The healthcare domain gets wide attention among the research community due to incremental data growth, advanced diagnostic tools, medical imaging processes, and many more. Enormous healthcare data is generated through diagnostic...
Brand extension is an important cost-effective marketing method to offer new products. However, ordinary Least Square regression with control variables has been applied for estimation of variable coefficients. In the study...
Why-type non-factoid questions are ambiguous and involve variations in their answers. A challenge in returning one appropriate answer to user requires the process of appropriate answer extraction, re-ranking and validation....
Face Recognition is an efficient technique and one of the most liked biometric software application for the identification and verification of specific individual in a digital image by analysing and comparing patterns. This...
Understanding the actual need of user from a question is very crucial in non-factoid why-question answering as Why-questions are complex and involve ambiguity and redundancy in their understanding. The precise requirement is to...
Emerging economies like India are witnessing rapid technological changes. To penetrate in the emerging markets and ensure smooth adoption of mobile wallets it is important to study the constructs that trigger mobile adoption....
Business intelligence (BI) helps organizations to make better and quicker decisions. The primary requirement, as per previous studies, for any successful BI implementation in an organization and its' stakeholders, is to...
Cervical cancer is second most prevailing cancer in women all over the world and the Pap smear is one of the most popular techniques used to diagnosis cervical cancer at an early stage. Developing countries like India has to...
An auction-based cloud model is followed in the spot pricing mechanism, where the spot instances charge changes with time. The user is bound to pay for the time that is initially initiated. If the user terminates before the...
CODVerif is an approach that aims to verify the data being inserted in a data store continuously. CODVerif leverages the combination of ontology and workflow technologies in order to define workflows that are specific to the...
Nowadays, Reversible Data Hiding (RDH) is used extensively in information sensitive communication domains to protect the integrity of hidden data and the cover medium. However, most of the recently proposed RDH methods lack...
This research study attempts to investigate the moderating role of financial institutions with corporate governance and firm performance variables in the light of a purposely developed contingent theoretical framework. The...
A domain-independent conceptual model that aims to be highly reusable across specific domain applications is provided by upper-level ontologies which usually describe abstract concepts. In this paper, the authors proposed...
Dynamic Adaptive Streaming over HTTP (DASH) is an emerging solution that aims to standardize existing proprietary streaming systems. DASH specification defines the media presentation description (MPD), which describes a list of...
In the knowledge-based economy, creation, management, and dissemination of knowledge in an organized way will certainly enhance the innovative practices of companies in any country. This article has tried to explore the impact...
Cervical cancer is second most prevailing cancer in women all over the world and the Pap smear is one of the most popular techniques used to diagnosis cervical cancer at an early stage. Developing countries like India has to...
This exploratory study aims to investigate the intention to use mobile travel applications in Jordan. 7 predictors in this study have been carefully selected from previous studies conducted to date in the tourism context, and...
This study analyses the perception of customer regarding conventional and Islamic banking system. This research has found the opinions of customers of conventional banks with comparison to Islamic banks, and standalone Islamic...
Extracting knowledge from unstructured text and then classifying it is gaining importance after the data explosion on the web. The traditional text classification approaches are becoming ubiquitous, but the hybrid of semantic...
Rapid growth in communication technology allows users location-independent access to IT infrastructure at pay-per-use via cloud computing. This has paved a new paradigm in information processing for the consumers. Due to Cloud's...
The purpose of the study is to examine the influence of hedonic and utilitarian motivation on Indian consumer's online purchase intention. Second, this study tried to explore if social media mediates the influence of hedonic and...
This comprehensive study reviews the technological impact during the COVID-19 pandemic and elucidates technology usage to technology-enhanced learning which assisted in enhancing the behavioral intention to use technologies...
The experimental and theoretical study of graphene, two-dimensional (2D) graphite, is an extremely rapidly growing field of today's condensed matter research. Different types of disorder in graphene modify the Dirac equation...
In this paper, a hybrid approach using sliding window mechanism followed by fuzzy c means clustering is proposed for the automated brain tumour extraction. The proposed method consists three phases. The first phase is used for...
A teaching approach plays an important role in teaching and learning process of an introductory programming (IP) course. The teaching approach should focus on different programming skills required by novice programmers. In this...