Proceeding International Conference on Science and Engineering最新文献

筛选
英文 中文
Impact of Cloud-Based HR Systems on Business Performance Metrics 基于云的人力资源系统对企业绩效指标的影响
Proceeding International Conference on Science and Engineering Pub Date : 2023-06-12 DOI: 10.52783/cienceng.v11i1.379
Jayashree Rajendran
{"title":"Impact of Cloud-Based HR Systems on Business Performance Metrics","authors":"Jayashree Rajendran","doi":"10.52783/cienceng.v11i1.379","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.379","url":null,"abstract":"Human resource (HR) systems and cloud computing technologies have both become integral to modern businesses, and their fusion can have significant impacts on business metrics. \u0000The goal of this paper is to systematically study the impact of implementing cloud infrastructure on the Human Resource systems of an organization, leveraging which, an organization attains sustainable growth and thus helps the country in achieving its economic goals.  \u0000The study examines the impact of cloud-based HR systems on key business metrics such as employee productivity, turnover, and profitability. The paper also provides insights into the different phases of implementation, challenges, and benefits of implementing cloud-based HR systems apart from the conceptual framework of the study and offers recommendations for organizations considering adopting such systems. \u0000And further research can be done on risk issues associated with adopting cloud computing like data privacy (due to data breaches), Compliance issues.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115747358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Lead Iodide-Polyvinyl Alcohol Polymer Composites as an X-ray Shielding Material 碘化铅-聚乙烯醇聚合物复合材料x射线屏蔽材料的研究
Proceeding International Conference on Science and Engineering Pub Date : 2023-06-12 DOI: 10.52783/cienceng.v11i1.383
Priti Rana, Sunil Chaudhary, Kulvinder Singh
{"title":"Study on Lead Iodide-Polyvinyl Alcohol Polymer Composites as an X-ray Shielding Material","authors":"Priti Rana, Sunil Chaudhary, Kulvinder Singh","doi":"10.52783/cienceng.v11i1.383","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.383","url":null,"abstract":"Now-a-days, the importance of x-rays is increasing in fields like medical diagnosis, cancer treatment, nuclear fission energy, x-ray scanning machines for airport and railway station entry and in treatment of food for preservation. But the exposure to x-rays will be harmful for the users of such facilities. Doctors, operators and researchers are required to be protected from the high energy ionizing radiations like x-rays and gamma rays.So to protect them, proper shielding is necessary. Numbers of shielding materials are used at workplaces of high radiation regions at nuclear installations.  Most commonly used, shielding material is lead glasses due to its high atomic number (Z=82). This insures high absorption by the shielding material. Recently light polymer sheets of polyvinyl alcohol (PVA) are replacing heavy glass sheets. To prepare lead polymer sheets lead compounds are mixed with polymer. In the present work, we selected to mix lead iodide in polymer composite to analyze its X-ray shielding capability. Polymer composites sheets of lead iodide with PVA were prepared by solution method. These sheets of Polymer composites were subjected to soft x-rays (30 KeV- 60KeV) switching studies at room temperature. These sheets found to provide the x-ray absorption69.6% higher than conventional shielding material like lead and are light in weight too.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122138450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
X-Ray Sensing by Mercury Iodide Poly-Vinyl Alcohol Composite 碘化汞-聚乙烯醇复合材料的x射线传感
Proceeding International Conference on Science and Engineering Pub Date : 2023-06-12 DOI: 10.52783/cienceng.v11i1.382
Sweta Chauhan, Praveen Bhatt, Kulvinder Singh
{"title":"X-Ray Sensing by Mercury Iodide Poly-Vinyl Alcohol Composite","authors":"Sweta Chauhan, Praveen Bhatt, Kulvinder Singh","doi":"10.52783/cienceng.v11i1.382","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.382","url":null,"abstract":"Technology has modified nearly every aspect of modern life and digital devices have made an important place in every field. In medical field also the digital X-ray applications have contributed a lot. The most important component of digital imaging system is X-Ray sensor. Solid state sensor materials are used as X-ray sensors, like lead iodide, Zinc Sulphide, Titanium dioxide and Mercuric idodide, etc. Mercury Iodide has some favourable properties which make it most suitable material for X-Ray sensor. In present study, polymer composites of Mercury Iodide were prepared using polyvinyl Alcohol (PVA) at room temperature. Studies revealed that Mercury Iodide - PVA sheets show a stable detection of X-rays for all concentrations and the value of (Imax-Imin) increases with increase in the concentration of Mercury iodide to 32 %, and after concentration of 61 % value of (Imax-Imin) starts decreasing. An optimized range of concentration is worked out (32 % to 61%) at which the maximum value of photocurrent is obtained. X-ray switching studies conducted on these sheets show low rise and fall time making the material good for imaging applications. For the concentration of 32.2 % concentration rise time was recorded as 0.99 for a pulse of 2s and more.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130601151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Motivational Theories and Their Relevance in Military Motivation 动机理论及其在军事动机中的意义
Proceeding International Conference on Science and Engineering Pub Date : 2023-06-12 DOI: 10.52783/cienceng.v11i1.381
C. Sekhar, Dr. Suja S Nair
{"title":"Motivational Theories and Their Relevance in Military Motivation","authors":"C. Sekhar, Dr. Suja S Nair","doi":"10.52783/cienceng.v11i1.381","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.381","url":null,"abstract":"Motivation is an important aspect that determines human behaviour and various studies have been carried out to establish the determinants of human behaviour and its motivational aspects. Military profession offers a different set of working conditions where the magnitude of challenges is well above those found in commercial and other business organisations. The aspects of motivation are peculiar to the military profession and Military motivation is in a league of its own. Militaries across the world face physical and psychological challenges at work that most other people don't. Being armed with the right set of motivational techniques is critical for rising to the demands of such challenges and ensuring the best performance from the soldiers. \u0000This study aims to review the different motivational theories and determine their  relevance  in the context of military motivation. Four of the primary motivation theories in practice today have been reviewed for this purpose. These motivational theories include Maslow’s Hierarchy of Needs Theory, Herzberg’s Motivation-Maintenance Theory, McClelland’s Theory of Need Motivation and McGregor’s Theory X/ Theory Y. These theories show how employees can be motivated to achieve tasks set upon them in the workplace. \u0000The relevance of these theories to Military motivation is analysed. Given the peculiarities of the working conditions of the military and the challenges faced therein, these motivational theories can be suitably adapted to modify the functional  aspects of military and institute suitable changes in the leadership styles and working mechanisms to improve motivation and enhance task achievement. It has been found that all these motivational theories are still relevant in military environment and can be factored in effectively in the Armed forces.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129130177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of Gesture Recognition for Differently Abled Persons 手势识别在残疾人中的应用
Proceeding International Conference on Science and Engineering Pub Date : 2023-06-12 DOI: 10.52783/cienceng.v11i1.371
Shaik Mohammad Rasool, Shifa Fathima, Mohammed Saqlain, Sadiq Hussain
{"title":"Use of Gesture Recognition for Differently Abled Persons","authors":"Shaik Mohammad Rasool, Shifa Fathima, Mohammed Saqlain, Sadiq Hussain","doi":"10.52783/cienceng.v11i1.371","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.371","url":null,"abstract":"There are nine billion dumb people in the world. The communication between dumb people and normal people is always a challenging task. One of the key technologies to afford reality is usual interaction between human and objects or living-things in the implicit world created in a computer. Disabled persons are an important part of our society. With the advent of science and technology, efforts are being made to develop certain systems that make them feel and act normally. Especially hearing impaired people interact through hand gestures or signs. It is difficult to find a well experienced translator for the sign language conversion every time and everywhere.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Virtual Assistance Strategy for Students Using Blockchain and Artificial Intelligence Framework 基于区块链和人工智能框架的学生虚拟辅助策略开发
Proceeding International Conference on Science and Engineering Pub Date : 2023-06-01 DOI: 10.52783/cienceng.v11i1.386
Nitesh Kumar
{"title":"Development of Virtual Assistance Strategy for Students Using Blockchain and Artificial Intelligence Framework","authors":"Nitesh Kumar","doi":"10.52783/cienceng.v11i1.386","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.386","url":null,"abstract":"The education sector is important and continuously upgrades in all aspects. Some essential needs are learning materials, teacher involvement, and student potential to use the resources for better knowledge gain. In a post-pandemic scenario, looking back at pandemic situations, educational reformation took place quickly. Virtual training, virtual laboratories, and online educational facilities must provide flexible training to students, working professionals, and corporate certifications to stay current in this technological era. Hence, this paper presents the virtual assistance strategy using artificial intelligence and blockchain to schedule various tasks at the convenience of the learner and instructor. The paper also uses quantitative analysis to present the post-research feasibility analysis for the proposed system.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133511253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preservation Techniques for Secure Data Broadcasting using in Distributed Environments 分布式环境下安全数据广播的隐私保护技术
Proceeding International Conference on Science and Engineering Pub Date : 2023-06-01 DOI: 10.52783/cienceng.v11i1.365
Rohit Ravindra Nikam, Rekha Shahapurkar
{"title":"Privacy Preservation Techniques for Secure Data Broadcasting using in Distributed Environments","authors":"Rohit Ravindra Nikam, Rekha Shahapurkar","doi":"10.52783/cienceng.v11i1.365","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.365","url":null,"abstract":"This Data security and privacy are essential things nowadays due to a large amount of sensitive data broadcasting on social media websites. Most of Internet of Things (IoT) and health care applications having quite challenges to achieve privacy preservation when number of distributed resources has involved during the data broadcasting. In this paper, we proposed a distributed data analysis and privacy preservation framework. In this paper, we introduced numerous privacy preservation techniques during data distribution to achieve high privacy. Some traditional methods, data anonymization, generalization, random permutation, specialization, top-down and bottom-up data generalization, fingerprint insertion etc., are also evaluated on extensive data when distributing with multi parties: the proposed one-way hashing privacy, XOR operation for generating multiple secure copies. First, we develop a few dynamic policies for each copy using XOR operation and insert fingerprints in individual documents. The collaboration of XOR operation and custom policies archives higher security from internal as well as external attacks. On the other hand, the data recovery approach has been designed to extract a fingerprint from secure copies. In the extensive experimental analysis, we evaluate proposed results with numerous existing systems and show the effectiveness of proposed modules in a distributed environment.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124960775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of enhanced hybrid encryption algorithm with single encryption algorithm 增强混合加密算法与单一加密算法的比较分析
Proceeding International Conference on Science and Engineering Pub Date : 2023-06-01 DOI: 10.52783/cienceng.v11i1.364
Renuka S. Durge, V. Deshmukh
{"title":"Comparative analysis of enhanced hybrid encryption algorithm with single encryption algorithm","authors":"Renuka S. Durge, V. Deshmukh","doi":"10.52783/cienceng.v11i1.364","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.364","url":null,"abstract":"To accomplish end users data security, it appears that the methods currently used to ensure data security, privacy, integrity, and availability to cloud users are insufficient. An encryption method will be required to guarantee the private preservation of users data while it is in transit or persistent state. The security of cloud data is ensured by a hybrid encryption algorithm that includes the use of the symmetric Advanced Encryption Standard (AES) and an asymmetric RSA algorithm ,combining an asymmetric algorithm (public-key cryptography, or PKC) with a symmetric algorithm (also called private key cryptography), which employs a single key for encryption and decryption, to increase the security of cloud data. Hybird encryption has significant benefits over single encryption in terms of security, speed and computation time. By first encrypting data with AES and then encrypting the AES key with RSA while in the cloud, the suggested method offers a hybrid encryption scheme that improves the security of cloud data. This paper examines various forms of cryptographic encryption and also offers a enchanced hybrid encryption technique for online applications.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"46 25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116355959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Various Feature Extraction and Selection Techniques for Lexicon Based and Machine learning Sentiment Classification 基于词典和机器学习情感分类的各种特征提取和选择技术
Proceeding International Conference on Science and Engineering Pub Date : 2023-06-01 DOI: 10.52783/cienceng.v11i1.361
Shital A. Patil, Krishnakant P. Adhiya, Girishkumar K. Patnaik
{"title":"Various Feature Extraction and Selection Techniques for Lexicon Based and Machine learning Sentiment Classification","authors":"Shital A. Patil, Krishnakant P. Adhiya, Girishkumar K. Patnaik","doi":"10.52783/cienceng.v11i1.361","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.361","url":null,"abstract":"Introduction: Natural Language Processing (NLP) is a kind of software that gives computers the ability to comprehend human languages. Words are often used as the fundamental unit for grammatical and semantic analysis on a deeper level, and the major objective of most natural language processing (NLP) projects is word segmentation \u0000Objectives: Proposed System uses the feature extraction method for generating the hybrid feature to get good accuracy for classification in order to solve the practical problem of huge structural differences between different data modalities in a multi-modal environment, where traditional machine learning methods cannot be directly applied to solve the problem. \u0000Methods: In order to do so, this paper introduces the method for generating the hybrid feature. In this System, we utilise a various feature extraction and selection technique from large text. The data has collected from students’ feedback and these feature extraction techniques has applied \u0000Results: Each technique provides different feature extraction while NLP based dependency features provides homogeneous feature set with relationship. \u0000Conclusions: In extensive experimental analysis NLP based features obtains higher precision over the other feature extraction techniques in classification.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132768274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Re-Thinking Society and Culture in the Era of Globalization - A Study of Selected Writings of Mahasweta Devi and Arundhati Roy 全球化时代对社会与文化的再思考——马哈韦塔·德维、阿兰达蒂·罗伊著作选集研究
Proceeding International Conference on Science and Engineering Pub Date : 2023-06-01 DOI: 10.52783/cienceng.v11i1.387
K Jayaramudu
{"title":"Re-Thinking Society and Culture in the Era of Globalization - A Study of Selected Writings of Mahasweta Devi and Arundhati Roy","authors":"K Jayaramudu","doi":"10.52783/cienceng.v11i1.387","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.387","url":null,"abstract":"This paper presents the writers consciousness of the society in the Era of Globalization specially how the writers try to show India in their works such as Mother of 1084, Bayen, Aajir, Statue were written by Mahasweta Devi and The God of Small Thingswas written by Arundhati Roy these two writers generally trigger the society’s pathethatic situation of the human condition such as in the form of Naxalism, women subjugation, oppression, outcast and patriarchal society, caste, class and gender in which especially how the women characters are shown not only women but also other souls in the novels through them we can easily understand the writers unconsciousness towards the culture of India. Here we can see how the women characters are killed or weaken in their works particularly apolitical mothers of children are made voiceless at the end of the novels (mother of 1084,Bayen,Statue and The God of small things) though they are Women writers and also radical in thinking they cannot escape from the Culture psychologically.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信