This research paper provides a comprehensive analysis of NSGA-III, a state-of-the-art multi-objective optimization algorithm. We delve into its principles, advancements, applications, and comparative studies to showcase its effectiveness and limitations.
{"title":"Evaluating NSGA-III : A Comprehensive Study on Multi-objective Optimization","authors":"None Ms. Shilpi Jain, None Prof Kamlesh Kumar Dubey, None Dr. Madhur Jain, None Divyansh Rampal","doi":"10.32628/cseit2390523","DOIUrl":"https://doi.org/10.32628/cseit2390523","url":null,"abstract":"This research paper provides a comprehensive analysis of NSGA-III, a state-of-the-art multi-objective optimization algorithm. We delve into its principles, advancements, applications, and comparative studies to showcase its effectiveness and limitations.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135098501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
None N. Ananda Reddy, None Dr. P. Dileep Kumar Reddy
Distributed computing networks play a significant role in contemporary computer architecture, facilitating the processing, analysis, and storage of sensitive data. This issue has garnered significant interest in the realm of investigating various encryption techniques. There is a pressing need to establish a dependable and validated security approach that enhances the data-processing efficacy of Cloud servers, as current cryptographic investigations suggest the vulnerability of server-side data security to potential breaches. This paper elucidates the process of implementing a cloud-centric cloud storage architecture and presents a unique security schema that validates the evidence of encrypted secret data storage. The researchers in this paper propose a novel computational security technique to tackle the issue of internal nodes by using efficient security strategies, hence minimizing computational overhead. The experimental results reported in this paper provide evidence of the greater effectiveness of the suggested mechanism in comparison to other commonly used security strategies.
{"title":"Fortifying Data Availability and Security in Cloud Servers Via Verification Protocols","authors":"None N. Ananda Reddy, None Dr. P. Dileep Kumar Reddy","doi":"10.32628/cseit2390521","DOIUrl":"https://doi.org/10.32628/cseit2390521","url":null,"abstract":"Distributed computing networks play a significant role in contemporary computer architecture, facilitating the processing, analysis, and storage of sensitive data. This issue has garnered significant interest in the realm of investigating various encryption techniques. There is a pressing need to establish a dependable and validated security approach that enhances the data-processing efficacy of Cloud servers, as current cryptographic investigations suggest the vulnerability of server-side data security to potential breaches. This paper elucidates the process of implementing a cloud-centric cloud storage architecture and presents a unique security schema that validates the evidence of encrypted secret data storage. The researchers in this paper propose a novel computational security technique to tackle the issue of internal nodes by using efficient security strategies, hence minimizing computational overhead. The experimental results reported in this paper provide evidence of the greater effectiveness of the suggested mechanism in comparison to other commonly used security strategies.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135098502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
None Tamanna Dhaker, None Aarju Kumar, None Dr. Abirami G
Social media platforms are vast reservoirs of human sentiment and behavior, making them ripe for depression detection. This literature review delves into approaches for this detection using data analysis, deep learning, natural language processing (NLP), and machine learning (ML). We discuss data types used and explore deep learning techniques like CNN, RNN, and DNN, applied across platforms such as Facebook, Twitter, and Reddit. The review also highlights NLP's role and ML algorithms, notably SVM, Naive Bayes, K-Nearest Neighbour, Random Forest, and Decision Trees. We analyze depression causes, its link with social media, and variations across age and gender. This comprehensive study guides researchers and practitioners in technology-driven mental health solutions.
{"title":"Detecting Depression on Social Media : A Comprehensive Review of Data Analysis, Deep Learning, NLP, and Machine Learning Approaches","authors":"None Tamanna Dhaker, None Aarju Kumar, None Dr. Abirami G","doi":"10.32628/cseit2390510","DOIUrl":"https://doi.org/10.32628/cseit2390510","url":null,"abstract":"Social media platforms are vast reservoirs of human sentiment and behavior, making them ripe for depression detection. This literature review delves into approaches for this detection using data analysis, deep learning, natural language processing (NLP), and machine learning (ML). We discuss data types used and explore deep learning techniques like CNN, RNN, and DNN, applied across platforms such as Facebook, Twitter, and Reddit. The review also highlights NLP's role and ML algorithms, notably SVM, Naive Bayes, K-Nearest Neighbour, Random Forest, and Decision Trees. We analyze depression causes, its link with social media, and variations across age and gender. This comprehensive study guides researchers and practitioners in technology-driven mental health solutions.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we briefly discuss main areas of computational linguistics particularly focus on the problem of ambiguity in computational linguistics. Then we take up the issue of ambiguity with inclusion of term anaphora which is well known in most of the languages and it is seen under pronouns specifically reflexives and reciprocals. In general, we have total five sections in this paper. First section primarily deals with introduction related to the topic and elaborates it in detail. Second section defines ambiguity with its background investigations in relation with computational linguistics. Third section presents detailed study on anaphoric ambiguity with strict sloppy readings at syntax level. Fourth section discusses about anaphora and soon it adds anaphora resolution irrespective of any specific language and most of the work related to anaphora resolution is mentioned from natural language processing point of view. Fifth is the last section where we conclude that ambiguity and anaphora both are difficult tasks for machine translation until unless we don’t train machine (computer) to learn as per given instructions and all.
{"title":"Computational Linguistics: A Research Survey on Ambiguity and Anaphora Resolution","authors":"None Harjit Singh","doi":"10.32628/cseit239059","DOIUrl":"https://doi.org/10.32628/cseit239059","url":null,"abstract":"In this paper we briefly discuss main areas of computational linguistics particularly focus on the problem of ambiguity in computational linguistics. Then we take up the issue of ambiguity with inclusion of term anaphora which is well known in most of the languages and it is seen under pronouns specifically reflexives and reciprocals. In general, we have total five sections in this paper. First section primarily deals with introduction related to the topic and elaborates it in detail. Second section defines ambiguity with its background investigations in relation with computational linguistics. Third section presents detailed study on anaphoric ambiguity with strict sloppy readings at syntax level. Fourth section discusses about anaphora and soon it adds anaphora resolution irrespective of any specific language and most of the work related to anaphora resolution is mentioned from natural language processing point of view. Fifth is the last section where we conclude that ambiguity and anaphora both are difficult tasks for machine translation until unless we don’t train machine (computer) to learn as per given instructions and all.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135368847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DALL.E 2 is a language model developed by OpenAI, which builds on the original DALL.E model. DALL.E is a neural network that can generate images from textual descriptions, allowing users to input written prompts and receive corresponding images. DALL.E 2 is an improved version of this technology, which has been trained on a larger and more diverse dataset, allowing it to generate more complex and varied images. DALL.E 2 can generate a wide variety of images, including objects, scenes, animals, and more, and can produce images that are surreal, humorous, or just plain bizarre. DALL·E 2 can understand the meaning of text and create images that match that meaning. This technology has many potential applications, from creative visual art to product design and advertising.
{"title":"DALL. E 2","authors":"None Sudershan Manasvi Malhar","doi":"10.32628/cseit239052","DOIUrl":"https://doi.org/10.32628/cseit239052","url":null,"abstract":"DALL.E 2 is a language model developed by OpenAI, which builds on the original DALL.E model. DALL.E is a neural network that can generate images from textual descriptions, allowing users to input written prompts and receive corresponding images. DALL.E 2 is an improved version of this technology, which has been trained on a larger and more diverse dataset, allowing it to generate more complex and varied images. DALL.E 2 can generate a wide variety of images, including objects, scenes, animals, and more, and can produce images that are surreal, humorous, or just plain bizarre. DALL·E 2 can understand the meaning of text and create images that match that meaning. This technology has many potential applications, from creative visual art to product design and advertising.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
None Aayushi Waghela, None Dev Makadia, None Monika Mangla
With the rise of online banking systems and easy transactions, there is an increase in fraud in the banking system and in the field of finance. To reduce fraud in the transactions we can apply the systems of machine learning algorithms and big data analysis. In this research paper, we discuss various methods used in the field such as Supervised learning, Unsupervised learning, and Ensemble Methods in the field of machine learning and transaction monitoring, behavior analytics, network analytics, and pattern recognition in the field of real-time monitoring. We have used a data set from Kaggle on credit card transactions and the methods of Random Forest Classification and Support Vector Machine which comes under the supervised learning method in machine learning and discussed other results and benefits achieved from it.
{"title":"Utilizing Machine Learning and Big Data Analysis for Risk Mitigation and Fraud Detection in Finance","authors":"None Aayushi Waghela, None Dev Makadia, None Monika Mangla","doi":"10.32628/cseit2390529","DOIUrl":"https://doi.org/10.32628/cseit2390529","url":null,"abstract":"With the rise of online banking systems and easy transactions, there is an increase in fraud in the banking system and in the field of finance. To reduce fraud in the transactions we can apply the systems of machine learning algorithms and big data analysis. In this research paper, we discuss various methods used in the field such as Supervised learning, Unsupervised learning, and Ensemble Methods in the field of machine learning and transaction monitoring, behavior analytics, network analytics, and pattern recognition in the field of real-time monitoring. We have used a data set from Kaggle on credit card transactions and the methods of Random Forest Classification and Support Vector Machine which comes under the supervised learning method in machine learning and discussed other results and benefits achieved from it.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Corporate Governance is the coalescence of rules, laws, processes by which businesses are regulated, operated and controlled. In-essence, corporate governance entails stabilizing the interests of the stakeholders of a company, such as investors, customers, employees, suppliers, communities, governments, or trade associations and the society as a whole. The rudimentary principles of corporate governance are accountability, transparency, fairness, and responsibility. In this study, we have tried to analyze the impact of corporate governance on the financial performance of the Indian insurance industry. For this purpose, a sample of 10 insurance companies has been selected among 56 insurance companies operating in India as per IRDA Annual Report (2021-22) from the accounting year 2018-19 to 2022-23 (5 years) using Purposive Sampling method. This study is fully based on secondary data, derived from annual reports, public disclosures, financial statements of IRDA and selected insurance companies. For analyzing the data, we have used correlation and multiple regression techniques. This study found that Board Mix and Independent Directors are positively and Female Board Members and CEO Duality are negatively associated with the financial performance of the Indian insurance industry.
{"title":"Impact of Corporate Governance on Financial Performance of Selected Insurance Companies in India","authors":"Indrajit Mondal, Dr. Biswambhar Mandal","doi":"10.32628/cseit2390449","DOIUrl":"https://doi.org/10.32628/cseit2390449","url":null,"abstract":"Corporate Governance is the coalescence of rules, laws, processes by which businesses are regulated, operated and controlled. In-essence, corporate governance entails stabilizing the interests of the stakeholders of a company, such as investors, customers, employees, suppliers, communities, governments, or trade associations and the society as a whole. The rudimentary principles of corporate governance are accountability, transparency, fairness, and responsibility. In this study, we have tried to analyze the impact of corporate governance on the financial performance of the Indian insurance industry. For this purpose, a sample of 10 insurance companies has been selected among 56 insurance companies operating in India as per IRDA Annual Report (2021-22) from the accounting year 2018-19 to 2022-23 (5 years) using Purposive Sampling method. This study is fully based on secondary data, derived from annual reports, public disclosures, financial statements of IRDA and selected insurance companies. For analyzing the data, we have used correlation and multiple regression techniques. This study found that Board Mix and Independent Directors are positively and Female Board Members and CEO Duality are negatively associated with the financial performance of the Indian insurance industry.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent years have seen a rapid expansion of the cloud computing industry, which may be visualized as a distributed computing environment where cloud resources can be distributed shared. In comparison to traditional systems, there are thousands of computers operating in parallel, completing the specified task quickly. The parallel processing is made possible by the low cost of these virtualized hardware resources. In this paper, we discuss several cloud deployment options and how they differ from conventional computers in terms of security. Different methods that minimize the cloud and the limitations of current cryptographic techniques can be used to analyse this security. This research introduces ecliptic curve cryptography technique for various cloud-based applications and compares this technique with existing RSA algorithm-based applications to analyse the security in deployment models. The suggested elliptic curve based public key cryptography is shown to be superior to the current RSA algorithm based applications in this paper's experimental and theoretical results. Our experimental findings show that the suggested ECA approach outperforms the RSA algorithm. This aids in the use of security solutions for the various cloud computing deployment patterns that have been studied.
{"title":"An efficient Technique for Data Security using Improved Elliptic Curve Cryptosystem over Cloud Computing","authors":"None Sunil Manoi, None S C Lingareddy","doi":"10.32628/cseit239053","DOIUrl":"https://doi.org/10.32628/cseit239053","url":null,"abstract":"Recent years have seen a rapid expansion of the cloud computing industry, which may be visualized as a distributed computing environment where cloud resources can be distributed shared. In comparison to traditional systems, there are thousands of computers operating in parallel, completing the specified task quickly. The parallel processing is made possible by the low cost of these virtualized hardware resources. In this paper, we discuss several cloud deployment options and how they differ from conventional computers in terms of security. Different methods that minimize the cloud and the limitations of current cryptographic techniques can be used to analyse this security. This research introduces ecliptic curve cryptography technique for various cloud-based applications and compares this technique with existing RSA algorithm-based applications to analyse the security in deployment models. The suggested elliptic curve based public key cryptography is shown to be superior to the current RSA algorithm based applications in this paper's experimental and theoretical results. Our experimental findings show that the suggested ECA approach outperforms the RSA algorithm. This aids in the use of security solutions for the various cloud computing deployment patterns that have been studied.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to solve the sharing document problem of the organizations online technically, we described the methods and advantages of building the DMS based on MVC Framework, achieve document sharing and information exchange among the heterogeneous systems. According to this model, we established a CodeIgniter MVC framework of the PHP, and designed and developed the realization of the internal DMS platform in detail. In this paper, we try to solve “how to share and store documents easily”. A Document Management System (DMS) provides a centralized platform to store, retrieve, and track documents, improving productivity and reducing manual errors. This research paper explores the design and implementation of a robust DMS using the Model-View-Controller (MVC) architectural pattern.
{"title":"Design and Implementation of a Document Management System with MVC Framework","authors":"Sadik Khan, Aaesha T. Khanam","doi":"10.32628/cseit2390451","DOIUrl":"https://doi.org/10.32628/cseit2390451","url":null,"abstract":"In order to solve the sharing document problem of the organizations online technically, we described the methods and advantages of building the DMS based on MVC Framework, achieve document sharing and information exchange among the heterogeneous systems. According to this model, we established a CodeIgniter MVC framework of the PHP, and designed and developed the realization of the internal DMS platform in detail. In this paper, we try to solve “how to share and store documents easily”. A Document Management System (DMS) provides a centralized platform to store, retrieve, and track documents, improving productivity and reducing manual errors. This research paper explores the design and implementation of a robust DMS using the Model-View-Controller (MVC) architectural pattern.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135937209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Model–View–Controller (MVC) design pattern is widely used in web development and ERP to separate data layer, presentation layer, and user interaction concerns. In recent years there have been many PHP frameworks available for web developers to choose from right one. Developers face difficulty in choosing the relevant frameworks and appropriate support functions with libraries to include in their projects. For this reason, a clear understanding of the various frameworks is now becoming an important requirement for web developers. In this paper, we studied several research papers talking about different PHP frameworks, and we compared them with each other for result. In PHP, there are several MVC frameworks available that provide a structured approach to developing web applications. The purpose of this research paper is to explore and review some of the popular MVC frameworks for web development in PHP.
{"title":"Study on MVC Framework for Web Development in PHP","authors":"Sadik Khan, Aaesha T. Khanam","doi":"10.32628/cseit2390450","DOIUrl":"https://doi.org/10.32628/cseit2390450","url":null,"abstract":"The Model–View–Controller (MVC) design pattern is widely used in web development and ERP to separate data layer, presentation layer, and user interaction concerns. In recent years there have been many PHP frameworks available for web developers to choose from right one. Developers face difficulty in choosing the relevant frameworks and appropriate support functions with libraries to include in their projects. For this reason, a clear understanding of the various frameworks is now becoming an important requirement for web developers. In this paper, we studied several research papers talking about different PHP frameworks, and we compared them with each other for result. In PHP, there are several MVC frameworks available that provide a structured approach to developing web applications. The purpose of this research paper is to explore and review some of the popular MVC frameworks for web development in PHP.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135937207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}