Program slicing is a technique to decompose programs depending on control flow and data flow amongst several lines of code in a program. Conditioned slicing is a generalization of static slicing and dynamic slicing. A variable...
The Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) is explored as a theoretical background to build extended UTAUT2 model with relevant variables for examining the cloud storage services technology acceptance at...
Allotment of nurses to patients is a critical task in terms of better treatment. Nurses should be appointed according to a patient's health condition, type of disease, and financial condition. Again, understaffing of nurses may...
The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The...
In this paper, Feature Selection Technique (FST) namely Particle Swarm Optimization (PSO) has been used. The filter based PSO is a search method with Correlation-based Feature Selection (CBFS) as a fitness function. The FST has...
Mapping of image-based object textures to ASCII characters can be a new modification towards visual cryptography. Naor and Shamir proposed a new dimension of Information security as visual cryptography which is a secret sharing...
Nowadays, many people are suffering from several health related issues in which Coronary Artery Disease (CAD) is an important one. Identification, prevention and diagnosis of diseases is a very challenging task in the field of...
Agriculture is a foremost field within the world, and it's the backbone in the Republic of India. Agriculture has been in poor condition. The impact of temperature variations and its uncertainty has engendered the bulk of the...