrid Routing Technique for IOT Systems 基于遗传算法的物联网系统混合路由技术
Pub Date : 2024-02-21 DOI: 10.59256/ijsreat.20240401009
Dr Rakesh Kumar
Internet is gaining new heights in the today’s technological environment. Internet of things (IoT) is a new class of Internet based heterogeneous networked application systems which uses various types of sensor/detectors and devices for the exchange and collection of data. Devices need to be in the radio range and must remain continuously connected to the internet. IoT can sense and control the objects remotely across existing networked architecture and builds chances for direct combination among the physical world and computer-based systems. It is believed that, in future many of the household application will be based on IoT. Due to their applications in situations such as building home automation, emergencies, crisis management, energy management and healthcare, message security becomes of top importance in IoT. An optimized routing scheme using the intelligent mathematical techniques, which includes Genetic Algorithms(GA) and Analytical Hierarchy Process(AHP), is proposed here and an optimized route can be encrypted using cryptanalytic techniques. Simulation results of GA and AHP are also presented here for the proposed network. It has been found that overall efficiency of the IoT system can be greatly improved with the proposed model. A comparison is also provided in discussion section which demonstrates that hybrid algorithms developed for IoT systems performs much better than traditional routing algorithms. Keywords: IoT; AHP;GA; Cryptanalytic Techniques; WSN
在当今的技术环境中,互联网正获得新的发展。物联网(IoT)是一种基于互联网的新型异构网络应用系统,它使用各种类型的传感器/探测器和设备来交换和收集数据。设备需要在无线电范围内,并且必须与互联网保持持续连接。物联网可以通过现有的网络架构远程感知和控制物体,并为物理世界和计算机系统之间的直接结合创造机会。相信在未来,许多家庭应用都将以物联网为基础。由于物联网在楼宇家庭自动化、紧急情况、危机管理、能源管理和医疗保健等方面的应用,信息安全成为物联网的重中之重。本文提出了一种使用智能数学技术(包括遗传算法(GA)和层次分析法(AHP))的优化路由方案,并可使用密码分析技术对优化路由进行加密。本文还介绍了针对拟议网络的 GA 和 AHP 仿真结果。研究发现,采用所提出的模型可以大大提高物联网系统的整体效率。讨论部分还进行了比较,结果表明为物联网系统开发的混合算法比传统路由算法的性能要好得多。关键词物联网;AHP;GA;密码分析技术;WSN
{"title":"A Genetic Algorithm Based Hybrid Routing Technique for IOT Systems","authors":"Dr Rakesh Kumar","doi":"10.59256/ijsreat.20240401009","DOIUrl":"https://doi.org/10.59256/ijsreat.20240401009","url":null,"abstract":"Internet is gaining new heights in the today’s technological environment. Internet of things (IoT) is a new class of Internet based heterogeneous networked application systems which uses various types of sensor/detectors and devices for the exchange and collection of data. Devices need to be in the radio range and must remain continuously connected to the internet. IoT can sense and control the objects remotely across existing networked architecture and builds chances for direct combination among the physical world and computer-based systems. It is believed that, in future many of the household application will be based on IoT. Due to their applications in situations such as building home automation, emergencies, crisis management, energy management and healthcare, message security becomes of top importance in IoT. An optimized routing scheme using the intelligent mathematical techniques, which includes Genetic Algorithms(GA) and Analytical Hierarchy Process(AHP), is proposed here and an optimized route can be encrypted using cryptanalytic techniques. Simulation results of GA and AHP are also presented here for the proposed network. It has been found that overall efficiency of the IoT system can be greatly improved with the proposed model. A comparison is also provided in discussion section which demonstrates that hybrid algorithms developed for IoT systems performs much better than traditional routing algorithms. Keywords: IoT; AHP;GA; Cryptanalytic Techniques; WSN","PeriodicalId":310227,"journal":{"name":"International Journal Of Scientific Research In Engineering & Technology","volume":"94 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140444207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Imploding Detonation Waves in Self-gravitating Ideal Gas 自引力理想气体中的内爆引爆波
Pub Date : 2024-02-19 DOI: 10.59256/ijsreat.20240401008
Pushpender Kumar Gangwar, Rajesh Kumar Verma
In the present paper, the propagation of strong spherical imploding detonation waves in a reacting ideal gas under the effect of self-gravitation of the non-homogeneous medium has been investigated, by the help of Chester-Chisnell-Whitham (CCW) theory. It is considered that detonation wave is initially Chapman-Jouguet. Initial taking the density distribution law as power decreasing with distance, the analytical expressions for the detonation velocity just behind the front along with other flow variables are derived. Neglecting the effect of overtaking disturbances the variation of non-dimensional detonation velocity, the pressure and density with the propagation distance have been calculated numerically. The effect of change in density parameter at different Alfven Mach number on the convergence of detonation front have been discussed through graphs in details. Finally, it is found that density parameter and Alfven Mach number of gas have a significant role on propagation of strong spherical detonation front in reacting ideal gas with gravitation effect on all the post-flow variables. The software MATLAB have been used for computation of the problem. Keywords: Self-gravitating gas, Strong detonation waves, CCW theory.
本文借助切斯特-奇斯内尔-惠瑟姆(CCW)理论,研究了在非均质介质自引力作用下,强球形内爆爆轰波在反应理想气体中的传播。我们认为起爆波最初是查普曼-朱盖特起爆波。最初将密度分布规律视为随距离递减的幂,从而推导出了前端后方爆轰速度的分析表达式以及其他流动变量。在不考虑超越扰动影响的情况下,对非维爆轰速度、压力和密度随传播距离的变化进行了数值计算。通过图表详细讨论了不同阿尔芬马赫数下密度参数的变化对爆轰前沿收敛的影响。最后发现,气体的密度参数和阿尔芬马赫数对反应理想气体中强球形爆轰前沿的传播具有重要作用,同时对所有后流变量具有引力效应。计算中使用了 MATLAB 软件。关键词自引力气体、强爆轰波、CCW 理论。
{"title":"Imploding Detonation Waves in Self-gravitating Ideal Gas","authors":"Pushpender Kumar Gangwar, Rajesh Kumar Verma","doi":"10.59256/ijsreat.20240401008","DOIUrl":"https://doi.org/10.59256/ijsreat.20240401008","url":null,"abstract":"In the present paper, the propagation of strong spherical imploding detonation waves in a reacting ideal gas under the effect of self-gravitation of the non-homogeneous medium has been investigated, by the help of Chester-Chisnell-Whitham (CCW) theory. It is considered that detonation wave is initially Chapman-Jouguet. Initial taking the density distribution law as power decreasing with distance, the analytical expressions for the detonation velocity just behind the front along with other flow variables are derived. Neglecting the effect of overtaking disturbances the variation of non-dimensional detonation velocity, the pressure and density with the propagation distance have been calculated numerically. The effect of change in density parameter at different Alfven Mach number on the convergence of detonation front have been discussed through graphs in details. Finally, it is found that density parameter and Alfven Mach number of gas have a significant role on propagation of strong spherical detonation front in reacting ideal gas with gravitation effect on all the post-flow variables. The software MATLAB have been used for computation of the problem. Keywords: Self-gravitating gas, Strong detonation waves, CCW theory.","PeriodicalId":310227,"journal":{"name":"International Journal Of Scientific Research In Engineering & Technology","volume":"24 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140450058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Case Study of Analysis of Wind Load on U and V Shape High Rise Building: A Review U 型和 V 型高层建筑风荷载分析案例研究:综述
Pub Date : 2024-02-17 DOI: 10.59256/ijsreat.20240401007
Ritik Chaudhary, Astha Verma
Conclusively, this case study provides an exhaustive and methodical investigation of wind load analysis on U and V-shaped high-rise structures, amalgamating conclusions from diverse scholars in the domain. The comprehensive examination and juxtaposition of current research techniques highlight the complex character of wind load assessment, utilizing a range of methods including wind tunnel testing, empirical observations, and Computational Fluid Dynamics (CFD) simulations. The research makes a substantial contribution to our comprehension of the complex relationships that exist between wind forces and the unique architectural arrangements of U and V shapes. By assimilating insights from numerous studies, the research successfully unveils commonalities, identifies divergences, and highlights emerging trends in the analysis of wind-induced effects on these high-rise structures. Professionals in high-rise building design, and architects and engineers. The goal of the research is to make a substantial contribution to the ongoing development of wind load analysis techniques.Understanding the building's response to wind rotation at different incident angles is a specific focus of this study. Validation against experimental data ensures the accuracy of CFD simulations, often involving model refinement based on real-world observations. Overall, this research contributes to a comprehensive understanding of building aerodynamics, offering insights into the intricate interplay between structures and wind forces. Keywords: High-rise building, ANSYS CFX, CFD, wind tunnel, pressure coefficient.
最后,本案例研究对 U 型和 V 型高层建筑结构的风荷载分析进行了详尽而有条理的研究,综合了该领域不同学者的结论。利用风洞试验、经验观察和计算流体动力学(CFD)模拟等一系列方法,对当前研究技术进行了全面检查和并列分析,突出了风荷载评估的复杂性。这项研究为我们理解风力与 U 型和 V 型独特建筑布局之间的复杂关系做出了重大贡献。通过吸收众多研究的见解,研究成功地揭示了这些高层建筑结构在风力效应分析方面的共性、差异,并突出了新的趋势。研究对象包括高层建筑设计专业人员、建筑师和工程师。本研究的目标是为风荷载分析技术的持续发展做出实质性贡献。了解建筑物在不同入射角度下对风旋转的响应是本研究的一个具体重点。根据实验数据进行验证可确保 CFD 模拟的准确性,这通常涉及根据实际观察结果对模型进行改进。总之,这项研究有助于全面了解建筑空气动力学,为结构与风力之间错综复杂的相互作用提供了见解。关键词高层建筑、ANSYS CFX、CFD、风洞、压力系数。
{"title":"Case Study of Analysis of Wind Load on U and V Shape High Rise Building: A Review","authors":"Ritik Chaudhary, Astha Verma","doi":"10.59256/ijsreat.20240401007","DOIUrl":"https://doi.org/10.59256/ijsreat.20240401007","url":null,"abstract":"Conclusively, this case study provides an exhaustive and methodical investigation of wind load analysis on U and V-shaped high-rise structures, amalgamating conclusions from diverse scholars in the domain. The comprehensive examination and juxtaposition of current research techniques highlight the complex character of wind load assessment, utilizing a range of methods including wind tunnel testing, empirical observations, and Computational Fluid Dynamics (CFD) simulations. The research makes a substantial contribution to our comprehension of the complex relationships that exist between wind forces and the unique architectural arrangements of U and V shapes. By assimilating insights from numerous studies, the research successfully unveils commonalities, identifies divergences, and highlights emerging trends in the analysis of wind-induced effects on these high-rise structures. Professionals in high-rise building design, and architects and engineers. The goal of the research is to make a substantial contribution to the ongoing development of wind load analysis techniques.Understanding the building's response to wind rotation at different incident angles is a specific focus of this study. Validation against experimental data ensures the accuracy of CFD simulations, often involving model refinement based on real-world observations. Overall, this research contributes to a comprehensive understanding of building aerodynamics, offering insights into the intricate interplay between structures and wind forces. Keywords: High-rise building, ANSYS CFX, CFD, wind tunnel, pressure coefficient.","PeriodicalId":310227,"journal":{"name":"International Journal Of Scientific Research In Engineering & Technology","volume":"86 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139959476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pneumonia Detection In Chest X-Rays Using Neural Networks 利用神经网络检测胸部 X 光片中的肺炎病症
Pub Date : 2024-02-05 DOI: 10.59256/ijsreat.20240401006
Asha Shiny Dr .X.S, Bhavana B, Jyothirmayee A, Sushanth B, Sathish D
Deep learning techniques are widely used to design robust classification models in several areas such as medical diagnosis tasks in which it achieves good performance. In this paper, we have proposed the CNN model (Convolutional Neural Network) for the classification of Chest X-ray images for Radiological Society of North America Pneumonia (RSNA) datasets. The study also tries to achieve the same RSNA benchmark results using the limited computational resources by trying out various approaches to the methodologies that have been implemented in recent years. The proposed method is based on a noncomplex CNN and the use of transfer learning algorithms like Xception, InceptionV3/V4, EfficientNetB7. Along with this, the study also tries to achieve the same RSNA benchmark results using the limited computational resources by trying out various approaches to the methodologies that have been implemented in recent years. The RSNA benchmark MAP score is 0.25 but using the Mask RCNN model (Region Convolutional Neural Network) on a stratified sample of 3017 along with image augmentation gave a MAP (Mean Average Precision) score of 0.15. Meanwhile, the YoloV3 without any hyperparameter tuning gave the MAP score of 0.32 but still, the loss keeps decreasing. Running the model for a greater number of iterations can give better results. Pneumonia is one of the major causes of cancer-related deaths due to its aggressive nature and delayed detections at advanced stages. Early detection of Pneumonia is very important for the survival of an individual, and is a significant challenging problem. Generally, chest radiographs (Xray) and computed tomography (CT) scans are used initially for the diagnosis of the malignant nodules; however, the possible existence of benign nodules leads to erroneous decisions. At early stages, the benign and the malignant nodules show very close resemblance to each other. In this paper, a novel deep learning-based model with multiple strategies is proposed for the precise diagnosis of the malignant nodules. Due to the recent achievements of deep convolutional neural networks (CNN) in image analysis, we have used two deep three-dimensional (3D) customized mixed link network (CMixNet) architectures for lung nodule detection and classification, respectively. Keywords: X-Rays, Deep learning techniques, CNN model, RSNA.
深度学习技术被广泛应用于多个领域,如在医疗诊断任务中设计稳健的分类模型,并取得了良好的性能。在本文中,我们提出了卷积神经网络(CNN)模型,用于对北美放射学会肺炎(RSNA)数据集的胸部 X 光图像进行分类。本研究还试图利用有限的计算资源,通过尝试近年来已实施的各种方法来实现相同的 RSNA 基准结果。所提出的方法基于非复杂的 CNN,并使用了 Xception、InceptionV3/V4 和 EfficientNetB7 等迁移学习算法。与此同时,本研究还尝试使用有限的计算资源,通过尝试近年来已实施的各种方法来实现相同的 RSNA 基准结果。RSNA 基准的 MAP 得分为 0.25,但在 3017 个分层样本上使用 Mask RCNN 模型(区域卷积神经网络)并进行图像增强后,MAP(平均精度)得分为 0.15。同时,YoloV3 在不调整任何超参数的情况下,MAP 得分为 0.32,但损失仍在不断减少。对模型进行更多次的迭代可以得到更好的结果。肺炎是导致癌症相关死亡的主要原因之一,这是因为肺炎具有侵袭性,而且在晚期会被延迟检测。肺炎的早期检测对患者的生存非常重要,也是一个极具挑战性的问题。一般来说,胸部 X 光片和计算机断层扫描(CT)是诊断恶性结节的初步方法,但良性结节的可能存在会导致错误的判断。在早期阶段,良性结节和恶性结节表现得非常相似。本文针对恶性结节的精确诊断,提出了一种基于深度学习的新型多策略模型。鉴于近年来深度卷积神经网络(CNN)在图像分析方面取得的成就,我们采用了两种深度三维(3D)定制混合链接网络(CMixNet)架构,分别用于肺结节的检测和分类。关键词X射线 深度学习技术 CNN模型 RSNA
{"title":"Pneumonia Detection In Chest X-Rays Using Neural Networks","authors":"Asha Shiny Dr .X.S, Bhavana B, Jyothirmayee A, Sushanth B, Sathish D","doi":"10.59256/ijsreat.20240401006","DOIUrl":"https://doi.org/10.59256/ijsreat.20240401006","url":null,"abstract":"Deep learning techniques are widely used to design robust classification models in several areas such as medical diagnosis tasks in which it achieves good performance. In this paper, we have proposed the CNN model (Convolutional Neural Network) for the classification of Chest X-ray images for Radiological Society of North America Pneumonia (RSNA) datasets. The study also tries to achieve the same RSNA benchmark results using the limited computational resources by trying out various approaches to the methodologies that have been implemented in recent years. The proposed method is based on a noncomplex CNN and the use of transfer learning algorithms like Xception, InceptionV3/V4, EfficientNetB7. Along with this, the study also tries to achieve the same RSNA benchmark results using the limited computational resources by trying out various approaches to the methodologies that have been implemented in recent years. The RSNA benchmark MAP score is 0.25 but using the Mask RCNN model (Region Convolutional Neural Network) on a stratified sample of 3017 along with image augmentation gave a MAP (Mean Average Precision) score of 0.15. Meanwhile, the YoloV3 without any hyperparameter tuning gave the MAP score of 0.32 but still, the loss keeps decreasing. Running the model for a greater number of iterations can give better results. Pneumonia is one of the major causes of cancer-related deaths due to its aggressive nature and delayed detections at advanced stages. Early detection of Pneumonia is very important for the survival of an individual, and is a significant challenging problem. Generally, chest radiographs (Xray) and computed tomography (CT) scans are used initially for the diagnosis of the malignant nodules; however, the possible existence of benign nodules leads to erroneous decisions. At early stages, the benign and the malignant nodules show very close resemblance to each other. In this paper, a novel deep learning-based model with multiple strategies is proposed for the precise diagnosis of the malignant nodules. Due to the recent achievements of deep convolutional neural networks (CNN) in image analysis, we have used two deep three-dimensional (3D) customized mixed link network (CMixNet) architectures for lung nodule detection and classification, respectively. Keywords: X-Rays, Deep learning techniques, CNN model, RSNA.","PeriodicalId":310227,"journal":{"name":"International Journal Of Scientific Research In Engineering & Technology","volume":"11 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139802756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pneumonia Detection In Chest X-Rays Using Neural Networks 利用神经网络检测胸部 X 光片中的肺炎病症
Pub Date : 2024-02-05 DOI: 10.59256/ijsreat.20240401006
Asha Shiny Dr .X.S, Bhavana B, Jyothirmayee A, Sushanth B, Sathish D
Deep learning techniques are widely used to design robust classification models in several areas such as medical diagnosis tasks in which it achieves good performance. In this paper, we have proposed the CNN model (Convolutional Neural Network) for the classification of Chest X-ray images for Radiological Society of North America Pneumonia (RSNA) datasets. The study also tries to achieve the same RSNA benchmark results using the limited computational resources by trying out various approaches to the methodologies that have been implemented in recent years. The proposed method is based on a noncomplex CNN and the use of transfer learning algorithms like Xception, InceptionV3/V4, EfficientNetB7. Along with this, the study also tries to achieve the same RSNA benchmark results using the limited computational resources by trying out various approaches to the methodologies that have been implemented in recent years. The RSNA benchmark MAP score is 0.25 but using the Mask RCNN model (Region Convolutional Neural Network) on a stratified sample of 3017 along with image augmentation gave a MAP (Mean Average Precision) score of 0.15. Meanwhile, the YoloV3 without any hyperparameter tuning gave the MAP score of 0.32 but still, the loss keeps decreasing. Running the model for a greater number of iterations can give better results. Pneumonia is one of the major causes of cancer-related deaths due to its aggressive nature and delayed detections at advanced stages. Early detection of Pneumonia is very important for the survival of an individual, and is a significant challenging problem. Generally, chest radiographs (Xray) and computed tomography (CT) scans are used initially for the diagnosis of the malignant nodules; however, the possible existence of benign nodules leads to erroneous decisions. At early stages, the benign and the malignant nodules show very close resemblance to each other. In this paper, a novel deep learning-based model with multiple strategies is proposed for the precise diagnosis of the malignant nodules. Due to the recent achievements of deep convolutional neural networks (CNN) in image analysis, we have used two deep three-dimensional (3D) customized mixed link network (CMixNet) architectures for lung nodule detection and classification, respectively. Keywords: X-Rays, Deep learning techniques, CNN model, RSNA.
深度学习技术被广泛应用于多个领域,如在医疗诊断任务中设计稳健的分类模型,并取得了良好的性能。在本文中,我们提出了卷积神经网络(CNN)模型,用于对北美放射学会肺炎(RSNA)数据集的胸部 X 光图像进行分类。本研究还试图利用有限的计算资源,通过尝试近年来已实施的各种方法来实现相同的 RSNA 基准结果。所提出的方法基于非复杂的 CNN,并使用了 Xception、InceptionV3/V4 和 EfficientNetB7 等迁移学习算法。与此同时,本研究还尝试使用有限的计算资源,通过尝试近年来已实施的各种方法来实现相同的 RSNA 基准结果。RSNA 基准的 MAP 得分为 0.25,但在 3017 个分层样本上使用 Mask RCNN 模型(区域卷积神经网络)并进行图像增强后,MAP(平均精度)得分为 0.15。同时,YoloV3 在不调整任何超参数的情况下,MAP 得分为 0.32,但损失仍在不断减少。对模型进行更多次的迭代可以得到更好的结果。肺炎是导致癌症相关死亡的主要原因之一,这是因为肺炎具有侵袭性,而且在晚期会被延迟检测。肺炎的早期检测对患者的生存非常重要,也是一个极具挑战性的问题。一般来说,胸部 X 光片和计算机断层扫描(CT)是诊断恶性结节的初步方法,但良性结节的可能存在会导致错误的判断。在早期阶段,良性结节和恶性结节表现得非常相似。本文针对恶性结节的精确诊断,提出了一种基于深度学习的新型多策略模型。鉴于近年来深度卷积神经网络(CNN)在图像分析方面取得的成就,我们采用了两种深度三维(3D)定制混合链接网络(CMixNet)架构,分别用于肺结节的检测和分类。关键词X射线 深度学习技术 CNN模型 RSNA
{"title":"Pneumonia Detection In Chest X-Rays Using Neural Networks","authors":"Asha Shiny Dr .X.S, Bhavana B, Jyothirmayee A, Sushanth B, Sathish D","doi":"10.59256/ijsreat.20240401006","DOIUrl":"https://doi.org/10.59256/ijsreat.20240401006","url":null,"abstract":"Deep learning techniques are widely used to design robust classification models in several areas such as medical diagnosis tasks in which it achieves good performance. In this paper, we have proposed the CNN model (Convolutional Neural Network) for the classification of Chest X-ray images for Radiological Society of North America Pneumonia (RSNA) datasets. The study also tries to achieve the same RSNA benchmark results using the limited computational resources by trying out various approaches to the methodologies that have been implemented in recent years. The proposed method is based on a noncomplex CNN and the use of transfer learning algorithms like Xception, InceptionV3/V4, EfficientNetB7. Along with this, the study also tries to achieve the same RSNA benchmark results using the limited computational resources by trying out various approaches to the methodologies that have been implemented in recent years. The RSNA benchmark MAP score is 0.25 but using the Mask RCNN model (Region Convolutional Neural Network) on a stratified sample of 3017 along with image augmentation gave a MAP (Mean Average Precision) score of 0.15. Meanwhile, the YoloV3 without any hyperparameter tuning gave the MAP score of 0.32 but still, the loss keeps decreasing. Running the model for a greater number of iterations can give better results. Pneumonia is one of the major causes of cancer-related deaths due to its aggressive nature and delayed detections at advanced stages. Early detection of Pneumonia is very important for the survival of an individual, and is a significant challenging problem. Generally, chest radiographs (Xray) and computed tomography (CT) scans are used initially for the diagnosis of the malignant nodules; however, the possible existence of benign nodules leads to erroneous decisions. At early stages, the benign and the malignant nodules show very close resemblance to each other. In this paper, a novel deep learning-based model with multiple strategies is proposed for the precise diagnosis of the malignant nodules. Due to the recent achievements of deep convolutional neural networks (CNN) in image analysis, we have used two deep three-dimensional (3D) customized mixed link network (CMixNet) architectures for lung nodule detection and classification, respectively. Keywords: X-Rays, Deep learning techniques, CNN model, RSNA.","PeriodicalId":310227,"journal":{"name":"International Journal Of Scientific Research In Engineering & Technology","volume":"166 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139862968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery 网络漏洞检测的机器学习:跨站请求伪造案例
Pub Date : 2024-02-05 DOI: 10.59256/ijsreat.20240401005
Sravani N, Sai Raju O, Harish Ch, Anil Kumar B, Anirudh S
Cross-site request forgery (CSRF) vulnerabilities pose a significant threat to web application security, enabling attackers to execute unauthorized actions on behalf of authenticated users. Conventional CSRF detection methods, such as manual code review and static analysis, are often time-consuming, error-prone, and inefficient. Proposes Mitch, a novel machine learning (ML)-based solution for the black-box detection of CSRF vulnerabilities. Mitch employs supervised learning, trained on a comprehensive dataset of HTTP requests and responses, to effectively identify security-sensitive HTTP requests and uncover CSRF vulnerabilities within them. Rigorous evaluations on a diverse set of real-world web applications demonstrate Mitch's remarkable ability to detect CSRF vulnerabilities with high accuracy, outperforming traditional methods. Mitch's automated nature eliminates the need for manual code review and static analysis, saving time and effort while reducing the risk of human error. Additionally, Mitch's scalability allows seamless integration into continuous integration and continuous delivery (CI/CD) pipelines, enabling continuous security monitoring and vulnerability detection. Mitch's efficacy extends beyond detecting known CSRF vulnerabilities. Its ability to identify patterns and relationships enables it to uncover obscure CSRF vulnerabilities that may have been overlooked by traditional methods, including zero-day vulnerabilities. In conclusion, Mitch emerges as a powerful tool for enhancing web application security, offering a comprehensive and automated solution for detecting CSRF vulnerabilities. Its ability to handle complex web applications, uncover hidden CSRF vulnerabilities, and integrate into CI/CD pipelines makes it an indispensable tool for web security professionals. Mitch's adoption has the potential to significantly reduce the risk of CSRF attacks and safeguard sensitive user data. We propose a methodology to leverage machine learning (ML) for the detection of web application vulnerabilities. We use it in the design of Mitch, the first ML solution for the black-box detection of cross-site request forgery vulnerabilities. Finally, we show the effectiveness of Mitch on real software. In this project, we propose a methodology to leverage Machine Learning (ML) for the detection of web application vulnerabilities. Web applications are particularly challenging to analyses, due to their diversity and the widespread adoption of custom programming practices. ML is thus very helpful for web application security it can take advantage of manually labeled data to bring the human understanding of the web application semantics into automated analysis toolsMitch allowed us to identify 35 new CSRFs on 20 major websites and 3 new CSRFs on production software. Keywords: Mitch, CSRF, CI/CD pipelines, Security Token Service (STS), Same-Origin Policy (SOP).
跨站请求伪造(CSRF)漏洞对网络应用程序的安全性构成了重大威胁,它使攻击者能够代表通过验证的用户执行未经授权的操作。传统的 CSRF 检测方法(如手动代码审查和静态分析)往往耗时长、易出错且效率低。Mitch 是一种基于机器学习 (ML) 的新型解决方案,可用于 CSRF 漏洞的黑盒检测。Mitch 采用监督学习方法,在全面的 HTTP 请求和响应数据集上进行训练,以有效识别安全敏感的 HTTP 请求并发现其中的 CSRF 漏洞。在各种实际网络应用程序上进行的严格评估表明,Mitch 能够高精度地检测出 CSRF 漏洞,其能力远远超过传统方法。Mitch 的自动化特性消除了人工代码审查和静态分析的需要,节省了时间和精力,同时降低了人为错误的风险。此外,Mitch 的可扩展性允许无缝集成到持续集成和持续交付(CI/CD)管道中,从而实现持续安全监控和漏洞检测。Mitch 的功效不仅限于检测已知的 CSRF 漏洞。它识别模式和关系的能力使其能够发现传统方法可能忽略的隐蔽 CSRF 漏洞,包括零日漏洞。总之,Mitch 是增强网络应用程序安全性的强大工具,为检测 CSRF 漏洞提供了全面的自动化解决方案。它能够处理复杂的网络应用程序,发现隐藏的 CSRF 漏洞,并集成到 CI/CD 管道中,是网络安全专业人员不可或缺的工具。采用 Mitch 有可能大大降低 CSRF 攻击的风险,保护敏感的用户数据。我们提出了一种利用机器学习(ML)检测网络应用程序漏洞的方法。我们在 Mitch 的设计中使用了这一方法,Mitch 是首个用于黑盒检测跨站请求伪造漏洞的 ML 解决方案。最后,我们在真实软件上展示了 Mitch 的有效性。在本项目中,我们提出了一种利用机器学习(ML)检测网络应用程序漏洞的方法。由于网络应用程序的多样性和广泛采用的自定义编程实践,对其进行分析尤其具有挑战性。Mitch让我们在20个主要网站上识别出35个新的CSRF,并在生产软件上识别出3个新的CSRF。关键字Mitch、CSRF、CI/CD 管道、安全令牌服务(STS)、同源策略(SOP)。
{"title":"Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery","authors":"Sravani N, Sai Raju O, Harish Ch, Anil Kumar B, Anirudh S","doi":"10.59256/ijsreat.20240401005","DOIUrl":"https://doi.org/10.59256/ijsreat.20240401005","url":null,"abstract":"Cross-site request forgery (CSRF) vulnerabilities pose a significant threat to web application security, enabling attackers to execute unauthorized actions on behalf of authenticated users. Conventional CSRF detection methods, such as manual code review and static analysis, are often time-consuming, error-prone, and inefficient. Proposes Mitch, a novel machine learning (ML)-based solution for the black-box detection of CSRF vulnerabilities. Mitch employs supervised learning, trained on a comprehensive dataset of HTTP requests and responses, to effectively identify security-sensitive HTTP requests and uncover CSRF vulnerabilities within them. Rigorous evaluations on a diverse set of real-world web applications demonstrate Mitch's remarkable ability to detect CSRF vulnerabilities with high accuracy, outperforming traditional methods. Mitch's automated nature eliminates the need for manual code review and static analysis, saving time and effort while reducing the risk of human error. Additionally, Mitch's scalability allows seamless integration into continuous integration and continuous delivery (CI/CD) pipelines, enabling continuous security monitoring and vulnerability detection. Mitch's efficacy extends beyond detecting known CSRF vulnerabilities. Its ability to identify patterns and relationships enables it to uncover obscure CSRF vulnerabilities that may have been overlooked by traditional methods, including zero-day vulnerabilities. In conclusion, Mitch emerges as a powerful tool for enhancing web application security, offering a comprehensive and automated solution for detecting CSRF vulnerabilities. Its ability to handle complex web applications, uncover hidden CSRF vulnerabilities, and integrate into CI/CD pipelines makes it an indispensable tool for web security professionals. Mitch's adoption has the potential to significantly reduce the risk of CSRF attacks and safeguard sensitive user data. We propose a methodology to leverage machine learning (ML) for the detection of web application vulnerabilities. We use it in the design of Mitch, the first ML solution for the black-box detection of cross-site request forgery vulnerabilities. Finally, we show the effectiveness of Mitch on real software. In this project, we propose a methodology to leverage Machine Learning (ML) for the detection of web application vulnerabilities. Web applications are particularly challenging to analyses, due to their diversity and the widespread adoption of custom programming practices. ML is thus very helpful for web application security it can take advantage of manually labeled data to bring the human understanding of the web application semantics into automated analysis toolsMitch allowed us to identify 35 new CSRFs on 20 major websites and 3 new CSRFs on production software. Keywords: Mitch, CSRF, CI/CD pipelines, Security Token Service (STS), Same-Origin Policy (SOP).","PeriodicalId":310227,"journal":{"name":"International Journal Of Scientific Research In Engineering & Technology","volume":"46 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139864068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery 网络漏洞检测的机器学习:跨站请求伪造案例
Pub Date : 2024-02-05 DOI: 10.59256/ijsreat.20240401005
Sravani N, Sai Raju O, Harish Ch, Anil Kumar B, Anirudh S
Cross-site request forgery (CSRF) vulnerabilities pose a significant threat to web application security, enabling attackers to execute unauthorized actions on behalf of authenticated users. Conventional CSRF detection methods, such as manual code review and static analysis, are often time-consuming, error-prone, and inefficient. Proposes Mitch, a novel machine learning (ML)-based solution for the black-box detection of CSRF vulnerabilities. Mitch employs supervised learning, trained on a comprehensive dataset of HTTP requests and responses, to effectively identify security-sensitive HTTP requests and uncover CSRF vulnerabilities within them. Rigorous evaluations on a diverse set of real-world web applications demonstrate Mitch's remarkable ability to detect CSRF vulnerabilities with high accuracy, outperforming traditional methods. Mitch's automated nature eliminates the need for manual code review and static analysis, saving time and effort while reducing the risk of human error. Additionally, Mitch's scalability allows seamless integration into continuous integration and continuous delivery (CI/CD) pipelines, enabling continuous security monitoring and vulnerability detection. Mitch's efficacy extends beyond detecting known CSRF vulnerabilities. Its ability to identify patterns and relationships enables it to uncover obscure CSRF vulnerabilities that may have been overlooked by traditional methods, including zero-day vulnerabilities. In conclusion, Mitch emerges as a powerful tool for enhancing web application security, offering a comprehensive and automated solution for detecting CSRF vulnerabilities. Its ability to handle complex web applications, uncover hidden CSRF vulnerabilities, and integrate into CI/CD pipelines makes it an indispensable tool for web security professionals. Mitch's adoption has the potential to significantly reduce the risk of CSRF attacks and safeguard sensitive user data. We propose a methodology to leverage machine learning (ML) for the detection of web application vulnerabilities. We use it in the design of Mitch, the first ML solution for the black-box detection of cross-site request forgery vulnerabilities. Finally, we show the effectiveness of Mitch on real software. In this project, we propose a methodology to leverage Machine Learning (ML) for the detection of web application vulnerabilities. Web applications are particularly challenging to analyses, due to their diversity and the widespread adoption of custom programming practices. ML is thus very helpful for web application security it can take advantage of manually labeled data to bring the human understanding of the web application semantics into automated analysis toolsMitch allowed us to identify 35 new CSRFs on 20 major websites and 3 new CSRFs on production software. Keywords: Mitch, CSRF, CI/CD pipelines, Security Token Service (STS), Same-Origin Policy (SOP).
跨站请求伪造(CSRF)漏洞对网络应用程序的安全性构成了重大威胁,它使攻击者能够代表通过验证的用户执行未经授权的操作。传统的 CSRF 检测方法(如手动代码审查和静态分析)往往耗时长、易出错且效率低。Mitch 是一种基于机器学习 (ML) 的新型解决方案,可用于 CSRF 漏洞的黑盒检测。Mitch 采用监督学习方法,在全面的 HTTP 请求和响应数据集上进行训练,以有效识别安全敏感的 HTTP 请求并发现其中的 CSRF 漏洞。在各种实际网络应用程序上进行的严格评估表明,Mitch 能够高精度地检测出 CSRF 漏洞,其能力远远超过传统方法。Mitch 的自动化特性消除了人工代码审查和静态分析的需要,节省了时间和精力,同时降低了人为错误的风险。此外,Mitch 的可扩展性允许无缝集成到持续集成和持续交付(CI/CD)管道中,从而实现持续安全监控和漏洞检测。Mitch 的功效不仅限于检测已知的 CSRF 漏洞。它识别模式和关系的能力使其能够发现传统方法可能忽略的隐蔽 CSRF 漏洞,包括零日漏洞。总之,Mitch 是增强网络应用程序安全性的强大工具,为检测 CSRF 漏洞提供了全面的自动化解决方案。它能够处理复杂的网络应用程序,发现隐藏的 CSRF 漏洞,并集成到 CI/CD 管道中,是网络安全专业人员不可或缺的工具。采用 Mitch 有可能大大降低 CSRF 攻击的风险,保护敏感的用户数据。我们提出了一种利用机器学习(ML)检测网络应用程序漏洞的方法。我们在 Mitch 的设计中使用了这一方法,Mitch 是首个用于黑盒检测跨站请求伪造漏洞的 ML 解决方案。最后,我们在真实软件上展示了 Mitch 的有效性。在本项目中,我们提出了一种利用机器学习(ML)检测网络应用程序漏洞的方法。由于网络应用程序的多样性和广泛采用的自定义编程实践,对其进行分析尤其具有挑战性。Mitch让我们在20个主要网站上识别出35个新的CSRF,并在生产软件上识别出3个新的CSRF。关键字Mitch、CSRF、CI/CD 管道、安全令牌服务(STS)、同源策略(SOP)。
{"title":"Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery","authors":"Sravani N, Sai Raju O, Harish Ch, Anil Kumar B, Anirudh S","doi":"10.59256/ijsreat.20240401005","DOIUrl":"https://doi.org/10.59256/ijsreat.20240401005","url":null,"abstract":"Cross-site request forgery (CSRF) vulnerabilities pose a significant threat to web application security, enabling attackers to execute unauthorized actions on behalf of authenticated users. Conventional CSRF detection methods, such as manual code review and static analysis, are often time-consuming, error-prone, and inefficient. Proposes Mitch, a novel machine learning (ML)-based solution for the black-box detection of CSRF vulnerabilities. Mitch employs supervised learning, trained on a comprehensive dataset of HTTP requests and responses, to effectively identify security-sensitive HTTP requests and uncover CSRF vulnerabilities within them. Rigorous evaluations on a diverse set of real-world web applications demonstrate Mitch's remarkable ability to detect CSRF vulnerabilities with high accuracy, outperforming traditional methods. Mitch's automated nature eliminates the need for manual code review and static analysis, saving time and effort while reducing the risk of human error. Additionally, Mitch's scalability allows seamless integration into continuous integration and continuous delivery (CI/CD) pipelines, enabling continuous security monitoring and vulnerability detection. Mitch's efficacy extends beyond detecting known CSRF vulnerabilities. Its ability to identify patterns and relationships enables it to uncover obscure CSRF vulnerabilities that may have been overlooked by traditional methods, including zero-day vulnerabilities. In conclusion, Mitch emerges as a powerful tool for enhancing web application security, offering a comprehensive and automated solution for detecting CSRF vulnerabilities. Its ability to handle complex web applications, uncover hidden CSRF vulnerabilities, and integrate into CI/CD pipelines makes it an indispensable tool for web security professionals. Mitch's adoption has the potential to significantly reduce the risk of CSRF attacks and safeguard sensitive user data. We propose a methodology to leverage machine learning (ML) for the detection of web application vulnerabilities. We use it in the design of Mitch, the first ML solution for the black-box detection of cross-site request forgery vulnerabilities. Finally, we show the effectiveness of Mitch on real software. In this project, we propose a methodology to leverage Machine Learning (ML) for the detection of web application vulnerabilities. Web applications are particularly challenging to analyses, due to their diversity and the widespread adoption of custom programming practices. ML is thus very helpful for web application security it can take advantage of manually labeled data to bring the human understanding of the web application semantics into automated analysis toolsMitch allowed us to identify 35 new CSRFs on 20 major websites and 3 new CSRFs on production software. Keywords: Mitch, CSRF, CI/CD pipelines, Security Token Service (STS), Same-Origin Policy (SOP).","PeriodicalId":310227,"journal":{"name":"International Journal Of Scientific Research In Engineering & Technology","volume":"4 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139803907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing the Future: Unveiling the Significance of MLOps in Streamlining the Machine Learning Lifecycle 优化未来:揭示 MLOps 在简化机器学习生命周期中的重要意义
Pub Date : 2024-02-02 DOI: 10.59256/ijsreat.20240401002
Gorantla Prasanna
As we stand on the precipice of 2024, the technological landscape is abuzz with the convergence of two revolutionary forces: MLOps (Machine Learning Operations) and Generative AI. This potent cocktail promises to reshape the very fabric of artificial intelligence (AI), ushering in a new era of streamlined workflows, boundless innovation, and redefined value delivery. MLOps, a paradigm shift inspired by DevOps principles, emerges as the knight in shining armor, poised to vanquish the challenges plaguing the machine learning lifecycle. By fostering seamless collaboration, agile deployment, vigilant monitoring, and efficient management of models, MLOps lays the groundwork for robust organizational AI strategies. In this paper, we delve deep into the intricate world of MLOps, exploring its genesis, its potential to revolutionize business operations, and its pivotal role in shaping the future of AI. Keywords: MLOps, Machine Learning, Artificial Intelligence, DevOps, Automation, Collaboration, Deployment, Monitoring, Management, Generative AI, Innovation, Value Delivery, Business Optimization.
当我们站在 2024 年的悬崖边上时,技术领域正充斥着两股革命性力量的交汇:MLOps(机器学习操作)和生成式人工智能。这杯烈性鸡尾酒有望重塑人工智能(AI)的结构,开创一个简化工作流程、无限创新和重新定义价值交付的新时代。MLOps 是受 DevOps 原则启发而产生的一种范式转变,它是身披闪亮盔甲的骑士,随时准备战胜困扰机器学习生命周期的各种挑战。通过促进无缝协作、敏捷部署、警惕监控和模型的高效管理,MLOps 为强大的组织人工智能战略奠定了基础。在本文中,我们将深入探讨 MLOps 的复杂世界,探索其起源、彻底改变业务运营的潜力及其在塑造人工智能未来中的关键作用。关键词MLOps、机器学习、人工智能、DevOps、自动化、协作、部署、监控、管理、生成式人工智能、创新、价值交付、业务优化。
{"title":"Optimizing the Future: Unveiling the Significance of MLOps in Streamlining the Machine Learning Lifecycle","authors":"Gorantla Prasanna","doi":"10.59256/ijsreat.20240401002","DOIUrl":"https://doi.org/10.59256/ijsreat.20240401002","url":null,"abstract":"As we stand on the precipice of 2024, the technological landscape is abuzz with the convergence of two revolutionary forces: MLOps (Machine Learning Operations) and Generative AI. This potent cocktail promises to reshape the very fabric of artificial intelligence (AI), ushering in a new era of streamlined workflows, boundless innovation, and redefined value delivery. MLOps, a paradigm shift inspired by DevOps principles, emerges as the knight in shining armor, poised to vanquish the challenges plaguing the machine learning lifecycle. By fostering seamless collaboration, agile deployment, vigilant monitoring, and efficient management of models, MLOps lays the groundwork for robust organizational AI strategies. In this paper, we delve deep into the intricate world of MLOps, exploring its genesis, its potential to revolutionize business operations, and its pivotal role in shaping the future of AI. Keywords: MLOps, Machine Learning, Artificial Intelligence, DevOps, Automation, Collaboration, Deployment, Monitoring, Management, Generative AI, Innovation, Value Delivery, Business Optimization.","PeriodicalId":310227,"journal":{"name":"International Journal Of Scientific Research In Engineering & Technology","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139809911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study on Loan Status: Utilizing Machine Learning Algorithms for Predictive Analysis 贷款状况比较研究:利用机器学习算法进行预测分析
Pub Date : 2024-02-02 DOI: 10.59256/ijsreat.20240401003
Thanneeru Mahesh
This research delves into a comprehensive comparative study focused on predicting loan status through the application of various machine learning (ML) algorithms. The objective is to assess and compare the effectiveness of Decision Trees, Random Forest, Support Vector Machines (SVM), and Gradient Boosting models in determining the likelihood of loan approval or denial. Leveraging a dataset comprising historical loan application data, including applicant demographics, financial history, and loan characteristics, the study conducts rigorous analysis and interpretation of the models' performance. The results provide valuable insights into the strengths and weaknesses of each algorithm, offering a nuanced understanding of their predictive capabilities in the context of loan status determination. This research contributes to the growing body of knowledge in the application of ML algorithms in the financial sector, presenting practical implications for institutions seeking to enhance their loan approval processes. Key words: Predictive Analysis, Machine Learning Algorithms, Loan Status, Comparative Study, Utilization
本研究深入探讨了通过应用各种机器学习(ML)算法预测贷款状况的综合比较研究。目的是评估和比较决策树、随机森林、支持向量机 (SVM) 和梯度提升模型在确定贷款批准或拒绝可能性方面的有效性。该研究利用由历史贷款申请数据(包括申请人人口统计学特征、财务历史和贷款特征)组成的数据集,对模型的性能进行了严格的分析和解释。研究结果为了解每种算法的优缺点提供了有价值的见解,使人们对其在贷款状态确定方面的预测能力有了细致入微的了解。这项研究为金融领域应用 ML 算法方面不断增长的知识库做出了贡献,为寻求加强贷款审批流程的机构提供了实际意义。关键词预测分析、机器学习算法、贷款状况、比较研究、利用率
{"title":"A Comparative Study on Loan Status: Utilizing Machine Learning Algorithms for Predictive Analysis","authors":"Thanneeru Mahesh","doi":"10.59256/ijsreat.20240401003","DOIUrl":"https://doi.org/10.59256/ijsreat.20240401003","url":null,"abstract":"This research delves into a comprehensive comparative study focused on predicting loan status through the application of various machine learning (ML) algorithms. The objective is to assess and compare the effectiveness of Decision Trees, Random Forest, Support Vector Machines (SVM), and Gradient Boosting models in determining the likelihood of loan approval or denial. Leveraging a dataset comprising historical loan application data, including applicant demographics, financial history, and loan characteristics, the study conducts rigorous analysis and interpretation of the models' performance. The results provide valuable insights into the strengths and weaknesses of each algorithm, offering a nuanced understanding of their predictive capabilities in the context of loan status determination. This research contributes to the growing body of knowledge in the application of ML algorithms in the financial sector, presenting practical implications for institutions seeking to enhance their loan approval processes. Key words: Predictive Analysis, Machine Learning Algorithms, Loan Status, Comparative Study, Utilization","PeriodicalId":310227,"journal":{"name":"International Journal Of Scientific Research In Engineering & Technology","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139810025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancements in Machine Learning: A Comprehensive Exploration of Methods, Applications, and Future Perspectives 机器学习的进步:方法、应用和未来展望的全面探索
Pub Date : 2024-02-02 DOI: 10.59256/ijsreat.20240401001
Bommireddy Srikanth Reddy
Machine learning, a specialized subset of artificial intelligence, imparts the ability to machines to learn, while artificial intelligence (AI) encompasses the broader field dedicated to emulating human capabilities. Within AI, machine learning employs computational techniques to instruct computers on learning from their historical experiences. Unlike models based on predetermined equations, machine learning algorithms derive insights directly from data, progressively improving their performance as the volume of learning examples grows. This paper presents a comprehensive overview of the domain, exploring diverse machine learning methodologies such as supervised, unsupervised, and reinforcement learning, along with an examination of various programming languages employed in machine learning applications. Keywords: Machine learning, Artificial intelligence, Computational techniques, Historical experiences, Learning examples, Supervised learning, Unsupervised learning, Reinforcement learning, Programming languages, Machine learning applications
机器学习是人工智能的一个专门分支,它赋予机器学习的能力,而人工智能(AI)则包括致力于模拟人类能力的更广泛领域。在人工智能中,机器学习采用计算技术指导计算机从历史经验中学习。与基于预定方程的模型不同,机器学习算法直接从数据中获得洞察力,并随着学习实例数量的增加而逐步提高性能。本文全面概述了这一领域,探讨了各种机器学习方法,如监督学习、无监督学习和强化学习,同时还研究了机器学习应用中使用的各种编程语言。关键词机器学习 人工智能 计算技术 历史经验 学习实例 监督学习 非监督学习 强化学习 编程语言 机器学习应用
{"title":"Advancements in Machine Learning: A Comprehensive Exploration of Methods, Applications, and Future Perspectives","authors":"Bommireddy Srikanth Reddy","doi":"10.59256/ijsreat.20240401001","DOIUrl":"https://doi.org/10.59256/ijsreat.20240401001","url":null,"abstract":"Machine learning, a specialized subset of artificial intelligence, imparts the ability to machines to learn, while artificial intelligence (AI) encompasses the broader field dedicated to emulating human capabilities. Within AI, machine learning employs computational techniques to instruct computers on learning from their historical experiences. Unlike models based on predetermined equations, machine learning algorithms derive insights directly from data, progressively improving their performance as the volume of learning examples grows. This paper presents a comprehensive overview of the domain, exploring diverse machine learning methodologies such as supervised, unsupervised, and reinforcement learning, along with an examination of various programming languages employed in machine learning applications. Keywords: Machine learning, Artificial intelligence, Computational techniques, Historical experiences, Learning examples, Supervised learning, Unsupervised learning, Reinforcement learning, Programming languages, Machine learning applications","PeriodicalId":310227,"journal":{"name":"International Journal Of Scientific Research In Engineering & Technology","volume":"17 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139810173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal Of Scientific Research In Engineering & Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1