Any vulnerability in the software creates a software security threat and helps hackers to gain unauthorized access to resources. Vulnerability prediction models help software engineers to effectively allocate their resources to...
Researchers are increasingly using algorithms that are influenced by nature because of its ease and versatility, the key components of nature-inspired metaheuristic algorithms are investigated, involving divergence and adoption...
The shrinking populations of many regions in Portugal have led to a debate on the criteria which should guide the restructuring of public services at the local scale, and namely how to balance raising per capita costs with...
A discussion of R. Murray Schafer's environmental music theatre is, inevitably, a discussion of culture. The outspoken composer, writer and educator is deeply engaged in the perennial Canadian question: what constitutes an...
The recent techniques built on cloud computing for data processing is scalable and secure, which increasingly attracts the infrastructure to support big data applications. This paper proposes an effective anonymization based...
In an emerging nation like India, entrepreneurship has the ability to present a solution for many problems related to the economy. The Union territory (UT) of Jammu & Kashmir (J&K) has grave issues of high unemployment and low...
A pattern classifier (PC) is used to solve a variety of non-separable and complex computing problems. One of the key problems is to efficiently predict a type of disease in a typical fruit tree. The timely and accurately...
Beall’s list heavily used as a base for selection of predatory journals by large no. of research studies was ceased from internet in 2017. Thus, status of journal declared as predatory in list is debatable. To verify ...
Selecting appropriate views that provide faster query response time is a critical decision in data warehouse design. Top-level users expect quick results from a data warehouse for faster decision-making to gain a competitive...
This paper proposes a new training algorithm for artificial neural networks based on an enhanced version of the grey wolf optimizer (GWO) algorithm. The proposed model is used for classifying the patients of diabetes disease....
Due to the rapid increase of internet-based data, there is urgent need for a robust intelligent documents security mechanism. Although there are many attempts to build a plagiarism detection system in natural language documents...
Association Rule Mining(ARM) is one of the most significant and active research areas in data mining. Recently, Whale Optimization Algorithm (WOA) has been successfully applied in the field of data mining, however, it easily...
This article examines the pro-environmental behaviour of EU citizens and the potential connection with their attitudes towards common environmental legislation and environmental standards. It analyses factors of the...
Predicting energy consumption has been a substantial topic because of its ability to lessen energy wastage and establish an acceptable overall operational efficiency. Thus, this research aims at creating a meta-heuristic-based...
Nowadays, Cloud Computing has become the most attractive platform, which provides anything as a Service (XaaS). Many applications may be developed and run on the cloud without worrying about platforms. It is a big challenge to...
Annotations are critical in various text mining tasks such as opinion mining, sentiment analysis, word sense disambiguation. Supervised learning algorithms start with the training of the classifier and require manually annotated...
Multisystemic resilience has been conceptualised as involving a constellation of protective factors which operate at different levels to promote adaptation and thriving despite experiences of adversity. We used network modelling...
EEG analysis aims to help scientists better understand the brain, help physicians diagnose and treatment choices of the brain-computer interface. Artificial neural networks are among the most effective learning algorithms to...
One of the major challenges faced by video surveillance is recognition from low-resolution videos or person identification. Image enhancement methods play a significant role in enhancing the resolution of the video. This article...
In this modern era, due to demand for cloud environments in business, the size, complexity, and chance of attacks to virtual cloud network (VCN) are increased. The protection of VCN is required to maintain the faith of the cloud...
Measuring the quality of the urban environment has been a matter of research rooted in different fields of knowledge. Several methods and indicators have been deployed through the years, as have horizontal approaches from mixed...
Universities are isomorphic not because of the effectiveness of their processes but because of the legitimacy assigned by institutional logic. However, sustainable development discourses invoke a novel mission for producing...
Tracing infectious individuals and clusters is a major tactic for mitigating the pandemic. This paper explores the factors impacting the intentions and actual use of COVID-19 contact tracing apps based on a technology acceptance...