The study aims to examine the impact of mobile banking (m-banking) application interactivity on consumer engagement. The study also analyses the moderation effects of perceived security concerns, consumer innovativeness, and...
Face recognition has drawn significant attention due to its potential use in biometric authentication, surveillance, security, robotics, and so on. It is a challenging task in the field of computer vision. Although the various...
Based on the cognitive-motivational-relational (CMR) theory, this study empirically investigates the mechanisms through which consumers' online engagement impacts their channel switching intention. The present study examines the...
Islands-Matrix-Dual-phase (I-M-DP) steel is received a great deal attention for better concern with the emissivity, fuel consumption and passengers safety. A number of deformation plasticity issues are yet to be fully...
In recent decades, Multiple Input Multiple Output beamforming is deliberated as the vital technology enablers for 5G mobile radio services. Since, it provides noticeable improvement regarding throughput and coverage measures in...
Nowadays sensor nodes are being deployed anywhere as per the applications and real-time data analysis. A major concern of this implementation is the limited battery power and huge data generation. The data redundancy can also...
This paper has organized a heart disease-related dataset from UCI repository. The organized dataset describes variables correlations with class-level target variables. This experiment has analyzed the variables by different...
Software plays an important role in effective computing and communication of any services. It become crucial to identify some critical parts of the software that can lead to enhanced computing and increases efficiency of the...
Event detection at its initial stage is considerably most demanding and more importantly challenging to reduce the causes and damages. The GPS-enabled sensor nodes are possibly a solution for the location estimation, but having...
The growth and rising prominence of multinationals from emerging markets (eMNCs) mark a significant phase in the evolution of the world economy in the last decade. This study investigates the effect of eMNCs' institutional...
The objective of the paper is to present the techniques of Artificial Intelligence based on deep learning that can be applied to detect fractures in bones on X-rays. The paper comprises of discussions of various entities....
It is increasingly important to reuse the wastewater conservancy facilities, which can further promote the development of agricultural economy. The basis of full investigation and research on the wastewater conservancy...
Due to ambiguity in the market orientation and performance relationship, the basic aim of the study to investigate the nature of relationship exists between market orientation and performance of the manufacturing SMEs in India....
In the software industry, where the quality of the output is based on human performance, fatigue can be a reason for performance degradation. Fatigue not only degrades quality, but is also a health risk factor. Sleep disorders...
Human relations experts have shown tremendous interest in determining the variables that enhance workers' satisfaction and their loyalty to organisation because only committed and qualified personnel can facilitate the...
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So...
Agriculture plays an important role in the making and development of a country. In India, agriculture is the primary source of living for more than about 60% of its population. The agriculture-related issues always hinder the...
The objective of this paper is to study the linear programming algorithm of the mathematical model of agricultural machinery allocation when there are many farmland projects and cross operations. In this paper, combined with the...
Nowadays, in the field of data transmission between receiver and transmitter, the Reed Solomon code is used very frequently. FEC codes have two foremost and influential operations: (1) calculating parity symbols at the encoder...
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So...
Particle swarm optimization (PSO) algorithm is proposed to deal with text summarization for the Punjabi language. PSO is based on intelligence that predicts among a given set of solutions which is the best solution. The search...
Performance is an essential characteristic of any cloud computing system. It can be enhance through parallel computing, scheduling and load balancing. This work evaluates the connection between the response time (RT) and virtual...
In recent era of IoT, energy ingesting by sensor nodes in Wireless Sensor Networks (WSN) is one of the key challenges. It is decisive to diminish energy ingesting due to restricted battery lifespan of sensor nodes, Objective of...
Architecture recovery techniques study dependencies in source code and reconstruct architecture. Most techniques either use structural or semantic dependencies and it is observed that the use of directory information helps in...
The main purpose of this study is to examine barriers towards e-commerce platforms in developing countries using specific analytic techniques. The present empirical analysis has its main objectives of detailed study of barriers...