The Corona virus also called SARS- CoV-2which spreads a disease called COVID-19. It has been documented that this disease has been spreading at an exponential rate and conquered 6 out of 7 continents sparing Antarctic...
详细信息
ISBN:
(纸本)9781665437899
The Corona virus also called SARS- CoV-2which spreads a disease called COVID-19. It has been documented that this disease has been spreading at an exponential rate and conquered 6 out of 7 continents sparing Antarctica. Since its outbreak it has been a close end to most industries and did not spare the consumer able industry. The pandemic creates a new door in digital transformation. Indian economy is adversely affected due the consequences of COVID-19. The traditional model of doing business has to be change as per the demand of current situations. The transformation in the context of digital is observed in all the sectors i.e., in culture, organization as well as in the work execution of an organization, in the industries as well as in the ecosystem via a smart assimilation of digital technologies, procedure and proficiency in every level and functions. The technologies are leveraged with digital transformation (also DX or DT) for creating worth for different stakeholders (customers in the broadest possible sense), create as well as obtain the potential for swiftly adjusting with the circumstances that are ever changing. Transformation done on digitalized mode is a strategy where any product or services are sold and promoted to the buyers digitally, it has removed the role of any mediator. COVID-19 is affects the whole world and it create a social distancing among the consumers, which in turns affecting a lot of businesses. A broad categories of industries and business will affect because of social distancing. In this study a perceived way out is suggested as a concept of Digital Transformation. The buying culture and the parameters might change due to social distancing. This research is conducted to see how the consumer's buying behaviour will change after the crisis of COVID-19. The consumer is transforming the traditional methods of buying goods and services by using online tools and techniques. According to the studies, the model of digital marketing has enter
A graph G is k-vertex-critical if χ(G) = k but χ(G − v) 1, H2)-free if it contains no induced subgraph isomorphic to H1 nor H2. A W4 is the graph consisting of a C4 plus an additional vertex adjacent to all the vert...
详细信息
In recent years, the issue of children's height has garnered widespread attention on social media. Social media platforms serve as pivotal communication channels for parents, doctors, educators, and researchers, w...
详细信息
ISBN:
(数字)9798350349184
ISBN:
(纸本)9798350349191
In recent years, the issue of children's height has garnered widespread attention on social media. Social media platforms serve as pivotal communication channels for parents, doctors, educators, and researchers, with children's height, a crucial health indicator, becoming one of the hot topics. Inaccurate prediction methods might mislead the public, resulting in parents harboring erroneous expectations regarding their children's future height. Such misplaced expectations may culminate in unwarranted worries or pressure. In pursuit of devising an accurate height prediction model, this paper thoroughly leverages a substantial data sample obtained from the physical health examinations of primary and secondary school students in Zhejiang Province, as well as continuous observation samples provided by the Zhejiang Provincial Bone Age Research Center, to delve deeply into the issue of height prediction in children and adolescents. In this research, we have developed a lightweight neural net-work model suitable for particle swarm optimization to predict children’s stage-wise height. When the difference between the actual and predicted values is within ±2cm, the prediction accuracy for boys reached 86.67%, and for girls, it was 85.32%, with an RMSE of 1.3503.
This investigation explores the viability of four noticeable models, specifically Pix2Pix, Neural Style Transfer (NST), Fast Neural Style Transfer (FastNST), and CycleGAN, within the space of aesthetic style exchange....
详细信息
ISBN:
(数字)9798350366846
ISBN:
(纸本)9798350366853
This investigation explores the viability of four noticeable models, specifically Pix2Pix, Neural Style Transfer (NST), Fast Neural Style Transfer (FastNST), and CycleGAN, within the space of aesthetic style exchange. The think about envelops a fastidious assessment of these models, investigating their capabilities in generating outwardly engaging and elaborately reliable pictures. Through broad tests and quantitative evaluations, Pix2Pix developed as a strong choice, accomplishing a Crest Signal-to-Noise Ratio (PSNR) of 26.78 dB, a Basic Likeness List (SSIM) of 0.832, and a Fréchet Initiation Separate (FID) of 54.21. NST, exceeding expectations in style devotion, achieved a PSNR of 29.45 dB, an SSIM of 0.905, and an FID of 72.03. FastNST, known for its real-time preparation, illustrated an adjusted execution with a PSNR of 28.12 dB, an SSIM of 0.892, and an FID of 68.54. CycleGAN, outlined for unpaired picture interpretation, accomplished a PSNR of 27.65 dB, an SSIM of 0.874, and an FID of 63.72. The results give profitable experiences into the comparative qualities and weaknesses of these models, educating their appropriateness in different artistic assignments.
In a modern computing world, transmission of the confidential information over public network is very challenge. Various solutions have been proposed to provide the confidentiality, authenticity against the unauthoriz...
详细信息
Combinatorial designs are closely related to linear codes. In recent year, there are a lot of t-designs constructed from certain linear codes. In this paper, we aim to construct 2-designs from binary three-weight code...
详细信息
In the current digital age, the volume of data generated by various cyber activities has become enormous and is constantly increasing. The data may contain valuable insights that can be harnessed to improve cyber secu...
详细信息
In the current digital age, the volume of data generated by various cyber activities has become enormous and is constantly increasing. The data may contain valuable insights that can be harnessed to improve cyber security measures. However, much of this data is unclassified and qualitative, which poses significant challenges to traditional analysis methods. In order to overcome these challenges, clustering, a crucial method in machine learning (ML) and data analysis, has become increasingly effective. Clustering facilitates the identification of hidden patterns and structures in data through grouping similar data points, which makes it simpler to identify and address threats. Clustering can be defined as a data mining (DM) approach, which uses similarity calculations for dividing a data set into several categories. Each data cluster that the clustering algorithm has identified has a high degree of similarity, and there is a fair amount of similarity between other clusters of data. Hierarchical, density-based, along with partitioning clustering algorithms are typical. The presented work use K-means algorithm, which is a popular clustering technique. Utilizing K-means algorithm, we worked with two different types of data: first, we gathered data with the use of XG-boost algorithm following completing the aggregation with K-means algorithm. Data was gathered utilizing Kali Linux environment, cicflowmeter traffic, and Putty Software tools with the use of diverse and simple attacks. The concept could assist in identifying new attack types, which are distinct from the known attacks, and labeling them based on the characteristics they will exhibit, as the dynamic nature regarding cyber threats means that new attack types often emerge, for which labeled data might not yet exist. The model counted the attacks and assigned numbers to each one of them. Secondly, We tried the same work on the ready data inside the Kaggle repository called (Intrusion Detection in Internet of Thi
Finite State Machine (FSM) is a useful and powerful tool to model a dynamic system. A traditional implementation of FSM using nested switch-case statement exists problems of poor reusability and maintainability for pr...
详细信息
Deduction is a recently introduced graph searching process in which searchers clear the vertex set of a graph with one move each, with each searcher’s movement determined by which of its neighbors are protected by ot...
详细信息
The present article is designed to study the Hamilton and Crosser model applied to the flow of ternary hybrid nanofluids over a Riga wedge, incorporating the effects of heterogeneous catalytic reactions. The complex i...
The present article is designed to study the Hamilton and Crosser model applied to the flow of ternary hybrid nanofluids over a Riga wedge, incorporating the effects of heterogeneous catalytic reactions. The complex interactions within the ternary hybrid nanofluids, comprising three distinct nanoparticles suspended in a base fluid, present significant challenges in accurately predicting flow and thermal characteristics. The Hamilton and Crosser model, known for its efficacy in determining the thermal conductivity of composite materials, is employed to analyze this intricate system. The analysis reveals the model's potential in offering a comprehensive understanding of the thermal and fluid dynamics involved, highlighting its suitability for predicting the behavior of ternary hybrid nanofluids in the presence of catalytic reactions. The governing model equations and boundary conditions are non-dimensionalized by introducing suitable similarity transformations. Thereafter, the computational Chebyshev collocation spectral technique implemented in the MATHEMATICA 11.3 software is used to calculate the numerical solution. The study reveals that the Casson parameter has a negative influence on the velocity distribution, causing it to reduce as the Casson parameter rises. This research contributes to the advancement of modeling techniques for complex fluid systems, with implications for enhanced design and optimization in various industrial and engineering applications.
暂无评论