The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The...
In this article, the author categorises the solid transportation problem (STP) under uncertain environments. He formulates the mixed and fully intuitionistic fuzzy solid transportation problems (FIFSTPs) and utilizes the...
The present article proposes use of a z-model to validate learning progress after experimenting on student’s performance. A statistical map of z-values is used to calculate the z-value. This paper is divided into two parts -...
The COVID 19 Pandemic, has resulted in large scale of generation of Big data. This Big data is heterogeneous and includes the data of people infected with corona virus, the people who were in contact of infected person...
The eagle expresses of cloud computing plays a pivotal role in the development of technology. The aim is to solve in such a way that it will provide an optimized solution. The key role of allocating these efficient resources and...
In the recent trends, cloud computing service users agreed on the concept of pay and use model by accessing all the best services provided by the providers. The major problem here is that there is no standardization so that not...
The image enhancement process is used for improving the standard of the image, it's inspired by the development of human perception pictorial information. Increasing the contrast of the image, removing the unwanted noise from...
The technology and use of computers helped the Indian dairy industry to change its rural face and its organization. It’s revolution in today’s supply chain management business validate that they are vital elements which can...
Circular economy (CE) and Industry 4.0 (I4.0) are clearly gaining popularity around the world because to their ability to integrate breakthrough technology with unique circular production and business models. This study...
Electric scooter rental companies such as Bird and Lime rely on gig workers to recharge their scooters. This paper discusses some of the limitations of the compensation schemes of these companies and the processes that these...
Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking...
Big data refers to the enormous heterogeneous data being produced at a brisk pace by a large number of diverse data generating sources. Since traditional data processing technologies are unable to process big data efficiently...
By the second decade of the 21st century, there has been a multi-faceted technological development in the field of networked control system (NCS). This progression in NCS has not only revealed its significant applications in...
The acceptance of tele-robotics and teleoperations through networked control system (NCS) is increasing day-by-day. NCS involves the feedback control loop system wherein the control components such as actuators and sensors are...
This study identifies various issues in managing transportation logistics activities on the basis of literature review and expert panel discussions so that the facilitation of e-applications can be used for managing...
ICT use in family functioning is an important area to study as the impact changes when technology grows over years. This research analyzed the role of ICT use in process & structure of families using the factors present in...
The prevalent applications of WSN have fascinated a plethora of research efforts. Sensor nodes have serious limitations such as battery lifetime, memory constraints, and computational capabilities. Clustering is an important...
This paper intends to consider a multi-objective problem for expansion planning in Power Distribution System (PDS) by focusing on (i) expansion strategy (ii) allocation of Circuit Breaker (CB), (iii) allocation of Distribution...
IoT devices are having many constraints related to computation power and memory etc. Many existing cryptographic algorithms of security could not work with IoT devices because of these constraints. Since the sensors are used in...
Forensic accounting is the prominent instrument in the field of accounting area to tackle the rampant situation of financial fraud. Forensic accounting is a specific branch of accounting. It involves the application of special...
In the healthcare industry, sources look after different customers with diverse diseases and complications. Thus, at the source, a great amount of data in all aspects like status of the patients, behaviour of the diseases, etc....
The online purchase through web channels regarding travel related product services have really taken an unprecedented growth. The objectives of the study is to determine how information quality available on the websites of the...
The present work uses flutter and transfer learning-based techniques for predicting the shelf-life of fruits in real-time by reducing the demand for huge number of samples and longer training durations. The work uses mango fruit...
With the ever-increasing popularity of traveling markets, more people are willing to spend their time and enjoy life by visiting some points of interest (POI) especially for the citizens living in cities. Therefore, it is of...
IoT is a communal association of things or equipment that can interact with each other with the help of an internet connection. IoT services play an imperative responsibility in the industry of agriculture, which can feed 10...