Skip to main content


Journal Issues

Study on the customer-oriented modern hotel management system using fuzzy analytic Hierarchical process (FAHP)
M. Syed Dadapeer
Pages: 1-9 | First Published: 05 May 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
The hotel undertaking, as an explanation of the tertiary region, is making at a quick, taking into account fast cash related new turn of events and strong associate for the improvement business experience. In the mean time, it's far up towards strong block each locally and all around. In the records age, a reliably making number of lodgings are picking informationalized control to certifiable strong regions for reflect for them of view through wandered forward liabilities, extra show, and sensible costs. The cutting edge standing control device is all around picked in all pieces of motel control, joining get, behind the scenes cash related making due, and surface gaining errands obviously into an unmarried contraption that basically suits the longings of each and every day hotel control. Standing undertaking information is exploding couple with the improvement of the housing records technique. These information, on the elective hand, have now everything considered unquestionably not an extraordinary clarification for what was in store been progressed and applied to their unwavering potential. This various gives the Warm from an overall perspective based totally Clever Different leveled out Cycle (FAHP), that is used to outline individual thought while generally picking. Hotel control's business undertaking information coordinating is restricted to work with mix, making due, and examinations. The records amassed is brief and timetable, and it falls expedient of the hotel's contemporary-day "support focused" publicizing plan. This subject is by and large settled totally on a standard housing control contraption, and it uses information mining age to take out essential records from present motel undertaking information that grants you to set up a help division mix and guide the decision in with layering in focusing in on information from more than one places and levels across the confirmation making point, that licenses you to thoroughly see the "triviality focused" thought, further help hotel carrier levels, and finish association focus validity.
Keywords: Data mining, CRM, dwelling control contraption, pointlessness, reenacted information, Cushioned as demonstrated by an overall viewpoint based completely Quick Moderate technique (FAHP)

Reference 
1. S.S. Devi, N.H. Singh and R.H. Laskar, Fuzzy C-Means Clustering with Histogram based Cluster Selection for Skin Lesion Segmentation using Non-Thermoscopic Images [J], International Journal of Interactive Multimedia and Artificial Intelligence 6 (2020), 26–31.
2. F. Niaz, M. Khalid, Z. Ullah, N. Aslam, M. Raza and M.K. Priyan, A bonded channel in cognitive wireless body area network based on IEEE 802.15.6 and internet of things, Computer Communications 150 (2020), 131–143.
3. O.A. Jawabreh, B. Alaqrarah, H.A. Hrerat, et al., Assessing Factors that Prevent Female Students from Studying Hotel Management: A Case Study of the University of Jordan (Aqaba Branch)[J], 9(4) (2017), 76.
4. W.U. Jing and S.V. Amp, Research on automatic braking control system for large civil aircraft[J], Electronic Design Engineering (2016).
5. H.P. K ̈onigs, Risk management Lifecycle von Information, System and Application[J]. (2017).
6. N.H.N. Mat, Efficiency and the hotel management in adaption to climate change[C]// Sibr-Rdinrru. (2017).
7. Q. Gao, S. Guo, X. Liu, G. Manogaran, N. Chilamkurti and S. Kadry, Simulation analysis of supply chain risk management system based on IoT information platform, Enterprise Information Systems 1–25.
8. S.D.B. Rianto, Mengukur Kesiapan Implementasi Customer Relationship Management (CRM) Model Application Service Provider (ASP) pada Usaha Mikro Kecil Menengah (UMKM) di Indonesia[J], 3(1) (2017).
9. R.T. Ngan, M. Ali, H. Fujita, N.L. Giang, G. Manogaran and M.K. Priyan, A New Representation of Intuitionistic Fuzzy Systems and Their Applications in Critical Decision Making, IEEE Intelligent Systems.
10. V.E. Sathishkumar, J. Park and Y. Cho, Using data mining techniques for bike sharing demand prediction in metropolitan city, Computer Communications 153 (2020), 353–366.
11. S. Wang, A. Zhou, M. Yang, L. Sun and C.-H. Hsu, Service Composition in Cyber-Physical-Social Systems", IEEE Transactions on Emerging Topics in Computing.
12. A.K. Sharma, Method and system for managing evacuations using positioning systems[J]. (2017).
13. Y. Song, H. Zeng and Y. Meng, Application Analysis on Zhuzhe Hotel Management System in Chinese Hotel Chain[C]// International Conference on Computational Sci- ence and Engineering (2016).
14. M.N. Sudin, S.S. Abdullah and M.F. Nasudin, Humanoid Localization on Robocup Field using Corner Intersection and Geometric Distance Estimation, International Journal of Interactive Multimedia and Artificial Intelligence 5(Regular Issue) (2019), 50–6.
15. D. ̈Ulker, M. Barıs ̧, E. Kartal, et al., Developing Web Based Decision Support System for Customer Relationship Management (CRM) Software Selection[C]// International Management Information Systems Conference (2017).
16. K. Vichova and M. Hromada, The Comparative Analysis of Crisis Management Information Systems in the Czech Republic[C]// Iisa. (2017).
17. B.V. Vishakh, M.K. Khwaja and C.M. Vidhyapathi, Comprehensive automated device for hotel management using I2C protocol[C]// IEEE International Conference on Computational Intelligence and Computing Research. IEEE, 2016 1–4.

Online Fruits and Vegetables Recycling and Reuse System
V. Reddy Sowjanya
Pages: 13-17 | First Published: 05 May 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
This paper pursuits to lessen the Traffic incidents entitled “ONLINE FRUITS AND VEGETABLES RECYCLING AND REUSE SYSTEM” . Online culmination and veggies recycling and reuse gadget refers back to the technique of creating reuse of unsold veggies and culmination.These unsold ones are processed in numerous bureaucracy through grading them in exclusive classes like healthy, 1/2 of spoiled and waste.In this we've got taken a few culmination like mango and custered apple for culmination for veggies, we've got taken Eggplant or brinjal and sour defend through appearing the deep mastering approach. CNN classify it as Grade A or Grade B or Grade C. Grade A kind Fruits are used to sale and vegetable used to make curries, B grade culmination or vegetable are used to make Pickles and ultimate grade used to make herbal fertilizers.The predominant goal of the gadget is to advantage the farmers for the unsold ones.
Keywords: CNN (Convolutional Neural Network), Deep Learning, Transfer Learning,.

References 
1. Abu-Qudais, M. (1996). Fluidized-bed combustion for energy production from olive cake. E 17 nergy, 411 21(3), 173–178.
2. AOAC (1997). Official methods of analysis. Washington, DC: Association of Official Analytical Chemists.
3. Directive of the European Parliament and Council (EC) 12/2006 on waste. Official Journal of European Community, L114/9-21.
4. Inglorious fruit and vegetables by Intermarchè. http://itm.marcelww.com/inglorious/.Accessed 24.10.16.

Corruption Control through Budget Maintainence
G. Kalyan Kumar Reddy
Pages: 25-31 | First Published: 05 May 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
Each nation authorities embody holds (Budget) for a selected cash associated 12 months in any occasion plan now no longer compasses to the same old occupants in listen such perpetual better confirmed knowledgeable made composed organized professionals and political trailblazers are omit blessings through the general public impact spending plan. We call for that an software live privy to the development of the cash conveyed through the nation lawmaking frame of a selected monetary 12 months and scholar manage dirtying. It offers the complete facts approximately the cash obliged a workplace, what is greater department clever and paintings clever. It is like way offers the facts approximately use of the organized coins completely. In the proposed shape completely unfold the coins associated plan for every department putting off the essentials. The apothegm of this undertaking is facts straightforwardness (clearness). In this manner, an general conventional occupant can aside from count on a significant element in controlling the beating.

References 
Book Resources
1. “Thinking in Java”, Bruce Eckel, Second Edition, Prentice Hall, mid-June 2000. 2. “Oracle Database 10g Sets for TPC-H Three TB Benchmark". Retrieved 2008-01-31.
3. “Java2 The Complete Reference”, Herbert Scheldt , McGraw Hill September 2001.
4. “Java Server Pages”, Hans Bergsten, O’reilly, Third Edition December 2003. 5. “Oracle Database" Reference 10g Release 1 (10.1). Oracle. Retrieved 2008-11-17.
6. “IEEE, IEEE Software Standards”, IEEE Press, 2009
7. “Software Engineering- A Practioners Approach”, Roger S.Pressman, McGraw-Hill
8. “JDBC, Servlets, and JSP”, Santosh Kumar K and Cogent Solutions Inc. Edition 6.

Fuzzy Weakly Ordering
Kuleep Kandwal
Pages: 32-34 | First Published: 05 May 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
In the prevailing paper, delivered a fuzzy weakly ordering the use of fuzzy metric area and fuzzy partial metric area.
Keywords: Fuzzy metric, fuzzy partial metric, fuzzy quasi metric, partial ordering and weakly ordering.

References
1. L. A. ZADEH, Fuzzy Sets, Information and Control, Vol. 8, 338-358, 1965.
2. C. L CHANG, Fuzzy Topological Spaces, J. Math. Anal. Appl, 24, (1968), 182-190
3. Partial Metric Topology, S.G. Matthews, in, Papers on General Topology and Applications, Eighth Summer
Conference at Queens College. Eds. S. Andimaet.al. Annals of the New York Academy of Sciences, vol. 728,
pp. 183-197.
4. S.G. Matthews, Partial metric topology, Research Report 212, Dept. of Computer Science, University of
Warwick, 1992.
5. I.Altun, F.Sola, H Simsek: generalized contractions on partial metric spaces: topology and its applications 157
(2010) 2778-2785.

Securing File sharing System in cloud environment using AES Algorithm
B. Nagesh
Pages: 35-40 | First Published: 05 May 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
Now days, the train sharing is fully useful for everyone. Some kind of websites or operation gave authorization to partake a train along with their pall/ garçon authorization. In any case, participating coffers among numerous guests in the pall is a grueling issue. The proposed scheme gives the installation of securely storing and participating the information for dynamic gatherings in the pall. By exercising encryption strategies any pall guests can consummately partake their information in the trusted pall. Information proprietor can store the record without uncovering their personality to others in the pall. cancellation of the customer happens without refreshing the private keys of the rest of the guests. Information proprietor or Group Manager can have the capacity to cancel the record which is stored in the pall. The train sharing can be done by further number of druggies at the same time. The druggies used to partake the train in pall to secure the train data. The receiver will be downloading the train from the pall to decipher the train data. This increases the security while participating the train between two druggies. The receiver will be entering the unique key for downloading the train.

References 
1. Mahajan, Prerna and Abhishek Sachdeva, 2013. A Study of Encryption Algorithms AES, DES and RSA for security. Worldwide Journal of Computer Science and Research in Computer Science and Software
2. Rijmen, Vincent and Joan Daemen, 2001. High level encryption standard. Procedures of Federal Information Processing Standards Publications, National Institute of Standards and Technology, pp: 1922.
3. Dhongade, Sudhir, et al., 2015. An Efficient Certificateless Encryption for Secure Data Sharing Over the Network Using AES-128 and AES-256..
4. Benson, Calum, Matthias Muller-Prove and Jiri Mzourek, 2004. Proficient convenience in open source projects: GNOME, OpenOffice. organization, NetBeans. CHI'04 expanded abstracts on Human Factors in Computing Systems. ACM, 2004.
5. Granado-Criado, José M., et al., 2010. Another approach to execute the AES calculation utilizing fractional and dynamic reconfiguration. Coordination, Fig. 22: Raw information caught by wireshark the VLSI Journal, 43(1): 72-80.
6. Balakrishnan, Bhargav, 2010. Three Tier Encryption Algorithm for Secure File Transfer. PC Engineering and Applications (ICCEA), 2010 Second International Conference on. Vol. 2. IEEE, 2010.

Block chain Based Accounts Payable Platform For Goods Trade
E. Pavan Kumar
Pages: 41-44 | First Published: 05 May 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
Products change is an stock community exchange that consists of transporters shopping merchandise from businesses and transporters giving merchandise transportation. Transporters are given solicitations from providers and transporters. Transporters do products getting and receipt dealing with before installment handling of payments for providers and transporters, in which receipt handling consists of errands like coping with claims and converting the invoice installments. Merchandise getting includes check of gotten products through the Shipper's getting institution. Receipt handling is completed by the Shipper's data payable company, which thusly is checked by means of the data receivable corporations of carriers and transporters. This assignment gives a blockchain-based creditor liabilities framework that creates claims for the lack within the products were given and in like manner changes the installment within the bills for providers and transporters. Essential inspirations for those save community associations to encompass blockchain-based creditor liabilities frameworks are to take away the cycle redundancies (creditor liabilities as opposed to records of profits), to lessen the amount of debates many of the executing members, and to speed up the facts payable cycles through improvements in the cases age and blockchain-based question compromise.

References
1. “Letter of credit,” https://en.wikipedia.org/wiki/Letter of credit/.
2. “Invoice discounting,” https://en.wikipedia.org/wiki/Factoring (finance).
3. “Reverse factoring (supply chain finance),” https://en.wikipedia.org/wiki/ Reverse factoring.
4. “GS1 XML standards 3.2,” https://www.gs1.org/standards/gs1-xml/3-2/.
5. “TradeLens,” https://www.tradelens.com.
6. K. Narayanam, S. Goel, A. Singh, Y. Shrinivasan, S. Chakraborty, P. Selvam, V. Choudhary, and M. Verma, “Blockchain based e-invoicing platform for global trade,” in 2020 IEEE International Conference on Blockchain (Blockchain), 2020, pp. 385–392.
7. http://ibm.biz/BlockchainSolutionFromWalmartCanadaAndDLTLabs