IoT is a communal association of things or equipment that can interact with each other with the help of an internet connection. IoT services play an imperative responsibility in the industry of agriculture, which can feed 10...
The business ecosystem has changed drastically. Advances in information technology, access to the internet, and pervasive use of mobile phones have given a spurt to various new age businesses adopting new business models. The...
Fine-grained searching is an important feature in multi-user cloud environment and a combination of attribute-based encryption (ABE) and searchable encryption (SE) is used to facilitate it. This combination provides a powerful...
In recent years, contactless transactions have risen rapidly. It includes NFC, MST, contactless cards, and many other payment methods. These payment methods have certain security issues, and attackers are in a regular search for...
This paper presents a framework for mutual authentication between a user device and a point of sale (POS) machine using magnetic secure transmission (MST) to prevent the wormhole attack in Samsung pay. The primary attribute of...
Nowadays, Cloud Computing has become the most attractive platform, which provides anything as a Service (XaaS). Many applications may be developed and run on the cloud without worrying about platforms. It is a big challenge to...
The demand for Internet security has escalated in the last two decades because the rapid proliferation in the number of Internet users has presented attackers with new detrimental opportunities. One of the simple yet powerful...
User Authentication plays a crucial role in smart card based systems. Multi-application smart cards are easy to use as a single smart card supports more than one application. These cards are broadly divided into single identity...
It is increasingly important to reuse the wastewater conservancy facilities, which can further promote the development of agricultural economy. The basis of full investigation and research on the wastewater conservancy...
In the wake of coronavirus pandemic, social distancing became a mandate that led to the transition from traditional classroom-based lectures to computer-based learning. This paper extensively deals with the ranking of the...
Organizational change, as well as failure, downsizing, mergers, and acquisitions, necessitates tactical development initiatives in relations of easy matters. Require business activity, which necessitates a high level of employee...
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our study was working and extracting the URL & Domain...
The student habit of using the digital platforms can be used to compliment the traditional learning methods. Specifically, designed digital learning platform can support the learning with convenience of time, place, and pace....
The purpose of this paper is to examine smartphone users' brand loyalty decisions across and within generation cohorts, Gen Z and Millennials, based on customer value theory. The study discovers value perceptions for the...
The increase in the number of users on the internet and the advancement in information technology have spiked the generation of information to an unprecedented level making information retrieval and web mining a difficult task....
Emerging economies like India are witnessing rapid technological changes. To penetrate in the emerging markets and ensure smooth adoption of mobile wallets it is important to study the constructs that trigger mobile adoption....
The detection and description of pathological voice are the most important applications of voice profiling. Currently, techniques like laryngostroboscopy or surgical microlarynoscopy are popularly used for the diagnosis of voice...
The major benefit of using Cellular manufacturing systems (CMS) is the improvement in efficiency and reduction in the production time. In a CMS the part families and machine parts are identified to minimise the inter and...
The catastrophic outbreak COVID-19 has brought threat to the society and also placed severe stress on the healthcare systems worldwide. Different segments of society are contributing to their best effort to curb the spread of...
This paper presents a fractional-order framework for control of blood pressure regulation system. A new perspective is explored to control the blood pressure in lieu of the conventional control framework. A multi-variable...
A non-invasive cum robust voice pathology detection and classification architecture is proposed in the current manuscript. In place of the conventional feature-based machine learning techniques, a new architecture is proposed...
The most important application of voice profiling is pathological voice detection. Parkinson's disease is a chronic neurological degenerative disease affecting the central nervous system responsible for essentially progressive...
In the recent trends, cloud computing service users agreed on the concept of pay and use model by accessing all the best services provided by the providers. The major problem here is that there is no standardization so that not...
Event detection at its initial stage is considerably most demanding and more importantly challenging to reduce the causes and damages. The GPS-enabled sensor nodes are possibly a solution for the location estimation, but having...
Being experiential commodities, it becomes difficult to make any judgment about hotels or attractions before their utilization. This is where the reviews provided by guests/tourists play an influential role. Therefore, it...