Opioid Habit Disorder (OHD), which has become a mass health epidemic, is defined as the psychological or physical dependency on opioids. This study demonstrates how supervised machine learning procedures help us investigate and...
In recent decades, Multiple Input Multiple Output beamforming is deliberated as the vital technology enablers for 5G mobile radio services. Since, it provides noticeable improvement regarding throughput and coverage measures in...
Nowadays sensor nodes are being deployed anywhere as per the applications and real-time data analysis. A major concern of this implementation is the limited battery power and huge data generation. The data redundancy can also...
This paper has organized a heart disease-related dataset from UCI repository. The organized dataset describes variables correlations with class-level target variables. This experiment has analyzed the variables by different...
Due to ambiguity in the market orientation and performance relationship, the basic aim of the study to investigate the nature of relationship exists between market orientation and performance of the manufacturing SMEs in India....
In the software industry, where the quality of the output is based on human performance, fatigue can be a reason for performance degradation. Fatigue not only degrades quality, but is also a health risk factor. Sleep disorders...
Human relations experts have shown tremendous interest in determining the variables that enhance workers' satisfaction and their loyalty to organisation because only committed and qualified personnel can facilitate the...
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So...
Nowadays, in the field of data transmission between receiver and transmitter, the Reed Solomon code is used very frequently. FEC codes have two foremost and influential operations: (1) calculating parity symbols at the encoder...
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So...
Particle swarm optimization (PSO) algorithm is proposed to deal with text summarization for the Punjabi language. PSO is based on intelligence that predicts among a given set of solutions which is the best solution. The search...
Performance is an essential characteristic of any cloud computing system. It can be enhance through parallel computing, scheduling and load balancing. This work evaluates the connection between the response time (RT) and virtual...
Parkinson disease (PD) is a neurological disorder where the dopaminergic neurons experience deterioration. It is caused from the death of the dopamine neurons present in the substantia nigra i.e., the mid part of the brain. The...
In recent era of IoT, energy ingesting by sensor nodes in Wireless Sensor Networks (WSN) is one of the key challenges. It is decisive to diminish energy ingesting due to restricted battery lifespan of sensor nodes, Objective of...
The main purpose of this study is to examine barriers towards e-commerce platforms in developing countries using specific analytic techniques. The present empirical analysis has its main objectives of detailed study of barriers...
Face recognition has drawn significant attention due to its potential use in biometric authentication, surveillance, security, robotics, and so on. It is a challenging task in the field of computer vision. Although the various...
Based on the cognitive-motivational-relational (CMR) theory, this study empirically investigates the mechanisms through which consumers' online engagement impacts their channel switching intention. The present study examines the...
Phishing attack is a deceitful attempt to steal the confidential data such as credit card information, and account passwords. In this paper, Phish-Shelter, a novel anti-phishing browser is developed, which analyzes the URL and...
A novel coronavirus is the causative agent identified for the current COVID-19 outbreak. Globally, more than 43 million people have been infected by this virus. The total number of deaths has surpassed 1.6 million across 210...
Wireless sensor networks (WSNs) are infrastructure-less in nature, which contains numbers of autonomous sensor nodes. These sensor nodes are dedicated to monitoring the physical conditions of the environment and are organizing...
Information about healthcare is derived from healthcare data. Healthcare data sharing helps make healthcare systems more efficient as well as improving healthcare quality. Patients should own and control healthcare information...
Fly ash is considered one of the major hazardous pollutants around the globe. Every year a million tonnes of fly ash is disposed of into the fly ash ponds which are major sites of pollution. The major fractions of fly ash are...