Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
TCP/IP has become an undeniable leader in the areas of Information Technology. It is a well-established fact that data transfer between devices occur by the rules defined by the TCP/IP protocol. Each layer of TCP/IP model generally has... more
    • by 
    •   12  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
- Result of “the Onlife Initiative,” a one-year project funded by the European Commission to study the deployment of ICTs and its effects on the human condition - Inspires reflection on the ways in which a hyperconnected world forces the... more
    • by 
    •   142  
      Information SystemsBusiness EthicsComputer ScienceInformation Science
Recently we have witnessed the worldwide adoption of many different types of innovative technologies, such as crowdsourcing, ridesharing, open and big data, aiming at delivering public services more efficiently and effectively. Among... more
    • by  and +1
    •   252  
      ManagementRisk Management and InsuranceInformation TechnologyPolicy Analysis/Policy Studies
Breast cancer is a top killer disease for women globally. The long term survival rate of women can be improved through early and effective screening of breast cancer cells. Currently, a mammogram is the recommended tool for breast cancer... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The main purpose of this paper is to examine some (potential) applications of quantum computation in AI and to review the interplay between quantum theory and AI. For the readers who are not familiar with quantum computation, a brief... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Sustaining technologies and innovations are important driving forces behind the modern day business and the working space. Sustaining technology and innovation enables businesses to improve their products and services in a way that makes... more
    • by 
    •   6  
      Information TechnologyInformation & Communication TechnologyInformation Communication TechnologyInformation and Communication technology
I.Digitalization
II.Topics Covered in the Context of Digitalization
    • by 
    •   96  
      BusinessBusiness AdministrationEnvironmental ScienceInformation Technology
In today’s society, most if not all sectors digitize and automate in order to become more efficient. The increasing availability and sophistication of software technologies disrupt labor markets by making workers redundant. Within this... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The present review reports the work done by the various authors towards rainfall forecasting using the different techniques within Artificial Neural Network concepts. Back-Propagation, Auto-Regressive Moving Average (ARIMA), ANN , K-... more
    • by 
    •   12  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Identifying indices of effort in post-editing of machine translation can have a number of applications, including estimating machine translation quality and calculating post-editors’ pay rates. Both source-text and machine-output features... more
    • by 
    •   68  
      PsychologyCognitive PsychologyCognitive ScienceQuantitative Psychology
Prediction of reservoir yield is an important for fisheries managers to use appropriate scientific management practices to increase the fishery production. Many mathematical or applied mathematics and Artificial Neural Networks models... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
This paper discusses the concept of "human disenhancement", i.e. the worsening of human individual abilities and expectations through technology. The goal is provoking ethical reflection on technological innovation outside the biomedical... more
    • by 
    •   9  
      Information TechnologyICT for DevelopmentHuman EnhancementInformation and Communication Technologies
Scientific writing is a technical form of writing that is designed to communicate scientific information to other scientists. Scientific writing is predicated on the rigors of scientific inquiry; therefore, it must reflect the same... more
    • by 
    •   5  
      Information TechnologyInformation Communication TechnologyInformation and TechnologyInformation Technology and System Integration
The development of mobile payment in the country is significant each year, has become a trend and lifestyle among the people with a user level reaching 70% by the younger population and 67% by rising digital usage. One of the mobile... more
    • by 
    •   4  
      Information TechnologyInformation Communication TechnologyInformation and TechnologyInformation Technology and System Integration
Ensuring sustainability in the long-run necessitates devoting strategic solutions to the rising environmental problems. Unless nations move to a sustainable growth path characterized by economic development and human development that... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Notwithstanding recent work which has demonstrated the potential of using Twitter messages for content-specific data mining and analysis, the depth of such analysis is inherently limited by the scarcity of data imposed by the 140... more
    • by 
    •   94  
      Electrical EngineeringComputer ScienceSoftware EngineeringHuman Computer Interaction
Learning efficient options illustrations and equivalency metric measures are imperative to the searching performance of a content-based image retrieval (CBIR) machine. Despite in depth analysis efforts for many years, it remains one... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Copied code or code clones are a sort of code that contrarily affect the improvement and support of software frameworks. Software clone research in the past generally cantered around the discovery. what's more, examination of code clones,... more
    • by  and +1
    •   9  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Purpose – This article aims to highlight the main limitations of the emancipatory potentials of digital inclusion policies and information and communication technologies (ICTs). Increasingly, empowerment is put forward as one of the main... more
    • by  and +1
    •   11  
      Critical TheoryDigital DividePolitical Economy of CommunicationDigital Media
The internet has provided many novel ways for people to express their ideas and views about different topics, ideas and trends. The contents generated by the users which are present on various mediums like internet blogs, discussion... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
As technology advances, it makes life easy and straightforward by solving many of the real-life problems which are faced by people in their daily life. Various types of technologies are used to improve the life of humans. Hence, this... more
    • by 
    •   12  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The novel human coronavirus is highly contagious and can lead to significant morbidity and mortality. This has triggered major and cascading economic and societal consequences that have contributed considerably to global impact and... more
    • by 
    •   12  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The battle of corona-virus and mankind is possible to be tackled as long as we maintain the basic norm of social distancing and wearing masks amongst ourselves as it is through our droplets from the respiratory tract that the virus... more
    • by 
    •   9  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Yoga is an ancient science and discipline originated in India 5000 years ago. It is used to bring harmony to both body and mind with the help of asana, meditation and various other breathing techniques It bring peace to the mind. Due to... more
    • by  and +1
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The development and upgrades that mobile gadgets have encountered, they are as yet considered as restricted registering gadgets. Presently, clients become the more requesting and hope to execute computational serious applications on their... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
India is an agricultural country. Agriculture is the important contributor to the Indian economy. There are many classification techniques like Support Vector Machine(SVM), LADTree, Naïve Bayes, Bayesnet, K Nearest Neighbour(KNN), Locally... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Cloud Computing has the facility to transform a large part of information technology into services in which computer resources are virtualized and made available as a utility service. From here comes the importance of scheduling virtual... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Datacenters are becoming the indispensable infrastructure for supporting the services offered by cloud computing. Unfortunately, datacenters consume a lot of energy, which currently stands at 3% of global electrical energy consumption.... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
This paper deals with a low cost solution to problem avoidance for a mobile machine using just a single Artifical Intelligennce. It allows the machine to navigate smoothly in an unknown environment, avoiding collisions, without having to... more
    • by 
    •   12  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Drowsiness as well as Tiredness of motorists is amongst the considerable root causes of road crashes. Yearly, they raise the quantities of deaths as well as fatalities injuries globally. In this paper, a module for Advanced Motorist Aid... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The GIS smart campuses have been constituted as an efficient system that allows the integration of information from different agencies inside universities, with the use of geographic applications developed for different types of users.... more
    • by 
    •   16  
      Information TechnologyDatabase SystemsHuman Resource ManagementInformation Communication Technology
This research is aimed at developing a Software Framework for poultry management with the objectives: To provide poultry farmers with expert knowledge from the comfort of their homes. The system is developed using generic iterative... more
    • by 
    •   9  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
This series of studies make it clear that a wide range of both physical and digital resources are involved in domestic music consumption. The selection of digital resources is particularly evident, and it can be observed that domestic... more
    • by 
    •   45  
      Information SystemsComputer ScienceInformation ScienceHuman Computer Interaction
A Mobile Adhoc Network (MANET) is prone to attacks. Adversaries take hold of the network, thus degrading their performance. Various attacks are prevalent in MANET, out of which Byzantine attack plays a vital role. A node or group of nodes... more
    • by 
    •   12  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Cloud Computing (CC) is the advancement of the Grid Computing (GC) worldview in the direction of administration arranged structures. The phrasing connected to this sort of handling, while portraying shared resources, alludes to the idea... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The serious constraints and requiring deployment atmospheres of wireless sensor networks make safety for these systems extra difficult than for traditional networks Nevertheless, a number of residential or commercial properties of sensor... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Malicious users use different techniques such as cracking passwords, text traffic, sniffing unencrypted or light, etc. System overhead and compromise critical systems. Therefore, there must be some sort of security for the organization's... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The Powerful software tools and techniques required for the development of data mining applications. With the rapid development of technologies and business interest in using electronics and latest technologies plays important role in... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Mobile health apps usually have a user interface that is difficult for elderly users to understand. With the increase in the number of elder users using applications on mobile phone, research on this area is important to do. This research... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
As India is rich in talent, lagging in research and poor in finance, authors sincerely appeal UGC, NAAC, NPTEL, IIT, AICTE, IISER, IISc and administrative institutions like IIM, UPSC and Supreme Court core committees to take initiative in... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
In recent years, Wireless sensor networks (WSNs) have been emerged as an important research area due to its wide spread application in various domains such as military sensing and tracking, environment monitoring, patient monitoring, etc.... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Natural language processing (NLP) is very much needed in today’s world to enhance human-machine interaction. It is an important concern to process textual data and obtain useful and meaningful information from these texts. NLP parses the... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The aim of this paper is to automatically identify a Roman Imperial denarius from a single query photograph of its obverse and reverse. Such functionality has the potential to contribute greatly to various national schemes which encourage... more
    • by 
    •   101  
      HistoryInformation RetrievalInformation TechnologyComputer Vision
Cloud computing has gained a lot of interest from both small and big academic and commercial organizations because of its success in delivering service on a pay-as-you-go basis. Moreover, many users (organizations) can share server... more
    • by  and +1
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Social networks have become a vital component in personal life. People are addicted to social network features, updating their profile page and collaborating virtually with other members have become daily routines. Web data mining is a... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Brushless DC motor has a rotor with permanent magnet and has no mechanical commutator which leads to many advantages like less maintenance, long life, high reliability, low inertia, low friction and low noise. Since the brush... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Bitcoin is a Cryptocurrency which is evolving in digital world and gaining a larger market related to digital currency and stands on all the user expectation of decentralize mechanism of system by providing proof of work in peer-to-peer... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
Machine learning is embraced in an extensive variety of areas where it demonstrates its predominance over customary lead based calculations. These strategies are being coordinated in digital recognition frameworks with the objective of... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
In this paper the use of online learning, assessment and self-evaluation platform to aid in teaching and assessment of computer programming and Aptitudes in classrooms are discussed. Based on the skills of the users, the programming and... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
The degree of pollution has expanded with times by parcel of variables like the expansion in populace, expanded vehicle use, industrialization and urbanization, which brings about hurtful impacts on human prosperity by legitimately... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering