Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Social and Behavioral Sciences

A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl Dec 2020

A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl

Library Philosophy and Practice (e-journal)

Due to a pandemic situation arising from the past few decades and the covid -19 patients are increasing at the rapid rate. Looking in the near future an IOT model is build which can be useful for people in coming years and allows rapid testing and efficient testing methodologies using various sensors such as Temperature, Respiration, RFID etc which takes various parameters. The study focuses around 412 scientific documents such as Journals, articles, book chapters and Patents in various papers. These documents are extracted from the scopus databases after querying with the keywords related to covid patients and IOT. The …


Bibliometric Analysis Of The Literature In The Field Of Information Technology Relatedness, Ilham M, Anis Eliyana, Praptini Yulianti Dec 2020

Bibliometric Analysis Of The Literature In The Field Of Information Technology Relatedness, Ilham M, Anis Eliyana, Praptini Yulianti

Library Philosophy and Practice (e-journal)

This bibliometric describe Information Technology Relateness is defined as the use of information technology infrastructure and information technology management processes betweeWas this submission previously published in a journal? Bepress will automatically create an OpenURL for published articles. Learn more about OpenURLsn business units together. There is not much research on Information Technology Relateness by providing a big picture that is visualized from year to year. This study aims to map research in the field of Information Technology Relateness with data from all international research publications. This study performs a bibliometric method and analyzes research data using the Services Analyze …


Software Development With Scrum: A Bibliometric Analysis And Profile, Peter Kokol, Sašo Zagoranski, Marko Kokol Dec 2020

Software Development With Scrum: A Bibliometric Analysis And Profile, Peter Kokol, Sašo Zagoranski, Marko Kokol

Library Philosophy and Practice (e-journal)

Introduction of the Scrum approach into software engineering has changed the way software is being developed. The Scrum approach emphasizes the active end-user involvement, embracing of change, and /iterative delivery of products. Our study showed that Scrum has different variants or is used in combination with different methods. Some tools not normally used in the conventional software approaches, like gamification, content analysis and grounded theory are also employed. However, Scrum like other software development approach focuses on improvement of software process, software quality, business value, performance, usability and efficiency and at the same time to reduce cost, risk and uncertainty. …


Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof. Nov 2020

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof.

Library Philosophy and Practice (e-journal)

Wireless Sensor Network is a network of wireless sensor nodes that are capable of sensing information from their surroundings and transmit the sensed information to data collection point known as a base station. Applications of wireless sensor networks are large in number and forest fire detection, landslide monitoring, etc. are few applications to note. The research challenges in wireless sensor networks is the transmission of data from the sensor node to the base station in an energy-efficient manner and network life prolongation. Cluster-based routing techniques are extensively adopted to address this research challenge. Researchers have used different metaheuristic and soft …


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


A Bibliometric Survey Of Fashion Analysis Using Artificial Intelligence, Seema Wazarkar, Shruti Patil, Satish Kumar Nov 2020

A Bibliometric Survey Of Fashion Analysis Using Artificial Intelligence, Seema Wazarkar, Shruti Patil, Satish Kumar

Library Philosophy and Practice (e-journal)

In the 21st century, clothing fashion has become an inevitable part of every individual human as it is considered a way to express their personality to the outside world. Currently the traditional fashion business models are experiencing a paradigm shift from being an experience-based business strategy implementation to a data driven intelligent business improvisation. Artificial Intelligence is acting as a catalyst to achieve the infusion of data intelligence into the fashion industry which aims at fostering all the business brackets such as supply chain management, trend analysis, fashion recommendation, sales forecasting, digitized shopping experience etc. The field of “Fashion …


Content Modelling For Unbiased Information Analysis, Milind Gayakwad, Suhas Patil Dr Oct 2020

Content Modelling For Unbiased Information Analysis, Milind Gayakwad, Suhas Patil Dr

Library Philosophy and Practice (e-journal)

Content is the form through which the information is conveyed as per the requirement of user. A volume of content is huge and expected to grow exponentially hence classification of useful data and not useful data is a very tedious task. Interface between content and user is Search engine. Therefore, the contents are designed considering search engine's perspective. Content designed by the organization, utilizes user’s data for promoting their products and services. This is done mostly using inorganic ways utilized to influence the quality measures of a content, this may mislead the information. There is no correct mechanism available to …


Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade Oct 2020

Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade

Library Philosophy and Practice (e-journal)

Authentication is an essential step for giving access to resources to authorized individuals and prevent leakage of confidential information. The traditional authentication systems like a pin, card, a password could not differentiate among the authorized users and fakers who have an illegal access to the system. Traditional authentication technique never alerts about the unwanted access to the system. The device that allows the automatic identification of an individual is known as a biometric system. It is not required to remember a password, card, and pin code in the Bio-metric system. Numerous biometric characteristics like the fingerprint, iris, palm print, face …


A Bibliometric Analysis Of Face Anti Spoofing, Swapnil Ramesh Shinde, Shraddha Phansalkar, Sudeep D. Thepade Oct 2020

A Bibliometric Analysis Of Face Anti Spoofing, Swapnil Ramesh Shinde, Shraddha Phansalkar, Sudeep D. Thepade

Library Philosophy and Practice (e-journal)

Face Recognition Systems are used widely in all areas as a medium of authentication, the ease of implementation and accuracy provides it with a broader scope. The face recognition systems are vulnerable to some extent and are attacked by performing different types of attacks using a variety of techniques. The term used to describe the measures taken to prevent these types of attacks is known as face anti spoofing. Research has been carried on since decades to design systems that are robust against these attacks. The focus of the work in this paper is to explore the area of face …


A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha Oct 2020

A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

The Internet has become an essential part of modern communication. People are sharing ideas, thoughts, and beliefs easily, using social media. This sharing of ideas has raised a big problem like the spread of the radicalized extremist ideas. The various extremist organizations use the social media as a propaganda tool. The extremist organizations actively radicalize and recruit youths by sharing inciting material on social media. Extremist organizations use social media to influence people to carry out lone-wolf attacks. Social media platforms employ various strategies to identify and remove the extremist content. But due to the sheer amount of data and …


The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman Oct 2020

The Influence Of Information Technology Governance Audit Using Cobit 5 For The Development Public Library : (Case Study : Public Library In East Java ), Ilham M, Anis Eliyana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study current technological developments have entered almost into the lines of people's lives. Currently, many public library have grown even bigger. And this development does not escape the good management of information technology governance. To maximize management to a better level, public library need information technology governance audits. The information technology audit used in this study uses the COBIT 5 framework which focuses on the APO04 and DSS01 domains. This study aims to improve the quality of services owned and to increase its competitiveness. The results of this study refer to the vision and mission of the public library …


Analysis Effect Of Audit Information Technology : Green Technology, Smart System And Innovation Behavior Working For Improving Business Services University In Indonesia, Merlin Apriliyanti, Ilham M, Tanti Handriana, Indrianawati Usman Oct 2020

Analysis Effect Of Audit Information Technology : Green Technology, Smart System And Innovation Behavior Working For Improving Business Services University In Indonesia, Merlin Apriliyanti, Ilham M, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study was conducted to determine the effectiveness and efficiency of the use of technology and integrated information systems and recommend the development of new systems at PTKIN (UIN Sunan Ampel Surabaya and UIN Maulana Malik Ibrahim Malang). The study of information technology management in tertiary institutions aims to measure the extent to which the application of information technology is able to support the activities of the Tri Dharma College in order to achieve world class universities. In measuring the results of the audit of information technology management the tertiary institution will conduct evaluation, monitoring and further development of information …


A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman Aug 2020

A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman

Library Philosophy and Practice (e-journal)

Data mining is characterized as searching for useful information through very large data sets. Some of the key and most common techniques for data mining are association rules, classification, clustering, prediction, and sequential models. For a wide range of applications, data mining techniques are used. Data mining plays a significant role in disease detection in the health care industry. The patient should be needed to detect a number of tests for the disease. However, the number of tests should be reduced by using data mining techniques. In time and performance, this reduced test plays an important role. Heart disease is …


The Role Of Information And Communication Technology (Ict) In Securing Books In Irish Academic Libraries., Emmanuel Oguche Aug 2020

The Role Of Information And Communication Technology (Ict) In Securing Books In Irish Academic Libraries., Emmanuel Oguche

Library Philosophy and Practice (e-journal)

This study examined how effective the ICT gadgets are used in securing books in academic libraries and what technological approach the libraries will adopt in the future to ensure books are secured from mutilation and theft. The study was also to understand why students steal or mutilate books. A semi-structured interview was the qualitative research design used to collect data from six librarians. It was discovered that the libraries had adopted the use of ICT security gadgets like Radio-Frequency Identification (RFID) technology, surveillance cameras, self-service machine, magnetic strips. The combined use of these gadgets led to the drastic reduction of …


Bibliometric Survey On Impact Of Sound Therapy On Blood Pressure And Covid-19., Vaishali Rajput, Preeti Mulay Apr 2020

Bibliometric Survey On Impact Of Sound Therapy On Blood Pressure And Covid-19., Vaishali Rajput, Preeti Mulay

Library Philosophy and Practice (e-journal)

The current situation of spread of Corona Virus is really worth to worry and critical. As we are moving from stage 2 to stage 3, it is really our duty and right to prevent its spread effectually, as its threat to life of every individual. As per the expert opinion from Health Organizations, the elder people are most at risk of Corona infection. But if the people with high blood pressure or high cholesterol fail to take their prescribed medication, then they are also prone to various infections, due to low immunity levels. Along with regular medication, Sound Therapy is …


Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa Feb 2020

Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa

Library Philosophy and Practice (e-journal)

In Cryptography, Block Cipher is an algorithm used to encode the data which is used to transfer over internet. Cryptanalyst tries to break secret code by using different methods like Brute Force attack, Linear Cryptanalysis and differential cryptanalysis etc. The basic aim of this bibliometric survey is to understand the extent of the available literature for the area of cryptanalysis of block ciphers towards cyber security. The bibliometric analysis is primarily based on Scopus as it provides research database for various areas and tools like Sciencescape, Gephi etc. It is analyzed by bibliometric survey that major publications are from conference, …


A Bibliometric Survey On The Diagnosis Of Plant Leaf Diseases Using Artificial Intelligence, Rutuja Rajendra Patil, Sumit Kumar Dr Feb 2020

A Bibliometric Survey On The Diagnosis Of Plant Leaf Diseases Using Artificial Intelligence, Rutuja Rajendra Patil, Sumit Kumar Dr

Library Philosophy and Practice (e-journal)

Due to uncertain environmental conditions such as untimely rainfall, hailstorms, draught, fog the agriculture sector faces huge loss in crop yield. One of the biggest reason is plant leaf diseases. Therefore the need arises to diagnose the plant leaf diseases beforehand so that the diseases could be avoided and crop yield loss could be minimized. The paper represents the bibliometric study of plant leaf disease diagnosis using Artificial Intelligence. The study focuses on 472 scientific documents such as journals, articles, book chapters publicized in various journals. These documents are extracted from Scopus database after querying it with keywords related to …


Code Smells: A Synthetic Narrative Review, Peter Kokol Prof, Marko Kokol, Sašo Zagoranski Jan 2020

Code Smells: A Synthetic Narrative Review, Peter Kokol Prof, Marko Kokol, Sašo Zagoranski

Library Philosophy and Practice (e-journal)

Code smells are symptoms of poor design and implementation choices, which might hinder comprehension, increase code complexity and fault-proneness and decrease maintainability of software systems. The aim of our study was to perform a triangulation of bibliometric and thematic analysis on code smell literature production. The search was performed on Scopus (Elsevier, Netherlands) database using the search string “code smells” which resulted in 442 publications. The Go-to statement was the first bad code smells identified in software engineering history in 1968. The literature production trend has been positive. The most productive countries were the United States, Italy and Brazil. Eight …


Bibliometric Analysis Of Passive Image Forgery Detection And Explainable Ai, Kalyani Dhananjay Kadam, Dr. Swati Ahirrao Ahirrao, Dr. Ketan Kotecha Jan 2020

Bibliometric Analysis Of Passive Image Forgery Detection And Explainable Ai, Kalyani Dhananjay Kadam, Dr. Swati Ahirrao Ahirrao, Dr. Ketan Kotecha

Library Philosophy and Practice (e-journal)

Due to the arrival of social networking services such as Facebook and Instagram, there has been a vast increase in the volume of image data generated in the last decade. The use of image processing tools like GNU Gimp, Adobe Photoshop to create doctored images and videos is a major concern. These are the main sources of fake news and are often used in malevolent ways such as for mob incitement. Before a move can be taken based on a fake image, we should confirm its realness. This paper shows systematic mappings of existing literature for image forgery detection using …


Implementation Of Uhf-Rfid Technology In An Academic Library Of Pakistan; A Case Study, Attya Shahid Ms, Naveed Sehar Jan 2020

Implementation Of Uhf-Rfid Technology In An Academic Library Of Pakistan; A Case Study, Attya Shahid Ms, Naveed Sehar

Library Philosophy and Practice (e-journal)

There are numerous libraries in Pakistan that cannot afford RFID technology because of the limited budget and resources and confronted book theft, low security, and delay services. This paper base an experiment that how libraries can adopt this technology effectively and productively with a lower budget and higher outcomes. The FAST-National University of Computer and Emerging Sciences Library Karachi campuses is the principal library in Pakistan which has adopted UHF-RFID technology with the integration of ILS insignia; SIP II compliance that jointly works with library integrated system and numerous activities can be made through this. An exploratory study conducted in …


Bibliometric Analysis Of Bearing Fault Detection Using Artificial Intelligence, Pooja Kamat, Rekha Sugandhi Dr. Jan 2020

Bibliometric Analysis Of Bearing Fault Detection Using Artificial Intelligence, Pooja Kamat, Rekha Sugandhi Dr.

Library Philosophy and Practice (e-journal)

The new industrial revolution called Industry 4.0 is proliferating at its peak. The time is no longer away when the human race is going to witness a huge paradigm shift. Intelligent machines empowered by Artificial Intelligence (AI)will take over the presence of human workers in the industrial manufacturing sector with the target of achieving 100% automation. With the emergence of cut-throat price competition in the product market, it has become equally important to manufacture goods at minimal costs and with the highest quality. Predicting the decrease in machinery efficiency at an earlier stage to accomplish this objective helps to reduce …