International Journal of Advanced Information and Communication Technology
Latest Publications


TOTAL DOCUMENTS

42
(FIVE YEARS 42)

H-INDEX

1
(FIVE YEARS 1)

Published By IJAICT India Publications

2348-9928, 2349-6339

Author(s):  
Nanditha P C ◽  
Ganesh M A

Welding is a significant industrial application that has been implemented since the early 18th century. The introduction of welding robots in the 19th century resulted in drastic improvements in the field of welding like improving the accuracy of welding, quality of the weld, etc., However, there is no literature which briefs the industry methodology to interface HMI with the industrial robots. In this paper, MOTOMAN AR1440 Industrial Welding Robot is interfaced with the Human Machine Interface (HMI) panel to improve the communication between the machine and the operator. This improves the safety and handling of the robot. The robot trajectory is taught using a teach pendant and the HMI panel is designed to control the robot. The robot and the HMI panel are interfaced via Ethernet communication. Thus, the main objective of this paper is to brief an industry methodology to interface an AR1440 robot with an HMI panel for arc welding application thereby, improving the communication between the machine and the worker.


Author(s):  
Thanuj Kumar S ◽  
Utsav Deep ◽  
Syed Shoiab ◽  
Syed Atif ◽  
Tejas Bhatnagar ◽  
...  

Every year, the insurance industry losing billions of dollars due to fraud. The act when a person makes fake insurance claims to gain benefits, compensation & other advantages to which they are not entitled is known as Insurance Fraud. Nowadays insurance fraud detection is becoming a tedious problem for insurance companies to deal with as they need more investment and workforces to keep track of every transaction. In this paper, we are focusing on the major issue faced by insurance companies that is insurance fraud. we use the machine learning technique to detect insurance fraud based on the transactional data given by the insurance company. We build predictive models and compare their performance by calculation of confusion matrix then it is evaluated on various performance measuring parameters like accuracy, precision, recall, F1 score, and on AUC curve. SVM (Support Vector Machine) and XG Boost (Extreme Gradient Boosting) are the machine learning algorithms used. After model evaluation, we select the best model for prediction.


Author(s):  
Karthikeyan K

The application of Information Systems (IS) in business necessitates critical comprehension of the business, management activities and the initiatives that structure various business systems. Various IS can be presented as management and business remedies to issues affecting the enterprise and influenced by the ecosystem. The initiatives in IS have significantly influenced how business is run in the modern competitive age. The advent and development of technology have allowed opportunities to be availed to people to prepare the business for challenges in this competitive environment. To effectively manage IS-centred frameworks, it is fundamental to implement effective approaches, which define framework, including the ways of managing them. Strategic data system alignment provides a fundamental approach to maintain and develop IS frameworks, which support operations in business. IS alignment plans and organizational plans are fundamental for enhanced Business Performance (BP). This research paper reviews the critical elements of strategic data system alignment in the transforming organizational conditions in developed countries.


Author(s):  
Anandakumar Haldorai ◽  
Shrinand Anandakumar

The application of Information Systems (IS) in business necessitates critical comprehension of the business, management activities and the initiatives that structure various business systems. Various IS can be presented as management and business remedies to issues affecting the enterprise and influenced by the ecosystem. The initiatives in IS have significantly influenced how business is run in the modern competitive age. The advent and development of technology have allowed opportunities to be availed to people to prepare the business for challenges in this competitive environment. To effectively manage IS-centred frameworks, it is fundamental to implement effective approaches, which define framework, including the ways of managing them. Strategic data system alignment provides a fundamental approach to maintain and develop IS frameworks, which support operations in business. IS alignment plans and organizational plans are fundamental for enhanced Business Performance (BP). This research paper reviews the critical elements of strategic data system alignment in the transforming organizational conditions in developed countries.


Author(s):  
Nadja Yang Meng ◽  
Karthikeyan K

Performance benchmarking and performance measurement are the fundamental principles of performance enhancement in the business sector. For businesses to enhance their performance in the modern competitive world, it is fundamental to know how to measure the performance level in business that also incorporates telling how they will performance after a change has been made. In case a business improvement has been made, the performance processes have to be evaluated. Performance measurements are also fundamental in the process of doing comparisons of performance levels between corporations. The best practices within the industry are evaluated by the businesses with desirable levels of the kind of performance measures being conducted. In that regard, it is fundamental if similar businesses applied the same collection of performance metrics. In this paper, the NETIAS performance measurement framework will be applied to accomplish the mission of evaluating performances in business by producing generic collection of performance metrics, which businesses can utilize to compare and measure their organizational activities.


Author(s):  
Christine Sarah ◽  
Anne Ashbrook

Safety and pliability, for Enterprise Information Systems (EIS), are fundamental aspects in business. These data systems incorporate the human users with the required behaviours, experiences, and capabilities. In that regard, they have to be pliable, usable and secure. Pliability necessitates the capability to adapt and prepare to handle the perpetuating transforming conditions, which are meant to restore the complete capacity of the incidents and the attack in EIS. In this research is purpose to discuss pliability, security and the Information Systems (IS) problems in the EIS. The problem necessitates the consideration of ergonomics of efficiency, effectiveness and interactions of obligation realization, user trust and user satisfaction, including human emotions when utilizing the secured services. This paper also proposes a technique centred on the socio-technical paradigm and systems meant to model the kinds of interplays between usability, security and pliability. We provide a discussion, based on case study, meant to display the projected approach and focussing on the user-experience centred on the design structures.


Author(s):  
Kevin Hart

This research paper provides a detailed evaluation of the business concepts in Electronic Commerce (E-Commerce). The concept of E-Commerce defines the exchange of goods and services with monetary value between consumers and companies. E-Commerce is a web-based catalogue whereby buyers can possibly place order and sellers possibly accept payments. E-Commerce incorporates two forms of business: Business-to-Business (B2B) and Business-to-Consumer (B2C), which provide a definition of the commerce transactions between enterprises, such as between the wholesalers and the manufacturers or the retailers. B2C E-Commerce provides enterprises with the model, which allows businesses to deliver purchasers to the relevant merchants and achieve from the commission rewards given by the merchants. This paper will evaluate the two forms of business with relation of management of Virtual Enterprises (VE) in the field of E-Commerce. The paper will end with an analysis of VE before projecting future directions for health of B2B and B2C in business.


Author(s):  
Meghan Bani Assad

Bitcoin can be considered as one of the most prevailed applications of Blockchain technology developed so far. It is the most eminent, decentralized and distributed network-based platform. Without using real names, it provides a pseudo name interface through which management and verification of transactions are performed by the user being anonymous. Blockchain which itself works as a virtual ledger consists of data in the form of various blocks connected in a chain. Although it is providing the Invisibility of user Identity but extracting and combining the data and profile from the Blockchain, the identity can be revealed. Thus, in contrast to that, many researchers and data scientists have suggested the amendments and proposals to enhance the Invisibility of user Identity and Concealment of Bitcoin customer. We project out some theories, project analyses and methodologies that certainly supports the concern of the improvement of Bitcoin Customer anonymity.


Author(s):  
Aravindhan K

Cost estimation of software projects is risky task in project management field. It is a process of predicting the cost and effort required to develop a software applications. Several cost estimation models have been proposed over the last thirty to forty years. Many software companies track and analyse the current project by measuring the planed cost and estimate the accuracy. If the estimation is not proper then it leads to the failure of the project. One of the challenging tasks in project management is how to evaluate the different cost estimation and selecting the proper model for the current project. This paper summarizes the different cost estimation model and its techniques. It also provides the proper model selection for the different types of the projects.


Author(s):  
Arulmurugan Ramu ◽  
Anandakumar Haldorai

The maintenance and logging in the health records is always required so that the overall predictive mining can be done on the patient records. In addition, the recording and maintenance of electronic health records is quite mandatory whereby the digital repository related to the patient is very important so that the future based predictions and the analytics can be retained. In addition to this, the patient records are providing the medical practitioners the higher degree of accuracy in the predictions and the aspects related to the knowledge discovery about that particular patient to have the effectiveness. By this way, the overall medical records can be maintained. In this research manuscript, the enormous tools and the vendors are presented usable for the electronic health records. The presented work is having the cavernous analytics on the vendor products associated with the electronic health records whereby the global perspectives and data analytics are cited.


Sign in / Sign up

Export Citation Format

Share Document