Nowadays sensor nodes are being deployed anywhere as per the applications and real-time data analysis. A major concern of this implementation is the limited battery power and huge data generation. The data redundancy can also...
The chapter aims to discuss building destination brands with the use of brand placements, like in movies and in songs, brand communities, and storytelling through new media options. The objective is to share how these three...
In recent decades, Multiple Input Multiple Output beamforming is deliberated as the vital technology enablers for 5G mobile radio services. Since, it provides noticeable improvement regarding throughput and coverage measures in...
This paper has organized a heart disease-related dataset from UCI repository. The organized dataset describes variables correlations with class-level target variables. This experiment has analyzed the variables by different...
The chapter aims to discuss building destination brands with the use of brand placements, like in movies and in songs, brand communities, and storytelling through new media options. The objective is to share how these three...
Due to ambiguity in the market orientation and performance relationship, the basic aim of the study to investigate the nature of relationship exists between market orientation and performance of the manufacturing SMEs in India....
In the software industry, where the quality of the output is based on human performance, fatigue can be a reason for performance degradation. Fatigue not only degrades quality, but is also a health risk factor. Sleep disorders...
Human relations experts have shown tremendous interest in determining the variables that enhance workers' satisfaction and their loyalty to organisation because only committed and qualified personnel can facilitate the...
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So...
The Product Owner and Scrum Master are members of the Scrum Team, which play an essential role in Global Software Development. They must have some competencies that can overcome challenges in the global environment. This study...
Nowadays, in the field of data transmission between receiver and transmitter, the Reed Solomon code is used very frequently. FEC codes have two foremost and influential operations: (1) calculating parity symbols at the encoder...
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So...
Particle swarm optimization (PSO) algorithm is proposed to deal with text summarization for the Punjabi language. PSO is based on intelligence that predicts among a given set of solutions which is the best solution. The search...
Performance is an essential characteristic of any cloud computing system. It can be enhance through parallel computing, scheduling and load balancing. This work evaluates the connection between the response time (RT) and virtual...
In recent era of IoT, energy ingesting by sensor nodes in Wireless Sensor Networks (WSN) is one of the key challenges. It is decisive to diminish energy ingesting due to restricted battery lifespan of sensor nodes, Objective of...
The prevailing picture of intercultural adaptation among international student sojourners features a reified process of overcoming culture shock or culture-related stress and anxiety. In the context of increasing recruitment of...
Gene Regulatory Networks (GRNs) are the pioneering methodology for finding new gene interactions getting insights of the biological processes using time series gene expression data. It remains a challenge to study the temporal...
The main purpose of this study is to examine barriers towards e-commerce platforms in developing countries using specific analytic techniques. The present empirical analysis has its main objectives of detailed study of barriers...
COVID-19 causes global health problems, and new technologies have to be established to detect, anticipate, diagnose, screen, and even trace COVID-19 by all health care experts. Several database searches are carried out in this...
Face recognition has drawn significant attention due to its potential use in biometric authentication, surveillance, security, robotics, and so on. It is a challenging task in the field of computer vision. Although the various...
Based on the cognitive-motivational-relational (CMR) theory, this study empirically investigates the mechanisms through which consumers' online engagement impacts their channel switching intention. The present study examines the...
Opioid Habit Disorder (OHD), which has become a mass health epidemic, is defined as the psychological or physical dependency on opioids. This study demonstrates how supervised machine learning procedures help us investigate and...
Phishing attack is a deceitful attempt to steal the confidential data such as credit card information, and account passwords. In this paper, Phish-Shelter, a novel anti-phishing browser is developed, which analyzes the URL and...
In 2009, National Skill Development (NSD) Policy was reformed to modify the vocational education system in India. The skills development and entrepreneurship policy developed in 2015 tries to solve the challenges of skill...
Quality teaching in higher education (HE) is gaining increasing international attention and pedagogical innovation is seen as an important construct of quality teaching. The drivers for pedagogical innovation include the need...