首页 > 最新文献

INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT最新文献

英文 中文
Navigating Unrealistic Expectations of Relationships on Instagram 驾驭 Instagram 上不切实际的关系期望
Pub Date : 2024-07-22 DOI: 10.55041/ijsrem36695
Swaleha Khanam, Dr. Tasha Singh Parihar
This study looks at how Instagram users' relationships are affected and whether they thinktheir relationships are improving or deteriorating. In today's globalized society, social networking services (SNS) greatly influence how people interact and form connections. Instagram is a tool that couples use to strengthen their romantic relationships and reduce uncertainty when they are first dating. On the other hand, overusing the app can result in problems like jealousy, profile monitoring, poor communication, and time wastage. Feelings of outside influence can give rise to jealousy in relationships, which can cause bad emotions and a decrease in the enjoyment of the partnership. Knapp's relational stage model sheds light on how relationships develop and end. Sustaining healthy connections requires concentrating on good interactions in virtual spaces. The majority of young peopleusing Instagram are between the ages of 18 and 29, reflecting a shift in the demographic. Users are in total control of the online personas they create, and this might affect their romantic relationships. In October 2023, research was carried out to investigate the use of Instagram in different relationship stages. The results indicated that jealousy was asignificant predictor of daily Instagram usage, the importance of promoting one's relationship on the platform, and the daily duration of Instagram usage. Keywords: Social Media, Online and Offline, Communication, Emotion, Insecurity.
本研究探讨了 Instagram 用户的人际关系如何受到影响,以及他们认为自己的人际关系是在改善还是在恶化。在当今全球化的社会中,社交网络服务(SNS)在很大程度上影响着人们如何互动和建立联系。Instagram 是情侣们在初次约会时用来加强浪漫关系和减少不确定性的工具。另一方面,过度使用该应用程序会导致嫉妒、档案监控、沟通不畅和时间浪费等问题。受外界影响的感觉会让人在恋爱中产生嫉妒,从而导致不良情绪,降低合作的乐趣。克纳普的关系阶段模型揭示了关系如何发展和结束。要维持健康的人际关系,就必须在虚拟空间中专注于良好的互动。使用 Instagram 的年轻人大多在 18-29 岁之间,这反映了人口结构的变化。用户可以完全控制自己创建的网络角色,这可能会影响他们的恋爱关系。2023 年 10 月,一项研究调查了 Instagram 在不同恋爱阶段的使用情况。研究结果表明,嫉妒是Instagram每日使用量、在平台上宣传自己关系的重要性以及Instagram每日使用时长的重要预测因素。关键词社交媒体、线上线下、沟通、情感、不安全感。
{"title":"Navigating Unrealistic Expectations of Relationships on Instagram","authors":"Swaleha Khanam, Dr. Tasha Singh Parihar","doi":"10.55041/ijsrem36695","DOIUrl":"https://doi.org/10.55041/ijsrem36695","url":null,"abstract":"This study looks at how Instagram users' relationships are affected and whether they thinktheir relationships are improving or deteriorating. In today's globalized society, social networking services (SNS) greatly influence how people interact and form connections. Instagram is a tool that couples use to strengthen their romantic relationships and reduce uncertainty when they are first dating. On the other hand, overusing the app can result in problems like jealousy, profile monitoring, poor communication, and time wastage. Feelings of outside influence can give rise to jealousy in relationships, which can cause bad emotions and a decrease in the enjoyment of the partnership. Knapp's relational stage model sheds light on how relationships develop and end. Sustaining healthy connections requires concentrating on good interactions in virtual spaces. The majority of young peopleusing Instagram are between the ages of 18 and 29, reflecting a shift in the demographic. Users are in total control of the online personas they create, and this might affect their romantic relationships. In October 2023, research was carried out to investigate the use of Instagram in different relationship stages. The results indicated that jealousy was asignificant predictor of daily Instagram usage, the importance of promoting one's relationship on the platform, and the daily duration of Instagram usage. Keywords: Social Media, Online and Offline, Communication, Emotion, Insecurity.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"70 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141817590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety and Security Alerting in Smart Homes 智能家居中的安全和安保警报
Pub Date : 2024-07-20 DOI: 10.55041/ijsrem36614
K. Chennakkeshava, Hemanth Hemanth
Abstract—Thanks to developments in Internet of Things (IoT) technology, safety and security alerting in smart homes has become a fundamental component of contemporary living. Smart houses are outfitted with an array of networked gadgets, in- cluding cameras, sensors, locks, and alarms, which collaborate to keep an eye on and safeguard the property. Homeowners can receive real-time messages and alerts from these systems on possible security breaches, fire threats, gas leaks, and other safety concerns. Smart home security systems can distinguish between typical activity and questionable conduct by utilizing data analytics and machine learning. This reduces false alerts and improves overall efficiency.Homeowners may now remotely control and monitor their properties thanks to the integration of voice assistants and mobile applications, which further improves user experience. These systems can automatically notify emer- gency contacts or local authorities in the event of an emergency, guaranteeing a prompt response. Further improvements in safety and security are anticipated as smart home technology continues to evolve; future models may have even more sophisticated predictive analytics and seamless interaction with public safety infrastructures. But these developments also give rise to worries about cybersecurity and data privacy, which calls for strong security measures to safeguard user information and guarantee the dependability of these alerting systems.
摘要--由于物联网(IoT)技术的发展,智能家居的安全和安保警报已成为当代生活的基本组成部分。智能家居配备了一系列联网的小工具,包括摄像头、传感器、锁和警报器,它们相互协作,共同监视和保护财产安全。房主可以收到这些系统发出的关于可能的安全漏洞、火灾威胁、煤气泄漏和其他安全问题的实时信息和警报。智能家居安防系统可利用数据分析和机器学习来区分典型活动和可疑行为。由于集成了语音助手和移动应用程序,业主现在可以远程控制和监控他们的财产,这进一步改善了用户体验。一旦发生紧急情况,这些系统可自动通知紧急联系人或地方当局,确保迅速做出反应。随着智能家居技术的不断发展,安全和安保方面有望得到进一步改善;未来的智能家居可能会具备更复杂的预测分析功能,并能与公共安全基础设施实现无缝互动。但这些发展也引起了人们对网络安全和数据隐私的担忧,这就要求采取强有力的安全措施来保护用户信息,并保证这些警报系统的可靠性。
{"title":"Safety and Security Alerting in Smart Homes","authors":"K. Chennakkeshava, Hemanth Hemanth","doi":"10.55041/ijsrem36614","DOIUrl":"https://doi.org/10.55041/ijsrem36614","url":null,"abstract":"Abstract—Thanks to developments in Internet of Things (IoT) technology, safety and security alerting in smart homes has become a fundamental component of contemporary living. Smart houses are outfitted with an array of networked gadgets, in- cluding cameras, sensors, locks, and alarms, which collaborate to keep an eye on and safeguard the property. Homeowners can receive real-time messages and alerts from these systems on possible security breaches, fire threats, gas leaks, and other safety concerns. Smart home security systems can distinguish between typical activity and questionable conduct by utilizing data analytics and machine learning. This reduces false alerts and improves overall efficiency.Homeowners may now remotely control and monitor their properties thanks to the integration of voice assistants and mobile applications, which further improves user experience. These systems can automatically notify emer- gency contacts or local authorities in the event of an emergency, guaranteeing a prompt response. Further improvements in safety and security are anticipated as smart home technology continues to evolve; future models may have even more sophisticated predictive analytics and seamless interaction with public safety infrastructures. But these developments also give rise to worries about cybersecurity and data privacy, which calls for strong security measures to safeguard user information and guarantee the dependability of these alerting systems.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"123 50","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141820154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Fake Detection 深度赝品检测
Pub Date : 2024-07-20 DOI: 10.55041/ijsrem36626
Daksh Baveja,, Yatharth Sharma, Dr. Nagadevi S
Abstract—The following paper considers an in-depth study of face detection and classification using a pre-trained VGG16 model with a prime focus on separating real from fake facial images. Face detection is a very fundamental task in computer vision and of key importance in various security- and biometric identification-related applications, social media, and so on, in which the above-mentioned Dortania et al. findings will find their use. The idea is to use transfer learning by tuning an already trained VGG16 that was developed for large-scale image classification to do well in a specific task of face authenticity verification. For this purpose, we constructed a custom dataset with images labeled either ’real’ or ’fake’, sourced from different environments to make it diverse and hence robust. The dataset was then preprocessed by face detection using Haar cascades, resizing, normalization, and augmentation to increase the model’s capacity for generalization. This dataset was trained as well as tested on the modified VGG16 model, where only one fully connected layer at the end was changed to give an output in two classes—one for the real faces and another for the fake ones. Model performance was ascertained through training loss and accuracy in the training phase. For the 30 epochs of training, the model achieved very good training accuracy. Further performance fluctuation analysis at different epochs used detailed plots of the loss and accuracy. Testing validates further that the model is robust, having a high testing accuracy to ensure the model generalizes on unseen data. Our results show the effectiveness of transfer learning using VGG16 in face classification, where accuracy was high for the classification of real and fake faces. Thus, this study not only demonstrates the potential of pre-trained deep models in specialized applications but also shows the proper quality of the dataset and its preprocessing towards the attainment of optimal model performance. This trained model is, therefore, deployable in every real-world application where verification of faces is very important, bringing in a reliable tool for improving security and authenticity in digital relations. Index Terms—deep fake, detection, artificial intelligence, ma- chine learning, digital forensics
摘要--本文将利用预先训练好的 VGG16 模型对人脸检测和分类进行深入研究,重点是区分真假人脸图像。人脸检测是计算机视觉中一项非常基本的任务,在各种与安全和生物识别相关的应用、社交媒体等方面具有关键重要性,上述 Dortania 等人的研究成果将在这些应用中得到应用。我们的想法是利用迁移学习,调整已经为大规模图像分类开发的训练有素的 VGG16,使其在特定的人脸真实性验证任务中表现出色。为此,我们构建了一个自定义数据集,其中的图像标注为 "真 "或 "假",这些图像来自不同的环境,因此具有多样性和鲁棒性。然后使用 Haar 级联对数据集进行人脸检测预处理、调整大小、归一化和增强,以提高模型的泛化能力。该数据集在修改后的 VGG16 模型上进行了训练和测试,其中只改变了末端的一个全连接层,以提供两类输出--一类是真人脸,另一类是假人脸。模型的性能通过训练阶段的训练损失和准确率来确定。在 30 个历时的训练中,模型达到了非常高的训练精度。利用损失率和准确率的详细图表,对不同历时的性能波动进行了进一步分析。测试进一步验证了该模型的鲁棒性,它具有很高的测试准确率,可确保模型在未见数据上的泛化。我们的结果表明,在人脸分类中使用 VGG16 进行迁移学习非常有效,对真实和虚假人脸的分类准确率都很高。因此,这项研究不仅证明了预训练深度模型在专业应用中的潜力,还显示了数据集的适当质量及其预处理对获得最佳模型性能的重要性。因此,这种训练有素的模型可以部署到人脸验证非常重要的各种现实应用中,为提高数字关系的安全性和真实性提供了可靠的工具。索引词条-深度伪造、检测、人工智能、机器学习、数字取证
{"title":"Deep Fake Detection","authors":"Daksh Baveja,, Yatharth Sharma, Dr. Nagadevi S","doi":"10.55041/ijsrem36626","DOIUrl":"https://doi.org/10.55041/ijsrem36626","url":null,"abstract":"Abstract—The following paper considers an in-depth study of face detection and classification using a pre-trained VGG16 model with a prime focus on separating real from fake facial images. Face detection is a very fundamental task in computer vision and of key importance in various security- and biometric identification-related applications, social media, and so on, in which the above-mentioned Dortania et al. findings will find their use. The idea is to use transfer learning by tuning an already trained VGG16 that was developed for large-scale image classification to do well in a specific task of face authenticity verification. For this purpose, we constructed a custom dataset with images labeled either ’real’ or ’fake’, sourced from different environments to make it diverse and hence robust. The dataset was then preprocessed by face detection using Haar cascades, resizing, normalization, and augmentation to increase the model’s capacity for generalization. This dataset was trained as well as tested on the modified VGG16 model, where only one fully connected layer at the end was changed to give an output in two classes—one for the real faces and another for the fake ones. Model performance was ascertained through training loss and accuracy in the training phase. For the 30 epochs of training, the model achieved very good training accuracy. Further performance fluctuation analysis at different epochs used detailed plots of the loss and accuracy. Testing validates further that the model is robust, having a high testing accuracy to ensure the model generalizes on unseen data. Our results show the effectiveness of transfer learning using VGG16 in face classification, where accuracy was high for the classification of real and fake faces. Thus, this study not only demonstrates the potential of pre-trained deep models in specialized applications but also shows the proper quality of the dataset and its preprocessing towards the attainment of optimal model performance. This trained model is, therefore, deployable in every real-world application where verification of faces is very important, bringing in a reliable tool for improving security and authenticity in digital relations. Index Terms—deep fake, detection, artificial intelligence, ma- chine learning, digital forensics","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"48 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141819444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FLIGHT TICKET PRICE PREDICTION 机票价格预测
Pub Date : 2024-07-20 DOI: 10.55041/ijsrem36633
Mudagal Nagarjun, R. R
The study uses past flight schedules, route data, and ticket prices to estimate airline ticket costs using machine learning regression. For ease of use and functionality, it has admin and user modules. Registering and logging in allows users to upload flight data for precise cost estimates. Ensuring continuous efficacy, the admin module makes data administration and system maintenance easier. The objective is to improve overall travel planning experiences by providing travelers with data- driven insights to help them make wise decisions and maximize the value of their airline ticket purchases. Keyword: Machine learning, Flight ticket Prediction, Flight fare.
该研究利用过去的航班时刻表、航线数据和机票价格,采用机器学习回归法估算机票成本。为便于使用和发挥功能,该系统设有管理员模块和用户模块。通过注册和登录,用户可以上传航班数据,以进行精确的成本估算。为确保持续有效,管理模块使数据管理和系统维护更加简便。其目标是通过为旅客提供以数据为驱动的洞察力,帮助他们做出明智的决策,最大限度地提高机票购买价值,从而改善整体旅行规划体验。关键词:机器学习、机票预测、航班票价。
{"title":"FLIGHT TICKET PRICE PREDICTION","authors":"Mudagal Nagarjun, R. R","doi":"10.55041/ijsrem36633","DOIUrl":"https://doi.org/10.55041/ijsrem36633","url":null,"abstract":"The study uses past flight schedules, route data, and ticket prices to estimate airline ticket costs using machine learning regression. For ease of use and functionality, it has admin and user modules. Registering and logging in allows users to upload flight data for precise cost estimates. Ensuring continuous efficacy, the admin module makes data administration and system maintenance easier. The objective is to improve overall travel planning experiences by providing travelers with data- driven insights to help them make wise decisions and maximize the value of their airline ticket purchases. Keyword: Machine learning, Flight ticket Prediction, Flight fare.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"124 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141819924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LSTM Based New Probability Features Using Machine Learning to Improve Network Attack Detection 利用机器学习改进网络攻击检测基于 LSTM 的新概率特征
Pub Date : 2024-07-20 DOI: 10.55041/ijsrem36583
Er. Krishna Raj Kumar.K, Dr. S Ilangovan
This project focuses on improving the detection of network attacks by using a machine learning technique known as Long Short-Term Memory (LSTM) networks. LSTM networks are a type of neural network that excels at analyzing sequences of data, making them well-suited for identifying patterns associated with network intrusions. To enhance the LSTM model's effectiveness, we introduce new probability features that help the model better distinguish between normal and malicious activities. Our approach includes collecting network data, preprocessing it to make it suitable for training, and then using this data to train the LSTM model. We evaluate the model's performance using a range of metrics to ensure its accuracy and reliability. The results indicate that our method significantly improves the detection rate of network attacks while also reducing the number of false alarms. This means that our LSTM-based model not only catches more real threats but also makes fewer mistakes in identifying normal activities as attacks. Overall, this project showcases the potential of advanced machine learning techniques, like LSTM networks, to enhance cyber security measures and protect against network threats more effectively.
本项目的重点是通过使用一种称为长短期记忆(LSTM)网络的机器学习技术来改进网络攻击的检测。LSTM 网络是一种擅长分析数据序列的神经网络,因此非常适合识别与网络入侵相关的模式。为了提高 LSTM 模型的有效性,我们引入了新的概率特征,帮助模型更好地区分正常活动和恶意活动。我们的方法包括收集网络数据,对其进行预处理使其适合训练,然后使用这些数据训练 LSTM 模型。我们使用一系列指标来评估模型的性能,以确保其准确性和可靠性。结果表明,我们的方法大大提高了网络攻击的检测率,同时也减少了误报的数量。这意味着我们基于 LSTM 的模型不仅能捕捉到更多的真实威胁,而且在将正常活动识别为攻击时也能减少失误。总之,该项目展示了 LSTM 网络等先进机器学习技术在加强网络安全措施和更有效地防范网络威胁方面的潜力。
{"title":"LSTM Based New Probability Features Using Machine Learning to Improve Network Attack Detection","authors":"Er. Krishna Raj Kumar.K, Dr. S Ilangovan","doi":"10.55041/ijsrem36583","DOIUrl":"https://doi.org/10.55041/ijsrem36583","url":null,"abstract":"This project focuses on improving the detection of network attacks by using a machine learning technique known as Long Short-Term Memory (LSTM) networks. LSTM networks are a type of neural network that excels at analyzing sequences of data, making them well-suited for identifying patterns associated with network intrusions. To enhance the LSTM model's effectiveness, we introduce new probability features that help the model better distinguish between normal and malicious activities. Our approach includes collecting network data, preprocessing it to make it suitable for training, and then using this data to train the LSTM model. We evaluate the model's performance using a range of metrics to ensure its accuracy and reliability. The results indicate that our method significantly improves the detection rate of network attacks while also reducing the number of false alarms. This means that our LSTM-based model not only catches more real threats but also makes fewer mistakes in identifying normal activities as attacks. Overall, this project showcases the potential of advanced machine learning techniques, like LSTM networks, to enhance cyber security measures and protect against network threats more effectively.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"111 41","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141820298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
911 Call Analyzer: A Vital Tool for Detecting Critical Emergencies 911 呼叫分析仪:检测重大紧急情况的重要工具
Pub Date : 2024-07-20 DOI: 10.55041/ijsrem36673
Paresh Patil, Sushant Gaikwad, Akash Hatkangane
Emergency response systems must be able to promptly and accurately evaluate emergency calls. We provide a machine learning- based method in this study, called the "911 Call Analyzer," to automate the process of identifying serious crises from 911 call audio recordings. Mel- frequency cepstral coefficients (MFCCs) are used by the system to extract features, and machine learning and deep learning architectures are used for classification. To forecast the urgency and severity of each emergency call, the collected features are fed into a model that has been trained on a dataset of labelled calls. We assess the 911 Call Analyzer's performance using a test dataset, and we obtain a 91% accuracy rate with RF and XG Boost model followed by SVM with 90% accuracy, CNN with 69% accuracy and lastly LSTM with 64% accuracy. These findings show how well the suggested method works to reliably identify important crises, which helps emergency dispatchers prioritize calls and allocate resources more wisely. The 911 Call Analyzer is a tool that holds great potential for improving emergency response systems' efficacy and efficiency, which will eventually benefit those who are in need. Key Words: 911 calls, MFCCs, LSTM, CNN, SVM, RF, XG Boost.
应急响应系统必须能够及时、准确地评估紧急呼叫。我们在本研究中提供了一种基于机器学习的方法,称为 "911 呼叫分析器",可自动从 911 呼叫录音中识别严重危机。系统使用梅尔频率倒频谱系数(MFCC)提取特征,并使用机器学习和深度学习架构进行分类。为了预测每个紧急呼叫的紧急程度和严重程度,收集到的特征被输入到一个模型中,该模型已在标记呼叫的数据集上经过训练。我们使用测试数据集对 911 呼叫分析仪的性能进行了评估,结果显示 RF 和 XG Boost 模型的准确率为 91%,其次是 SVM,准确率为 90%,CNN,准确率为 69%,最后是 LSTM,准确率为 64%。这些研究结果表明,所建议的方法能够可靠地识别重要危机,从而帮助紧急调度员确定呼叫的优先次序,更合理地分配资源。911 呼叫分析器是一种具有巨大潜力的工具,可提高应急响应系统的效率和效能,最终造福于那些需要帮助的人。关键字911 电话、MFCCs、LSTM、CNN、SVM、RF、XG Boost。
{"title":"911 Call Analyzer: A Vital Tool for Detecting Critical Emergencies","authors":"Paresh Patil, Sushant Gaikwad, Akash Hatkangane","doi":"10.55041/ijsrem36673","DOIUrl":"https://doi.org/10.55041/ijsrem36673","url":null,"abstract":"Emergency response systems must be able to promptly and accurately evaluate emergency calls. We provide a machine learning- based method in this study, called the \"911 Call Analyzer,\" to automate the process of identifying serious crises from 911 call audio recordings. Mel- frequency cepstral coefficients (MFCCs) are used by the system to extract features, and machine learning and deep learning architectures are used for classification. To forecast the urgency and severity of each emergency call, the collected features are fed into a model that has been trained on a dataset of labelled calls. We assess the 911 Call Analyzer's performance using a test dataset, and we obtain a 91% accuracy rate with RF and XG Boost model followed by SVM with 90% accuracy, CNN with 69% accuracy and lastly LSTM with 64% accuracy. These findings show how well the suggested method works to reliably identify important crises, which helps emergency dispatchers prioritize calls and allocate resources more wisely. The 911 Call Analyzer is a tool that holds great potential for improving emergency response systems' efficacy and efficiency, which will eventually benefit those who are in need. Key Words: 911 calls, MFCCs, LSTM, CNN, SVM, RF, XG Boost.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"110 50","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141820440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EARLY PREDICTION OF LOWBIRTH WEIGHT CASES USING ML 用毫升对低体重儿病例进行早期预测
Pub Date : 2024-07-20 DOI: 10.55041/ijsrem36637
K. M, M. G L
This work aims to predict, from a variety of user inputs, whether a baby will be born healthy or underweight. Taking into account characteristics including parental health, ethnicity, educational background, and region—all of which have an impact on healthcare accessibility and environmental factors—the study acknowledges the significance of birth weight in relation to gestational age. Through the examination of extensive datasets containing these lifestyle and demographic characteristics, health care providers can improve prenatal care and interventions, concentrating more carefully on populations that are at risk. With the help of user-supplied data, this prediction tool provides a probabilistic estimate of birth weight outcomes, giving parents and medical professionals peace of mind and assistance. Keyword: Low Birth weight (LBW), Smart health informatics, Machine Learning (ML).
这项工作旨在根据用户的各种输入,预测婴儿出生时是健康还是体重不足。考虑到父母的健康状况、种族、教育背景和地区等特征--所有这些都会对医疗保健的可及性和环境因素产生影响--该研究承认出生体重与胎龄的关系非常重要。通过对包含这些生活方式和人口特征的大量数据集进行检查,医疗服务提供者可以改进产前护理和干预措施,更细致地关注高危人群。借助用户提供的数据,该预测工具提供了出生体重结果的概率估计,让父母和医疗专业人员放心并得到帮助。关键词低出生体重(LBW) 智能健康信息学 机器学习(ML)
{"title":"EARLY PREDICTION OF LOWBIRTH WEIGHT CASES USING ML","authors":"K. M, M. G L","doi":"10.55041/ijsrem36637","DOIUrl":"https://doi.org/10.55041/ijsrem36637","url":null,"abstract":"This work aims to predict, from a variety of user inputs, whether a baby will be born healthy or underweight. Taking into account characteristics including parental health, ethnicity, educational background, and region—all of which have an impact on healthcare accessibility and environmental factors—the study acknowledges the significance of birth weight in relation to gestational age. Through the examination of extensive datasets containing these lifestyle and demographic characteristics, health care providers can improve prenatal care and interventions, concentrating more carefully on populations that are at risk. With the help of user-supplied data, this prediction tool provides a probabilistic estimate of birth weight outcomes, giving parents and medical professionals peace of mind and assistance. Keyword: Low Birth weight (LBW), Smart health informatics, Machine Learning (ML).","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"77 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141819197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Generative Adversarial Network for Image Synthesis 为图像合成构建生成式对抗网络
Pub Date : 2024-07-20 DOI: 10.55041/ijsrem36641
B. Y. Chandra
Generative Adversarial Networks (GANs) have emerged as a powerful class of generative models, capable of synthesizing realistic images by leveraging adversarial training. It explores the process of building a Generative Adversarial Network for image synthesis, delving into the underlying architecture, training methodology, and potential applications. Generative Adversarial Networks typically run unsupervised and use a cooperative zero- sum game framework to learn, where one person's gain equals another person's loss. The proposed Generative Adversarial Network architecture consists of a generator network that learns to create images from random noise and a discriminator network trained to distinguish between real and generated images. Through an adversarial training process, these networks iteratively refine their capabilities, resulting in a generator that produces increasingly realistic pictures and a discriminator with enhanced discriminative abilities. Generative Adversarial Networks are an effective tool for producing realistic, high-quality outputs in a variety of fields, including text and image generation, because of this back-and- forth competition, which results in the creation of increasingly convincing and indistinguishable synthetic data.
生成对抗网络(GAN)是一类功能强大的生成模型,能够通过对抗训练合成逼真的图像。该书探讨了为图像合成构建生成对抗网络的过程,深入研究了其基本架构、训练方法和潜在应用。生成式对抗网络通常在无监督的情况下运行,并使用合作零和博弈框架进行学习,即一个人的收益等于另一个人的损失。拟议的生成式对抗网络架构由一个生成器网络和一个判别器网络组成,生成器网络可学习从随机噪音中生成图像,而判别器网络则经过训练,可区分真实图像和生成的图像。通过对抗训练过程,这些网络不断完善自身能力,最终生成器生成的图像越来越逼真,而鉴别器的鉴别能力也越来越强。生成式对抗网络是在文本和图像生成等多个领域生成逼真、高质量输出结果的有效工具,因为这种来回竞争的结果是创建出越来越令人信服和难以区分的合成数据。
{"title":"Building a Generative Adversarial Network for Image Synthesis","authors":"B. Y. Chandra","doi":"10.55041/ijsrem36641","DOIUrl":"https://doi.org/10.55041/ijsrem36641","url":null,"abstract":"Generative Adversarial Networks (GANs) have emerged as a powerful class of generative models, capable of synthesizing realistic images by leveraging adversarial training. It explores the process of building a Generative Adversarial Network for image synthesis, delving into the underlying architecture, training methodology, and potential applications. Generative Adversarial Networks typically run unsupervised and use a cooperative zero- sum game framework to learn, where one person's gain equals another person's loss. The proposed Generative Adversarial Network architecture consists of a generator network that learns to create images from random noise and a discriminator network trained to distinguish between real and generated images. Through an adversarial training process, these networks iteratively refine their capabilities, resulting in a generator that produces increasingly realistic pictures and a discriminator with enhanced discriminative abilities. Generative Adversarial Networks are an effective tool for producing realistic, high-quality outputs in a variety of fields, including text and image generation, because of this back-and- forth competition, which results in the creation of increasingly convincing and indistinguishable synthetic data.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"7 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141819692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-Commerce Product Recommendation System Using Machine Learning 使用机器学习的电子商务产品推荐系统
Pub Date : 2024-07-20 DOI: 10.55041/ijsrem36656
Darshan M, A. C
The goal of the machine learning-powered e- commerce product recommendation system is to provide a complete, end-to-end web-based platform that improves online shopping by making insightful product recommendations. This system has features for administrators as well as users, and safe access requires login credentials. To extract information from product photos, the system's backend uses machine learning models, specifically convolutional neural networks (CNNs) for image analysis. The user's buying experience is enhanced by the use of sophisticated machine learning techniques, which guarantee relevant and accurate recommendations. To sum up, our study highlights how important machine learning-driven recommendation systems are for increasing consumer engagement and generating income for e-commerce platforms. Through constant innovation and improvement, we strive to provide businesses with state-of-the-art resources to enable them to provide individualized and significant purchasing experiences. Key Words: User Experience, Product Recommendation, Neural Network (CNN’s)
机器学习驱动的电子商务产品推荐系统的目标是提供一个完整的端到端网络平台,通过提供有见地的产品推荐来改善网上购物。该系统既有面向管理员的功能,也有面向用户的功能,安全访问需要登录凭证。为了从产品照片中提取信息,系统的后台使用了机器学习模型,特别是用于图像分析的卷积神经网络(CNN)。通过使用复杂的机器学习技术,用户的购买体验得到了提升,从而保证了相关推荐的准确性。总之,我们的研究强调了机器学习驱动的推荐系统对于提高消费者参与度和为电子商务平台创收的重要性。通过不断创新和改进,我们努力为企业提供最先进的资源,使其能够提供个性化和重要的购买体验。关键字用户体验、产品推荐、神经网络(CNN)
{"title":"E-Commerce Product Recommendation System Using Machine Learning","authors":"Darshan M, A. C","doi":"10.55041/ijsrem36656","DOIUrl":"https://doi.org/10.55041/ijsrem36656","url":null,"abstract":"The goal of the machine learning-powered e- commerce product recommendation system is to provide a complete, end-to-end web-based platform that improves online shopping by making insightful product recommendations. This system has features for administrators as well as users, and safe access requires login credentials. To extract information from product photos, the system's backend uses machine learning models, specifically convolutional neural networks (CNNs) for image analysis. The user's buying experience is enhanced by the use of sophisticated machine learning techniques, which guarantee relevant and accurate recommendations. To sum up, our study highlights how important machine learning-driven recommendation systems are for increasing consumer engagement and generating income for e-commerce platforms. Through constant innovation and improvement, we strive to provide businesses with state-of-the-art resources to enable them to provide individualized and significant purchasing experiences. Key Words: User Experience, Product Recommendation, Neural Network (CNN’s)","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"19 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141819281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INNOVATIVE AERIAL IMAGE PROCESSING TECHNIQUES FOR ENHANCED SOIL EROSION DETECTION 创新航空图像处理技术,加强土壤侵蚀检测
Pub Date : 2024-07-20 DOI: 10.55041/ijsrem36676
Nikhil A, R. R
The health of ecosystems, land use, and agriculture are all seriously threatened by soil erosion.This innovative method makes use of sophisticated image processing techniques like contour evaluation, adaptive thresholding, Gaussian blur, and morphological operations to analyze aerial photos. The method increases the accuracy of detecting erosion and identifies susceptible areas in expansive landscapes. This scalable approach offers a potent weapon in the fight against soil degradation and promises to transform ecological monitoring and management. The novel approach represents a significant development in the evaluation of soil erosion andenvironmental preservation. Keyword: Soil Erosion, Aerial Photography, Image Processing, Gaussian Blur.
这种创新方法利用复杂的图像处理技术,如轮廓评估、自适应阈值处理、高斯模糊和形态学运算来分析航空照片。该方法提高了检测水土流失的准确性,并能在广阔的地貌中识别易受影响的区域。这种可扩展的方法为防治土壤退化提供了有力武器,有望改变生态监测和管理。这种新方法是土壤侵蚀和环境保护评估领域的一项重大进展。关键词:土壤侵蚀、航空摄影、图像处理、高斯模糊。
{"title":"INNOVATIVE AERIAL IMAGE PROCESSING TECHNIQUES FOR ENHANCED SOIL EROSION DETECTION","authors":"Nikhil A, R. R","doi":"10.55041/ijsrem36676","DOIUrl":"https://doi.org/10.55041/ijsrem36676","url":null,"abstract":"The health of ecosystems, land use, and agriculture are all seriously threatened by soil erosion.This innovative method makes use of sophisticated image processing techniques like contour evaluation, adaptive thresholding, Gaussian blur, and morphological operations to analyze aerial photos. The method increases the accuracy of detecting erosion and identifies susceptible areas in expansive landscapes. This scalable approach offers a potent weapon in the fight against soil degradation and promises to transform ecological monitoring and management. The novel approach represents a significant development in the evaluation of soil erosion andenvironmental preservation. Keyword: Soil Erosion, Aerial Photography, Image Processing, Gaussian Blur.","PeriodicalId":504501,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"14 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141819398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1