Pub Date : 2020-09-30DOI: 10.17762/ijnpme.v9i03.89
S. Anasica, Sweta Batra
This article explains the risk factors involved in a business. In each type of business, there are certain risk factors for the implementation of anything in the business. The type of risks involved can depend upon many factors. It also depends on the type of business an organisation is doing. But it is very important that the risk analyst does all the analysis of the risks that might arise in future and must take necessary actions in order to avoid those risks. The risk analyst can also try to reduce the impact of the risks on the business. Therefore, it is very important that the risk analyst should have the knowledge of how to analyse risk and then can act upon them.
{"title":"Analysing the Factors Involved In Risk Management in a Business","authors":"S. Anasica, Sweta Batra","doi":"10.17762/ijnpme.v9i03.89","DOIUrl":"https://doi.org/10.17762/ijnpme.v9i03.89","url":null,"abstract":"This article explains the risk factors involved in a business. In each type of business, there are certain risk factors for the implementation of anything in the business. The type of risks involved can depend upon many factors. It also depends on the type of business an organisation is doing. But it is very important that the risk analyst does all the analysis of the risks that might arise in future and must take necessary actions in order to avoid those risks. The risk analyst can also try to reduce the impact of the risks on the business. Therefore, it is very important that the risk analyst should have the knowledge of how to analyse risk and then can act upon them.","PeriodicalId":297822,"journal":{"name":"International Journal of New Practices in Management and Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130591203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-30DOI: 10.17762/ijnpme.v9i03.87
Dr. Anasica S, Mrs. Sweta Batra
This article explains the risk factors involved in a business. In each type of business, there are certain risk factors for the implementation of anything in the business. The type of risks involved can depend upon many factors. It also depends on the type of business an organisation is doing. But it is very important that the risk analyst does all the analysis of the risks that might arise in future and must take necessary actions in order to avoid those risks. The risk analyst can also try to reduce the impact of the risks on the business. Therefore, it is very important that the risk analyst should have the knowledge of how to analyse risk and then can act upon them.
{"title":"Analysing the Factors Involved In Risk Management in a Business","authors":"Dr. Anasica S, Mrs. Sweta Batra","doi":"10.17762/ijnpme.v9i03.87","DOIUrl":"https://doi.org/10.17762/ijnpme.v9i03.87","url":null,"abstract":"This article explains the risk factors involved in a business. In each type of business, there are certain risk factors for the implementation of anything in the business. The type of risks involved can depend upon many factors. It also depends on the type of business an organisation is doing. But it is very important that the risk analyst does all the analysis of the risks that might arise in future and must take necessary actions in order to avoid those risks. The risk analyst can also try to reduce the impact of the risks on the business. Therefore, it is very important that the risk analyst should have the knowledge of how to analyse risk and then can act upon them.","PeriodicalId":297822,"journal":{"name":"International Journal of New Practices in Management and Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121275822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-30DOI: 10.17762/ijnpme.v9i03.91
N. Sherje
Bundling materials for calculated intentions are intended to ensure electrical and electronic items and other delicate purchaser products from harms because of stun and over the top vibrations during dealing with and transportation. There is as of late an expanded worry for the improvement of very much planned as well as practical materials. Material maintainability is frequently connected with the extraction of sustainable assets and removal techniques that would not harm our biological system. In this regard, home-grown agro-squander assets would be a savvy choice to create unimportant and expendable green equipment effortlessly. This article features a portion of the answer utilities or elements of bundling supplies and the financially accessible bundling. The possibility of biodegradable materials including indigenous common strands and a case of totally compostable business bundling substance are illustrated. Fundamental aftereffects of stun padding test on surface-adjusted polypropylene arranged in this investigation demonstrated 20% ideal substance padding are introduced.
{"title":"Biodegradable Material Alternatives for Industrial Products and Goods Packaging System","authors":"N. Sherje","doi":"10.17762/ijnpme.v9i03.91","DOIUrl":"https://doi.org/10.17762/ijnpme.v9i03.91","url":null,"abstract":"Bundling materials for calculated intentions are intended to ensure electrical and electronic items and other delicate purchaser products from harms because of stun and over the top vibrations during dealing with and transportation. There is as of late an expanded worry for the improvement of very much planned as well as practical materials. Material maintainability is frequently connected with the extraction of sustainable assets and removal techniques that would not harm our biological system. In this regard, home-grown agro-squander assets would be a savvy choice to create unimportant and expendable green equipment effortlessly. This article features a portion of the answer utilities or elements of bundling supplies and the financially accessible bundling. The possibility of biodegradable materials including indigenous common strands and a case of totally compostable business bundling substance are illustrated. Fundamental aftereffects of stun padding test on surface-adjusted polypropylene arranged in this investigation demonstrated 20% ideal substance padding are introduced.","PeriodicalId":297822,"journal":{"name":"International Journal of New Practices in Management and Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127274391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-30DOI: 10.17762/ijnpme.v9i02.83
Mrs. Ritika Dhabliya
Autonomous travel is a notable test for visually impaired people and furthermore the expanding accessibility of cost proficiency, superior and versatile advanced imaging gadgets has made a gigantic open door for enhancing conventional checking for record picture securing. We propose a camera based visual help system utilizing raspberry pi for content perusing, movement of items and the sentiments of outwardly hindered people face various challenges to play out their everyday errand. They are absolutely or halfway subject to somebody for help. Their issues have made them to lose their would like to live in this contending society. They look for help from others to control them entire day. This paper expects to make the outwardly debilitated individual completely autonomous in all perspectives. The proposed framework depends on a virtual eye, which conveys to the outside encompassing through a camera. The camera goes about as a consistent wellspring of data to the framework. The information is gotten through the camera. They got signals from the information gadgets are dissected utilizing picture handling in LABVIEW and it reacts to the outwardly debilitated individual through discourse preparing units. The handled data about environmental factors will be educated through the speaker (yield unit) by which outwardly weakened individuals can move and make their work effectively all alone. Also the outwardly weakened individual can naturally control a portion of the home apparatuses like fan utilizing remote correspondence framework.
{"title":"Obstacle Detection and Text Recognition for Visually Impaired Person Based on Raspberry Pi","authors":"Mrs. Ritika Dhabliya","doi":"10.17762/ijnpme.v9i02.83","DOIUrl":"https://doi.org/10.17762/ijnpme.v9i02.83","url":null,"abstract":"Autonomous travel is a notable test for visually impaired people and furthermore the expanding accessibility of cost proficiency, superior and versatile advanced imaging gadgets has made a gigantic open door for enhancing conventional checking for record picture securing. We propose a camera based visual help system utilizing raspberry pi for content perusing, movement of items and the sentiments of outwardly hindered people face various challenges to play out their everyday errand. They are absolutely or halfway subject to somebody for help. Their issues have made them to lose their would like to live in this contending society. They look for help from others to control them entire day. This paper expects to make the outwardly debilitated individual completely autonomous in all perspectives. The proposed framework depends on a virtual eye, which conveys to the outside encompassing through a camera. The camera goes about as a consistent wellspring of data to the framework. The information is gotten through the camera. They got signals from the information gadgets are dissected utilizing picture handling in LABVIEW and it reacts to the outwardly debilitated individual through discourse preparing units. The handled data about environmental factors will be educated through the speaker (yield unit) by which outwardly weakened individuals can move and make their work effectively all alone. Also the outwardly weakened individual can naturally control a portion of the home apparatuses like fan utilizing remote correspondence framework.","PeriodicalId":297822,"journal":{"name":"International Journal of New Practices in Management and Engineering","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116657340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-30DOI: 10.17762/ijnpme.v9i02.84
V. Arthi
4G Wireless communication systems have the inherent capability to foster the multimedia services in terms of bandwidth and data rate. These systems have very high integrity compared to the conventional wireless communication systems. It can fully support extended multimedia services with High Definition quality, audio and video files. Wireless internet and other broad band services provided superior quality signal transmission and reception. The degree of freedom enjoyed by the technology in terms of scalability and reliability is highly commendable. Any basic wireless transmitter sends information by varying the phase of the signal. In the receiver end, the desired signal can be decoded by appropriate decoding algorithm. The degradation occurs at the conventional receivers due to lack of Channel State Information. The efficiency of 4G system purely relies on the performance of receiver and is purely dependent on the synchronization of estimated instantaneous channel. In any wireless terminal, channel state information provides the in and around status of the channel. It provides the following parameters of the propagating signal (ie) Scattering, Fading and Attenuation. The dynamic estimation of channel state information can be obtained through Enhanced Least Squares channel estimation algorithm. It is based on Multi Carrier Filter Bank Transmission system. This kind of dynamic estimation can be done with a set of well-known sequence of coded unique bits .For a transmitter the information propagation is initiated in the form of frame bursts. It enhances the throughput of the system to the required level.
{"title":"A Novel Channel Estimation Technique in MIMO-OFDM Mobile Communication Systems","authors":"V. Arthi","doi":"10.17762/ijnpme.v9i02.84","DOIUrl":"https://doi.org/10.17762/ijnpme.v9i02.84","url":null,"abstract":"4G Wireless communication systems have the inherent capability to foster the multimedia services in terms of bandwidth and data rate. These systems have very high integrity compared to the conventional wireless communication systems. It can fully support extended multimedia services with High Definition quality, audio and video files. Wireless internet and other broad band services provided superior quality signal transmission and reception. The degree of freedom enjoyed by the technology in terms of scalability and reliability is highly commendable. Any basic wireless transmitter sends information by varying the phase of the signal. In the receiver end, the desired signal can be decoded by appropriate decoding algorithm. The degradation occurs at the conventional receivers due to lack of Channel State Information. The efficiency of 4G system purely relies on the performance of receiver and is purely dependent on the synchronization of estimated instantaneous channel. In any wireless terminal, channel state information provides the in and around status of the channel. It provides the following parameters of the propagating signal (ie) Scattering, Fading and Attenuation. The dynamic estimation of channel state information can be obtained through Enhanced Least Squares channel estimation algorithm. It is based on Multi Carrier Filter Bank Transmission system. This kind of dynamic estimation can be done with a set of well-known sequence of coded unique bits .For a transmitter the information propagation is initiated in the form of frame bursts. It enhances the throughput of the system to the required level.","PeriodicalId":297822,"journal":{"name":"International Journal of New Practices in Management and Engineering","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132301630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-31DOI: 10.17762/ijnpme.v9i01.81
S. Chakkravarthy
One of the potential approaches to lessen the quantity of mishaps in rush hour gridlock is to follow the driver's condition. In this paper, a new driver observing calculation, which works on a video caught from the camera situated in the instrument board in the vehicle, is introduced. The calculation analyzes the nearness of the driver's head in each edge and checks whether the driver has bizarrely long closed eyes, regardless of whether the driver looks sideways, and whether the driver's head has dropped for quite a while. The calculation is tried utilizing ten unique recordings recorded under various light conditions. The calculation for the most part accomplishes superior, while for a few lighting conditions a specific calculation redesigning would be vital to keep up an elevated level of precision.
{"title":"Smart Monitoring of the Status of Driver Using the Dashboard Vehicle Camera","authors":"S. Chakkravarthy","doi":"10.17762/ijnpme.v9i01.81","DOIUrl":"https://doi.org/10.17762/ijnpme.v9i01.81","url":null,"abstract":"One of the potential approaches to lessen the quantity of mishaps in rush hour gridlock is to follow the driver's condition. In this paper, a new driver observing calculation, which works on a video caught from the camera situated in the instrument board in the vehicle, is introduced. The calculation analyzes the nearness of the driver's head in each edge and checks whether the driver has bizarrely long closed eyes, regardless of whether the driver looks sideways, and whether the driver's head has dropped for quite a while. The calculation is tried utilizing ten unique recordings recorded under various light conditions. The calculation for the most part accomplishes superior, while for a few lighting conditions a specific calculation redesigning would be vital to keep up an elevated level of precision.","PeriodicalId":297822,"journal":{"name":"International Journal of New Practices in Management and Engineering","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127597498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-31DOI: 10.17762/ijnpme.v6i01.53
Prof. Virendra Umale
The advancement of battery operated designs has abundantly increases the memory elements and registers to be operated in ultra-low power. That is the this paper we have proposed a design of CT_C DET flip-flop with power gating technique which is the most efficient power consuming reduction technique. The design of the power gating technique involves the pull-up transistor in the Vdd of the circuit and pull-down transistor in the ground terminal. This power gating technique reduces the power consumption by more than 40% than that of the existing design.
{"title":"Design and Analysis of Low Power Dual Edge Triggered Mechanism Flip-Flop Employing Power Gating Methodology","authors":"Prof. Virendra Umale","doi":"10.17762/ijnpme.v6i01.53","DOIUrl":"https://doi.org/10.17762/ijnpme.v6i01.53","url":null,"abstract":"The advancement of battery operated designs has abundantly increases the memory elements and registers to be operated in ultra-low power. That is the this paper we have proposed a design of CT_C DET flip-flop with power gating technique which is the most efficient power consuming reduction technique. The design of the power gating technique involves the pull-up transistor in the Vdd of the circuit and pull-down transistor in the ground terminal. This power gating technique reduces the power consumption by more than 40% than that of the existing design.","PeriodicalId":297822,"journal":{"name":"International Journal of New Practices in Management and Engineering","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127248586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-31DOI: 10.17762/ijnpme.v9i01.82
Prof. C. Ranjeeth Kumar
As a huge number of new malware tests rise each day, traditional malware recognition strategies are not sufficient. Static examination strategies, for example, report signature, fail to recognize obscure projects. Dynamic examination techniques have low execution and over the top bogus positive charge. A discovery method that could adjust to the quickly changing malware condition is required. The paper introduced a spic and span malware identification approach the utilization of machine picking up information on. This paper proposes an answer where some of the gadget contemplating calculations are chosen. Utilizing the chose abilities, an incorporated methodology has been progressed with the picked calculations so the grouping and identification expense may improve contrasted with static and dynamic approach. The analyzed malwares equipped with various algorithms and capacities is utilized for higher order and discovery result. The final product got during utilizing calculations like Random woodland, Decision tree and Adaboost demonstrates a precision of 99.35% the use of the Random backwoods, 98.96% the use of Decision tree and 98.54% utilizing Adaboost. Looking at the static and dynamic strategy, this incorporated technique gives higher exactness.
{"title":"Malware Detection Using Remedimorbus Application","authors":"Prof. C. Ranjeeth Kumar","doi":"10.17762/ijnpme.v9i01.82","DOIUrl":"https://doi.org/10.17762/ijnpme.v9i01.82","url":null,"abstract":"As a huge number of new malware tests rise each day, traditional malware recognition strategies are not sufficient. Static examination strategies, for example, report signature, fail to recognize obscure projects. Dynamic examination techniques have low execution and over the top bogus positive charge. A discovery method that could adjust to the quickly changing malware condition is required. The paper introduced a spic and span malware identification approach the utilization of machine picking up information on. This paper proposes an answer where some of the gadget contemplating calculations are chosen. Utilizing the chose abilities, an incorporated methodology has been progressed with the picked calculations so the grouping and identification expense may improve contrasted with static and dynamic approach. The analyzed malwares equipped with various algorithms and capacities is utilized for higher order and discovery result. The final product got during utilizing calculations like Random woodland, Decision tree and Adaboost demonstrates a precision of 99.35% the use of the Random backwoods, 98.96% the use of Decision tree and 98.54% utilizing Adaboost. Looking at the static and dynamic strategy, this incorporated technique gives higher exactness.","PeriodicalId":297822,"journal":{"name":"International Journal of New Practices in Management and Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121229415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.17762/ijnpme.v8i04.80
Prof. Romi Morzelona
Histogram shifting plays a major role in reversible data hiding technique. By this shifting method the distortion is reduced and the embedding capacity may be increased. This proposed work uses, shifting and embedding function. The pixel elements of the original image are divided into two disjoint groups. The first group is used to carry the secret data and the second group adds some additional information which ensures the reversibility of data. The parameter such as PSNR, embedding capacity and bit rate are used for comparisons of various images
{"title":"Histogram Based Data Cryptographic Technique with High Level Security","authors":"Prof. Romi Morzelona","doi":"10.17762/ijnpme.v8i04.80","DOIUrl":"https://doi.org/10.17762/ijnpme.v8i04.80","url":null,"abstract":"Histogram shifting plays a major role in reversible data hiding technique. By this shifting method the distortion is reduced and the embedding capacity may be increased. This proposed work uses, shifting and embedding function. The pixel elements of the original image are divided into two disjoint groups. The first group is used to carry the secret data and the second group adds some additional information which ensures the reversibility of data. The parameter such as PSNR, embedding capacity and bit rate are used for comparisons of various images","PeriodicalId":297822,"journal":{"name":"International Journal of New Practices in Management and Engineering","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131513106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.17762/ijnpme.v8i04.79
Dr. B. Maruthi Shankar
The structure of a self-ruling vehicle dependent on neural sophisticated network for route in obscure condition is proposed. The vehicle is equipped with an IR sensor for obstacle separation estimation, a GPS collector for goal data and heading position, L298 H-connect for driving the engines which runs the wheels; all interfaced to a controller unit. The smaller scale controller forms the data gained from the sensor and GPS to produce robot movement through neural based network. The neural network running inside the small scale controller is a multi-layer feed-forward network with back-engendering blunder calculation. The network is prepared disconnected with tangent-sigmoid and positive direct estimate as enactment work for neurons and is executed progressively with piecewise straight guess of tangent-sigmoid capacity. The programming of the miniaturized scale controller is finished by PIC C Compiler and the neural network is actualized utilizing MATLAB programming. Results have shown that up to twenty neurons can be actualized in shrouded layer with this method. The vehicle is tried with differing goal places in open air situations containing fixed as well as moving obstructions and is found to arrive at the set targets effectively and its yield exactness is about equivalent to that of the normal precision.
{"title":"Neural Network Based Hurdle Avoidance System for Smart Vehicles","authors":"Dr. B. Maruthi Shankar","doi":"10.17762/ijnpme.v8i04.79","DOIUrl":"https://doi.org/10.17762/ijnpme.v8i04.79","url":null,"abstract":"The structure of a self-ruling vehicle dependent on neural sophisticated network for route in obscure condition is proposed. The vehicle is equipped with an IR sensor for obstacle separation estimation, a GPS collector for goal data and heading position, L298 H-connect for driving the engines which runs the wheels; all interfaced to a controller unit. The smaller scale controller forms the data gained from the sensor and GPS to produce robot movement through neural based network. The neural network running inside the small scale controller is a multi-layer feed-forward network with back-engendering blunder calculation. The network is prepared disconnected with tangent-sigmoid and positive direct estimate as enactment work for neurons and is executed progressively with piecewise straight guess of tangent-sigmoid capacity. The programming of the miniaturized scale controller is finished by PIC C Compiler and the neural network is actualized utilizing MATLAB programming. Results have shown that up to twenty neurons can be actualized in shrouded layer with this method. The vehicle is tried with differing goal places in open air situations containing fixed as well as moving obstructions and is found to arrive at the set targets effectively and its yield exactness is about equivalent to that of the normal precision.","PeriodicalId":297822,"journal":{"name":"International Journal of New Practices in Management and Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115461154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}