Arpit Jain
YOU?
Author Swipe
View article: AI & Blockchain-Enabled Smart Contracts: The Future of Transparent and Fraud-Proof Medical Cost Negotiation
AI & Blockchain-Enabled Smart Contracts: The Future of Transparent and Fraud-Proof Medical Cost Negotiation Open
The convergence of Artificial Intelligence (AI) and blockchain technology is revolutionizing medical cost negotiations by introducing fraud-proof, transparent, and automated smart contracts. This paper explores how AI-driven analytics, whe…
View article: DSIA U-Net: deep shallow interaction with attention mechanism UNet for remote sensing satellite images
DSIA U-Net: deep shallow interaction with attention mechanism UNet for remote sensing satellite images Open
View article: Enhancing Business Process Efficiency through SAP BW4HANA in Order-to-Cash Cycles
Enhancing Business Process Efficiency through SAP BW4HANA in Order-to-Cash Cycles Open
In today’s competitive business environment, optimizing the Order-to-Cash (O2C) cycle is critical for enhancing operational efficiency and improving customer satisfaction. This paper explores the transformative role of SAP BW/4HANA in stre…
View article: Role of SAP Order Management in Managing Backorders in High-Tech Industries
Role of SAP Order Management in Managing Backorders in High-Tech Industries Open
Effective order management is critical in the high-tech industry, where rapid innovation, fluctuating demand, and global supply chain complexities create unique challenges. SAP Order Management emerges as a robust solution for addressing t…
View article: Green Cloud Technologies for SAP-driven Enterprises
Green Cloud Technologies for SAP-driven Enterprises Open
Green Cloud Technologies are rapidly transforming the landscape of enterprise IT solutions, particularly for SAP-driven businesses. As organizations increasingly turn to cloud computing for its scalability, flexibility, and cost-efficiency…
View article: Optimization of SAP SD Pricing Procedures for Custom Scenarios in High-Tech Industries
Optimization of SAP SD Pricing Procedures for Custom Scenarios in High-Tech Industries Open
The high-tech industry operates in a dynamic environment requiring customized solutions for unique business scenarios. Pricing procedures within the SAP Sales and Distribution (SD) module are critical for managing complex pricing structure…
View article: Leveraging SAP BW4HANA for Scalable Data Warehousing in Large Enterprises
Leveraging SAP BW4HANA for Scalable Data Warehousing in Large Enterprises Open
In the era of big data, large enterprises face the challenge of efficiently managing and analyzing vast volumes of information to derive actionable insights. SAP BW/4HANA emerges as a powerful solution that facilitates scalable data wareho…
View article: Advances in High-Frequency Surgical Device Design and Safety
Advances in High-Frequency Surgical Device Design and Safety Open
Modern surgical treatments are more precise, effective, and safe because to high-frequency surgical equipment design. Electrosurgical units, laser systems, and sophisticated ultrasonic instruments provide accurate tissue cutting, coagulati…
View article: Navigating Mergers and Demergers in the Technology Sector: A Guide to Managing Change and Integration
Navigating Mergers and Demergers in the Technology Sector: A Guide to Managing Change and Integration Open
In the dynamic landscape of the technology sector, mergers and demergers have become pivotal events that significantly impact organizational structures, strategic directions, and operational efficiencies. This guide delves into the intrica…
View article: Effective Strategies for Managing Multi-Cloud Salesforce Solutions
Effective Strategies for Managing Multi-Cloud Salesforce Solutions Open
Businesses are using multi-cloud solutions to improve flexibility, scalability, and efficiency in today's dynamic environment. Salesforce, a prominent CRM platform, is crucial to many organizations' multi-cloud ecosystems. To achieve seaml…
View article: Advances in Malware Analysis and Detection in Cloud Computing Environments: A Review
Advances in Malware Analysis and Detection in Cloud Computing Environments: A Review Open
Cloud computing, integral for data storage and online services, presents significant advantages over traditional data storage and distribution methods, including enhanced convenience, on-demand storage, scalability, and cost efficiency.Its…
View article: Scalable Data Engineering Solutions for Healthcare: Best Practices With Airflow, Snow Park, And Apache Spark
Scalable Data Engineering Solutions for Healthcare: Best Practices With Airflow, Snow Park, And Apache Spark Open
View article: Deep Learning-Based Mask Identification System Using ResNet Transfer Learning Architecture
Deep Learning-Based Mask Identification System Using ResNet Transfer Learning Architecture Open
Recently, the coronavirus disease 2019 has shown excellent attention in the global community regarding health and the economy.World Health Organization (WHO) and many others advised controlling Corona Virus Disease in 2019.The limited trea…
View article: The Impact of Cloud Native Technologies on Healthcare Application Scalability and Compliance
The Impact of Cloud Native Technologies on Healthcare Application Scalability and Compliance Open
View article: Correction: Kumar et al. Face Spoofing, Age, Gender and Facial Expression Recognition Using Advance Neural Network Architecture-Based Biometric System. Sensors 2022, 22, 5160
Correction: Kumar et al. Face Spoofing, Age, Gender and Facial Expression Recognition Using Advance Neural Network Architecture-Based Biometric System. Sensors 2022, 22, 5160 Open
In the original publication [...]
View article: Intellectual Feature Ranking Model with Correlated Feature Set based Malware Detection in Cloud environment using Machine Learning
Intellectual Feature Ranking Model with Correlated Feature Set based Malware Detection in Cloud environment using Machine Learning Open
Malware detection for cloud systems has been studied extensively, and many different approaches have been developed and implemented in an effort to stay ahead of this ever-evolving threat. Malware refers to any programme or defect that is …
View article: DSCNet: Deep Skip Connections-Based Dense Network for ALL Diagnosis Using Peripheral Blood Smear Images
DSCNet: Deep Skip Connections-Based Dense Network for ALL Diagnosis Using Peripheral Blood Smear Images Open
Acute lymphoblastic leukemia (ALL) is a life-threatening hematological malignancy that requires early and accurate diagnosis for effective treatment. However, the manual diagnosis of ALL is time-consuming and can delay critical treatment d…
View article: Copyright Page
Copyright Page Open
View article: An enhanced self-learning-based clustering scheme for real-time traffic data distribution in wireless networks
An enhanced self-learning-based clustering scheme for real-time traffic data distribution in wireless networks Open
The process of examining the data flow over the internet to identify abnormalities in wireless network performance is known as network traffic analysis. When analyzing network traffic data, traffic classification becomes an important task.…
View article: Simulating the BB84 Protocol
Simulating the BB84 Protocol Open
Quantum Key Distribution (QKD) is a cryptographic technique that allows two parties to establish a secure communication channel by using the laws of quantum mechanics. The BB84 protocol is one of the earliest and most widely used QKD proto…
View article: Image Geo-Site Estimation Using Convolutional Auto-Encoder and Multi-Label Support Vector Machine
Image Geo-Site Estimation Using Convolutional Auto-Encoder and Multi-Label Support Vector Machine Open
The estimation of an image geo-site solely based on its contents is a promising task. Compelling image labelling relies heavily on contextual information, which is not as simple as recognizing a single object in an image. An Auto-Encode-ba…
View article: Networked control system with MANET communication and AODV routing
Networked control system with MANET communication and AODV routing Open
View article: Improved Recurrent Neural Network Schema for Validating Digital Signatures in VANET
Improved Recurrent Neural Network Schema for Validating Digital Signatures in VANET Open
Vehicular ad hoc networks (VANETs) allow communication between stationary or moving vehicles with the assistance of wireless technology. Among various existing issues in smart VANETs, secure communication is the key challenge in VANETs wit…
View article: Multilayer Neural Network Based Speech Emotion Recognition for燬mart燗ssistance
Multilayer Neural Network Based Speech Emotion Recognition for燬mart燗ssistance Open
Day by day, biometric-based systems play a vital role in our daily lives. This paper proposed an intelligent assistant intended to identify emotions via voice message. A biometric system has been developed to detect human emotions based on…
View article: Face Spoofing, Age, Gender and Facial Expression Recognition Using Advance Neural Network Architecture-Based Biometric System
Face Spoofing, Age, Gender and Facial Expression Recognition Using Advance Neural Network Architecture-Based Biometric System Open
Nowadays, the demand for soft-biometric-based devices is increasing rapidly because of the huge use of electronics items such as mobiles, laptops and electronic gadgets in daily life. Recently, the healthcare department also emerged with s…
View article: Improved Security of E-Healthcare Images Using Hybridized Robust Zero-Watermarking and Hyper-Chaotic System along with RSA
Improved Security of E-Healthcare Images Using Hybridized Robust Zero-Watermarking and Hyper-Chaotic System along with RSA Open
With the rapid advancements of the internet of things (IoT), several applications have evolved with completely dissimilar structures and requirements. However, the fifth generation of mobile cellular networks (5G) is unable to successfully…
View article: Securing E-Healthcare Images Using an Efficient Image Encryption Model
Securing E-Healthcare Images Using an Efficient Image Encryption Model Open
With the advancements in e-healthcare services, it is possible to provide remote medical services to patients and swifter first aid. Medical images play an essential role in e-healthcare applications for providing quick and better remote d…
View article: Enhanced Method of Object Tracing Using Extended Kalman Filter via Binary Search Algorithm
Enhanced Method of Object Tracing Using Extended Kalman Filter via Binary Search Algorithm Open
Day by day demand for object tracing is increasing because of the huge scope in real-time applications. Object tracing is one of the difficult issues in the computer vision and video processing field. Nowadays, object tracing is a common p…
View article: Comparative Approaches by Using Machine Learning Algorithms in Crop Yield Prediction
Comparative Approaches by Using Machine Learning Algorithms in Crop Yield Prediction Open
View article: Deep Neural Network Based Vehicle Detection and Classification of Aerial Images
Deep Neural Network Based Vehicle Detection and Classification of Aerial Images Open
The detection of the objects in the ariel image has a significant impact on the field of parking space management, traffic management activities and surveillance systems. Traditional vehicle detection algorithms have some limitations as th…