Odoo is a Belgian suite of business operation software tools including, for illustration, CRM,e- commerce, billing, account, manufacturing, storehouse, design operation, and force operation. Odoo experience which took place in Belgium in October 2022, Fabien Pinckaers blazoned that moving forward Odoo will make all operations available for free in the enterprise edition, making Odoo an unequaled suite of 70 integrated business apps. The Community interpretation is libre software, certified under the GNU LGPLv3. The Enterprise interpretation has personal redundant features and services. The source law for the frame and core ERP modules is curated by the Belgium- grounded OdooS.A. Odoo is available for both on- demesne and ready- to- use SaaS surroundings. The source law for the OpenObject frame and the core ERP modules are handed by Belgium- grounded OdooS.A. OdooS.A( formerly OpenERPS.A) has released the core software as open source.( 4) Since the V9.0 release, the company has transitioned to an open- core model, which provides subscription- grounded personal enterprise software and pall- hosted software as a service, in addition to the open- source interpretation. In 2013, the not- for- profit Odoo Community Association was formed to promote the wide use of Odoo and to support the cooperative development of Odoo features.( 5)
{"title":"AUTOMATIC TASK ASSIGNING FOR EMPLOYEE USING ODOO FRAMEWORK","authors":"S. S, S. N.","doi":"10.55041/isjem00405","DOIUrl":"https://doi.org/10.55041/isjem00405","url":null,"abstract":"Odoo is a Belgian suite of business operation software tools including, for illustration, CRM,e- commerce, billing, account, manufacturing, storehouse, design operation, and force operation. Odoo experience which took place in Belgium in October 2022, Fabien Pinckaers blazoned that moving forward Odoo will make all operations available for free in the enterprise edition, making Odoo an unequaled suite of 70 integrated business apps. The Community interpretation is libre software, certified under the GNU LGPLv3. The Enterprise interpretation has personal redundant features and services. The source law for the frame and core ERP modules is curated by the Belgium- grounded OdooS.A. Odoo is available for both on- demesne and ready- to- use SaaS surroundings. The source law for the OpenObject frame and the core ERP modules are handed by Belgium- grounded OdooS.A. OdooS.A( formerly OpenERPS.A) has released the core software as open source.( 4) Since the V9.0 release, the company has transitioned to an open- core model, which provides subscription- grounded personal enterprise software and pall- hosted software as a service, in addition to the open- source interpretation. In 2013, the not- for- profit Odoo Community Association was formed to promote the wide use of Odoo and to support the cooperative development of Odoo features.( 5)","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper discusses provided is a method of storing accident data for a vehicle, in which image data taken by a camera during driving is stored in real time. Recently, to acquire data for determining circumstances at the time of a vehicle accident and a fault between parties, research and development on a vehicle black box for recording driving data such as vehicle speed have been conducted actively. In particular, a vehicle accident data recording apparatus has recently attracted much attention, which records external circumstances at the time of an accident as image data by using a camera mounted in the vehicle and uses pre- and post-accident external image data as well as driving data, thereby finding out cause of the accident. The accident of the vehicle means an unexpected event which may cause damage to a body of the vehicle or of a passenger. Keywords:IOT,cloud,data storage,accident info,sensor.
{"title":"IOT BASED VEHICLE INFORMATION STORAGE CONTAINER TO PREVENT FAKE CLAIM INSURANCE","authors":"Thirumurugan R","doi":"10.55041/isjem00448","DOIUrl":"https://doi.org/10.55041/isjem00448","url":null,"abstract":"This paper discusses provided is a method of storing accident data for a vehicle, in which image data taken by a camera during driving is stored in real time. Recently, to acquire data for determining circumstances at the time of a vehicle accident and a fault between parties, research and development on a vehicle black box for recording driving data such as vehicle speed have been conducted actively. In particular, a vehicle accident data recording apparatus has recently attracted much attention, which records external circumstances at the time of an accident as image data by using a camera mounted in the vehicle and uses pre- and post-accident external image data as well as driving data, thereby finding out cause of the accident. The accident of the vehicle means an unexpected event which may cause damage to a body of the vehicle or of a passenger. Keywords:IOT,cloud,data storage,accident info,sensor.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122827472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today it’s a very serious issue of air pollution in our environment. Day by Day its increasing because of industries, vehicles and constructions sites. So, this IOT based Air Pollution Monitoring System works to monitor the current quality of air over a web server using the internet. Air Pollution effects mainly human lungs and by this they face many serious disease as well. The particle which is generated from these sectors are categorized in two types and first PM 2.5 which is generated from vehicle, bricks chimneys and industries and second one is PM 10 which is generated from construction sites, mines etc. Keywords: Air Pollution, Internet of Things, Arduino Uno, MQ135 Sensor.
{"title":"IOT Based Air Pollution Monitoring System","authors":"Ravi Kumar, Sanjay Singla, Jhonsy Bansal","doi":"10.55041/isjem00297","DOIUrl":"https://doi.org/10.55041/isjem00297","url":null,"abstract":"Today it’s a very serious issue of air pollution in our environment. Day by Day its increasing because of industries, vehicles and constructions sites. So, this IOT based Air Pollution Monitoring System works to monitor the current quality of air over a web server using the internet. Air Pollution effects mainly human lungs and by this they face many serious disease as well. The particle which is generated from these sectors are categorized in two types and first PM 2.5 which is generated from vehicle, bricks chimneys and industries and second one is PM 10 which is generated from construction sites, mines etc. Keywords: Air Pollution, Internet of Things, Arduino Uno, MQ135 Sensor.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115782919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An important indicator that shows how well-liked a YouTube video is by its viewers is the like ratio. By examining the emotive tone of viewer comments, sentiment analysis can be used to forecast the like ratio of a YouTube video. With this method, the YouTube API is used to first get the comments from the video. Following that, these comments are pre-processed to eliminate any unnecessary data, including URLs and special characters, and to change the text's case to lowercase. The pre-processed comments are then subjected to sentiment analysis using a natural language processing package, such as TextBlob or NLTK, to categorise them as positive, negative, or neutral. The like ratio can be estimated after sentiment analysis by measuring the percentage of positive comments to all comments. This can be used to determine how viewers feel about the video overall and forecast whether the film will have a high or low like ratio. Overall, forecasting the like ratio of a YouTube video using sentiment analysis can offer insightful information for content producers and marketers, assisting them in understanding the emotional response of their audience and improving their content accordingly. KEYWORDS: Text mining, Sentimental Analysis, Youtube, NLTK, Machine Learing Processing
{"title":"Sentimental Analysis of YouTube Video Comments Using Bagging Ensemble Learning Approach","authors":"Mr.Rajendra prasad .K","doi":"10.55041/isjem00336","DOIUrl":"https://doi.org/10.55041/isjem00336","url":null,"abstract":"An important indicator that shows how well-liked a YouTube video is by its viewers is the like ratio. By examining the emotive tone of viewer comments, sentiment analysis can be used to forecast the like ratio of a YouTube video. With this method, the YouTube API is used to first get the comments from the video. Following that, these comments are pre-processed to eliminate any unnecessary data, including URLs and special characters, and to change the text's case to lowercase. The pre-processed comments are then subjected to sentiment analysis using a natural language processing package, such as TextBlob or NLTK, to categorise them as positive, negative, or neutral. The like ratio can be estimated after sentiment analysis by measuring the percentage of positive comments to all comments. This can be used to determine how viewers feel about the video overall and forecast whether the film will have a high or low like ratio. Overall, forecasting the like ratio of a YouTube video using sentiment analysis can offer insightful information for content producers and marketers, assisting them in understanding the emotional response of their audience and improving their content accordingly. KEYWORDS: Text mining, Sentimental Analysis, Youtube, NLTK, Machine Learing Processing","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121575330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer graphics software has become an integral part of the digital age, transforming the way we create and interact with visual media. The software allows users to create stunning visual content that can be used in a variety of industries. One such industry is the film industry, where computer graphics software is extensively used to create realistic visual effects and animations that are immersive and visually appealing to audiences. The gaming industry is another industry where computer graphics software plays a crucial role. Game developers use computer graphics software to create 3D models, animations, and environments for video games. The development of game engines such as Unity and Unreal Engine has led to the creation of visually stunning games that have revolutionized the gaming industry. Advertising and marketing are other industries that have significantly benefitted from computer graphics software. Digital advertisements, product designs, and marketing campaigns can be created with ease, making them more visually appealing and engaging to potential customers. The software allows advertisers to create unique and compelling content that stands out from their competitors. The architecture and engineering industries also rely heavily on computer graphics software to create 3D models of buildings and structures. The software allows designers to create accurate and realistic designs that can be used for presentations and proposals. It has become an essential tool in the architecture and engineering industries, enabling designers to visualize their ideas and present them to clients with more clarity. Advancements in computer graphics software have made it easier for users to create stunning visual content. The development of new tools and techniques has improved the user experience and enhanced the quality of graphics. For instance, machine learning algorithms have been integrated into the software, enabling users to create more realistic images and animations. The future of computer graphics software is bright, with new technologies and innovations constantly being developed. The development of augmented and virtual reality has revolutionized the way we experience visual content, and software developers are working on tools and techniques to create even more immersive experiences for users. With the continuous development of technology, we can only expect to see even more exciting developments in the world of computer graphics software.
{"title":"RESEARCH ON APPLICATION OF COMPUTER GRAPHICS SOFTWARE","authors":"M. Madan","doi":"10.55041/isjem00381","DOIUrl":"https://doi.org/10.55041/isjem00381","url":null,"abstract":"Computer graphics software has become an integral part of the digital age, transforming the way we create and interact with visual media. The software allows users to create stunning visual content that can be used in a variety of industries. One such industry is the film industry, where computer graphics software is extensively used to create realistic visual effects and animations that are immersive and visually appealing to audiences. The gaming industry is another industry where computer graphics software plays a crucial role. Game developers use computer graphics software to create 3D models, animations, and environments for video games. The development of game engines such as Unity and Unreal Engine has led to the creation of visually stunning games that have revolutionized the gaming industry. Advertising and marketing are other industries that have significantly benefitted from computer graphics software. Digital advertisements, product designs, and marketing campaigns can be created with ease, making them more visually appealing and engaging to potential customers. The software allows advertisers to create unique and compelling content that stands out from their competitors. The architecture and engineering industries also rely heavily on computer graphics software to create 3D models of buildings and structures. The software allows designers to create accurate and realistic designs that can be used for presentations and proposals. It has become an essential tool in the architecture and engineering industries, enabling designers to visualize their ideas and present them to clients with more clarity. Advancements in computer graphics software have made it easier for users to create stunning visual content. The development of new tools and techniques has improved the user experience and enhanced the quality of graphics. For instance, machine learning algorithms have been integrated into the software, enabling users to create more realistic images and animations. The future of computer graphics software is bright, with new technologies and innovations constantly being developed. The development of augmented and virtual reality has revolutionized the way we experience visual content, and software developers are working on tools and techniques to create even more immersive experiences for users. With the continuous development of technology, we can only expect to see even more exciting developments in the world of computer graphics software.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114716087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vaibhav Ghule, Tanmay Ghormade, Sujal Lanjewar, P. Sambhare
In today’s world many prestigious applications used recommendation systems. Some of the information filtering algorithms are used to predict preferences as per user requirements. This system saves users time in searching and provides the best user experience. Books, news, music, articles, movies, videos, etc. are the most popular areas where recommendation systems are used. When we take reference from several research papers, one thing is clear Content-Based Filtering Algorithm is used for the recommendation system. In this paper, we work on several algorithms and manipulation of results of this we get a final recommendation list based on ratings like dislike content, related content, etc. Keywords: -Contest Based Filtering, Movie Recommendation System, Vector Similarity, Text to vector, K NN Algorithm, Cosine Similarity.
{"title":"Movie Recommendation System Using Filtering Techniques","authors":"Vaibhav Ghule, Tanmay Ghormade, Sujal Lanjewar, P. Sambhare","doi":"10.55041/isjem00308","DOIUrl":"https://doi.org/10.55041/isjem00308","url":null,"abstract":"In today’s world many prestigious applications used recommendation systems. Some of the information filtering algorithms are used to predict preferences as per user requirements. This system saves users time in searching and provides the best user experience. Books, news, music, articles, movies, videos, etc. are the most popular areas where recommendation systems are used. When we take reference from several research papers, one thing is clear Content-Based Filtering Algorithm is used for the recommendation system. In this paper, we work on several algorithms and manipulation of results of this we get a final recommendation list based on ratings like dislike content, related content, etc. Keywords: -Contest Based Filtering, Movie Recommendation System, Vector Similarity, Text to vector, K NN Algorithm, Cosine Similarity.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132854929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Portfolio website for Interior Design would showcase the designer's unique aesthetic and design philosophy, highlighting their past projects and successful collaborations with clients. The portfolio website would include a carefully curated selection of high-quality images and videos, showcasing the designer's past work. It would describe the website's purpose, design style, and featured projects. This also aims at designer's strengths. The creativity meets functionality. In this portfolio website the customers can view the designer's ideas and works. Once after the view of the portfolio the customers can also take the contact form to contact he designer directly. The customers are also given choice to get quote for upon their selection of the catalogue.
{"title":"CREATION OF PORTFOLIO WEBSITE FOR INTERIOR DESIGN","authors":"S. S, S. N.","doi":"10.55041/isjem00386","DOIUrl":"https://doi.org/10.55041/isjem00386","url":null,"abstract":"The Portfolio website for Interior Design would showcase the designer's unique aesthetic and design philosophy, highlighting their past projects and successful collaborations with clients. The portfolio website would include a carefully curated selection of high-quality images and videos, showcasing the designer's past work. It would describe the website's purpose, design style, and featured projects. This also aims at designer's strengths. The creativity meets functionality. In this portfolio website the customers can view the designer's ideas and works. Once after the view of the portfolio the customers can also take the contact form to contact he designer directly. The customers are also given choice to get quote for upon their selection of the catalogue.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132447333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This journal review provides an overview of the current state of cloud computing, including its definition, benefits, and challenges. It examines the various cloud computing models and architectures, and discusses the security and privacy issues associated with the cloud. It also looks at the potential of cloud computing to transform the IT industry and provide new opportunities for businesses. Finally, the review looks at the future of cloud computing, including potential use cases and applications Cloud computing is a paradigm that has revolutionized the way we store, process and access data and applications. At its core, it involves delivering computing resources such as servers, storage, and applications over the internet, allowing users to access them on-demand from anywhere and at any time. This technology has numerous benefits, including cost-effectiveness, scalability, flexibility, and ease of maintenance. It has become a crucial enabler for many businesses and organizations, offering them the ability to streamline their operations and remain competitive in a constantly changing market. In this abstract, we explore the fundamentals of cloud computing, its key features, and its potential impact on the future of technology.. KEYWORDS Cloud computing, technology, advantages, disadvantages, security, challenges, opportunities.
{"title":"CLOUD COMPUTING","authors":"D. P","doi":"10.55041/isjem00289","DOIUrl":"https://doi.org/10.55041/isjem00289","url":null,"abstract":"This journal review provides an overview of the current state of cloud computing, including its definition, benefits, and challenges. It examines the various cloud computing models and architectures, and discusses the security and privacy issues associated with the cloud. It also looks at the potential of cloud computing to transform the IT industry and provide new opportunities for businesses. Finally, the review looks at the future of cloud computing, including potential use cases and applications Cloud computing is a paradigm that has revolutionized the way we store, process and access data and applications. At its core, it involves delivering computing resources such as servers, storage, and applications over the internet, allowing users to access them on-demand from anywhere and at any time. This technology has numerous benefits, including cost-effectiveness, scalability, flexibility, and ease of maintenance. It has become a crucial enabler for many businesses and organizations, offering them the ability to streamline their operations and remain competitive in a constantly changing market. In this abstract, we explore the fundamentals of cloud computing, its key features, and its potential impact on the future of technology.. KEYWORDS Cloud computing, technology, advantages, disadvantages, security, challenges, opportunities.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115227568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The method may efficiently find rogue nodes by inspecting network traffic in real time. Our system is capable of creating a dynamic blacklist of Network nodes that may be used to block nodes whose trust levels are below a certain minimum. The detection of malicious nodes and the computation of node trust levels are handled by a central server. To increase the network and infrastructure's security, the method may be used in conjunction with other security tools including database activity monitoring, white listing, and data loss prevention. Session based encrypt is used to secure the node from the compromised attacker. Attacker request will be accepted by unique key of individual node validation process. Intruders wouldn't be able to steal TOP-SECRET data or information if this were done.. [1]
{"title":"Networking and Data Communication","authors":"Navya A M, Dr. Padmajadevi G","doi":"10.55041/isjem00355","DOIUrl":"https://doi.org/10.55041/isjem00355","url":null,"abstract":"The method may efficiently find rogue nodes by inspecting network traffic in real time. Our system is capable of creating a dynamic blacklist of Network nodes that may be used to block nodes whose trust levels are below a certain minimum. The detection of malicious nodes and the computation of node trust levels are handled by a central server. To increase the network and infrastructure's security, the method may be used in conjunction with other security tools including database activity monitoring, white listing, and data loss prevention. Session based encrypt is used to secure the node from the compromised attacker. Attacker request will be accepted by unique key of individual node validation process. Intruders wouldn't be able to steal TOP-SECRET data or information if this were done.. [1]","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115618251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
OTT (Over the Top) platforms have seen a meteoric rise in users over the past decade and more so due to the pandemic. There have been several new OTT platforms established to help consumers choose their favourite series, movies or services and this brings a problem of choice to consumers. Many consumers feel that subscribing to many platforms and loyalty programs are a hassle as each may have different amounts and will be renewed on different dates. Cyndesi is an all in one platform that manages subscriptions in one roof and helps making subscribing to various platforms/programmes an hassle free experience. Keywords - OTT (Over the Top) Platforms, Loyalty Programmes, Consumer Spending on OTT, Demographics on OTT
在过去的十年里,由于大流行,OTT (Over the Top)平台的用户迅速增加。已经建立了几个新的OTT平台来帮助消费者选择他们最喜欢的电视剧、电影或服务,这给消费者带来了一个选择的问题。许多消费者觉得订阅多个平台和忠诚度计划很麻烦,因为每个平台的金额可能不同,续订日期也不同。Cyndesi是一个集所有功能于一体的平台,它在一个屋檐下管理订阅,并帮助订阅各种平台/程序成为一种无麻烦的体验。关键词:OTT平台,忠诚度计划,OTT消费者支出,OTT人口统计
{"title":"Cyndesi - All in one OTT Platform","authors":"Baisakhi SHALYA ACCAMMA","doi":"10.55041/isjem00334","DOIUrl":"https://doi.org/10.55041/isjem00334","url":null,"abstract":"OTT (Over the Top) platforms have seen a meteoric rise in users over the past decade and more so due to the pandemic. There have been several new OTT platforms established to help consumers choose their favourite series, movies or services and this brings a problem of choice to consumers. Many consumers feel that subscribing to many platforms and loyalty programs are a hassle as each may have different amounts and will be renewed on different dates. Cyndesi is an all in one platform that manages subscriptions in one roof and helps making subscribing to various platforms/programmes an hassle free experience. Keywords - OTT (Over the Top) Platforms, Loyalty Programmes, Consumer Spending on OTT, Demographics on OTT","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121919553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}