×
Home Current Archive Editorial board
Instructions for papers
For Authors Aim & Scope Contact

Archive

More Filters

Contents

Sixth generation (6G) communication networks are anticipated to facilitate the achievement of ultra-low latency, massive device connections, intelligent automation, and high-security in the end-to-end connectivity to accommodate new applications, including autonomous systems, immersive communications, and massive infrastructures of cyber-physical u...

By A. Mummoorthy, M. Rajeswari, K.S. Krishnapriya, S. Krithika, S. Suganya, Gafur Namazov, M. Nalini

The manufacturing industry around the globe is now facing one of the most nervous upheavals in history, wherein the prediction of financial performance now ranks among the most crucial processes of production. In the case of technology-intensive companies, standard planning may not be as precise as it needs to be to cope with high capital intensity...

By Shinki Katyayani Pandey, Mariyam Ahmed

Project and operations management play an important role in enhancing efficiency in the development of large-scale technical systems. Although it is important, the strategic alignment of these fields is under-researched in the high-tech sectors where integration of engineering, procurement, and operations is critical in ensuring that they retain th...

By R. Satish, B. Selvakumar

Urban infrastructure, especially smart bridges, is growing rapidly, requiring effective solutions to ensure structural integrity. Conventional Structural Health Monitoring (SHM) systems have limitations in scalability, speed, and accuracy. This paper presents a new edge-enabled digital twin platform for real-time SHM of smart bridges, combining IoT...

By Nidhi Mishra, Aakansha Soy

Text summarization plays a crucial role in natural language processing by condensing large volumes of textual information into concise and meaningful summaries. With the rapid growth of digital content, existing summarization approaches often struggle to balance contextual understanding and semantic relevance. This paper presents a PMI-driven BERT-...

By R. Ramesh, N. Subalakshmi, S. Selvarani, K. Kavitha, M. Jeyakarthic

Purpose: The study aims to establish the connection between green entrepreneurship variables, environmental management, green technologies, green commitment of individuals, and the environmentally sustainable workforce, and the performance of internationalization of the SME in China. It further examines the mediating position of eco-...

By Wang Jing Hui, Noor Afzainiza Afendi, Muhamad Ali Imran Bin Kamarudin

Researchers have begun coupling SAP invoicing engines with blockchain smart contracts to automate document flows and provide an audit trail that cannot be tampered with. Still, a nagging obstacle is the mismatch between the timestamps SAP assigns to events and the moments when those same events are registered on a blockchain. In an effort to quanti...

By Nagendra Harish Jamithireddy

The marine ecoculture is an evolving realm that necessitates thorough scrutiny of the diverse species it comprises, along with the explicit identification of the species classes that form, to be crucial for aquaculture and the ecological conservation of fish diversity. The stratification through image classification is a well-studied area of resear...

By R.P. Selvam, R. Devi

Generative AI (GenAI), especially GPT-3.5-turbo, has transformed the e-commerce marketing process because it offers personalized learning experiences and improves the customer experience. In this paper, we discuss the use of GenAI in consumer behavior analysis and the development of customized marketing strategies. It has been observ...

By Bsmah Alsulami, Budoor Alwated, Khadijah Barashid, Manal Abdullah, Monerah AlOsaimi, Samah Alhusayni

Cyberbullying are becoming more susceptible to online social networks because of the large-scale usergenerated content. The current methods of detection are primarily post-event methods and lack built-in prevention strategies, thereby limiting their ability to ensure the protection of user privacy and platform security. In this paper, a H...

By N. Sheba Pari, K. Senthil Kumar