Nowadays sensor nodes are being deployed anywhere as per the applications and real-time data analysis. A major concern of this implementation is the limited battery power and huge data generation. The data redundancy can also...
In the healthcare field, preserving privacy of the patient's electronic health records has been an elementary issue. Numerous techniques have been emerged to maintain privacy of the susceptible information. Acting as a first...
In recent decades, Multiple Input Multiple Output beamforming is deliberated as the vital technology enablers for 5G mobile radio services. Since, it provides noticeable improvement regarding throughput and coverage measures in...
This paper has organized a heart disease-related dataset from UCI repository. The organized dataset describes variables correlations with class-level target variables. This experiment has analyzed the variables by different...
Electrical impedance tomography (EIT) is a non-invasive technique that is used to estimate the electrical properties of a medical or non-medical object through the boundary data of the object. It used to achieve functional...
In the healthcare field, preserving privacy of the patient's electronic health records has been an elementary issue. Numerous techniques have been emerged to maintain privacy of the susceptible information. Acting as a first...
Due to ambiguity in the market orientation and performance relationship, the basic aim of the study to investigate the nature of relationship exists between market orientation and performance of the manufacturing SMEs in India....
In the software industry, where the quality of the output is based on human performance, fatigue can be a reason for performance degradation. Fatigue not only degrades quality, but is also a health risk factor. Sleep disorders...
Human relations experts have shown tremendous interest in determining the variables that enhance workers' satisfaction and their loyalty to organisation because only committed and qualified personnel can facilitate the...
Cross-site scripting is one of the notable exceptions effecting almost every web application. Hence, this article proposed a framework to negate the impact of the XSS attack on web servers deployed in one of the major...
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So...
Nowadays, in the field of data transmission between receiver and transmitter, the Reed Solomon code is used very frequently. FEC codes have two foremost and influential operations: (1) calculating parity symbols at the encoder...
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So...
Particle swarm optimization (PSO) algorithm is proposed to deal with text summarization for the Punjabi language. PSO is based on intelligence that predicts among a given set of solutions which is the best solution. The search...
Performance is an essential characteristic of any cloud computing system. It can be enhance through parallel computing, scheduling and load balancing. This work evaluates the connection between the response time (RT) and virtual...
In recent era of IoT, energy ingesting by sensor nodes in Wireless Sensor Networks (WSN) is one of the key challenges. It is decisive to diminish energy ingesting due to restricted battery lifespan of sensor nodes, Objective of...
The main purpose of this study is to examine barriers towards e-commerce platforms in developing countries using specific analytic techniques. The present empirical analysis has its main objectives of detailed study of barriers...
Face recognition has drawn significant attention due to its potential use in biometric authentication, surveillance, security, robotics, and so on. It is a challenging task in the field of computer vision. Although the various...
Based on the cognitive-motivational-relational (CMR) theory, this study empirically investigates the mechanisms through which consumers' online engagement impacts their channel switching intention. The present study examines the...
Opioid Habit Disorder (OHD), which has become a mass health epidemic, is defined as the psychological or physical dependency on opioids. This study demonstrates how supervised machine learning procedures help us investigate and...
Phishing attack is a deceitful attempt to steal the confidential data such as credit card information, and account passwords. In this paper, Phish-Shelter, a novel anti-phishing browser is developed, which analyzes the URL and...
A novel coronavirus is the causative agent identified for the current COVID-19 outbreak. Globally, more than 43 million people have been infected by this virus. The total number of deaths has surpassed 1.6 million across 210...
Wireless sensor networks (WSNs) are infrastructure-less in nature, which contains numbers of autonomous sensor nodes. These sensor nodes are dedicated to monitoring the physical conditions of the environment and are organizing...
Information about healthcare is derived from healthcare data. Healthcare data sharing helps make healthcare systems more efficient as well as improving healthcare quality. Patients should own and control healthcare information...
Fly ash is considered one of the major hazardous pollutants around the globe. Every year a million tonnes of fly ash is disposed of into the fly ash ponds which are major sites of pollution. The major fractions of fly ash are...