Study on Detour Distance and Self Centered Graphs

This research looks at the detour distance of a graph, as well as the issues that come with it. We look at graph detour eccentricity and average detour eccentricity, as well as some…

Impact of Information Security Policies on Security Breach Incidences in Kenyan Public Universities: An Observational Approach

The purpose of this study was to see how information security policies affected security breaches in Kenyan public universities. The purpose of information security policies is to protect network resources against security breaches….

From the Meaning of Infinite Classification to the Conjecture of Twin Prime Numbers: Scientific Explanation

Background: The twin prime conjecture is a classic number theory puzzle and one of the most well-known conjectures that has always baffled us. At the International Congress of Mathematicians in 1900, mathematician David…

A Common Database and Transaction Pool to Reduce Data Redundancy and to Maximize Database Throughput in an Integrated Software System of a Particular Domain

The major goal of this work is to adopt and establish a single database from multiple databases in an Integrated Software System for a certain area. As a consequence, data redundancy will be…

Study on Development of an Sms Controlled Car Security System Via Voice Recording and Image Capturing Techniques

This paper provides an SMS-controlled car security system that incorporates image capture and audio recording techniques to increase automotive security. A mobile phone controls the device, which is connected to a PIC, GPS,…

Determining the Major Policy Issues Regarding the Smart Schooling System Using the Analytical Hierarchy Process Method

Korea is one of the world’s top countries in promoting education using ICT and smart school practises. This paper aims to identify the determinants affecting the success of the smart schooling system in…

Fixed Points Theorem of a Countable Family of I-Nonexpansive Multivalued Mappings of Modified Iteration in Banach Spaces

  In this chapter, I provide a modified Ishikawa iteration for a countable family of multi-valued Mappings under the SC- and Condition constraints (A). The optimum approximation operator for the modified Ishikawa iteration…

Study of Efficient Scalar Multiplication over Elliptic Curve

  The process of repeatedly adding a point on a curve to itself is known as elliptic curve scalar multiplication [1]. In recent years, many cryptography researchers have been drawn to research on…

Investigating the Factors Influencing the Sustainability of Social Enterprises in Korea

  The unemployment rate in Korea is not improving, the income gap between affluent and poor is rising, and a big number of young university graduates remain unemployed (the employment rate is approximately…

Determination of Text Summary Using Morphological Filtering of Intuitionistic Fuzzy Hypergraph

  For many years, text summarization has piqued people’s interest. It refers to condensing a document’s text without losing any information. Many abstractive and extractive strategies for constructing summaries have been developed by…

The Klein Four-Group: A Brief Mathematical Approach

  We discuss different approaches to presenting the well-known Klein four-group. Author (S) Details Volker W. Thürey Independent Researcher, Bremen, Germany. View Book :- stm.bookpi.org/CTMCS-V11/article/view/3980  

Study on Statistical Inference in Contraception

A comprehensive statistical model for the correct evaluation of contraception effectiveness is developed with two goals in mind: first, to help statisticians better understand the general subject of inference by using an interesting…

Two State of Art Image Segmentation Approaches

The fundamental purpose of this research is to use only a few general features of real-world objects to define object borders in outside scenes of images. In this scenario, segmentation and recognition should…

Study on Optimization of three Way Merging Algorithm for Mobile Users

  Mobile Computing is a new paradigm that aims to provide users with persistent network connectivity no matter where they are. Computer networking broke down the physical barriers between computers, allowing users on…

Hankel Type Convolution and Boundedness of Product of Pseudo Differential Type Operators

In this work, the Hankel type transform is used to create two symbols, as well as the pseudo-differential type operators M(x,D) and N(x,D) associated with the Bessel type operator, which are described by…

Study on Weakness Analysis Learning Mathematics Junior High School in Medan

Mathematics is an organised and deductive object of study that includes an abstract form of facts, concepts, principles, and procedures, and is based on agreement, deductive thinking patterns, having an empty symbol of…