Search

Results: 279
Behavior of Low Height Embankment Under Earthquake Loading
Low height embankments are widely used as road embankments for highways and rural roads in India. Sometimes, the construction of such types of embankments on soft foundation soil becomes mandatory. In addition to the problematic...
Liquefaction Behavior of Typical River Channel Deposit in Kolkata City
Liquefaction susceptibility of river channel deposit in Kolkata city is studied using laboratory cyclic triaxial tests. River channel deposit, which supports a large part of rapidly growing urbanization of Kolkata city, mainly...
Quantify the Behaviour Intention of Individuals to Control SC Performance by Exploring Cloud Storage Services
The Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) is explored as a theoretical background to build extended UTAUT2 model with relevant variables for examining the cloud storage services technology acceptance at...
Role of Ultrasonography and Mammography in Evaluation of Breast Masses
OBJECTIVE: To characterize breast masses using mammography and ultrasonography along with colour Doppler study and to correlate mammography, ultrasonography and FNAC findings and to determine sensitivity and specificity of...
Published by: IJHS Medical Association
Role of Ultrasonography and Mammography in Evaluation of Breast Masses
OBJECTIVE: To characterize breast masses using mammography and ultrasonography along with colour Doppler study and to correlate mammography, ultrasonography and FNAC findings and to determine sensitivity and specificity of...
Published by: IJHS Medical Association
Conditioned Slicing of Interprocedural Programs
Madhusmita Sahu
Jan 01, 2019
Program slicing is a technique to decompose programs depending on control flow and data flow amongst several lines of code in a program. Conditioned slicing is a generalization of static slicing and dynamic slicing. A variable...
Classification of Autistic Spectrum Disorder Using Deep Neural Network With Particle Swarm Optimization
In this paper, Feature Selection Technique (FST) namely Particle Swarm Optimization (PSO) has been used. The filter based PSO is a search method with Correlation-based Feature Selection (CBFS) as a fitness function. The FST has...
Prediction of Nurses Allotment to Patient in Hospital through Game Theory
Satya Dash, Rekha Sahu
Jan 01, 2022
Allotment of nurses to patients is a critical task in terms of better treatment. Nurses should be appointed according to a patient's health condition, type of disease, and financial condition. Again, understaffing of nurses may...
A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card
The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The...
A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography
Mapping of image-based object textures to ASCII characters can be a new modification towards visual cryptography. Naor and Shamir proposed a new dimension of Information security as visual cryptography which is a secret sharing...
SDN-Based Traffic Monitoring in Data Center Network Using Floodlight Controller
Data center networks are the backbone of IT infrastructure and cloud services. According to traffic pattern research, a small group of flows transport the vast majority of the bytes and are referred to as elephant flows. Proper...
Nucleolar Architecture Is Modulated by a Small Molecule, the Inositol Pyrophosphate 5-InsP7.
Inositol pyrophosphates (PP-InsPs); are a functionally diverse family of eukaryotic molecules that deploy a highly-specialized array of phosphate groups as a combinatorial cell-signaling code. One reductive strategy to derive a...
Published by:
Latest Trends in Deep Learning Techniques for Image Steganography
The development of deep convolutional neural networks has been largely responsible for the significant strides forward made in steganography over the past decade. In the field of image steganography, generative adversarial...
Agricultural Recommendation System for Crops Using Different Machine Learning Regression Methods
Agriculture is a foremost field within the world, and it's the backbone in the Republic of India. Agriculture has been in poor condition. The impact of temperature variations and its uncertainty has engendered the bulk of the...
Role of AYUSH Therapies in Modern Medicine
OBJECTIVE: To understand doctors' attitude to and awareness of AYUSH therapies for the treatment of diabetes mellitus (DM). METHODS: This qualitative study, using a usage-and-attitude survey, was conducted in secondary centers...
Published by:
Users' Acceptance of Artificial Intelligence-Based Chatbots
This research examines the effects of factors such as perceived ease of use, perceived usefulness, perceived enjoyment, innovativeness, perceived information quality, and perceived customisation on behavioural intention to use...
Coronary Artery Disease Classification Using Deep Neural Network and Ensemble Models Optimized by Particle Swarm Optimization
Nowadays, many people are suffering from several health related issues in which Coronary Artery Disease (CAD) is an important one. Identification, prevention and diagnosis of diseases is a very challenging task in the field of...
Temperate Earth-sized planets transiting a nearby ultracool dwarf star.
Star-like objects with effective temperatures of less than 2,700 kelvin are referred to as 'ultracool dwarfs'. This heterogeneous group includes stars of extremely low mass as well as brown dwarfs (substellar objects not massive...
Published by:
Avoiding high ozone pollution in Delhi, India.
Surface ozone is a major pollutant threatening public health, agricultural production and natural ecosystems. While measures to improve air quality in megacities such as Delhi are typically aimed at reducing levels of...
Published by:

|<

<

1

2

3

4

5

>

>|