An introduction to linear programming problems with some real-life applications
Linear programming is a mathematical tool for optimizing an outcome through a
mathematical model. In recent times different mathematical models are extensively used in …
mathematical model. In recent times different mathematical models are extensively used in …
Impact of information and communication technology in the Indian education system during COVID-19
Abstract Knowledge has become power for every nation in the 21st century. Information and
communication become important sources for the transformation of any human civilization …
communication become important sources for the transformation of any human civilization …
The Nexus of War, Violence, and Rights: A History of War-Torn Afghanistan
Afghanistan is a land that is known for its war, violence, and instability. Called a rogue state,
Afghanistan has been living with violence and war as part of its reality for the last four …
Afghanistan has been living with violence and war as part of its reality for the last four …
The Detection of SQL Injection on Blockchain-Based Database
In today's world, the storage of data needs a huge amount of space. Meanwhile, cloud and
distributed environments provide sufficient storage space for the data. One of the …
distributed environments provide sufficient storage space for the data. One of the …
Policies and social work against women violence
Women violence is a widespread problem that affects millions of women and girls across the
world. The gender-based violence that threatens the well-being, dignity, and rights of …
world. The gender-based violence that threatens the well-being, dignity, and rights of …
Voice-Based Speaker Identification and Verification
In recent years, the advancement in voice-based authentication leads in the field of
numerous forensic voice authentication technology. For verification, the speech reference …
numerous forensic voice authentication technology. For verification, the speech reference …
A study on evolutionary technique to predict the sales during COVID-19
COVID-19 has affected the growth of every industry; in the meantime, an enormous amount
of demand is present in the field of telecom and automobiles. In this chapter, the authors …
of demand is present in the field of telecom and automobiles. In this chapter, the authors …
Automated Detection of SQL Injection Attack on Blockchain-Based Database
In the era of computing, where the data are stored in a cloud or distributed environment, the
privacy of data is one of the challenging tasks. The attacks like denial of service attacks …
privacy of data is one of the challenging tasks. The attacks like denial of service attacks …
A Study on Supervised Machine Learning Technique to Detect Anomalies in Networks
K Sinha - Handbook of Research on Library Response to the …, 2021 - igi-global.com
During this time, COVID-19 has affected the lifestyles of many individuals; in the meantime,
an enormous amount of users are connected with the internet. This will also increase the …
an enormous amount of users are connected with the internet. This will also increase the …
An Efficient Approach for Sending Identification Bit With the Help of Blowfish-RC6
K Patidar, DP Tiwari, P Sharma… - … of Research on …, 2023 - igi-global.com
This chapter used an efficient mechanism based on blowfish and the RC6 (BRC6) algorithm
for better security against cross-site scripting (XSS) attacks. The data types covered in this …
for better security against cross-site scripting (XSS) attacks. The data types covered in this …