PPG signal utilize the light-based method to sense the blood-flow-rate as controlled by the actions of heart’s pumping. It is extensively utilized in the healthcare with application ranging from the pulse oximetry in the serious...
Cluster analysis is the prominent data mining technique in knowledge discovery and it discovers the hidden patterns from the data. The K-Means, K-Modes and K-Prototypes are partition based clustering algorithms and these...
Online learning is part of the future of K-12 education. However, few online K-12 instructors have been formally trained in online pedagogy. This chapter describes best practices in creating online courses for K-12 students....
(k, n) threshold is a special case of the general access structure (GAS) in secret image sharing (SIS), therefore GAS is more extensive than (k, n) threshold. Most of conventional SIS, including visual secret sharing (VSS)...
Recently, due to the advance and impressive results of deep learning techniques in the fields of image recognition, natural language processing and speech recognition for various long-standing artificial intelligence (AI) tasks...
Air pollution is increasing day by day, decreasing the world economy, degrading the quality of life, and resulting in a major productivity loss. At present, this is one of the most critical problems. It has a significant impact...
The purpose of this paper is to identify the factors for both HR practices and organizational effectiveness along with what extent HR practices impact organizational effectiveness. The data were randomly collected from faculty...
Economics has some limitations, such as insecure multiple parties economical investment decision and leakage of business quotation. Secret image sharing (SIS) for (k, n)-threshold is such a technique that protects an image...
Cardio Vascular Diseases (CVD) is the major reason for the death of the majority of the people in the world. Earlier diagnosis of disease will reduce the mortality rate. Machine learning (ML) algorithms are giving promising...
While the growth of blended learning environments in higher education and non-educational settings has continued to increase in recent years, this has not been the case in K-12 settings. Recently, in an effort to explore the...
While the growth of blended learning environments in higher education and non-educational settings has continued to increase in recent years, this has not been the case in K-12 settings. Recently, in an effort to explore the...
The recent techniques built on cloud computing for data processing is scalable and secure, which increasingly attracts the infrastructure to support big data applications. This paper proposes an effective anonymization based...
In this article, the author categorises the solid transportation problem (STP) under uncertain environments. He formulates the mixed and fully intuitionistic fuzzy solid transportation problems (FIFSTPs) and utilizes the...
The weather has a serious impact on the environment as it affects to change day to day life. In recent days, many algorithms were proposed to predict the weather. Although various machine learning algorithms predict the weather...
Very few academic programs in pre-service teacher education include opportunities for current and future K-12 educators to develop the necessary skills to teach in an online setting. While limited research has been done related...
Shopper buying behaviour is essential for the retailers to segment the shoppers in accordance to their disruptive attitude and perception for better innovative strategies which may lead to higher profits. The major purpose of...
Although K–12 online education is becoming more common in the United States, there is still much we do not know about how K–12 online teachers are being prepared. Given that few teacher education programs include online pedagogy...
This paper intends to consider a multi-objective problem for expansion planning in Power Distribution System (PDS) by focusing on (i) expansion strategy (ii) allocation of Circuit Breaker (CB), (iii) allocation of Distribution...
Taking the one-year-old T. chinensis (Tamarix chinensis Lour.) in Yellow River Delta as the study object, the variations of C, N and P stoichiometry in T. chinensis under drought stress was studied using pot experiments. The...
With the development of internet of things (IoT) technology, servitization of IoT device functions has become a trend. The cooperation between IoT devices can be equivalent to web service composition. However, current service...
This article presents a stream mining framework to cluster the data stream and monitor its evolution. Even though concept drift is expected to be present in data streams, explicit drift detection is rarely done in stream...
The field of information retrieval (IR) is an important area in computer science, this domain helps us to find information that we are interested in from an important volume of information. A search engine is the best example of...
Web bots are destructive programs that automatically fill the web form and steal the data from web sites. According to numerous web bot traffic reports, web bots traffic comprises of more than fifty percent of the total web...
An American K-12 cooperative educational services provider (“The Agency”) has an issue: partner school districts are saving money by building internal capacity for professional development, rather than fully utilizing expertise...
Mapping of image-based object textures to ASCII characters can be a new modification towards visual cryptography. Naor and Shamir proposed a new dimension of Information security as visual cryptography which is a secret sharing...