This study examined post-test performance and retention performance of students in mathematics when learned and problem-solving ability through educational video games and traditional lecture method. The study adopted a...
In this article, the author categorises the solid transportation problem (STP) under uncertain environments. He formulates the mixed and fully intuitionistic fuzzy solid transportation problems (FIFSTPs) and utilizes the...
This article presents a stream mining framework to cluster the data stream and monitor its evolution. Even though concept drift is expected to be present in data streams, explicit drift detection is rarely done in stream...
C4 photosynthesis has evolved by repurposing enzymes found in C3 plants. Compared with the ancestral C3 state, accumulation of C4 cycle proteins is enhanced. We used de-etiolation of C4 Gynandropsis gynandra and C3 Arabidopsis...
Shopper buying behaviour is essential for the retailers to segment the shoppers in accordance to their disruptive attitude and perception for better innovative strategies which may lead to higher profits. The major purpose of...
Government of India’s ‘Digital India’ initiative intends to build robust digital ecosystem that fosters innovation & entrepreneurship enabling better citizen service & citizen empowerment. Digitization in India involves...
This article deals with the steady-state behavior of an MX/G/1 retrial queue with the Bernoulli vacation schedule and unreliable server, under linear retrial policy. Breakdowns can occur randomly at any instant while the server...
Today, the advent of social media has provided a platform for expressing opinions regarding legislation and public schemes. One such burning legislation introduced in India is the Citizenship Amendment Act (CAA) and its impact...
This study aims to determine procurement and project management critical factors to develop procurement strategy with stakeholders to eliminate Project Scope Creep (PSC) risks in the oil & gas (O&G) sector. Analytical Hierarchy...
In this paper, pectoral muscle segmentation was performed to study the presence of malignancy in the pectoral muscle region in mammograms. A combined approach involving granular computing and layering was employed to locate the...
This research aims to devise a method of encrypting medical images based on chaos map, Knight's travel map, affine transformation, and DNA cryptography to prevent attackers from accessing the data. The proposed DMIES...
The COVID 19 Pandemic, has resulted in large scale of generation of Big data. This Big data is heterogeneous and includes the data of people infected with corona virus, the people who were in contact of infected person...
Self-regulated learning (SRL) is a very significant ability for students in the learning process, and SRL strategies are used to assist students in learning efficiently in higher education. Many SRL environments face challenges...
Biosurfactant production by Rhodococcus erythropolis SB-1A was studied based on Atlas oil agar medium in a batch reactor. The strain was isolated from a water sample collected from Northern Atlantic Ocean. Several parameters...
The primary requirements of a heterogeneous wireless network topology, adaptive and smart resource allocation to users, protocols for routing and lifetime enhancement, access to the network with security and appropriate network...
The paper aims to examine the factors that influence employee attrition rate using the employee records dataset from kaggle.com. It also aims to establish the predictive power of Deep Learning for employee churn prediction over...
The educational system has moved towards digitization and online learning in the past two decades. The institutions are focusing on delivering online courses to facilitate the students. Uttarakhand Open University offered online...
Performance of innovative sludge-blanket anaerobic membrane bioreactors (SB-AnMBRs) was evaluated at mesophilic (35oC for 400 days) followed by thermophilic (55oC for 330 days) temperatures for the treatment of the...
In cloud computing, an advanced persistent threat (APT) is a cyber-attack that gains access to a network and remains undetected for some time. As well APTs have proven difficult to detect and protect, in the existing system they...
A key step in addressing the classification issue was the selection of genes for removing redundant and irrelevant genes. The proposed Type Combination Approach –Feature Selection(TCA-FS) model uses the efficient feature...
In the research community, the estimation of the scholarly impact of an individual is based on either citation-based indicators or network centrality measures. The network-based centrality measures like degree, closeness...
This manuscript presents the design of a new approach of human skin color authentication. Skin color is one of the most popular soft biometric modalities. Since a soft biometric modality alone cannot reliably authenticate an...
The image enhancement process is used for improving the standard of the image, it's inspired by the development of human perception pictorial information. Increasing the contrast of the image, removing the unwanted noise from...
Today, the advent of social media has provided a platform for expressing opinions regarding legislation and public schemes. One such burning legislation introduced in India is the Citizenship Amendment Act (CAA) and its impact...
Rotavirus genotypes are species specific. However, interspecies transmission is reported to result in the emergence of new genotypes. A cross-sectional study of 242 households with 281 cattle, 418 goats, 438 pigs, and 258 humans...