In this article, the author categorises the solid transportation problem (STP) under uncertain environments. He formulates the mixed and fully intuitionistic fuzzy solid transportation problems (FIFSTPs) and utilizes the...
The medical imaging technique showed remarkable improvement in interventional treatment of computer-aided medical diagnosis system. Image processing techniques are broadly applied in detection and exploring the abnormalities...
The deadliest form of skin cancer is melanoma, and if detected in time, it is curable. Detection of melanoma using biopsy is a painful and time-consuming task. Alternate means are being used by medical experts to diagnose...
Brain tumor detection from magnetic resonance (MR)images is a tedious task but vital for early prediction of the disease which until now is solely based on the experience of medical practitioners. Multilevel image segmentation...
The paper seeks to examine the cross-country variation in the state of digital economy in Asia-Pacific region. In addition, this paper also identifies the role played by the digital skill in fostering the development of the...
Brain tumor detection from magnetic resonance (MR)images is a tedious task but vital for early prediction of the disease which until now is solely based on the experience of medical practitioners. Multilevel image segmentation...
The COVID 19 Pandemic, has resulted in large scale of generation of Big data. This Big data is heterogeneous and includes the data of people infected with corona virus, the people who were in contact of infected person...
The image enhancement process is used for improving the standard of the image, it's inspired by the development of human perception pictorial information. Increasing the contrast of the image, removing the unwanted noise from...
The technology and use of computers helped the Indian dairy industry to change its rural face and its organization. It’s revolution in today’s supply chain management business validate that they are vital elements which can...
Electric scooter rental companies such as Bird and Lime rely on gig workers to recharge their scooters. This paper discusses some of the limitations of the compensation schemes of these companies and the processes that these...
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So...
Big data refers to the enormous heterogeneous data being produced at a brisk pace by a large number of diverse data generating sources. Since traditional data processing technologies are unable to process big data efficiently...
By the second decade of the 21st century, there has been a multi-faceted technological development in the field of networked control system (NCS). This progression in NCS has not only revealed its significant applications in...
The acceptance of tele-robotics and teleoperations through networked control system (NCS) is increasing day-by-day. NCS involves the feedback control loop system wherein the control components such as actuators and sensors are...
This study identifies various issues in managing transportation logistics activities on the basis of literature review and expert panel discussions so that the facilitation of e-applications can be used for managing...
ICT use in family functioning is an important area to study as the impact changes when technology grows over years. This research analyzed the role of ICT use in process & structure of families using the factors present in...
The prevalent applications of WSN have fascinated a plethora of research efforts. Sensor nodes have serious limitations such as battery lifetime, memory constraints, and computational capabilities. Clustering is an important...
The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The...
This paper intends to consider a multi-objective problem for expansion planning in Power Distribution System (PDS) by focusing on (i) expansion strategy (ii) allocation of Circuit Breaker (CB), (iii) allocation of Distribution...
IoT devices are having many constraints related to computation power and memory etc. Many existing cryptographic algorithms of security could not work with IoT devices because of these constraints. Since the sensors are used in...
Forensic accounting is the prominent instrument in the field of accounting area to tackle the rampant situation of financial fraud. Forensic accounting is a specific branch of accounting. It involves the application of special...
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So...
In the healthcare industry, sources look after different customers with diverse diseases and complications. Thus, at the source, a great amount of data in all aspects like status of the patients, behaviour of the diseases, etc....
The online purchase through web channels regarding travel related product services have really taken an unprecedented growth. The objectives of the study is to determine how information quality available on the websites of the...
The present work uses flutter and transfer learning-based techniques for predicting the shelf-life of fruits in real-time by reducing the demand for huge number of samples and longer training durations. The work uses mango fruit...