A Proficient and secure way of Transmission using Cryptography and Steganography

GD Reddy, YVU Kiran, P Singh… - 2022 2nd …, 2022 - ieeexplore.ieee.org
People are concerned about the security of their data over the internet. The data can be
protected in many ways to keep unauthorized individuals from accessing it. To secure data …

Customer-Churn Prediction Using Machine Learning

V Agarwal, S Taware, SA Yadav… - 2022 2nd …, 2022 - ieeexplore.ieee.org
The gradual but consistent decrease in the number of customers retained over time is
referred to as “customer churn,” and it is a word that is frequently used in the business and …

Recent Management Trends Involved With the Internet of Things in Indian Automotive Components Manufacturing Industries

FA Syed, N Bargavi, A Sharma, A Mishra… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The development of smart manufacturing systems is being driven by a variety of diverse
needs for the dependability of equipment and the prediction of quality. In order to …

Factors affecting port users' behavioral intentions to adopt financial technology (fintech) in ports in sub-saharan africa: A case of ports in Ghana

A Antwi-Boampong, DK Boison, MO Doumbia… - FinTech, 2022 - mdpi.com
The study evaluated factors influencing port users' intentions to participate in Financial
Technology (Fintech) in the ports of Ghana. The study used non-experimental quantitative …

Digital transformation strategies enabled by internet of things and big data analytics: The use-case of telecommunication companies in Greece

I Moumtzidis, M Kamariotou, F Kitsios - Information, 2022 - mdpi.com
Both Internet of Things (IoT) and Big Data Analytics (BDA) are innovations that already
caused a significant disruption having a major impact on organizations. To reduce the …

A review on 5G network system with its limitation and different approaches to build strong 5G network system

V Chauhan - 2022 3rd International Conference on Intelligent …, 2022 - ieeexplore.ieee.org
Due to the large demands of the high throughput of network and large size network capacity,
that brings the need of 5G Network in the world to improve Quality of Services. As time-to …

Security in manufacturing systems in the age of industry 4.0: Pitfalls and possibilities

R Gupta, RK Phanden, S Sharma, P Srivastava… - Advances in Industrial …, 2021 - Springer
The manufacturing industry is swiftly entering Industry 4.0, wherein the supply chains,
operations, factories and customers are becoming digitally interconnected. This …

Artificial Intelligence Based E-Commerce Information Management Model

R Gatla, A Bansal, SN Bansod, I Muda… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
Despite growing enthusiasm, it is still difficult to successfully implement AI in corporate
settings. The results of recent polls indicate that as many as 90% of AI projects fail to meet …

Factors Influencing Employees' Intention to Participate in a Bring Your Own Device Program in the Workplace: A Correlational Study in Ghana

A Blay - 2022 - search.proquest.com
The study investigated factors influencing employees' intention to participate in a Bring-Your-
Own-Device (BYOD) program in Ghana. BYOD programs are organizational strategies that …

Temporal Data Mining: Uncovering Patterns in Time-Series Data Streams with Machine Learning

A Harika, K Aravinda, A Nagpal… - 2023 10th IEEE Uttar …, 2023 - ieeexplore.ieee.org
Temporal data mining is an advanced analytical field that focuses on the extraction of
interpretable patterns, correlations, and trends over time within data streams. This paper …