Sei sulla pagina 1di 6

International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

RESEARCH ARTICLE OPEN ACCESS

Claim Management in Construction Site


Ankit Garg
Amity School of Engineering and Technology-Haryana

ABSTRACT
One of the mainstream and significant development models is EPC that fuses work among development,
obtainment, and designing in the single agreement. Designing Procurement Construction (EPC) uses the task's
structure of agreement frameworks. The time and cost are the significant target capacities to be fathomed in this
paper. The development strategies and configuration substitutes in which it fulfills the base necessities of the
Engineer. From that point, an official choice is made with the undertaking supervisor sees the record by means of
cost and time. The exploratory investigation for the EPC approach is audited regarding using the danger level order.
By utilizing the algorithm calculation to limits the expense and time for the EPC development measure. The case the
board issues are successfully dissected in the outcome area.
Keywords: Claim, EPC, Ecological factors, Concrete and Construction site.

I. INTRODUCTION The Meta heuristic problem of the training stage of


ANN is the major representation of the problem and
The choice of building materials must also be it is overcome by using Meta heuristic algorithm. So
governed by ecological factors that are now we introduced a Gray Wolf Optimization (GWO)
becoming increasingly concerned. Concrete is an algorithm for weight updation of artificial neural
environmentally safe material that has a minimum network. The single hidden layer of MLP network
average environmental cost per tonne of concrete [1- with the most popular variables weights and biases
20]. In certain parts of the planet, extreme weather are optimized using GWO. The signal link between
patterns occur more frequently. The elevated levels two neurons is calculated by using this method. The
of emissions from greenhouse gases, principally trainer must identify the weights and biases of set
carbon dioxide, have improved from 280 to 370 parts values. The tremendous measure of undertaking
per million of volume, mainly during modern times unpredictability is resultant with the expanding
[20-30], in this event. Usually, ordinary concrete volume of cases. More contractual workers and
comprises about 12 percent mortar, 8 percent water proprietors take the legitimate strategies and the
mixing, and 80 percent mass mixture. This means value model of the development business [44-50].
that the concrete industry uses 9 billion tonnes of The development ventures are dangerous dependent
sand and rock and 1 billion tonnes of mixing water on various types of agreement. Designing
per year, besides 1,5 billion tonnes of cement. Thus Procurement Construction (EPC) uses the venture's
the concrete market of 11.5 billion tonnes a year is structure of agreement frameworks. In view of
the world's biggest capital user. Approximately 18 enormous scope framework extends, the EPC
billion tonnes of concrete (16 billion tonnes) per year contract models are used with a private zone to
are projected to rise by 2050 [31-40]. execute the development work. The proficiency of
Due to the unabating issues regarding climate change contractual workers is improved by the EPC model if
and sustainability in the building industry, the use of there should arise an occurrence of development,
various waste forms in concrete production is obtainment, and plan.
becoming increasingly widespread. The optimum
behavior of vibrating concrete generated by adding
II. RELATED WORKS:
such waste is now commonly recognized and can
Asih et al. [54] proposed the Artificial Neural
rival the behavior of traditional goods [41-50]. The
Network (ANN) for dynamic, cost forecast, claims,
culmination of development ventures is effectively
and danger appraisal, planning, and question goal
forestalled by the main considerations of debates. So
yields. Additionally, measurable and conventional
as to complete the development ventures in the
numerical procedures are utilized to fathom the
favored quality, spending plan, and time in which the
unpredictable issues in ANN. Along these lines, the
task culmination is essential to know about debates
creator consolidated and utilized delicate registering
cause. Every development venture established the
techniques with the incorporation of ANN. When
development claims [32,45].

ISSN: 2347-8578 www.ijcstjournal.org Page 13


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

differentiated to the traditional ANN, the ANN with calculation for weight updation of fake neural
the delicate registering model achieved extensive organization. The single concealed layer of MLP
ANN notoriety. Lydia et al. [55] built up an ANP network with the most well known factors loads and
based choice emotionally supportive network by inclinations are streamlined utilizing GWO. The sign
means of the nearby development industry with a connection between two neurons is determined by
short poll overview to approve the cycle of choice. utilizing this strategy. The coach must recognize the
Moreover, the choice emotionally supportive loads and inclinations of set qualities.
networks are assessed by finished street development
ventures with five contextual investigations. This
idea is applied to private, business, and high force
structures. At long last, the significant and exact
outcomes with suitable information banking are
gotten.
The SCL convention based defer figuring techniques
were presented by Sengar et al. [56]. Around the
globe, each venture is experiencing delays yet it
contains not many disadvantages. The measures of
undertaking delays are determined by utilizing SCL
convention techniques. Maseleno et al. [57] issued Fig 1: Claims, conflicts and disputes connections
and hindrances are multifaceted in many ventures as
far as changes in essential timetables, various
amendments, numerous expansion period necessities, IV. RESULT AND DISCUSSION
work stops, and low-speed work. The various task
life cycle troubles are respected dependent on their
The beneath figure 2 portrays the different danger
chief records in ventures. Also, discrete and
gatherings and their contribution to cost invades. The
persistent deferrals are examined with the use of the
specialists have a consolidated information on over
coordinated strategy.
16 years. They are recorded in the Engineering
News-Record (ENR) magazine and are associated
III. PROPOSED METHODOLOGY with ventures the world over. The worldwide
temporary worker has been liable for these ENR
The finishing of development ventures is effectively rankings for a very long time.
forestalled by the central point of questions. So as to The proprietor, account, and material and gear hazard
complete the development ventures in the favored bunches give over half of the task chances [18].
quality, financial plan, and time in which the task Different gatherings, for example, administrative,
consummation is essential to know about debates expert, and temporary worker give over 30% of
cause. Every development venture established the invades cost. The proprietor related danger gives
development claims [58-63]. The immense measure 23% of the reasons for the expense of the
of venture unpredictability is resultant with the overwhelms. The material and hardware give 12% of
expanding volume of cases. More temporary workers invades cost. 15% adds to monetary danger. Figure 5
and proprietors take the legitimate strategies and the speaks to the commitment of danger among different
value model of the development business [64-68]. gatherings.
The development ventures are dangerous dependent By and large, guarantee development close by
on various types of agreement. Designing proprietors is experiencing various types of reasons
Procurement Construction (EPC) uses the task's including assisting, contract increasing speeds,
structure of agreement frameworks. In view of oversights, blunders, useful variety orders, scope
enormous scope foundation extends, the EPC changes, and helpless venture arranging. Two
contract models are used with a private zone to essential sorts of cases, for example, extra cash
execute the development work. The proficiency of expanding out of agreement and extra an ideal
temporary workers is improved by the EPC model in opportunity to complete the agreement are the case
the event of development, acquisition, and plan [68]. targets. The way toward managing or overseeing
The relationship among claims, conflicts and disputes things or individuals is named as the executives. The
connections are formulated in Fig 1. The Meta way toward managing or dealing with the looking for
heuristic issue of the preparation phase of ANN is the of thought or change with single gatherings develop
significant portrayal of the issue and it is the case the executives. Various types of essential
overwhelmed by utilizing Meta heuristic calculation. techniques includes the settlement and contest goal,
So we presented a Gray Wolf Optimization (GWO)

ISSN: 2347-8578 www.ijcstjournal.org Page 14


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

guarantee arrangement, evolving evaluating, time and applications. Transactions on Emerging


cost variety, exact and efficient documentation, Telecommunications Technologies, e3976.
change warning, change the recognizable proof, and [5] Ezhilarasu, P., Krishnaraj, N., &Dhiyanesh, B.
acknowledgment are shown for change request (2015). Arithmetic Coding for Lossless Data
organization and cases. Compression–A Review. International Journal
of Computer Science Trends and
Technology, 3(3).
[6] Porkodi, V., Singh, A. R., Sait, A. R. W.,
Shankar, K., Yang, E., Seo, C., & Joshi, G. P.
(2020). Resource Provisioning for Cyber–
Physical–Social System in Cloud-Fog-Edge
Computing Using Optimal Flower Pollination
Algorithm. IEEE Access, 8, 105311-105319.
[7] Gao, D., Wang, G. G., &Pedrycz, W. (2020).
Solving fuzzy job-shop scheduling problem
using DE algorithm improved by a selection
mechanism. IEEE Transactions on Fuzzy
Systems.
[8] Sivaram, M., Mohammed, A. S., Yuvaraj, D.,
Fig. 2: Different groups with risk contribution Porkodi, V., Manikandan, V., &Yuvaraj, N.
(2019, February). Advanced expert system
V. CONCLUSION using particle swarm optimization based
adaptive network based fuzzy inference
The development methods and configuration system to diagnose the physical constitution of
substitutes in which it fulfills the base prerequisites human body. In International Conference on
of the Engineer. The proposed calculation based case Emerging Technologies in Computer
the executive’s framework through the EPC system. Engineering (pp. 349-362). Springer,
In this work, we think about both time and cost are Singapore.
the goal capacities. The task lifecycle includes three [9] Jiménez, A. C., García-Díaz, V., González-
stages specifically Engineering, Procurement, and Crespo, R., &Bolaños, S. (2018).
Construction. The exploratory outcomes exhibited Decentralized Online Simultaneous
least expense and time sensitive on guarantee the Localization and Mapping for Multi-Agent
board in the EPC cycle. Systems. Sensors, 18(8), 2612.
[10] Venkatraman, S., Surendiran, B., & Kumar, P.
A. R. (2020). Spam e-mail classification for
REFERENCES the Internet of Things environment using
semantic similarity approach. The Journal of
[1] Feng, Y., Yi, J. H., & Wang, G. G. (2019). Supercomputing, 76(2), 756-776.
Enhanced Moth Search Algorithm for the Set- [11] Lydia, E. L., Raj, J. S., PandiSelvam, R.,
Union Knapsack Problems. IEEE Access, 7, Elhoseny, M., & Shankar, K. (2019).
173774-173785. Application of discrete transforms with
[2] Sivaram, M., Batri, K., Amin Salih, M., selective coefficients for blind image
&Porkodi, V. (2019). Exploiting the Local watermarking. Transactions on Emerging
Optima in Genetic Algorithm using Tabu Telecommunications Technologies, e3771.
Search. Indian Journal of Science and [12] Ezhilarasu, P., Prakash, J., Krishnaraj, N.,
Technology, 12(1), 1-13. Kumar, D. S., Babu, K. S., &Parthasarathy, C.
[3] Venkatraman, S., &Surendiran, B. (2020). (2015). A Novel Approach to Design the
Adaptive hybrid intrusion detection system for Finite Automata to Accept the Palindrome
crowd sourced multimedia internet of things with the Three Input Characters. Indian
systems. Multimedia Tools and Journal of Science and Technology, 8(28).
Applications, 79(5), 3993-4010. [13] Devaraj, A. F. S., Elhoseny, M.,
[4] Sujitha, B., Parvathy, V. S., Lydia, E. L., Rani, Dhanasekaran, S., Lydia, E. L., & Shankar, K.
P., Polkowski, Z., & Shankar, K. (2020). (2020). Hybridization of firefly and Improved
Optimal deep learning based image Multi-Objective Particle Swarm Optimization
compression technique for data transmission algorithm for energy efficient load balancing
on industrial Internet of things

ISSN: 2347-8578 www.ijcstjournal.org Page 15


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

in Cloud Computing environments. Journal of objective optimization. Future Generation


Parallel and Distributed Computing. Computer Systems, 107, 49-69.
[14] Zou, D., Wang, G. G., Sangaiah, A. K., & [24] Porkodi, V., Khan, J., Mohammed, A. S.,
Kong, X. (2017). A memory-based simulated Bhuvana, J., & Sivaram, M. OPTIMIZED
annealing algorithm and a new auxiliary COOPERATIVE QOS ENHANCED
function for the fixed-outline floorplanning DISTRIBUTED MULTIPATH ROUTING
with soft blocks. Journal of Ambient PROTOCOL.
Intelligence and Humanized Computing, 1-12. [25] Geerthik, S., Venkatraman, S., & Gandhi, R.
[15] Kumar, A., Ahuja, H., Singh, N. K., Gupta, D., (2016). AnswerRank: Identifying Right
Khanna, A., & Rodrigues, J. J. (2018). Answers in QA system. International Journal
Supported matrix factorization using of Electrical and Computer Engineering, 6(4),
distributed representations for personalised 1889.
recommendations on twitter. Computers & [26] Samad, A., Salima, R., Lydia, E. L., &
Electrical Engineering, 71, 569-577. Shankar, K. (2020). Definition and Features of
[16] Sivaram, M., Porkodi, V., Mohammed, A. S., Rural Marketing Strategies for Encourage
Manikandan, V., &Yuvaraj, N. (2019). Development in Rural Areas. TEST
Retransmission DBTMA protocol with fast Engineering & Management, 82, 4983-4988.
retransmission strategy to improve the [27] Palani, E., Nagappan, K., &Alhadidi, B.
performance of MANETs. IEEE Access, 7, (2016). Segmentation and Texture Analysis for
85098-85109. Efficient Classification of Breast Tumors from
[17] Venkatraman, S., & Kumar, P. A. R. (2019). Sonograms. Current Signal Transduction
Improving Adhoc wireless sensor networks Therapy, 11(2), 84-90.
security using distributed automaton. Cluster [28] Rajagopal, A., Ramachandran, A., Shankar,
Computing, 22(6), 14551-14557. K., Khari, M., Jha, S., Lee, Y., & Joshi, G. P.
[18] Lydia, E. L., Govindaswamy, P., (2020). Fine-tuned residual network-based
Lakshmanaprabu, S., &Ramya, D. (2018). features with latent variable support vector
Document clustering based on text mining K- machine-based optimal scene classification
means algorithm using euclidean distance model for unmanned aerial vehicles. IEEE
similarity. J. Adv. Res. Dyn. Control Access, 8, 118396-118404.
Syst.(JARDCS), 10(2), 208-214. [29] Mondragon, V. M., García-Díaz, V., Porcel,
[19] Ortin, F., Mendez, S., García‐Díaz, V., & C., & Crespo, R. G. (2018). Adaptive contents
Garcia, M. (2014). On the suitability of for interactive TV guided by machine learning
dynamic languages for hot‐reprogramming a based on predictive sentiment analysis of
robotics framework: a Python case data. Soft Computing, 22(8), 2731-2752.
study. Software: Practice and [30] Feng, Y., Yu, X., & Wang, G. G. (2019). A
Experience, 44(1), 77-104. Novel Monarch Butterfly Optimization with
[20] Krishnaraj, N., Ezhilarasu, P., & Gao, X. Z. Global Position Updating Operator for Large-
Hybrid Soft Computing Approach for Scale 0-1 Knapsack
Prediction of Cancer in Colon Using Problems. Mathematics, 7(11), 1056.
Microarray Gene Data. Current Signal [31] Mohammed, A. S., & Sivaram, P. (2018).
Transduction Therapy, 11(2). Securing the Sensor Networks Along With
[21] Le Nguyen, B., Lydia, E. L., Elhoseny, M., Secured Routing Protocols for Data Transfer
Pustokhina, I., Pustokhin, D. A., Selim, M. M., in Wireless Sensor Networks.
... & Shankar, K. (2020). Privacy Preserving [32] Geerthik, S., Venkatraman, S., & Gandhi, K.
Blockchain Technique to Achieve Secure and R. (2016, February). Reward rank: A novel
Reliable Sharing of IoT Data. CMC- approach for positioning user answers in
COMPUTERS MATERIALS & community question answering system.
CONTINUA, 65(1), 87-107. In 2016 International Conference on
[22] Chavhan, S., Gupta, D., Chandana, B. N., Information Communication and Embedded
Khanna, A., & Rodrigues, J. J. (2019). IoT- Systems (ICICES) (pp. 1-6). IEEE.
based Context-Aware Intelligent Public [33] Sivaram, M., Lydia, E. L., Pustokhina, I. V.,
Transport System in a metropolitan area. IEEE Pustokhin, D. A., Elhoseny, M., Joshi, G. P.,
Internet of Things Journal. & Shankar, K. (2020). An optimal least square
[23] Gu, Z. M., & Wang, G. G. (2020). Improving support vector machine based earnings
NSGA-III algorithms with information prediction of blockchain financial
feedback models for large-scale many- products. IEEE Access, 8, 120321-120330.

ISSN: 2347-8578 www.ijcstjournal.org Page 16


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

[34] Ghantasala, G. P., &KrishnaRaj, N. Support [45] Gochhayat, S. P., Lal, C., Sharma, L., Sharma,
Vector Machine Based Automatic D. P., Gupta, D., Saucedo, J. A. M., &Kose, U.
Mammogram Classification Using Hybrid (2019). Reliable and secure data transfer in
Optimization Algorithm. IoT networks. Wireless Networks, 1-14.
[35] Sikkandar, M. Y., Alrasheadi, B. A., Prakash, [46] Subbarayalu, V., Surendiran, B., &Arun Raj
N. B., Hemalakshmi, G. R., Mohanarathinam, Kumar, P. (2019). Hybrid Network Intrusion
A., & Shankar, K. (2020). Deep learning based Detection System for Smart Environments
an automated skin lesion segmentation and Based on Internet of Things. The Computer
intelligent classification model. Journal of Journal, 62(12), 1822-1839.
Ambient Intelligence and Humanized [47] Rosa, A. T. R., Pustokhina, I. V., Lydia, E. L.,
Computing, 1-11. Shankar, K., & Huda, M. (2019). Concept of
[36] Zhang, Z., Wang, G. G., Zou, K., & Zhang, J. electronic document management system
(2014). A solution quality assessment method (EDMS) as an efficient tool for storing
for swarm intelligence optimization document. Journal of Critical Reviews, 6(5),
algorithms. The Scientific World 85-90.
Journal, 2014. [48] Espada, J. P., Diaz, V. G., Crespo, R. G.,
[37] Sivaram, Murugan et al. ‘Data Fusion Using Bustelo, B. C. P. G., &Lovelle, J. M. C.
Tabu Crossover Genetic Algorithm in (2015). An intelligent Mobile Web Browser to
Information Retrieval’. 1 Jan. 2020 : 1 – 10. adapt the mobile web as a function of the
[38] Khamparia, A., Pandey, B., Tiwari, S., Gupta, physical environment. IEEE Latin America
D., Khanna, A., & Rodrigues, J. J. (2020). An Transactions, 13(2), 503-509.
integrated hybrid CNN–RNN model for visual [49] Kumar, R. S., Krishnaraj, N., &Keerthana, G.
description and generation of (2017). Assessment of Quality of Service in
captions. Circuits, Systems, and Signal Communication Network and Evaluating
Processing, 39(2), 776-788. Connectivity Among IP Networks. Asian
[39] Geerthik, S., Gandhi, K. R., &Venkatraman, S. Journal of Applied Science and Technology
(2016, December). Domain expert ranking for (AJAST), 1(3), 319-322.
finding domain authoritative users on [50] Elhoseny, M., Rajan, R. S., Hammoudeh, M.,
community question answering sites. In 2016 Shankar, K., &Aldabbas, O. (2020). Swarm
IEEE International Conference on intelligence–based energy efficient clustering
Computational Intelligence and Computing with multihop routing protocol for sustainable
Research (ICCIC) (pp. 1-5). IEEE. wireless sensor networks. International Journal
[40] Muruganantham, A., Nguyen, P. T., Lydia, E. of Distributed Sensor Networks, 16(9),
L., Shankar, K., Hashim, W., &Maseleno, A. 1550147720949133.
(2019). Big data analytics and intelligence: A [51] Chu, H. C., Wang, G. G., & Park, J. H. (2015).
perspective for health care. The digital fingerprinting analysis concerning
[41] Ramkumar, V., &Krishnaraj, N. Weight Based google calendar under ubiquitous mobile
LSA to Retrieve Information from Web Pages computing era. Symmetry, 7(2), 383-394.
Based On Document Score. [52] Manikandan, V., Sivaram, M., Mohammed, A.
[42] Balakiruthiga, B., Deepalakshmi, P., Mohanty, S., &Porkodi, V. (2020). Nature Inspired
S. N., Gupta, D., Kumar, P. P., & Shankar, K. Improved Firefly Algorithm for Node
(2020). Segment routing based energy aware Clustering in WSNs. CMC-COMPUTERS
routing for software defined data MATERIALS & CONTINUA, 64(2), 753-
center. Cognitive Systems Research. 776.
[43] Chu, H. C., Wang, G. G., & Deng, D. J. [53] Kuppusamy, P., Venkatraman, S.,
(2016). The social networking investigation of Rishikeshan, C. A., & Reddy, Y. P. (2020).
metadata of forensic artifacts of a typical Deep learning based energy efficient optimal
WeChat session under Windows. Security and timetable rescheduling model for intelligent
Communication Networks, 9(18), 5698-5709. metro transportation systems. Physical
[44] Sivaram, M., Yuvaraj, D., Mohammed, A. S., Communication, 101131.
Manikandan, V., Porkodi, V., &Yuvaraj, N. [54] Asih, E. S., Nguyen, P. T., Lydia, E. L.,
(2019). Improved Enhanced Dbtma with Shankar, K., Hashim, W., &Maseleno, A.
Contention-Aware Admission Control to (2019). Mobile E-commerce website for
Improve the Network Performance in Manets. technology-based buying selling
CMC-COMPUTERS MATERIALS & services. International Journal of Engineering
CONTINUA, 60(2), 435-454. and Advanced Technology, 8(6), 884-888.

ISSN: 2347-8578 www.ijcstjournal.org Page 17


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

[55] Lydia, E. L., &Swarup, M. B. (2015). Big data International Conference on Intelligent
analysis using hadoop components like flume, Systems and Control (ISCO) (pp. 1-6). IEEE.
mapreduce, pig and hive. International Journal [66] Wei, C. L., & Wang, G. G. (2020). Hybrid
of Science, Engineering and Computer Annealing Krill Herd and Quantum-Behaved
Technology, 5(11), 390. Particle Swarm
[56] Sengar, S. S., Hariharan, U., &Rajkumar, K. Optimization. Mathematics, 8(9), 1403.
(2020, March). Multimodal Biometric [67] Sivaram, M., Yuvaraj, D., Mohammed, A. S.,
Authentication System using Deep Learning &Porkodi, V. Estimating the Secret Message
Method. In 2020 International Conference on in the Digital Image. International Journal of
Emerging Smart Computing and Informatics Computer Applications, 975, 8887.
(ESCI) (pp. 309-312). IEEE. [68] Nieto, Y., Gacía-Díaz, V., Montenegro, C.,
[57] Maseleno, A., Hashim, W., Perumal, E., González, C. C., & Crespo, R. G. (2019).
Ilayaraja, M., & Shankar, K. (2020). Access Usage of machine learning for strategic
control and classifier-based blockchain decision making at higher educational
technology in e-healthcare applications. institutions. IEEE Access, 7, 75007-75017.
In Intelligent Data Security Solutions for e-
Health Applications (pp. 151-167). Academic
Press.
[58] Li, J., Lei, H., Alavi, A. H., & Wang, G. G.
(2020). Elephant Herding Optimization:
Variants, Hybrids, and
Applications. Mathematics, 8(9), 1415.
[59] Mohammed, A. S., Kareem, S. W., Al Azzawi,
A. K., & Sivaram, M. (2018). Time series
prediction using SRE-NAR and SRE-
ADALINE. Journal of Advanced Research in
Dynamical and Control Systems, Pages, 1716-
1726.
[60] Shankar, K., Elhoseny, M., Chelvi, E. D.,
Lakshmanaprabu, S. K., & Wu, W. (2018). An
efficient optimal key based chaos function for
medical image security. IEEE Access, 6,
77145-77154.
[61] Geerthik, S., Gandhi, R., &Venkatraman, S.
(2006). CATEGORY BASED EXPERT
RANKING: A NOVEL APPROACH FOR
EXPERT IDENTIFICATION IN
COMMUNITY QUESTION ANSWERING.
[62] Laxmi, C. V., &Somasundaram, K. (2014).
Application Level Scheduling (AppLeS) in
Grid with Quality of Service
(QoS). International Journal of Grid
Computing & Applications, 5(2), 1.
[63] Kumar, R. S., Krishnaraj, N., &Keerthana, G.
Highly Energy Efficient and Scalable
Distributed Clustering Procedure for Dense
Wireless Sensor Networks.
[64] Krishnaraj, N., Kumar, K. A., & Kumar, P. K.
(2018). DESIGN OF ADAPTIVE
SCHEDULER TO IMPROVE
PERFORMANCE OF COMPUTATIONAL
GRIDS. International Journal of Pure and
Applied Mathematics, 119(18), 1741-1751.
[65] Shankar, K., & Eswaran, P. (2016, January). A
new k out of n secret image sharing scheme in
visual cryptography. In 2016 10th

ISSN: 2347-8578 www.ijcstjournal.org Page 18

Potrebbero piacerti anche