Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Social and Behavioral Sciences

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof. Nov 2020

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof.

Library Philosophy and Practice (e-journal)

Wireless Sensor Network is a network of wireless sensor nodes that are capable of sensing information from their surroundings and transmit the sensed information to data collection point known as a base station. Applications of wireless sensor networks are large in number and forest fire detection, landslide monitoring, etc. are few applications to note. The research challenges in wireless sensor networks is the transmission of data from the sensor node to the base station in an energy-efficient manner and network life prolongation. Cluster-based routing techniques are extensively adopted to address this research challenge. Researchers have used different metaheuristic and soft …


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman Aug 2020

A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman

Library Philosophy and Practice (e-journal)

Data mining is characterized as searching for useful information through very large data sets. Some of the key and most common techniques for data mining are association rules, classification, clustering, prediction, and sequential models. For a wide range of applications, data mining techniques are used. Data mining plays a significant role in disease detection in the health care industry. The patient should be needed to detect a number of tests for the disease. However, the number of tests should be reduced by using data mining techniques. In time and performance, this reduced test plays an important role. Heart disease is …


Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa Feb 2020

Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa

Library Philosophy and Practice (e-journal)

In Cryptography, Block Cipher is an algorithm used to encode the data which is used to transfer over internet. Cryptanalyst tries to break secret code by using different methods like Brute Force attack, Linear Cryptanalysis and differential cryptanalysis etc. The basic aim of this bibliometric survey is to understand the extent of the available literature for the area of cryptanalysis of block ciphers towards cyber security. The bibliometric analysis is primarily based on Scopus as it provides research database for various areas and tools like Sciencescape, Gephi etc. It is analyzed by bibliometric survey that major publications are from conference, …


Implementation Of Uhf-Rfid Technology In An Academic Library Of Pakistan; A Case Study, Attya Shahid Ms, Naveed Sehar Jan 2020

Implementation Of Uhf-Rfid Technology In An Academic Library Of Pakistan; A Case Study, Attya Shahid Ms, Naveed Sehar

Library Philosophy and Practice (e-journal)

There are numerous libraries in Pakistan that cannot afford RFID technology because of the limited budget and resources and confronted book theft, low security, and delay services. This paper base an experiment that how libraries can adopt this technology effectively and productively with a lower budget and higher outcomes. The FAST-National University of Computer and Emerging Sciences Library Karachi campuses is the principal library in Pakistan which has adopted UHF-RFID technology with the integration of ILS insignia; SIP II compliance that jointly works with library integrated system and numerous activities can be made through this. An exploratory study conducted in …