Search

Results: 80
Modeling lightcurves for improved classification of astronomical objects
Many synoptic surveys are observing large parts of the sky multiple times. The resulting time series of light measurements, called lightcurves, provide a wonderful window to the dynamic nature of the Universe. However, there are...
Published by:
Modeling lightcurves for improved classification of astronomical objects
Many synoptic surveys are observing large parts of the sky multiple times. The resulting time series of light measurements, called lightcurves, provide a wonderful window to the dynamic nature of the Universe. However, there are...
Published by:
A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card
The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The...
Adaptive Ontology-Based IoT Resource Provisioning in Computing Systems
The eagle expresses of cloud computing plays a pivotal role in the development of technology. The aim is to solve in such a way that it will provide an optimized solution. The key role of allocating these efficient resources and...
Two-stage penalized regression screening to detect biomarker-treatment interactions in randomized clinical trials.
High-dimensional biomarkers such as genomics are increasingly being measured in randomized clinical trials. Consequently, there is a growing interest in developing methods that improve the power to detect biomarker-treatment...
Published by:
Analysis and Evaluation of Roadblocks Hindering Lean-Green and Industry 4.0 Practices in Indian Manufacturing Industries
This research is focused on the identification, assessment, analysis, and evaluation of the impact of the most prominent out of many roadblocks impeding the implementation of Lean-Green and I4.0 practices in manufacturing...
OCC
In the recent trends, cloud computing service users agreed on the concept of pay and use model by accessing all the best services provided by the providers. The major problem here is that there is no standardization so that not...
Z-Test-Based Analysis for Validating the Effectiveness of NPTEL E-Learning Modules
The present article proposes use of a z-model to validate learning progress after experimenting on student’s performance. A statistical map of z-values is used to calculate the z-value. This paper is divided into two parts -...
Disentangling the effects of traits with shared clustered genetic predictors using multivariable Mendelian randomization.
When genetic variants in a gene cluster are associated with a disease outcome, the causal pathway from the variants to the outcome can be difficult to disentangle. For example, the chemokine receptor gene cluster contains...
Published by:
Inhibitors of Industry 4.0 and Circular Economy in Manufacturing Industry Supply Chains
Circular economy (CE) and Industry 4.0 (I4.0) are clearly gaining popularity around the world because to their ability to integrate breakthrough technology with unique circular production and business models. This study...
Fragile Watermarking Framework for Tamper Detection of Color Biometric Images
Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking...
POIs Category Recommendation for Cultural Country Travel Enterprises Based on Check-In Information
With the ever-increasing popularity of traveling markets, more people are willing to spend their time and enjoy life by visiting some points of interest (POI) especially for the citizens living in cities. Therefore, it is of...
Two-stage penalized regression screening to detect biomarker-treatment interactions in randomized clinical trials.
High-dimensional biomarkers such as genomics are increasingly being measured in randomized clinical trials. Consequently, there is a growing interest in developing methods that improve the power to detect biomarker-treatment...
Published by:
The Novel Multi-Layered Approach to Enhance the Sorting Performance of Healthcare Analysis
Emergence of big data in today’s world leads to new challenges for sorting strategies to analyze the data in a better way. For most of the analyzing technique, sorting is considered as an implicit attribute of the technique...
Computational Framework of Various Semi-Active Control Strategies for Road Vehicles Thorough Bondgraphs
Vehicle suspension system plays a vital role in diminishing the vibration caused by the road roughness and prevent it from transmitting to the driver and the passenger. The semi-active suspensions contain spring and damping...
Ranking Barriers of Supply Chain Management by MCDM Method During Disaster Management
Disasters are often described as a result of the combination of the exposure to a hazard, the conditions of vulnerability that are present, and insufficient capacity or measures to reduce or cope with the potential negative...
A Multi-Objective Genetic Algorithm-Based Resource Scheduling in Mobile Cloud Computing
Mobile cloud computing is an emerging technology in recent years. This technology reduces battery consumption and execution time by executing mobile applications in remote cloud server. The virtual machine (VM) load balancing...
Decorative Art Pattern Mining and Discovery Based on Group User Intelligence
With the continuous developments of real estates and the increasing personalization of people, more and more house owners are willing to search for and discover their preferred decorative art patterns via various house...
Combining evidence from Mendelian randomization and colocalization
Mendelian randomization and colocalization are two statistical approaches that can be applied to summarized data from genome-wide association studies (GWASs) to understand relationships between traits and diseases. However...
Published by:
Building the Metaverse
Virtual worlds are progressing toward a holistic abstraction of the metaverse. While there is abundant literature and synthesis on virtual worlds and related constructs, the linkages between above scholarly work and the...
Decentralized Identity Management Using Blockchain
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a...

|<

<

1

2

3

4

>

>|