2,366 research outputs found

    Enhancing Flight Delay Prediction through Feature Engineering in Machine Learning Classifiers: A Real Time Data Streams Case Study

    Get PDF
    The process of creating and selecting features from raw data to enhance the accuracy of machine learning models is referred to as feature engineering. In the context of real-time data streams, feature engineering becomes particularly important because the data is constantly changing and the model must be able to adapt quickly. A case study of using feature engineering in a flight information system is described in this paper. We used feature engineering to improve the performance of machine learning classifiers for predicting flight delays and describe various techniques for extracting and constructing features from the raw data, including time-based features, trend-based features, and error-based features. Before applying these techniques, we applied feature pre-processing techniques, including the CTAO algorithm for feature pre-processing, followed by the SCSO (Sand cat swarm optimization) algorithm for feature extraction and the Enhanced harmony search for feature optimization. The resultant feature set contained the 9 most relevant features for deciding whether a flight would be delayed or not. Additionally, we evaluate the performance of various classifiers using these engineered features and contrast the results with those obtained using raw features. The results show that feature engineering significantly improves the performance of the classifiers and allows for more accurate prediction of flight delays in real-time

    Isolation, Screening and Characterization of Exopolysaccharide Producing Pseudomonas Sp. from The Soil Sample

    Get PDF
      Exopolysaccharides (EPS) are vital metabolites that specific environmental microorganisms produce and expel. The goal of the current investigation is to identify bacteria that produce exopolysaccharides in soil samples from the Buttenath Dam region, At. Chanai, Tq. Ambajogai, Dist. Beed situated in the Marathwada region of Maharashtra, India. Two methods, such as gravimetric analysis of exopolysaccharide dry weight and quantification as, instance, for total carbohydrate content using phenol sulphuric acid technique, were used to screen the EPS-producing capacities of the chosen isolates. Post preliminary screening by selecting thick, ropy-like colony formers on agar medium, the results showed that thirteen (13) distinct colonies were marked to manufacture EPS. Tentative identification of these isolates was done based on morphological and biochemical tests. Three (03) isolates, VJ001, VJ003 and VJ010, were identified through secondary screening as the most effective EPS producers (producing precipitates over 1.46 mg/L of total dry weight and 8). This was in comparison to other bacterial colonies that were also isolated. Out of these screened isolates, VJ003 was the isolate with the highest exopolysaccharide produced and this isolated bacterium was identified using 16S rRNA gene sequence and phylogeny study as Pseudomonas aeruginosa VJ003 with NCBI GeneBank accession no. OR196093. The Pseudomonas aeruginosa VJ003 strain can be used in biotechnological sectors because of the ability it has to create significant levels of exopolysaccharides, according to the results of the current study

    Documentation and ethnobotanical survey of wild edible plants from Kolhapur district

    Get PDF
    The present study deals with the identification, documentation and ethno-botanical exploration with respect to food value of wild edible plants from Kolhapur district. Total 50 wild edible plants were surveyed. Edible parts of wild plants (fruit, flower, leaves, tubers and inflorescences) are the nature’s gift to mankind; these are not only delicious and refreshing but also the chief source of vitamin, minerals and protein. The wild edible plants are the normal food of cattle grazers and the forest tribes. Although the popularity of these wild forms of fruits, flowers and tubers has declined, it is considered that special attention should be paid to them in order to maintain and improve this important source of food supply

    DESIGN, DEVELOPMENT AND CHARACTERIZATION OF MUCOADHESIVE GASTRO SPHERES OF CARVEDILOL

    Get PDF
    Objective: The purpose of this study was to design mucoadhesive gastro spheres of carvedilol targeting to upper GIT, and optimize it in terms of its entrapment efficiency and drug release. A 32 full factorial design was employed to study the effect of independent variables like sodium alginate and sodium carboxyl methyl cellulose on entrapment efficiency and in vitro drug release. Methods: Mucoadhesive gastro spheres were prepared by Orifice-Ionic gelation method, in which drug is uniformly distributed in the polymer solution so drug can be loaded easily in the polymer.32 full factorial designs were used to study the effect of process variables on formulation characteristics by applying statistical analysis. Results: FTIR, XRD and DSC analyses apparently did not indicate any interaction of the drug with the polymers. However, the drug content, drug entrapment efficiency and morphology of the gastro spheres were found to be influenced by the method of preparation, composition of gastro spheres as well as exposure to the cross linking agent. In vitro drug release study showed that drug release can be modified by varying drug to polymer ratio. The release rate was found to be decreased in accordance with the increase in the ratio of polymer used. Conclusion: From the study, we successfully developed carvedilol gastro spheres by using mucoadhesive polymer like SCMC and rate retardant sodium alginate polymer

    Friendbook: A Semantic-Based Friend Recommendation System for Social Networks

    Get PDF
    TWENTY years past, folks generally created friends with others who live or work near themselves, like neighbors or colleagues. we have a tendency to decision friends created through this ancient fashion as G-friends, that stands for geographical location-based friends as a result of they're influenced by the geographical distances between one another. With the speedy advances in social networks, services like Facebook, Twitter and Google+ have provided us revolutionary ways in which of creating friends.According to Facebook statistics, a user has a mean of one hundred thirty friends, maybe larger than the other time in history. One challenge with existing social networking services is a way to suggest a good or reliable friend to a user. Most of them rely on pre-existing user relationships to choose friend candidates. for instance, Facebook depends on a social link analysis among those that already share common friends and recommends  users as potential friends.Unfortunately, this approach might not be the foremost applicable supported recent social science ï¬ndings. according to these studies, the principles to group individuals along include: 1) habits or life style; 2) attitudes; 3) tastes; 4) ethical standards; 5) economic level; and 6) individuals they already know. life styles are typically closely correlate with daily routines and activities. Therefore, if we tend to may gather data on users’ daily routines and activities, we are able to exploit rule #1 and suggest friends to individuals supported their similar life styles. This recommendation mechanism may be deployed as a standalone app on smartphones for existing social network frameworks

    PUF Probe: A PUF-based Hardware Authentication Equipment for IEDs

    Full text link
    Intelligent Electronic Devices (IEDs) are vital components in modern electrical substations, collectively responsible for monitoring electrical parameters and performing protective functions. As a result, ensuring the integrity of IEDs is an essential criteria. While standards like IEC 61850 and IEC 60870-5-104 establish cyber-security protocols for secure information exchange in IED-based power systems, the physical integrity of IEDs is often overlooked, leading to a rise in counterfeit and tainted electronic products. This paper proposes a physical unclonable function (PUF)-based device (IEDPUF probe) capable of extracting unique hardware signatures from commercial IEDs. These signatures can serve as identifiers, facilitating the authentication and protection of IEDs against counterfeiting. The paper presents the complete hardware architecture of the IEDPUF probe, along with algorithms for signature extraction and authentication. The process involves the central computer system (CCS) initiating IED authentication requests by sending random challenges to the IEDPUF probe. Based on the challenges, the IEDPUF probe generates responses, which are then verified by the CCS to authenticate the IED. Additionally, a two-way authentication technique is employed to ensure that only verified requests are granted access for signature extraction. Experimental results confirm the efficacy of the proposed IEDPUF probe. The results demonstrate its ability to provide real-time responses possessing randomness while uniquely identifying the IED under investigation. The proposed IEDPUF probe offers a simple, cost-effective, accurate solution with minimal storage requirements, enhancing the authenticity and integrity of IEDs within electrical substation

    An Intrusion Detection System Algorithm for Defending MANET against the DDoS Attacks.

    Get PDF
    Mobile ad hoc network (MANET) is rapidly deployable, self configuring network able to communicate with each other without the aid of any centralized system. There is no need for existing infrastructure base network. In MANET Wireless medium is radio frequencies and nodes are mobile, topology can be very dynamically. Nodes must be able to relay traffic since communicating nodes might be out of range. A MANET can be a standalone network or it can be connected to external networks like internet. Multihop operation of MANET requires a routing mechanism designed for mobile nodes are internet access mechanisms, self configuring networks requires an address allocation mechanism, mechanism to detect and act on, merging of existing networks and security mechanisms. As we know that there is no any centralized system so routing is done by node itself. Due to its mobility and self routing capability nature, there are many weaknesses in its security

    Implementation of Decoy Deception based Detection System for Ransomware Attack

    Get PDF
    Ransomware poses a dangerous threat to  cybersecurity. Data as well as rights owned by the user are  adversely impacted. The situation has become considerably  more critical as a result of the emergence of new ransomware  varieties and Ransomware-as-a-Service. In this paper, we  presented a novel deception-based and behaviour-based  method for real-time ransomware detection. In order to avoid  any loss before ransomware is discovered, we build pretend  files and directories for nefarious behaviours. We conducted a  pilot study using Locky, and the results demonstrate the  effectiveness of our strategy with little system resource usage  and geographical cost.&nbsp
    • …
    corecore