Refine Search

New Search

Results: 11,050,130

(searched for: publisher_id:141)
Save to Scifeed
Page of 221,003
Articles per Page
by
Show export options
  Select all
, Jörn Steuding, Pascal Stumpf
Published: 8 July 2021
essentials pp 19-29; doi:10.1007/978-3-658-33108-5_3

Abstract:
Wir starten mal wieder mit etwas zum Tüfteln: Im Flatland (das ist ein Land, das sich, im Gegensatz zu unserer Erde, nicht im dreidimensionalen Raum, sondern im Zweidimensionalen befindet) soll jeder Haushalt mit Gas, Wasser und Strom versorgt werden.
, Jörn Steuding, Pascal Stumpf
Published: 8 July 2021
essentials pp 13-17; doi:10.1007/978-3-658-33108-5_2

Abstract:
Graphen helfen uns oftmals, Netzwerke zu modellieren und besser zu verstehen, so auch in der folgenden kleinen Geschichte, in der nun erstmals ein (aus der Sesamstraße bekannter) Graf auftritt.
, Raju K. D.
Submarine Cables Protection and Regulations pp 23-60; doi:10.1007/978-981-16-3436-9_2

Abstract:
Before this transatlantic telegraph cable between Newfoundland and Ireland, an incident where a fisherman cut the first submarine cable laid across the English Channel between Dover and Calais in 1850 had informed about the protection of this cable. The laying of telegraph cables on the ocean’s seabed had its initial challenges unique of its kind.
Fiona Yuen, Bahman Chavoshan, Danya Waqfi,
Controversies in Testosterone Deficiency pp 45-56; doi:10.1007/978-3-030-77111-9_5

Abstract:
Disordered sleep may be insufficient, misaligned, or disrupted and is known to adversely impact cardiometabolic health. The effect of insufficient, misaligned, or disrupted sleep on andrological health – including hypogonadism and systemic testosterone exposure, fertility, and erectile function – is only now becoming recognized. Restricting sleep decreases overall mean 24-hour blood testosterone concentrations, and lower sleep duration is associated with smaller testicular volumes and reduced sperm concentrations. Misaligned sleep due to night shift work does not alter overall systemic testosterone levels, but it does shift the diurnal rise in testosterone to coincide with the timing of sleep irrespective of whether sleep occurs during the day or during the night. Accordingly, testosterone should be measured in blood soon after awakening, not necessarily in the early morning, to assess hypogonadism in shift workers. Disrupted sleep due to obstructive sleep apnea (OSA) is associated with low blood testosterone concentrations, symptoms of hypogonadism, and erectile dysfunction. Adherent continuous positive airway pressure (CPAP) treatment of OSA improves erectile function and some symptoms of hypogonadism and may also increase testosterone levels. On the other hand, testosterone therapy may induce or worsen OSA, but any possible effects are moderate in degree and these effects may not persist with longer term, more physiological replacement therapy. Longer-term interventional studies in larger cohorts are required to better understand the complex relationship between disordered sleep and andrological health, and to document its reversibility.
Gaoxiang Li, Huhua Cao
Published: 8 July 2021
Rethinking Map Literacy pp 29-43; doi:10.1007/978-981-16-3021-7_3

Abstract:
This chapter presents the research methodology and selection of variables, relevant data sources, and computational formulas. The study covers two time periods: 1990-2000 and 2000-2010, with multiple scales designated as the research area focus. Each scale represents a different scope to contextualize the spatial-temporal characteristics of Chinese urban minorities. The data used in this study comes primarily from the national censuses of 1990, 2000, and 2010, with additional data pulled from the City Statistical Yearbooks of China and the All-China Data Center. This chapter also illustrates the Standard Deviational Ellipse, the primary method used.
Dynamics of Organizational Ambidexterity pp 101-148; doi:10.1007/978-3-658-34127-5_5

Abstract:
Part 5 of this dissertation is the second empirical investigation of OA as a dynamic construct and builds upon the findings of the first empirical study (Study 2). While Study 2 adopted a macro-process view in focusing on the development process of OA change, this study aims to go deeper to further analyze the multi-level dynamics inside the organization.
O. Hasan, M. Houlihan, D. Yang,
Controversies in Testosterone Deficiency pp 123-138; doi:10.1007/978-3-030-77111-9_10

Abstract:
Supraphysiologic use of exogenous hormone replacement is allowing users to greatly increase muscle strength and athletic performance in the context of an overall world decline in fitness. In part due to societal pressures, more individuals are taking exogenous testosterone for performance enhancement and pursuit of an idealized physique. This chapter primarily focuses on the illicit use of synthetic testosterone as a performance enhancer. We discuss the history and evolution of anabolic androgenic steroids (AAS) in the last few decades and review current literature on the side effect profile of supraphysiologic use of AAS.
, Milan Oravec, Zuzana Kotianova, Michal Gorzas, Jan Hijj, Ivan Habala
Inventive Computation and Information Technologies pp 213-219; doi:10.1007/978-3-030-80713-9_28

Abstract:
The presented paper points to the use of available devices of wearable electronics for people with epilepsy to increase safety in the work process. The essence of the device is the detection of a change in the acceleration of the wrist movement of the person being monitored and, in the case of the development of an epileptic seizure, the identification of a repeated change in the acceleration of the wrist movement of the person being monitored. Subsequently, after evaluation in the analytical element, this information is sent to people in the vicinity or to a third party to assist the person being monitored. The proposed technical solution in the form of a digital device is usable not only for epileptic seizures but also for other diseases with the potential for loss of stability and subsequent injury.
Fritz Sager, Susanne Hadorn, Andreas Balthasar, Céline Mavrot
Published: 8 July 2021
Politikevaluation pp 17-38; doi:10.1007/978-3-658-32490-2_2

Abstract:
In diesem Kapitel gehen wir auf die konzeptionellen Grundlagen der öffentlichen Politik ein und befassen uns im ersten Abschn. 2.1 mit der öffentlichen Politik als Gegenstand der Politikevaluation. Abschn. 2.2 stellt das Wirkungsmodell öffentlicher Politik genauer vor. Der Policy Cycle beschreibt öffentliche Politik nicht als Kausalmodell, sondern als Prozess. In diesem Prozess muss das Wirkungsmodell zunächst umgesetzt werden, bevor es wirken kann. In der Umsetzung zeigt sich, ob die Hypothesen des Wirkungsmodells der Realität standhalten. Allerdings kann es in der Umsetzung selber zu Problemen kommen, die die Wirkung beeinträchtigen. Abschn. 2.3 unterscheidet daher zwischen Konzeptversagen und Umsetzungsversagen einer Politik. Ein Konzeptversagen führt Wirkungsdefizite einer Politik darauf zurück, dass die Massnahmen auf einem nicht zutreffenden Kausalmodell beruhen. Ein Umsetzungsversagen ist hingegen dann gegeben, wenn das Kausalmodell angemessen ist, die getroffenen Maßnahmen aber nicht wunschgemäß umgesetzt werden (Linder und Peters 1987). In Abschn. 2.3 werden die Implikationen dieses Unterschiedes für die Politikevaluation beschrieben und diskutiert. Abschn. 2.4 spiegelt die zentralen Lerninhalte dieses Kapitels an einem Beispiel aus der politischen Realität. Darauf aufbauend formuliert Abschn. 2.5 eine Checkliste mit Aspekten, welche bei der Evaluation substanzieller öffentlicher Politiken berücksichtigt werden sollen. Abschn. 2.6 illustriert die Inhalte dieses Kapitels am Beispiel des australischen „Home Insulation Program“ (HIP, dt. Hausisolationsprogramm), das als Extremfall eines gescheiterten Politikprogramms gelten kann.
Ketan Sunil Mhetre, Abhijith Shasheendra, Shahram Aarabi, Ashley Emery,
Inventive Computation and Information Technologies pp 253-260; doi:10.1007/978-3-030-80744-3_32

Abstract:
To address the challenges associated with tourniquet induced limb ischemia a team of researchers have been working on developing a limb cooling medical device. One of the challenges in developing a system like this, is simulating and ultimately testing the performance of its cooling effectiveness. During the development cycle of any medical device, it is important to test the performance by simulating the application, yet human testing is often not an option during early development phases. To that end, this paper reports on the use of CAD (computer aided design) modeling techniques in combination with CT scan data and 3D printing to develop a limb prototype or phantom which was used as a thermal test platform. Although these methods were directed at a specific application, the overall strategy and techniques will be informative to a broader medical device design community as it represents the continued convergence of several digital tools.
Manuel Ayala, , Víctor Leiva, Ana María Vallina-Hernández
Inventive Computation and Information Technologies pp 495-503; doi:10.1007/978-3-030-80713-9_63

Abstract:
Chile is recognized as a highly centralized country, the literature in general and organizations such as the OECD identify Chile with a strong economic dependence on a few regions, where in addition, the OECD itself points out that this centralization and concentration limits Chile's capacity for increase. The main objective of the following research is to analyze the degree of incidence of macroeconomic, social, territorial and political variables that influence the foreign trade of the political-administrative regions of Chile with the World. Evaluating the impact of trade liberalization policies on the development of productive activity in the political-administrative regions of Chile. Regarding the methodology, a formulation of a commercial gravity model will be carried out applying the analysis methodology of panel data, considering for this the regionalized import and export figures, extracted from the customs databases, comprised between the years 2010 and 2019 and information from different national and foreign data sources published as open sources. Thus, it seeks to obtain a regional econometric analysis instrument that identifies the main variables that influence the flow of regional trade in Chile, and consequently measure the degree of territorial deconcentrating achieved from the international trade of Chile's regions as a percentage.
Jianghua Xu, Shuangle Ding
Inventive Computation and Information Technologies pp 504-511; doi:10.1007/978-3-030-80713-9_64

Abstract:
Objective. In order to improve the color comfort of economy class seats and reduce the dependence of seat color design scheme on designers’ sensory experience, the perceptual demand is quantified to obtain a color design scheme more in line with users’ perceptual needs. Method. A design method combining kansei engineering and NCS color quantization system is proposed. Cluster analysis and gray correlation analysis are used to screen out the optimal color design scheme. Firstly, the semantic difference method (SD method) was used to construct the economy class color image vocabulary and the mapping model of a single color. Secondly, the NCS color system is used to quantify and classify each color. Then, the image value of each group of color design schemes is obtained according to the relationship between color design schemes and color image positioning vocabulary. Finally, based on MATLAB grey correlation analysis, the correlation degree analysis is carried out on the image evaluation matrix of color design scheme, and the correlation coefficient and correlation degree of each color design scheme’s evaluation on passenger image are obtained, so as to obtain the priority of color design scheme of economy class seat. Conclusion. By quantifying the emotional value of passengers, this method prioritizes the final color design scheme and obtains the color design scheme of economy class seats that better meets the emotional needs of passengers, which provides a good theoretical basis for the follow-up research.
Fritz Sager, Susanne Hadorn, Andreas Balthasar, Céline Mavrot
Published: 8 July 2021
Politikevaluation pp 233-254; doi:10.1007/978-3-658-32490-2_11

Abstract:
Die ersten Bestrebungen, Qualitätskriterien für Evaluationen festzulegen, wurden in den 1970er-Jahren in den USA unternommen (Sager und Ledermann 2008). Nachdem parallel verschiedene Gruppen ihre eigenen Standards entwickelt hatten, haben sich schließlich die „Joint Committee on Standards for Educational Evaluation“ (Sanders [Joint Committee on Standards for Educational Evaluation] 1994) durchgesetzt. Der Bedarf für ähnliche Evaluationsstandards wurde in Europa erst wesentlich später erkannt (Widmer 1996). Folglich wurden in der Schweiz und in Deutschland anfangs des Jahrtausends von den jeweiligen nationalen Evaluationsgesellschaften Standards verabschiedet. Österreich verfügt aktuell über keine Politikbereich-übergreifenden Evaluationsstandards. Hingegen hat 2012 die Österreichische Plattform für Forschungs- und Technologiepolitikevaluation (fteval) Evaluationsstandards verabschiedet (Kohlweg 2019). Die in Deutschland, Österreich und der Schweiz erlassenen Evaluationsstandards unterscheiden vier Qualitätsdimensionen, welche es bei der Planung und der Durchführung von Evaluationen zu berücksichtigen gilt: Nützlichkeit, Durchführbarkeit, Fairness und Genauigkeit. In Frankreich hat die Société Française de l’Évaluation eine wenig detaillierte Charte de l’évaluation verabschiedet, die einen kurzen Überblick über sieben Grundprinzipien bietet: Pluralität, Unabhängigkeit, Kompetenz, Respekt, Transparenz, Gelegenheit und Verantwortlichkeit (SFE (Societé francaise de l’évaluation) 2006 [2003]). Abschn. 11.1 bietet eine Übersicht über die entsprechenden Standards in Deutschland, Österreich und der Schweiz. Abschn. 11.2 geht auf die Techniken der Meta-Evaluation, also der Evaluation von Evaluationen, und der Evaluationssynthese, also der Zusammenfassung von Evaluationsresultaten, ein. Abschn. 11.3 befasst sich mit einem Kernproblem der Qualität von Evaluationen, nämlich deren Unabhängigkeit, und Abschn. 11.4 macht Vorschläge, um die Unabhängigkeit von Evaluationen zu verbessern.
Fritz Sager, Susanne Hadorn, Andreas Balthasar, Céline Mavrot
Published: 8 July 2021
Politikevaluation pp 185-209; doi:10.1007/978-3-658-32490-2_9

Abstract:
In diesem Kapitel werden die konkreten Schritte der Datenerhebung und -analyse erläutert, die letztlich die Grundlage für die Schlussfolgerungen und Empfehlungen einer Evaluation bilden. Die Datenerhebung und -analyse bilden den Punkt, an dem mehrere zentrale Entscheidungen über die Form der Evaluation und den Umfang der Untersuchung getroffen werden. In den folgenden Abschnitten wird ein Überblick gegeben, wobei zu berücksichtigen ist, dass sich eine ganze Reihe von Publikationen ausschließlich mit Evaluationsmethoden beschäftigen (siehe z. B. Patton 1987; Wholey et al. 2015 [2010]). Entscheidungen bezüglich der Datenerhebung und -analyse sind das Ergebnis einer Kombination aus wissenschaftlichen und praktischen Faktoren. Einerseits sind sie untrennbar mit den Evaluationsfragen (siehe Kap. 5) und dem Evaluationsdesign (siehe Kap. 8) verbunden und müssen kohärent mit diesen beiden Dimensionen abgestimmt werden. Andererseits ist die Wahl der Techniken zur Sammlung und Analyse der Daten auch mit praktischen Aspekten verbunden, die im Folgenden näher erläutert werden. Schließlich gilt es zu beachten, dass jede methodische Wahl den Fokus der Untersuchung beeinflusst, wodurch bestimmte Aspekte der Realität beleuchtet werden und andere im Dunkeln bleiben (Bourdieu et al. 1983 [1968], S. 51–80, 193–264).
Sarat Chandra Nayak, B. Satyanarayana, Bimal Prasad Kar, J. Karthik
Blockchain Technology and Innovations in Business Processes pp 127-136; doi:10.1007/978-981-16-0878-0_13

Abstract:
Cryptocurrency, in a short period of time has got wide popularity and considered as an investment asset. Prediction of cryptocurrency is a recent area of research interest and budding fast. The price trend of cryptocurrency behaves arbitrarily and fluctuates like other stock markets due to inherent volatility. Though few computational intelligence methods are available, sophisticated methodologies for accurate prediction of cryptocurrency are still lacking and need to be explored. Extreme learning machine (ELM) is a faster and better learning method for neural networks with solitary hidden layer and has enhanced generalization performance. This study proposes an ELM based approach for prediction of four emerging cryptocurrencies such as Litecoin, Ethereum, Ripple, and Bitcoin. The prediction ability of the proposed approach is compared with few similar methods such as RBFN, SVM, MLP, ARIMA, and LSE. From exhaustive simulation studies and comparative result analysis it is found that the ELM method performed better than others and hence can be suggested as an efficient tool for cryptocurrencies prediction.
N. Vanitha, M. Suriakala
Blockchain Technology and Innovations in Business Processes pp 665-670; doi:10.1007/978-981-16-0878-0_64

Abstract:
A web server log is a data file created by a server. Many servers collect data about the information requested for the web server, examples are date, time, client IP address, recommendation, user agent, and so on. This data will help identify specific issues on the web. Log files are stored in the web server, web proxy server, and the client browser. This paper provides a detailed overview of weblog files, analytics tools, and reviews of existing research.
Sanjay B. Ankali, Latha Parthiban
Blockchain Technology and Innovations in Business Processes pp 623-632; doi:10.1007/978-981-16-0878-0_60

Abstract:
Software forking is the process of creating a variant of the existing system by reusing more reliable algorithms and the design of the legacy systems. The software porting team converts the legacy system to the new system by adding or deleting of features and retaining the more reliable algorithm and design. A cross-language clone detector can significantly improve the performance of the software forking team by helping them to locate the code clones of legacy software. This paper proposes a technique to detect functionally equivalent code clones across C, C++, and Java codes by employing the Levenshtein distance algorithm to build a porting analyzer that helps the software forking team with three features like (i) locating all functionally similar cross-language clones among the C, C++, and Java project repositories. (ii) Given an input code for searching, it fetches the functionally equivalent code clone types from the respective repositories. (iii) Displays bug fixes to convert the code from one language to another language. The proposed cross-language clone detector outperforms the accuracy of existing works in terms of precision and can enhance the speed of the software forking process. Results prove that keyword-based filtering using Levenshtein distance detects the cross-language type 1 (Exact) clones and type 2 (Renamed) clones with 100% precision and detects type 3 (Near miss) clones and type 4 (Semantic) clones with 98% and 95% precision, respectively, which is found to be the best accuracy in finding cross-language code clones so far.
G. P. Hegde, Nagaratna Hegde, M. Seetha
Blockchain Technology and Innovations in Business Processes pp 487-495; doi:10.1007/978-981-16-0878-0_48

Abstract:
The leakage of chemical plant liquid causes hazards to human beings and animals. Liquid would convert into gaseous form and starts spreading everywhere. This paper focuses on automatic monitoring of liquid leakage in chemical plant which causes pollution of environment. This paper presents design pattern of minimum cost liquid leakage monitoring system for real-time detection of quality of liquid passes in longer tubes of chemical plant. This pattern consists of different sensors which are used to measuring physical quality of the liquid. The parameters flow sensor of the liquid can be measured. Storage of large data and its analysis are more useful in various investigations and developments. The Arduino framework is one of the main controller devices in this innovative work, and the sensed data can be configured and stored in cloud server as metadata for the purpose of silent measure of physical variations in liquids.
, Jürgen Engel
Published: 8 July 2021
Life and Its Future pp 75-95; doi:10.1007/978-3-030-59075-8_6

Abstract:
We discuss some prominent major natural risks to life including the epidemics and pandemics caused by micro-organisms such as bacteria or viruses, with detail on the ongoing covid-19 pandemic. We also consider localised severe climatic or geological events and extra-terrestrial risks from hits by asteroids. We discuss current knowledge of the likely causes of historic mass extinctions, such as the Cretaceous-Paleogene extinction which abolished the majority of the dinosaurs.
Maniza Hijab, Avula Damodaram
Blockchain Technology and Innovations in Business Processes pp 723-730; doi:10.1007/978-981-16-0878-0_70

Abstract:
In the distributed computing environments, user-submitted job details such as the expected job completion time estimates are prone to inaccuracies. These inaccurate details force the system to under-perform due to ineffective allocation of processing resources. Addressing the concerns that crop-up due to the presence of these ill-defined user-provided parameters is an important task, which is very much required to get the jobs executed using optimal number of resources. At the same time, studying the ways of deriving accurate job runtimes benefits us in attaining improved load balancing results. The work proposed in the present study tries to apply an enhanced user priority model, taking into account the penalty and aging of job requests. It also combines least load variance method to improve the load balancing across grid resources. Simulation results obtained using realistic workloads bring forward the load balance efficiency of the studied scheme. This also confirms that to consider and infer of improved modeling of these user priority provides gains that outperform the methods void of it. The results attained are equated and contrasted with prevailing algorithms in terms of parameters like response time, wait time, tardiness, and average resource utilization in high-performance computing environments.
Sidharth Atluri, Revanth Rallabandi
Blockchain Technology and Innovations in Business Processes pp 377-385; doi:10.1007/978-981-16-0878-0_37

Abstract:
The content in the present paper reviews the attack carried out to decipher WEP, WPA, and WPA2 passwords using a tool named Fluxion. Before understanding how the tool works, brief information about the security protocols is given so that comprehending the attack more undoubtedly. At the same time, we compare Fluxion to other pre-existing tools used to crack Wi-Fi passwords and then list out the major differences between them. This comparison is done to evaluate the efficacy and success rate of Fluxion. In conclusion, this research and attack are performed to provide a deeper insight into WEP, WPA, and WPA2 cracking.
K. Mallikarjuna, Y. Hariprasad Reddy
Blockchain Technology and Innovations in Business Processes pp 9-16; doi:10.1007/978-981-16-0878-0_2

Abstract:
Universally, specialists and scientists accept that flexibility assumes a elementary play in modern factory segment. Only associated with modest parcel size generation since agility adaptable is an indispensable part to be incorporate into course of action of racks in format plan among the assembling fragment. In view of such conditions, considering NP hard double target issues is, regularly, a lumbering responsibility. In this work, researchers tended to about a populace-based high end search techniques like differential development (DE) and sheep run technique (SRT) for making wrung structure configuration matters in lithe system of manufacturing location. The instigators focused on twofold aim headway connected with fundamental objective is stressed over the versatile slot (FJSP) arranging issue, the accompanying objective focused on wrung order layout matters where expelling the interest of machineries within lead-ins of wrung steps to control rigid transference cost and hoarding working time of employments on machineries. The accomplishment of the estimation (SRT and TS) is crisscross by standard issues. At long last, it is pondered that SRT yields better outcomes at the point on par with TS.
M. D. Asrar Ahmed, S. Ramachandram, Khaleel Ur Rahman Khan
Blockchain Technology and Innovations in Business Processes pp 655-664; doi:10.1007/978-981-16-0878-0_63

Abstract:
Searchable encryption (SE) is a promising primitive which enables data owners to privately query and retrieve required documents from encrypted outsourced data collection in cloud servers. Most of the SE schemes in literature strive to achieve a balanced trade-off between efficiency, privacy and expressiveness of query. However, a vast majority of efficient and secure schemes lack searching capabilities beyond exact match of queries and ignore the semantic relationship between keywords and documents. Therefore, a new trend in SE research is to address the question: How to make search semantic-aware and context-based? Majority of the existing semantic search schemes are static, do not support dynamic update operations, suffer from leakage of significant information to server, and employ huge size vectors to represent documents, keywords and topics/features. We propose a privacy preserving, relevance ranking-based dynamic search scheme using a sublinear search time hash-based indexing mechanism and semantic-aware search supporting semantic expansion of user queries. Our scheme employs Word2Vec model to quantitatively evaluate semantic relationships between query and other keywords to expand queries to fulfill user’s search intentions. It also supports dynamic operations like insert and delete of documents on outsourced collection with less efforts to update relevance information which is calculated partially at client and server. Experiments on RFC dataset have demonstrated a time and space efficient non-interactive semantic search over encrypted data.
Srikanth Bethu, Suresh Mamidisetti, S. Bhargavi Latha, B. Sankara Babu
Blockchain Technology and Innovations in Business Processes pp 475-485; doi:10.1007/978-981-16-0878-0_47

Abstract:
Correspondence by means of motions is a visual language that is used by in need of a hearing-aided people as their local language. Not in the least like acoustically passed on sound models, signal-based correspondence uses non-verbal correspondence and manual correspondence to easily pass on the contemplations of a person. It is practiced by simultaneously uniting hand shapes, heading and advancement of the hands, arms or body, and outward appearances. In this paper, we will endeavor to develop a programmed model which changes over voice to motion-based correspondence and besides correspondence by means of motions to voice/text. We may be using talk-to-message programming interface (Python modules or Google programming interface) and a while later using the semantics of natural language processing to breakdown the substance into more diminutive sensible pieces which requires AI as a segment. Instructive assortments of predefined motion-based correspondence are used as the information with the objective that the item can use manmade mental ability to show the changed over sound into the signal-based correspondence.
, Wladimir L. Tenecota, Paul Santiago Pullas Tapia, Livio Danilo Miniguano Miniguano
Blockchain Technology and Innovations in Business Processes pp 757-764; doi:10.1007/978-981-16-0878-0_74

Abstract:
This paper presents the development of an agent based on an ontology reasoner based on the CommonKADS methodology. An ontology is built for the representation of the shoplifting trick “bulky-baggage” in the Protégé tool and in Java source code on the Jena library. And to build the agent, the Pellet reasoner is used both for Protégé and for its implementation in Java. As a result, the products that were stolen from the supermarket are taken by inference.
T. Asha, H. S. Jahanavi, Sony S. Rao, S. Sinchana, K. A. Priyanka
Blockchain Technology and Innovations in Business Processes pp 155-164; doi:10.1007/978-981-16-0878-0_16

Abstract:
Our life is dependent upon trees. There is a deep relationship between man and trees. Nowadays, there are many incidents about smuggling of trees like sandal and sagwan. These trees are very costly and meager. They are used in the medical sciences, cosmetics and many more. To restrict their smuggling and to save forests around the globe, some preventive measures need to be deployed. A system has been proposed that uses RFID tags and four sensors along with Wi-Fi module which can be used to restrict smuggling. The proposed system is cost effective and efficiently signals the forest officer or any authorities regarding any illegal smuggling activities.
T. Subba Reddy, J. Harikiran, B. Sai Chandana
Blockchain Technology and Innovations in Business Processes pp 633-641; doi:10.1007/978-981-16-0878-0_61

Abstract:
The main objective of hyperspectral Image Classification is to group pixels into spectral classes, where each class having a unique label representing specific information in the image. The classification can be done using methods categorized as supervised and unsupervised. The contrast of hyperspectral images is degraded if there is any disturbance of the transmission medium. This disturbance degrades the quality of the image generated by the sensor, which effects the classification accuracy. In this paper, Genetic Algorithm (GA) is used for hyperspectral image analysis. The algorithm is used in contrast enhancement, dimensionality reduction, and classification. This dimensionality reduction will remove less informative bands, decrease storage space, computational load, and communication bandwidth. The experimental results show the improvement of accuracy in classifying Indian Pines and Pavia University datasets
Hemalatha Eedi, Pattan Asif Khan
Blockchain Technology and Innovations in Business Processes pp 773-784; doi:10.1007/978-981-16-0878-0_76

Abstract:
Smart contracts are widely popularized to transfer an asset securely from one device to another. Smart contracts contain the blockchain’s business logic that revolutionized the concept of self-enforcing contracts without the need for a middle man. Many use cases thus are being generated day by day. Smart contracts allow us to build decentralized applications through blockchains. The transactions in the smart contract are interrelated; they define the overall flow of the application. To maintain integrity between the transactions, the execution of the smart contracts is sequential and has no conflicts. These contracts’ execution is slow and time-consuming. Thus, we cannot leverage the current systems’ complete resource utilization. To overcome this, we propose a safer multi-threading model using fine-grain locking and thread executor service mechanism to concurrently execute the smart contract which also provides integrity among the transactions. Our results prove the faster and safer execution of smart contracts.
, , , Gauri Vaidya, Krishn Kumar Gupt, Vivek Kshirsagar
Blockchain Technology and Innovations in Business Processes pp 609-621; doi:10.1007/978-981-16-0878-0_59

Abstract:
The desire of human intelligence to surpass its potential has triggered the emergence of artificial intelligence and machine learning. Over the last seven decades, these terms have gained much prominence in the digital arena due to its wide adoption of techniques for designing affluent industry-enabled solutions. In this comprehensive survey on artificial intelligence, the authors provide insights from the evolution of machine learning and artificial intelligence to the present state of art and how the technology in future can be exploited to yield solutions to some of the challenging global problems. The discussion centers around successful deployment of diverse use cases for the present state of affairs. The rising interest among researchers and practitioners led to the unfolding of AI into many popular subfields as we know today. Through the course of this research article, the authors provide brief highlights about techniques for supervised as well as unsupervised learning. AI has paved the way to accomplish cutting-edge research in complex competitive domains ranging from autonomous driving, climate change, cyber-physical security systems, to healthcare diagnostics. The study concludes by depicting the growing share in market revenues from artificial intelligence-powered products and the forecasted billions of dollars worth of market shares ahead in the coming decade.
S. Fouzia Sayeedunnisa, Nagaratna P. Hegde, Khaleel Ur Rahman Khan
Blockchain Technology and Innovations in Business Processes pp 423-430; doi:10.1007/978-981-16-0878-0_42

Abstract:
Sentiment analysis faces the biggest challenge of high-dimensional feature set. The current trends contemplate this intricate process through conventional feature selection/extraction. In this proposal, the statistical feature selection method, Wilcoxon sign rank score, is used for optimal feature selection. The proposal evaluates and compares the conventional filter method of feature selection with the Wilcoxon sign score for finding the optimal features. The features are defined by feature association between the terms and the sentiment lexicon. The identified optimal features using information gain (IG), chi square, and statistical method Wilcoxon sign score are then classified using the Adaboost classifier. The experiment was conducted on three datasets widely used for sentiment analysis. Result from the experiment demonstrate that the classification accuracy using the proposed method of optimal feature selection is much higher when compared to the contemporary models.
Sanjay Chaturvedi, Arun Parakh, H. K. Verma
Blockchain Technology and Innovations in Business Processes pp 747-755; doi:10.1007/978-981-16-0878-0_73

Abstract:
Today, systems around us are expanding rapidly every day, whether it be communication systems, power distribution systems or security systems, or any other interwoven system in our daily lives. With the increasing size, these systems are becoming complex to manage as they are interdependent on several parameters. This problem of managing systems is handled very well by incorporating smartness into these systems. A system can be made smart by using current technologies like IoT and WSN. Where in IoT, the sensors are Internet-enabled and send data directly over the Internet, and the case with WSN is different in the sense that WSN does not need to have any connection to the Internet and can be used independently. The use of WSN-based systems requires wireless sensor nodes to sense the parameters of the system under observation. The available works present different ways of developing the sensor nodes. Still, the common problem with them is the cost of development and the complexity and steep learning curve to reproduce those sensor nodes within the academia for research purposes. In this work, we present a simple approach to design a wireless sensor node for application in a power monitoring system. We built the sensor node around an open-source development board, Arduino Uno, using simple circuits and readily available sensors and used ZigBee technology, an open standard, for wireless communication. We implemented the developed sensor node in our work ‘wireless sensor network-based power monitoring system’. Here, we measure three critical parameters at a power distribution point viz voltage, current, and frequency. The measured values are transmitted to the central server from where the distribution system is monitored. The operating voltage of power lines varies between 230 and 245 V, and the current varies to a maximum of 30 A in our case. The frequency ranges from 49.8 to 50.25 Hz. The results obtained in implementation have a marginal error with an approximate mean square error of less than 0.5% of the parameter’s maximum operating value. These results have validated our developed sensor node and the power monitoring system.
, Jürgen Engel
Published: 8 July 2021
Life and Its Future pp 35-55; doi:10.1007/978-3-030-59075-8_4

Abstract:
Over more than 4 billion years, many millions of species have developed on Earth by biological evolution under natural selection. We summarise the theory of the mechanism of evolution as developed by Charles Darwin. We survey later research that led to the identification of DNA as the molecule of inheritance, its structure and the molecular basis of genetic inheritance. We discuss the use of phylogenetic plots, based on DNA, RNA or protein sequences, to infer pathways of evolution. The sequencing of the human genome and comparisons between modern day humans and palaeontological remains have enabled new models of human evolution and an appreciation that there is no biological basis for the concept of race.
Sridhar Gujjeti, Suresh Pabboju
Blockchain Technology and Innovations in Business Processes pp 241-250; doi:10.1007/978-981-16-0878-0_24

Abstract:
Big data is an emerging domain with huge amounts of data and is increasing rapidly in an exponential manner. There exist different eras in the massive datasets, but the analysis of huge data in the medical field is a challenging task. This paper presents a Rider-based Deep belief network (Rider-DBN) for classifying big data in the medical domain to predict diseases. The goal is to provide a MapReduce framework with a deep learning classifier that can categorize normal and abnormal classes with improved accuracy. Here, the information gain is employed for selecting the imperative features using inputted data considering mappers. Thus, the dimension of the features is reduced in such a way that only the selected features are given for the classification to handle the big data. The selected features are employed by the Deep belief network (DBN) for categorizing the normal or abnormal classes in disease prediction. The Rider optimization algorithm (ROA) is employed to train DBN that finds optimum weights of the DBN for disease prediction. The Rider-DBN provides superior performance with the accuracy of 89.3%, sensitivity of 78.6%, and specificity of 92%.
S. Rooban, I. Venkata Sai Eshwar, R. Radhika, M. Dheeraj Kumar, K. Chaitanya Krishna
Blockchain Technology and Innovations in Business Processes pp 365-375; doi:10.1007/978-981-16-0878-0_36

Abstract:
Reliability is the basic requirement for all the products and even for human beings. All the researchers and manufacturing industry are focusing toward improving the reliability of the products or circuits with minimum cost. This paper presents a speed and direction control of cost-effective robot which can be used for surveillance in places where human beings are unable to enter. Many surveillance robots have been proposed by many researchers in recent years. Always the customer expects single device usage for various applications; this requirement makes the designer to incorporate all the features in a device that leads to increased cost and reduction in speed. One of the methods to improve the speed of the device processing capability with all features is parallel processing that makes the product costlier because high cost of high-speed parallel processor. The proposed method incorporates many features and increases the speed of operation by doing parallel operation with different processors. This proposed method of designing a surveillance robot uses three processors which are Arduino, MyRIO and NodeMCU. All the three processors are of low cost and are easily available. The proposed method is divided into modules, and various features of surveillance robot are allocated into each module with different processors. So that robot can operate in parallel for the applications. Because of the parallel operation, the speed of operation is improved, and if any one processor fails, the robot can work with the limited features whereas in single processor once the processor fails that collapse the robot.
Shiramshetty Gouthami,
Blockchain Technology and Innovations in Business Processes pp 537-547; doi:10.1007/978-981-16-0878-0_53

Abstract:
The evaluation of any product or event on social media with the opinion or emotion of peoples is known as sentiment analysis (SA). A great deal of attention has been attracted in recent years, toward both science and industry fields for a variety of uses. Machine learning and the text mining uses this most widely known application area of sentiment analysis. This paper presents a framework for efficient multilevel sentiment analysis using fuzzy logic for the classification of online test reviews polarity as strong positive, positive, negative and strong negative. This proposed model can use the fuzzy logic classifier to enhance the degree of sentiment polarity of reviews. Here, fuzzy logic classifier is used for finding the sentiment classes. This also utilizes the mechanism of imputation of missing sentiment for integrating non-opinionated sentences in generating precise results. Results show that the proposed method has a capability of extracting opinions and classify them in an effective way. The proposed method has a capability to predict the degree of sentiment polarity for the reviews on a social media. The better precision and F1-scores are obtained for an objective/subjective classification and polarity (positive/negative) classification on twitter dataset.
Vijay A. Kanade
Blockchain Technology and Innovations in Business Processes pp 305-314; doi:10.1007/978-981-16-0878-0_30

Abstract:
Internet is playing a critical role in today’s world. It has kept people connected regardless of the physical barriers. Business connections, communications, and remote work seem a possibility today due to the Internet. However, with the growth in smart devices and an exponential increase in the number of Internet users, there has been significant growth in the global Internet traffic which has exposed the limitations of the RF signals used in wireless communication in households, offices, and public places. In addition, these RF signals encounter disturbances as they travel through the transmission medium, i.e., air, and undergo attenuation. As a result, the RF signals received at the client end device seem to display an inconsistent and unstable flow, leading to an unsteady Internet connection for its users. The research paper discloses a novel solution to address the problem of inconsistent and unstable Internet connection observed in a Wi-Fi networking environment, wherein Wi-Fi routers are at play in a defined geography.
K. Vasanth, C. N. Ravi, S. Nagaraj, M. Vadivel, K. Gopi, S. Pradeep Kumar Reddy, Thulasi Prasad
Blockchain Technology and Innovations in Business Processes pp 147-154; doi:10.1007/978-981-16-0878-0_15

Abstract:
A decision based asymmetrically trimmed modified geometric mean algorithm (DBATMGMA) for the removal of high density salt and pepper noise in images and videos is proposed. The algorithm uses fixed 3 × 3 windows for increasing noise densities. The algorithm initially checks for the presence of outliers (0 or 255) in the processed pixel. If it holds the outliers, the processed pixel is termed faulty. If the processed pixel is faulty, check for the four neighbors are noisy or not (0 or 255). If all the four neighbors are noisy, then check for all the pixels is noisy in the confined neighborhood. If the entire window is noisy, then the corrupted pixel is replaced by mean of all the elements else the corrupted pixel is replaced by mean of the four neighbors. If all the four neighbors are not noisy, then the faulty pixels are replaced with asymmetrically trimmed modified geometric mean. If the pixels does not hold the outlier, then the pixel is considered undamaged and left unaltered. The proposed algorithm is compared with standard algorithms on an image database. The noise suppression along with information preservation capability of the proposed algorithm was found to be very good both in terms of qualitative and quantitative measures.
Deepika Pal, Vikrant Bhateja, Archita Johri, Babita Pal
Blockchain Technology and Innovations in Business Processes pp 817-824; doi:10.1007/978-981-16-0878-0_80

Abstract:
Glaucoma is one of the main diseases causing permanent blindness. It is marked by an increase in Intraocular Pressure (IOP) which results in changing the shape of Optic disc and Optic cup. Segmentation and Localization of Optic Disc and Optic Cup for the automated detection and diagnosis of Glaucoma is necessary. Morphological Filters with the method of thresholding of the retinal fundus images have been adapted for segmentation of Region of Interest (ROI). The quality measurement of the segmentation of the ROI can be determined by the use of Similarity Coefficients. The resultant segmented binary images have been obtained with the value of Dice and Jaccard representing overlapping and similarity check between the segmented image and the ground truth. Cup to Disc Ratio has been calculated for the temporary analysis of Glaucoma.
Akashdeep Bhardwaj
Advanced Controllers for Smart Cities pp 177-197; doi:10.1007/978-3-030-69174-5_9

Abstract:
Recent technological innovations and new age computing models in IT infrastructure have provided faster bandwidth speeds, cloud computing, mobile computing and virtualization have virtually melted the boundaries between traditional on premise and internet based enterprise security perimeter. This has created a data-rich digital era, which is in fact an excellent opportunity for hackers and threat vectors leading to cybercrime. In fact, cybercrime has been progressing at the highest pace in last few years. Advanced Persistent Threat or APT is a highly sophisticated threat. Initially, such attacks focused and targeted government, state, or financial institutions only. However, recent breach reports and studies have started to indicate the trend of APT involving wider domains. This chapter takes a critical look at the impact and incidents due to advanced persistent threats and the advanced evasion techniques for packing, encryption, and behavior obfuscation during APT attacks to hide their malicious behavior and evade detection.
Advanced Controllers for Smart Cities pp 65-84; doi:10.1007/978-3-030-69174-5_4

Abstract:
Mal Image represents any type of malicious executable (Windows files, APKs) for using image-based features for building classifiers. In recent years, Mal Image-based malware classification is getting attention, which provides a new approach to malware research and addresses some of the bottlenecks of traditional approaches. With the advancement in computing capacities in recent years, neural network research has gained tremendous attention. As a result, deep learning-based image classification techniques report very high accuracy for different classification tasks such as face detection and recognition, object identification, etc. In this proposed work, the authors have combined these two evolving techniques to improve android malware detection. For this chapter, the research involved experiments with transfer learning techniques under deep learning models and android malware detection techniques. The experimental result of various pre-trained models in terms of accuracy is in the range of 75–80%, but this technique can overcome bottlenecks such as analysis obstacles and obfuscation of traditional methods.
, Abdul Khader Jilani
Advanced Controllers for Smart Cities pp 85-96; doi:10.1007/978-3-030-69174-5_5

Abstract:
Data is termed as huge asset in today’s World. In this paper, an introduction to WWW, classification of different kinds of web, i.e. surface web, deep web and dark web is discussed along with differences among them. Trending research on deep and dark web is discussed focusing on benefits of deep web. The significance of searching deep web data underneath the surface web aids in getting access to gigantic data as 96% of data is hidden inside the deep web and it is freely available. TOR is a tool to access the deep data and how this works along with its benefits are deliberated and is the objective of this chapter. Deep web accessing method is described in detail with suitable examples. Ongoing research in deep web is discussed and later, attacks faced by the deep web and how cyber criminals use the dark web is emphasized. An overview of web, types of web and how it works is discussed focusing on surface web, deep web and dark web. Distinguish characteristics between deep and dark web are portrayed well with suitable examples. Attacks faced by the deep web are explained and the need to secure individuals system when accessing data hidden deeply inside the web and necessary measures to be considered are discussed.
Akashdeep Bhardwaj, Sam Goundar, Luxmi Sapra
Advanced Controllers for Smart Cities pp 113-159; doi:10.1007/978-3-030-69174-5_7

Abstract:
The worldwide infrastructure facilitator for corporations and home customers today is cloud computing. Cloud infrastructure provides infinite consistency in the computing power, storage, and network bandwidth in order for them to satisfy the demands of operation in an optimal manner. Cloud computing allows technology firms, internet suppliers, and home consumers to consistently minimize investments and implementation expenditures. Increased use of cloud-based technology by multinational businesses located in offices, remote areas, and home users was also motivated by the proximity to fast speed connectivity and internet access. This chapter focuses on the creation of a detailed and stable networking architecture to minimize the attacks on hybrid clouds by the distributed denial of service. The writers first published an investigation into cybersecurity problems and the effect on cloud environments. The authors analyzed the study of cloud infrastructure, denial of service, and malware identification and mitigation methods released between January 2010 and December 2020. Current strategies to prevent distributed service denial attacks were tested by the authors. The authors then developed and introduced a stable framework for networks that mitigates distributed service denial attacks on hybrid cloud environments. The proposed infrastructures and the findings contrasted with the single data center architectural architecture were carried out at the network- and device-level assaults. This chapter further discusses future study directions.
, André Heikius, Timo Holopainen
Inventive Computation and Information Technologies pp 174-180; doi:10.1007/978-3-030-80876-1_23

Abstract:
Obesity and overweight are worldwide issues, fortunately there are good treatment options and interventions to decreasing obesity for individuals and organizational bodies. Unfortunately, the good treatment options and interventions need resources. For effective resource allocation, it is crucial to understand how different interventions and different treatment options can be effectively measured for their impact and economic effects. In the article the authors present a concept to manage weight health problems and show why a broad approach is needed to tackle overweight and support individuals with obesity. The article also gives insight for how the treatment of overweight and obesity can be looked an investment towards individuals, businesses, regions and societies.
Leo Christen, Tami Farber,
Inventive Computation and Information Technologies pp 617-624; doi:10.1007/978-3-030-80744-3_77

Abstract:
The COVID-19 pandemic required the adoption of several health-safety practices that have been demonstrated to be crucial for limiting the spread of the virus, including the use of personal protection equipment (PPE). Particularly, face masks have become a ubiquitous component of our daily lives. However, despite their effectiveness, they have several drawbacks. In addition to being uncomfortable for many users, they entirely cover the mouth, which, in turn, poses limitations to non-verbal communication and interpersonal interaction. In this paper, we present the user-centered design process of a solution that augments face masks with additional features that support interaction, awareness, and engagement.
, Wilmer Atoche, Jonatán Rojas
Inventive Computation and Information Technologies pp 797-804; doi:10.1007/978-3-030-80744-3_99

Abstract:
This article aims to study the factors that affect college students due to confinement due to the COVID 19 pandemic. The pandemic has forced university students to study from home, without leaving it, with unfavorable elements and study conditions. Taking into account that it is a situation similar to teleworking, a measurement instrument similar to that used in teleworking adapted to home university studies, has been used to determine the most important factors that affect remote study, particularly ergonomic and psychosocial factors. The results conclude that the main result of the study is the dissatisfaction of the students of the virtual study, followed by the inadequate management of the schedules and the lack of adequate chairs. On the other hand, the least important factor is the visibility of the screen and the characters, since almost 98% of students have adequate equipment for their study.
, Shah Rukh Shakeel, Arto Rajala, Zeeshan Raza
Inventive Computation and Information Technologies pp 42-49; doi:10.1007/978-3-030-80876-1_7

Abstract:
Pakistan is struggling to cope up with its mounting energy needs. The gap between electricity generation and consumption is widening, leaving power cuts as an only choice to bridge the gap. The adverse effects of this crisis can be observed at household and industrial level. In order to mitigate the impacts of this prolonged load shedding, people have started using power generators, uninterrupted power supplies and solar photovoltaics (PV) for generating electricity at homes and work. Solar power, a promising renewable energy source in Pakistan, renders an excellent opportunity to be a sustainable and environmentally friendly alternative for self-generation. However, despite all the benefits it can offer, its adoption is at earlier stages, citing high cost as one of the major barriers. The objective of this study is to explore how the barrier of high cost can be addressed to enhance the use of solar PV in Pakistan. By using the qualitative case study design, the findings of this research highlight the need to introduce innovative business models to make solar PV affordable.
, Jukka Rantala, Timo Holopainen
Inventive Computation and Information Technologies pp 3-8; doi:10.1007/978-3-030-80876-1_1

Abstract:
Failing of most start-ups is a global phenomenon. The start-up’s dealing with technology are often lacking the understating that there are two different sales processes, one dealing with investors and one with actual customers. By understand the importance of business development, their changing unique competing space and the importance of the timing and combining this with customer relationship management and sales process management can produce positive effects on start-ups’ success rate, especially when combined with the under-standing of the need for continuous cash flow. This article introduces sales approaches and models for start-ups to utilize.
Vinh Pham, Ha Min Son, Thuy Huynh,
Inventive Computation and Information Technologies pp 770-778; doi:10.1007/978-3-030-80744-3_96

Abstract:
COVID-19 is an ongoing pandemic that is continuing to spread after recording one hundred million cases, causing millions of casualties, overwhelming health care systems of many countries, and threatening the whole world. Monitoring and assessing the severity of COVID-19 through artificial intelligence would be a practical support for medical practitioners reviving patients and offloading the burden from medical system. Previous works exploited deep learning, for this purpose, which produces inexplainable diagnosis results and lacks medical evidence. Integrating clinical symptom into diagnosis with deep learning will support generating results more compelled and validated. In this study, we focus on verifying the effectiveness of applying the human lung lesion, specifically Ground Glass Opacity and Consolidation, caused by typical pneumonia for COVID-19 detection or severity assessment on chest X-ray image with deep learning technology. We have conducted multiple experiments with state-of-art machine learning architectures (MobileNetV2, ResNet, Faster R-CNN) on many datasets to establish the conclusion. The experiment result demonstrates that lung lesion is useful when incorporating with deep learning solutions for monitoring COVID-19 progression and will provide solid pathway to develop an improved model and support better research in the future.
Oluwatumininu Ademolu, Clinton Aigbavboa, Wellington Thwala
Inventive Computation and Information Technologies pp 86-91; doi:10.1007/978-3-030-80876-1_13

Abstract:
This research discusses ergonomic procedures at building sites and further addresses the usefulness of protection and productivity management practices in the construction industry. Over the last three decades, the construction industry has experienced dramatic changes in terms of the type of project to be delivered, the technology used, the design and tools required by the job, and the communication medium in place. This development put construction firms on their toes as the business becomes trickier. This development in the construction industry necessitates the consideration of effective strategy that will ensure optimality in practice especially in the area of safety and productivity management. To attain enhanced productivity in the construction practice, a safe workplace is very crucial. The key purpose of the analysis is to examine the feasibility of applied ergonomics as a tool for the construction sector’s safety and efficiency management. The study approach focused on the employee and work team, the workplace and the environment, the material involved, the equipment involved, and the organization at large through an applied system of ergonomic practice. Literature was critically reviewed under the categories of construction safety and construction productivity. The two categories were reviewed concerning their geographical location including international, regional, and local. The technique followed is survey design, primary data were gathered to gather data from the selected population by using a possibly the best survey. The appropriateness of the research design can be justified because the design allowed the use of a questionnaire to capture data, the provided data can be quantitatively analyzed for inferential implication. The research uses multisampling techniques which combined stratified and random sampling methods. The stratified sampling was used to group the construction firms according to their sizes, the random sampling is used to select respondents from each stratum. The study indicated that productivity would be enhanced by a safe working environment. This is after the result revealed that productivity would be significantly affected by the condition of the working environment. The study concludes that the ergonomics practices in a construction site is very essential for a safe working environment and enhanced productivity.
Alejandra Lascano, , Fernando Urrutia, Maria Augusta Latta
Inventive Computation and Information Technologies pp 372-379; doi:10.1007/978-3-030-80713-9_47

Abstract:
Severe spine deformations are common among elderly indigenous women of Ecuadorian highlands mainly dedicated to agricultural labors. Participatory Ergonomics (PE) is used to reduce or eliminate the incidence of musculoskeletal disorders. Two demanding daily activities of these women were evaluated with MREBA and 3DSSPP, then the ergonomic recommendations were discussed with the ERGO group, and their opinions regarding the proposals were used to modify them according to the women traditions and customs. The PE is an effective instrument to adjust the recommendations, in the case of this study to be respectful of the customs and traditions of the intervened community. However, the ingrained customs suggest that the modifications should be implemented gradually, especially for older women who have the most compromised musculoskeletal health. A major detected problem is the great magnitude of the loads these women lift and transport, tied to their backs (sacks or children) since they exceeded by far the recommended levels.
Page of 221,003
Articles per Page
by
Show export options
  Select all
Back to Top Top