Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Library and Information Science

Past Challenges And The Future Of Discrete Event Simulation, Andrew J. Collins, Farinaz Sabz Ali Pour, Craig A. Jordan Jan 2023

Past Challenges And The Future Of Discrete Event Simulation, Andrew J. Collins, Farinaz Sabz Ali Pour, Craig A. Jordan

Engineering Management & Systems Engineering Faculty Publications

The American scientist Carl Sagan once said: “You have to know the past to understand the present.” We argue that having a meaningful dialogue on the future of simulation requires a baseline understanding of previous discussions on its future. For this paper, we conduct a review of the discrete event simulation (DES) literature that focuses on its future to understand better the path that DES has been following, both in terms of who is using simulation and what directions they think DES should take. Our review involves a qualitative literature review of DES and a quantitative bibliometric analysis of the …


A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr. May 2021

A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr.

Library Philosophy and Practice (e-journal)

Background: This research aims to look into the work that has been done on Face Presentation attacks and detection with domain adaptation techniques from 2011 to 2021 utilizing bibliography methods.

Approaches: Diverse research articles on Face Presentation Attacks were retrieved using the two most popular databases Web of Science & Scopus. Research articles consider between 2011-2021. Some research results, such as documents by year, documents by source, documents by funding agencies, countries, etc are obtained using Web of Science and Scopus Analyzers. The analysis is performed using Vos Viewer version 1.6.16 and various parameters such as keywords, co-authorship, co-occurrences, citation …


Bibliometric Analysis And Research Trends Of A Journal: Magazine Of Civil Engineering, Daniel Aristizabal, Angy Juliet Lara, Valentina Payares, Alejandro Alzate Apr 2021

Bibliometric Analysis And Research Trends Of A Journal: Magazine Of Civil Engineering, Daniel Aristizabal, Angy Juliet Lara, Valentina Payares, Alejandro Alzate

Library Philosophy and Practice (e-journal)

Magazine of Civil Engineering (MCE) is an open access scientific journal in the field of civil engineering and construction. Motivated by its more than a thousand articles published since 2008, this study aims to develop a bibliometric analysis based on the historical consolidation of publications and subject areas to identify research trends, authors, countries, and institutions with more publications. For this purpose, the Scopus database and the journal's homepage were consulted to identify the number of published issues and articles and other bibliometric indicators of interest, using open-source tools such as Bibliometrix and VOSviewer. The mapping of the scientific production …


Households Electricity Consumption Analysis: A Bibliometric Approach, Gaikwad Sachin Ramnath, Harikrishnan R Mar 2021

Households Electricity Consumption Analysis: A Bibliometric Approach, Gaikwad Sachin Ramnath, Harikrishnan R

Library Philosophy and Practice (e-journal)

The household electricity consumption ranks in the second position after the industrial electricity consumption, across the globe. This is because of the factors, which include, higher consumer income, electrification, digitalization and advancement in technologies. Moreover, the electricity demand is also depending on household characteristics, non-household characteristics and occupant’s behavior. The aim behind this study is to provide insights to researchers on household electricity consumption areas with different aspects, which includes factors affecting them, need of data collection, its approaches and techniques. To know about the research dedicated to the above-mentioned aspects, it is crucial to explore the Scopus database, refer …


Analysis Of Recent Trends In Malware Attacks On Android Phone: A Survey Using Scopus Database, Sonali Kothari Tidke, Vijayshri Khedkar Mar 2021

Analysis Of Recent Trends In Malware Attacks On Android Phone: A Survey Using Scopus Database, Sonali Kothari Tidke, Vijayshri Khedkar

Library Philosophy and Practice (e-journal)

In past few years, smartphone use has shifted from professional access to personal need. Smartphone has now become an essential requirement to perform day to day activities. This has made smartphones unsecured and vulnerable to cyber threats and malware attacks. This study is also focused on finding intersection between malware attacks and Android OS considering Android as the most widely used mobile OS. A comprehensive search is conducted on Scopus Database for peer-reviewed articles. The study is carried out on bibliometric data of the considered articles to generate a highly useful concept map.


A Bibliometric Analysis Of Plant Disease Classification With Artificial Intelligence Based On Scopus And Wos, Shivali Amit Wagle, Harikrishnan R Feb 2021

A Bibliometric Analysis Of Plant Disease Classification With Artificial Intelligence Based On Scopus And Wos, Shivali Amit Wagle, Harikrishnan R

Library Philosophy and Practice (e-journal)

The maneuver of Artificial Intelligence (AI) techniques in the field of agriculture help in the classification of diseases. Early prediction of the disease benefits in taking relevant management steps. This is an important step towards controlling the disease growth that will yield good quality products to fulfill the global food demand. The main objective of this paper is to study the extent of research work done in this area of plant disease classification. The paper discusses the bibliometric analysis of plant disease classification with AI in Scopus and Web of Science core collection (WOS) database in analyzing the research by …


Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite Jan 2021

Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite

Library Philosophy and Practice (e-journal)

Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …


Research Trend Of Metal Matrix Composites Reinforced With Silica Extracted By Green Route: A Bibliometric Analysis, Rinku Datkhile, Meena Laad, Babaji Ghule Jan 2021

Research Trend Of Metal Matrix Composites Reinforced With Silica Extracted By Green Route: A Bibliometric Analysis, Rinku Datkhile, Meena Laad, Babaji Ghule

Library Philosophy and Practice (e-journal)

Metal Matrix Composites have acquired an important place in the engineering applications due to their distinctive characteristics such as high specific strength, lower specific gravity, improved material stiffness, better durability, enhanced creep and fatigue strength etc. Worldwide scientists are working on the improvement of mechanical properties of composite materials. The present work attempts to summarise all the research carried out on metal matrix composites reinforced with silica extracted by green route and provides up-to-date research material for researchers who are interested in the field of composites with metal matrices. Scopus databases and software such as Gephi Vos Viewer and Table2Net …


Chlorination As Drinking Water Disinfection Technique And Disinfection By Products: A Scientometric Analysis, Sapna Ramchandra Shinde, Sayali D. Apte Dr, Kanchan C. Khare Dr, Philipp Otter Mr Jan 2021

Chlorination As Drinking Water Disinfection Technique And Disinfection By Products: A Scientometric Analysis, Sapna Ramchandra Shinde, Sayali D. Apte Dr, Kanchan C. Khare Dr, Philipp Otter Mr

Library Philosophy and Practice (e-journal)

The Sustainable Development Goals (SDG) 2015, defined to achieve a better and more sustainable future, contains goal number 6 related to safe and affordable drinking water facility for all till 2030. The rural and remote areas in the developing countries predominantly face the scarcity of pathogen free drinking water leading to water borne diseases and deaths due to consumption of contaminated water indicating a need of advancement in the drinking water disinfection techniques. The paper discusses scientometric analysis of publication trends in chlorination as a popular disinfection techniques and research related to the Disinfection By Products (DBPs) that are produced …


A Bibliometric Survey On Polymer Composites In Energy Storage Applications, Babaji Ghule, Meena Laad Nov 2020

A Bibliometric Survey On Polymer Composites In Energy Storage Applications, Babaji Ghule, Meena Laad

Library Philosophy and Practice (e-journal)

Ceramic polymer composites have gained a significant place in energy storage applications for electrical capacitors due to their distinguished properties. There is a huge demand of capacitors with high energy density, high dielectric strength, negligibly low dielectric loss, light weight, chemically less reactive in energy storage applications. These requirements can be fulfilled by ceramic polymer composites only which exhibit all the above-mentioned characteristics. Considering the huge demand of such capacitors, it has attracted the attention of researchers around the world. The present work attempts to summarise all the research conducted on Polymer Composites for energy storage applications and provides an …


Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade Oct 2020

Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade

Library Philosophy and Practice (e-journal)

Authentication is an essential step for giving access to resources to authorized individuals and prevent leakage of confidential information. The traditional authentication systems like a pin, card, a password could not differentiate among the authorized users and fakers who have an illegal access to the system. Traditional authentication technique never alerts about the unwanted access to the system. The device that allows the automatic identification of an individual is known as a biometric system. It is not required to remember a password, card, and pin code in the Bio-metric system. Numerous biometric characteristics like the fingerprint, iris, palm print, face …


Bibliometric Analysis Of Passive Image Forgery Detection And Explainable Ai, Kalyani Dhananjay Kadam, Dr. Swati Ahirrao Ahirrao, Dr. Ketan Kotecha Jan 2020

Bibliometric Analysis Of Passive Image Forgery Detection And Explainable Ai, Kalyani Dhananjay Kadam, Dr. Swati Ahirrao Ahirrao, Dr. Ketan Kotecha

Library Philosophy and Practice (e-journal)

Due to the arrival of social networking services such as Facebook and Instagram, there has been a vast increase in the volume of image data generated in the last decade. The use of image processing tools like GNU Gimp, Adobe Photoshop to create doctored images and videos is a major concern. These are the main sources of fake news and are often used in malevolent ways such as for mob incitement. Before a move can be taken based on a fake image, we should confirm its realness. This paper shows systematic mappings of existing literature for image forgery detection using …