•Journal•ISSN: 2348-6848
International Journal of Research
Granthaalayah Publications and Printers
About: International Journal of Research is an academic journal. The journal publishes majorly in the area(s): Population & Cloud computing. It has an ISSN identifier of 2348-6848. It is also open access. Over the lifetime, 12699 publications have been published receiving 31499 citations.
Topics: Population, Cloud computing, Encryption, Inverter, The Internet
Papers published on a yearly basis
Papers
More filters
•
TL;DR: In this paper, a research has been done on the essay "Can the Subaltern Speak" by Gayatri Chakravorty Spivak, which has been explained into much simpler language about what the author conveys for better understanding and further references.
Abstract: In the present paper a research has been done on the essay ‘Can the Subaltern Speak’ by’ Gayatri Chakravorty Spivak’. It has been explained into much simpler language about what the author conveys for better understanding and further references. Also the criticism has been done by various critiques from various sources which is helpful from examination point of view. The paper has been divided into various contexts with an introduction and the conclusions. Also the references has been written that depicts the sources of criticism.
2,638 citations
•
TL;DR: The resource-based view RBV of the firm has influenced the field of strategic human resource management SHRM in a number of ways as discussed by the authors and has been used in a variety of ways.
Abstract: The resource-based view RBV of the firm has influenced the field of strategic human resource management SHRM in a number of ways
665 citations
•
TL;DR: A targeted literature survey of machine learning (ML) and data processing (DM) strategies for cyber analytics in support of intrusion detection as it applies to wired networks.
Abstract: Cyber security is that the body of technologies, processes and practices designed to safeguard networks, computers, programs and knowledge from attack, harm or unauthorized access. During a computing context, the term security implies cyber security. This survey paper describes a targeted literature survey of machine learning (ML) and data processing (DM) strategies for cyber analytics in support of intrusion detection. This paper focuses totally on cyber intrusion detection as it applies to wired networks. With a wired network, associate oppose must experience many layers of defense at firewalls and operative systems, or gain physical access to the network. The quality of ML/DM algorithms is addressed, discussion of challenges for victimization ML/DM for cyber security is conferred, and some recommendations on once to use a given methodology area unit provided.
614 citations
•
TL;DR: Calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs.
Abstract: More particularly, calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs. This paper concentrates on using Wireless for interacting with and localizing the robot. We've carried out thorough studies of Wireless signal propagation qualities both in indoor and outside conditions, which forms the foundation for Wireless AP deployment and communication to be able to augment how human operators communicate with this atmosphere, a mobile automatic platform is developed. Gas and oil refineries could be a harmful atmosphere for various reasons, including heat, toxic gasses, and unpredicted catastrophic failures. When multiple Wireless APs are close together, there's a possible for interference. A graph-coloring heuristic can be used to find out AP funnel allocation. Additionally, Wireless fingerprinting based localization is developed. All of the calculations implemented are examined in real life situations using the robot developed and answers are promising. For example, within the gas and oil industry, during inspection, maintenance, or repair of facilities inside a refinery, people might be uncovered to seriously high temps to have a long time, to toxic gasses including methane and H2S, and also to unpredicted catastrophic failures.
455 citations
••
TL;DR: In this article, the authors describe action research aiming to develop a conceptualization of fac-tors inherent in collaborative forms and, hence, about their practicality as governance tools, and conclude that two areas that seriously affect the ability of collaborations to deliver their potential, structural complexity and diversity are reviewed.
Abstract: Partnerships increasingly play a major role in determining and implementing major policy drives in localities. Under-standing how they may provide value is therefore essential to understanding modern governance principles. This article describes action research aiming to develop a conceptualization of fac-tors inherent in collaborative forms and, hence, about their practicality as governance tools. Different interpreta-tions of what collaborative governance is intended to achieve are first reviewed. Two areas that seriously affect the ability of collaborations to deliver their potential, structural complexity and diversity are then reviewed. The article concludes by considering what is needed to make collaborative governance work.
403 citations