{"title":"Composites and Its Applications: A Review","authors":"Surbhi Bhati, Shruti Panwar, S. Loonker","doi":"10.2139/ssrn.3904471","DOIUrl":"https://doi.org/10.2139/ssrn.3904471","url":null,"abstract":"The major advantages of composites are its relative stiffness, strength properties and its light weight. The key concepts of composites include its physical properties, material properties, tooling, design and repair. The use of composite materials has led to cost reduction, an increase in efficiency, and better utilization of available sources. Composite materials have been manufactured using different molding methods in different sectors. Composite materials have wide applications in the aerospace industry, automobile sector, manufacturing industries etc. This study illustrates the need of composite materials over common materials.","PeriodicalId":376550,"journal":{"name":"Computer Science Negative Results eJournal","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117241027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Impact of Social Media on Consumer’S Towards Hedonic Shopping (With Special Reference to Virudhunagar District)","authors":"J. Mahamayi, S. Hemalatha","doi":"10.2139/ssrn.3904218","DOIUrl":"https://doi.org/10.2139/ssrn.3904218","url":null,"abstract":"Today, factors as internet and social media lead to changes in the way of life of individuals. Due to these factors, consumption has begun to be interpreted in different forms. Hedonic consumption that comes from consumption by gaining the emotional satisfaction from shopping has gained importance rather than physical necessity. Social media is another factor that influences the emotional satisfaction of individuals and their consumption behavior. This paper is an attempt to analyse the impact of social media on consumer towards hedonic shopping. Chunk sampling technique is used to collect data. Both primary and secondary data were used. 150 samples were collected through a structured questionnaire. Data were analysed through statistical tools like percentage, Descriptive statistics, Garrett ranking score.","PeriodicalId":376550,"journal":{"name":"Computer Science Negative Results eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130632462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method of Trust Management in Wireless Sensor Networks","authors":"J. Górski, Alan Turower","doi":"10.5121/IJSPTM.2018.7401","DOIUrl":"https://doi.org/10.5121/IJSPTM.2018.7401","url":null,"abstract":"The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks target ingthe trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated. The method is specified by giving its class model in UML and by explaining the related attributes and methods. Different attacks against the network and against WCT2M deployed in the network are considered. The experimental evaluation of WCT2M involves laboratory experiments and simulations using a dedicated simulator. The evaluation focuses on efficiency of detecting and isolating the malicious nodes that implement different attack scenarios in the network and on the method’s sensitivity to the changes in effectiveness of the security mechanisms deployed in the network nodes.","PeriodicalId":376550,"journal":{"name":"Computer Science Negative Results eJournal","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130251370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characteristic Specific Prioritized Dynamic Average Burst Round Robin Scheduling for Uniprocessor and Multiprocessor Environment","authors":"Amar Ranjan Dash, Sandipta Kumar Sahu, Sanjay Kumar Samantra, Sradhanjali Sabat","doi":"10.5121/ijcsea.2015.5501","DOIUrl":"https://doi.org/10.5121/ijcsea.2015.5501","url":null,"abstract":"CPU scheduling is one of the most crucial operations performed by operating systems. Different conventional algorithms like FCFS, SJF, Priority, and RR (Round Robin) are available for CPU Scheduling. The effectiveness of Priority and Round Robin scheduling algorithm completely depends on selection of priority features of processes and on the choice of time quantum. In this paper a new CPU scheduling algorithm has been proposed, named as CSPDABRR (Characteristic specific Prioritized Dynamic Average Burst Round Robin), that uses seven priority features for calculating priority of processes and uses dynamic time quantum instead of static time quantum used in RR. The performance of the proposed algorithm is experimentally compared with traditional RR and Priority scheduling algorithm in both uni-processor and multi-processor environment. The results of our approach presented in this paper demonstrate improved performance in terms of average waiting time, average turnaround time, and optimal priority feature.","PeriodicalId":376550,"journal":{"name":"Computer Science Negative Results eJournal","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115266996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-Channel System Architecture for Banking","authors":"C. Pavlovski","doi":"10.2139/ssrn.3571389","DOIUrl":"https://doi.org/10.2139/ssrn.3571389","url":null,"abstract":"Financial institutions have increased dependence upon the technology solutions that enable their financial products and services. The proliferation of Internet technologies, mobile devices, and competition from international commerce have placed increased pressure up banking and financial institutions to ensure that competitive leadership is maintained. A key challenge facing banking and finance is how to adopt the new Information and Communications Technologies (ICT) within the organization in a timely manner whilst not disrupting the embedded solutions that provide core banking capabilities to operate the business. In this paper we propose a multi-channel architecture for financial institutions such as banking. The architecture is based upon our industry experience in developing multi-channel solutions in similar industries and is refined further here based upon our experiences in banking. The proposed architecture may be used to facilitate decisions on how best to deploy new and emerging multi-channel technologies within the banking environment, providing a means for assessing how to ensure effective use of existing investments in systems and technologies. The solution may be used as a blueprint for banking institutions in developing their multi-channel strategies; addressing the incumbent, emerging, and future channels of banking distribution.","PeriodicalId":376550,"journal":{"name":"Computer Science Negative Results eJournal","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126388118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Isolation Forest and Local Outlier Factor for Credit Card Fraud Detection System","authors":"V. Vijayakumar, N. Divya, P. Sarojini, K. Sonika","doi":"10.35940/ijeat.d6815.049420","DOIUrl":"https://doi.org/10.35940/ijeat.d6815.049420","url":null,"abstract":"Fraud identification is a crucial issue facing large economic institutions, which has caused due to the rise in credit card payments. This paper brings a new approach for the predictive identification of credit card payment frauds focused on Isolation Forest and Local Outlier Factor. The suggested solution comprises of the corresponding phases: pre-processing of data-sets, training and sorting, convergence of decisions and analysis of tests. In this article, the behavior characteristics of correct and incorrect transactions are to be taught by two kinds of algorithms local outlier factor and isolation forest. To date, several researchers identified different approaches for identifying and growing such frauds. In this paper we suggest analysis of Isolation Forest and Local Outlier Factor algorithms using python and their comprehensive experimental results. Upon evaluating the dataset, we received Isolation Forest with high accuracy compared to Local Outlier Factor Algorithm","PeriodicalId":376550,"journal":{"name":"Computer Science Negative Results eJournal","volume":"114 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116639372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}