Vehicle suspension system plays a vital role in diminishing the vibration caused by the road roughness and prevent it from transmitting to the driver and the passenger. The semi-active suspensions contain spring and damping...
The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The...
Indian corporations' risk management practises are examined in this study. Enterprise-wide risk management (ERM) implementation can be broken down into three broad categories: enabling factors in the organisation, ERM practises...
The eagle expresses of cloud computing plays a pivotal role in the development of technology. The aim is to solve in such a way that it will provide an optimized solution. The key role of allocating these efficient resources and...
Elderly-friendly integrated care portals are a relatively new phenomenon that could be a helpful addition to physical primary care, for example, by lowering costs and increasing access to healthcare. However, such platforms are...
In the recent trends, cloud computing service users agreed on the concept of pay and use model by accessing all the best services provided by the providers. The major problem here is that there is no standardization so that not...
The map matching method gets simpler with higher precision positioning systems, but because the positioning framework is still not sufficiently precise or too costly for marginal map matching in practice, it is still a hot...
Fine-grained searching is an important feature in multi-user cloud environment and a combination of attribute-based encryption (ABE) and searchable encryption (SE) is used to facilitate it. This combination provides a powerful...
The COVID-19 pandemic reshapes our knowledge and reconceptualises our belief in small and medium enterprises (SMEs) as more flexible and resilient than bigger organisations under difficult socioeconomic conditions. The critical...
This paper presents a framework for mutual authentication between a user device and a point of sale (POS) machine using magnetic secure transmission (MST) to prevent the wormhole attack in Samsung pay. The primary attribute of...
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a...
Circular economy (CE) and Industry 4.0 (I4.0) are clearly gaining popularity around the world because to their ability to integrate breakthrough technology with unique circular production and business models. This study...
The aim of the paper is to evaluate the impact of novel COVID-19 on the returns and volatility of Indian stock markets with special reference to equity investment strategies of Bombay Stock Exchange. For the purpose of...
The objective of this study is to explore the challenges faced by the Indian apparel supply chain in the wake of COVID-19 to identify the factors that are being affected and build a multilevel hierarchy model to prioritize the...
Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking...
This paper examines the components of Intellectual Capital (IC) as mediating variables between knowledge-based Human Resource Management (HRM) practices and organizational performance. Therefore, integrating research channels in...
Improving the quality of education is a challenging activity in every educational institution. Through this research paper, a model has been proposed representing the challenges in order to manage the trade-off to maintain the...
In recent years, contactless transactions have risen rapidly. It includes NFC, MST, contactless cards, and many other payment methods. These payment methods have certain security issues, and attackers are in a regular search for...
Cross-site scripting is one of the notable exceptions effecting almost every web application. Hence, this article proposed a framework to negate the impact of the XSS attack on web servers deployed in one of the major...
With the ever-increasing popularity of traveling markets, more people are willing to spend their time and enjoy life by visiting some points of interest (POI) especially for the citizens living in cities. Therefore, it is of...
The outbreak of the novel COVID-19 pandemic emerged as a major black swan event which has caused shock waves and severely hurt the sentiments of market participants. The pandemic has raised uncertainties and risks all over the...
IoT devices are having many constraints related to computation power and memory etc. Many existing cryptographic algorithms of security could not work with IoT devices because of these constraints. Since the sensors are used in...
Forensic accounting is the prominent instrument in the field of accounting area to tackle the rampant situation of financial fraud. Forensic accounting is a specific branch of accounting. It involves the application of special...
The purpose of this research article is to study the effect of inclusion and perceived organizational diversity on turnover intention with the mediating role of employee engagement. Data of 413 participants were evaluated for...
Within the advanced computation time, real-time application pulled in much more attention. Implementing a better high-quality real-time system requires to improve the responsiveness of the tasks set. This research work aims to...