Sentiment analysis denotes the analysis of emotions and opinions from text. The authors also refer to sentiment analysis as opinion mining. It finds and justifies the sentiment of the person with respect to a given source of...
Sentiment analysis denotes the analysis of emotions and opinions from text. The authors also refer to sentiment analysis as opinion mining. It finds and justifies the sentiment of the person with respect to a given source of...
Retrieving keywords in a text is attracting researchers for a long time as it forms a base for many natural language applications like information retrieval, text summarization, document categorization etc. A text is a...
Most of the web applications are hosting by cloud due to low cost and low infrastructure setup is required. In continue to this, user no need to maintain the infrastructure by their own. In this paper, both the technology...
In challenging environments, opportunistic networks can provide limited communication features in a delay tolerant manner. It is extremely difficult to transmit large data like videos in such environments, as delay may be hours...
This paper solves the internet of things (IoT) security issues by introducing a chaotic whale crow (CWC) optimization, which is the integration of chaotic whale optimization algorithm (CWOA) in crow search algorithm (CSA). The...
The creation of the “Jones Sustainability Index” in 1999, the “Asia Pacific Index” in 2009 and other indices have made it easier for investors to select companies with a best-in-class approach to ‘economic’, ‘environmental’ and...
In the growing world of technology, where everything is available in just one click, the user expectations has increased with time. In the era of Search Engines, where Google, Yahoo are providing the facility to search through...
Healthcare and medicine are key areas where machine learning algorithms are widely used. The medical decision support systems thus created are accurate enough, however, they suffer from the lack of transparency in decision...
In secure web application development, the role of web services will not continue if it is not trustworthy. Retaining customers with applications is one of the major challenges if the services are not reliable and trustworthy....
In this paper the spintronic-based memory MRAM is presented that showed how it can replace both SRAM and DRAM and provide the high speed with great chip size. Moreover, MRAM is the nonvolatile memory that provides great...
Crowdsourcing platforms have gained importance in recent times, and their success is dependent mainly on the participation of the crowd. Participation is a function of both intrinsic and extrinsic motivation. Moreover, with the...
Profit is fundamental right of every business, but the question is what should be the gravity of profit or how much be the greed of profit. Appetency of profit is must but too much greed affect the business. Researcher in this...
According to the market research firm Tractica, the global artificial intelligence software market is forecast to grow to 126 billion by 2025. Additionally, the Gartner group predicts that during the same time as much as 80% of...
Several electronic-engagement-related questions arise at work due to the beginning of a new era of social distancing, lockdowns, quarantining, and sanitization. These terms were not so common before. What challenges do employees...
Nowadays sensor nodes are being deployed anywhere as per the applications and real-time data analysis. A major concern of this implementation is the limited battery power and huge data generation. The data redundancy can also...
Every day from morning to evening we all are in the battlefield. We are facing number of problems and challenges in day to day life. In this research paper, some important teachings of Bhagwad-Geeta are highlighted. Such as;...
Non-Factoid Question Answering (QA) is the next generation of textual QA systems, which gives passage level summaries for a natural language query, posted by the user. The main issue lies in the appropriateness of the generated...
There are three types of maintenance management policy Run-tofailure (R2F), Preventive Maintenance (PvM) and Predictive Maintenance (PdM). In both R2F and PdM we have the data related to the maintenance cycle. In case of...
Uniqueness is the law of nature. Two individuals are not alike. This law has a great impact on business organization’s work environment. It’s a big challenge to deal with number of individual & group differences at...
In recent times, self-driving vehicles have been widely adopted across different countries as they are equipped to drastically reduce the number of road accidents and congestion on the road thereby improving the traffic...
This article describes how the exponential growth of e-commerce in India and the presence of many national and multinational e-retailers has set the trend for the major overhaul of the online industry. Most of the e-retailers...
Diabetes is a rapidly spreading disease. When the pancreas produces insufficient insulin or the body cannot utilise it effectively. Diabetic Retinopathy (DR) and blindness are two major issues for diabetics. Diabetes patients...
The present study is a systematic literature review that identifies the context of consumer behaviour and analytics in business to forecast the future of consumer behaviour with changing business trends through TCCM (theory...
To address this research possibility, the present empirical study undertakes the assessment of usable-security of healthcare software system. The attributes considered for the assessment are: four factors at first level;...