fund allocation
Using DEA measures of efficiency and effectiveness in contractor performance fund allocation free downloadT he Franklin County Alcohol, Drug Addiction, and Mental Health (ADAMH) Services Board is the county agency charged with funding and oversight of the local community behavioral health services network in Columbus, Ohio. This network consists of more than 50 nonprofit Analysis […]
supply chain management
Supply chain management is the management of the flow of goods and services and includes all processes that transform raw materials into final products. It involves the active streamlining of a business’s supply-side activities to maximize customer value and gain a competitive advantage in the marketplace Supply chain logistics management free download In todays competitive […]
sports in computer science
computer science has become an important partner for sport science is mainly connected with “the fact that the use of data and media, the design of models, the analysis of systems etc. increasingly requires the support of suitable tools and concepts which are developed and available in computer science. Computer science in sport is an […]
smart trolley
RFID Reader is attached to shopping trolley or shopping basket which detects the presence of the regular customer and with this, shopping trolley will act as a Smart Trolley. The regular customer requires downloading a mobile application and then the smartphone act as a barcode scanner. Automatic human guided shopping trolley with smart shopping systemfree […]
smart shopping
A smart shopping assistant utilizing adaptive plan recognitionfree download In this paper we describe an adaptive shopping assistant system utilising plan recognition. Radio Frequency Identification (RFID) sensory is used to observe a shoppers actions, from which the plan recogniser tries to infer the goals of the user. Using this information, an Consumer attitude toward using […]
iot tracking system
IOT Based Smart Energy Tracking System free download The motivation to manage energy usage at residential home is influenced by the continuous evolution of smart grid technology and economics environmental condition. The evolution of smart grid technology will allow consumers to make more informed decisions about their Smart integrated multiple tracking system development for iot […]
computer security intrusion detection
Multi-agent technologies for computer network security : Attack simulation, intrusion detection and intrusion detection learningfree download This paper presents experience in application of multi-agent technology to design and implementation of multi-agent systems (MASs) intended to cooperatively solve the currently critical tasks in the area of computer network security assurance. These MASs are AgentThe scenario in […]
computer security 2019
Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, Computer -based Methods for Assessing Information Security Competenciesfree download With the growing importance of information security and cybersecurity, there is a widely recognized need for more security […]
computer security 2014
Development Review on Phishing: A Computer Security Threatfree download Abstract: Phishing is kinds of attack in which criminals are use spoofed emails and fraudulent websites to trick people into giving up personal information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an A Guide free download ABSTRACT Academic […]
computer security
CSI computer crime and security surveyfree download For several years, this survey perhaps the most widely quoted set of statistics in the industry showed a steady drop in average estimated losses due to cybercrime. It seemed counterintuitive to some experts, accustomed to seeing the worst of the crime that’s out Introduction to computer securityfree download […]