Search

Results: 22
3D MIMO Beamforming Using Spatial Distance SVM Algorithm and Interference Mitigation for 5G Wireless Communication Network
In recent decades, Multiple Input Multiple Output beamforming is deliberated as the vital technology enablers for 5G mobile radio services. Since, it provides noticeable improvement regarding throughput and coverage measures in...
Published by: IGI Global
RMAC
One knows that smart transport is also an integrated part of healthcare technologies. To minimize the pollution for benefiting the healthcare, the traffic throughput on roundabout intersection has to be increased which will...
Published by: IGI Global
A Novel Power-Efficient Data Aggregation Scheme for Cloud-Based Sensor Networks
Nowadays sensor nodes are being deployed anywhere as per the applications and real-time data analysis. A major concern of this implementation is the limited battery power and huge data generation. The data redundancy can also...
Published by: IGI Global
Analysis of Heart Disease Using Parallel and Sequential Ensemble Methods With Feature Selection Techniques
This paper has organized a heart disease-related dataset from UCI repository. The organized dataset describes variables correlations with class-level target variables. This experiment has analyzed the variables by different...
Published by: IGI Global
Dis-Aggregated Effect of Market Orientation on Firms' Performance
Due to ambiguity in the market orientation and performance relationship, the basic aim of the study to investigate the nature of relationship exists between market orientation and performance of the manufacturing SMEs in India....
Published by: IGI Global
A Survey on Fatigue Detection of Workers Using Machine Learning
In the software industry, where the quality of the output is based on human performance, fatigue can be a reason for performance degradation. Fatigue not only degrades quality, but is also a health risk factor. Sleep disorders...
Published by: IGI Global
Study of Predictors of Organizational Effectiveness Among Private and Public Sector IT Companies
Human relations experts have shown tremendous interest in determining the variables that enhance workers' satisfaction and their loyalty to organisation because only committed and qualified personnel can facilitate the...
Published by: IGI Global
SafeWomen
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So...
Published by: IGI Global
Design and Implementation of RS(450, 406) Decoder
Nowadays, in the field of data transmission between receiver and transmitter, the Reed Solomon code is used very frequently. FEC codes have two foremost and influential operations: (1) calculating parity symbols at the encoder...
Published by: IGI Global
SafeWomen
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So...
Published by: IGI Global
Particle Swarm Optimization for Punjabi Text Summarization
Particle swarm optimization (PSO) algorithm is proposed to deal with text summarization for the Punjabi language. PSO is based on intelligence that predicts among a given set of solutions which is the best solution. The search...
Published by: IGI Global
Efficient Cloudlet Allocation to Virtual Machine to Impact Cloud System Performance
Performance is an essential characteristic of any cloud computing system. It can be enhance through parallel computing, scheduling and load balancing. This work evaluates the connection between the response time (RT) and virtual...
Published by: IGI Global
Optimizing Energy Consumption in IoT-Based Scalable Wireless Sensor Networks
In recent era of IoT, energy ingesting by sensor nodes in Wireless Sensor Networks (WSN) is one of the key challenges. It is decisive to diminish energy ingesting due to restricted battery lifespan of sensor nodes, Objective of...
Published by: IGI Global
Evaluation of Barriers in the Adoption of E-Commerce Technology in SMEs
The main purpose of this study is to examine barriers towards e-commerce platforms in developing countries using specific analytic techniques. The present empirical analysis has its main objectives of detailed study of barriers...
Published by: IGI Global
Robust Face Recognition Under Partial Occlusion Based on Local Generic Features
Face recognition has drawn significant attention due to its potential use in biometric authentication, surveillance, security, robotics, and so on. It is a challenging task in the field of computer vision. Although the various...
Published by: IGI Global
How Does Online Engagement Drive Consumers' Webrooming Intention?
Based on the cognitive-motivational-relational (CMR) theory, this study empirically investigates the mechanisms through which consumers' online engagement impacts their channel switching intention. The present study examines the...
Published by: IGI Global
An Improved Supervised Classification Algorithm in Healthcare Diagnostics for Predicting Opioid Habit Disorder
Opioid Habit Disorder (OHD), which has become a mass health epidemic, is defined as the psychological or physical dependency on opioids. This study demonstrates how supervised machine learning procedures help us investigate and...
Published by: IGI Global
Phish-Shelter
Phishing attack is a deceitful attempt to steal the confidential data such as credit card information, and account passwords. In this paper, Phish-Shelter, a novel anti-phishing browser is developed, which analyzes the URL and...
Published by: IGI Global
Identification of Potential Mpro Inhibitors for the Treatment of COVID-19 by Targeted Covalent Inhibition
A novel coronavirus is the causative agent identified for the current COVID-19 outbreak. Globally, more than 43 million people have been infected by this virus. The total number of deaths has surpassed 1.6 million across 210...
Published by: IGI Global
Detecting Sinkhole Attacks in IoT-Based Wireless Sensor Networks Using Distance From Base Station
Wireless sensor networks (WSNs) are infrastructure-less in nature, which contains numbers of autonomous sensor nodes. These sensor nodes are dedicated to monitoring the physical conditions of the environment and are organizing...
Published by: IGI Global
Simulation of the Lightweight Blockchain Technique Based on Privacy and Security for Healthcare Data for the Cloud System
Information about healthcare is derived from healthcare data. Healthcare data sharing helps make healthcare systems more efficient as well as improving healthcare quality. Patients should own and control healthcare information...
Published by: IGI Global
Synthesis and Characterization of Mullites From Silicoaluminous Fly Ash Waste
Fly ash is considered one of the major hazardous pollutants around the globe. Every year a million tonnes of fly ash is disposed of into the fly ash ponds which are major sites of pollution. The major fractions of fly ash are...
Published by: IGI Global