In this article, the author categorises the solid transportation problem (STP) under uncertain environments. He formulates the mixed and fully intuitionistic fuzzy solid transportation problems (FIFSTPs) and utilizes the...
In this study, we consider a switching strategy that yields a stable desirable dynamic behaviour when it is applied alternatively between two undesirable dynamical systems. From the last few years, dynamical systems employed...
A news recommendation system not only must recommend the latest, trending and personalized news to the users but also give opportunity to know about the people’s opinion on trending news. Most of the existing news recommendation...
In any construction projects,assessment of liquefaction potential induced due to seismic excitation during earthquake is a critical concern.The objective of present model development is to classify and assess liquefaction...
Web bots are destructive programs that automatically fill the web form and steal the data from web sites. According to numerous web bot traffic reports, web bots traffic comprises of more than fifty percent of the total web...
The COVID 19 Pandemic, has resulted in large scale of generation of Big data. This Big data is heterogeneous and includes the data of people infected with corona virus, the people who were in contact of infected person...
Phishing attack is a deceitful attempt to steal the confidential data such as credit card information, and account passwords. In this paper, Phish-Shelter, a novel anti-phishing browser is developed, which analyzes the URL and...
The image enhancement process is used for improving the standard of the image, it's inspired by the development of human perception pictorial information. Increasing the contrast of the image, removing the unwanted noise from...
The technology and use of computers helped the Indian dairy industry to change its rural face and its organization. It’s revolution in today’s supply chain management business validate that they are vital elements which can...
Electric scooter rental companies such as Bird and Lime rely on gig workers to recharge their scooters. This paper discusses some of the limitations of the compensation schemes of these companies and the processes that these...
Big data refers to the enormous heterogeneous data being produced at a brisk pace by a large number of diverse data generating sources. Since traditional data processing technologies are unable to process big data efficiently...
By the second decade of the 21st century, there has been a multi-faceted technological development in the field of networked control system (NCS). This progression in NCS has not only revealed its significant applications in...
The acceptance of tele-robotics and teleoperations through networked control system (NCS) is increasing day-by-day. NCS involves the feedback control loop system wherein the control components such as actuators and sensors are...
This study identifies various issues in managing transportation logistics activities on the basis of literature review and expert panel discussions so that the facilitation of e-applications can be used for managing...
ICT use in family functioning is an important area to study as the impact changes when technology grows over years. This research analyzed the role of ICT use in process & structure of families using the factors present in...
The prevalent applications of WSN have fascinated a plethora of research efforts. Sensor nodes have serious limitations such as battery lifetime, memory constraints, and computational capabilities. Clustering is an important...
The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The...
This paper intends to consider a multi-objective problem for expansion planning in Power Distribution System (PDS) by focusing on (i) expansion strategy (ii) allocation of Circuit Breaker (CB), (iii) allocation of Distribution...
IoT devices are having many constraints related to computation power and memory etc. Many existing cryptographic algorithms of security could not work with IoT devices because of these constraints. Since the sensors are used in...
Forensic accounting is the prominent instrument in the field of accounting area to tackle the rampant situation of financial fraud. Forensic accounting is a specific branch of accounting. It involves the application of special...
Nowadays, mobile cloud applications have attracted millions of smartphone users due to the proliferation of cyber technologies and a wide range of applications. Mobile cloud forensic investigation methodologies need tremendous...
In the healthcare industry, sources look after different customers with diverse diseases and complications. Thus, at the source, a great amount of data in all aspects like status of the patients, behaviour of the diseases, etc....
The online purchase through web channels regarding travel related product services have really taken an unprecedented growth. The objectives of the study is to determine how information quality available on the websites of the...
The present work uses flutter and transfer learning-based techniques for predicting the shelf-life of fruits in real-time by reducing the demand for huge number of samples and longer training durations. The work uses mango fruit...
IoT is a communal association of things or equipment that can interact with each other with the help of an internet connection. IoT services play an imperative responsibility in the industry of agriculture, which can feed 10...