Search

Results: 16
Quantify the Behaviour Intention of Individuals to Control SC Performance by Exploring Cloud Storage Services
The Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) is explored as a theoretical background to build extended UTAUT2 model with relevant variables for examining the cloud storage services technology acceptance at...
Published by: IGI Global
Conditioned Slicing of Interprocedural Programs
Madhusmita Sahu
Jan 01, 2019
Program slicing is a technique to decompose programs depending on control flow and data flow amongst several lines of code in a program. Conditioned slicing is a generalization of static slicing and dynamic slicing. A variable...
Published by: IGI Global
Prediction of Nurses Allotment to Patient in Hospital through Game Theory
Satya Dash, Rekha Sahu
Jan 01, 2022
Allotment of nurses to patients is a critical task in terms of better treatment. Nurses should be appointed according to a patient's health condition, type of disease, and financial condition. Again, understaffing of nurses may...
Published by: IGI Global
A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card
The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The...
Published by: IGI Global
Classification of Autistic Spectrum Disorder Using Deep Neural Network With Particle Swarm Optimization
In this paper, Feature Selection Technique (FST) namely Particle Swarm Optimization (PSO) has been used. The filter based PSO is a search method with Correlation-based Feature Selection (CBFS) as a fitness function. The FST has...
Published by: IGI Global
A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography
Mapping of image-based object textures to ASCII characters can be a new modification towards visual cryptography. Naor and Shamir proposed a new dimension of Information security as visual cryptography which is a secret sharing...
Published by: IGI Global
Application of Machine Learning Algorithm in Managing Deviant Consumer Behaviors and Enhancing Public Service.
Consumer-deviant behavior costs global utility firms USD 96 billion yearly, attributable to Non-Technical Losses (NTLs). NTLs affect the operations of power systems by overloading lines and transformers, resulting in voltage...
Published by: IGI Global
Short-Term Wind Power Prediction Using Hybrid Auto Regressive Integrated Moving Average Model and Dynamic Particle Swarm Optimization
With the upsurge in restructuring of the power markets, wind power has become one of the key factors in power generation in the smart grids and gained momentum in the recent years. The accurate wind power forecasting is highly...
Published by: IGI Global
Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection
An autoencoder has the potential to overcome the limitations of current intrusion detection methods by recognizing benign user activity rather than differentiating between benign and malicious activity. However, the line...
Published by: IGI Global
Integration of Multi-Class Service Paradigm With Generic Trust Mechanism for Innovation, Customization and Adaptability in MANETs
Trust-based mechanisms are widely used in wireless networks of different kinds for providing security against attack. Trust mechanism provides security from various attacks using both detective and preventive manner. This paper...
Published by: IGI Global
Coronary Artery Disease Classification Using Deep Neural Network and Ensemble Models Optimized by Particle Swarm Optimization
Nowadays, many people are suffering from several health related issues in which Coronary Artery Disease (CAD) is an important one. Identification, prevention and diagnosis of diseases is a very challenging task in the field of...
Published by: IGI Global
Advanced Object Detection in Bio-Medical X-Ray Images for Anomaly Detection and Recognition
The human vision system is mimicked in the format of videos and images in the area of computer vision. As humans can process their memories, likewise video and images can be processed and perceptive with the help of computer...
Published by: IGI Global
Advanced Object Detection in Bio-Medical X-Ray Images for Anomaly Detection and Recognition
The human vision system is mimicked in the format of videos and images in the area of computer vision. As humans can process their memories, likewise video and images can be processed and perceptive with the help of computer...
Published by: IGI Global
Agricultural Recommendation System for Crops Using Different Machine Learning Regression Methods
Agriculture is a foremost field within the world, and it's the backbone in the Republic of India. Agriculture has been in poor condition. The impact of temperature variations and its uncertainty has engendered the bulk of the...
Published by: IGI Global
An Integrated Remote Control-Based Human-Robot Interface for Education Application
Portable interfaced robot arms equipped with mobile user interactions are significantly being utilized in modern world. The application of teaching robotics is being used in challenging pandemic situation but it is still...
Published by: IGI Global