Rahul Ranjan

Factors Affecting Students Academic Performance in Mathematics: A Comparative Study between Boarding and Non-Boarding Secondary Schools in Monduli District, Tanzania

The aim of this research was to investigate the factors impacting Mathematics achievement in secondary schools within Monduli District. The study focused on four secondary schools: Moringe, Orkeeswa, Engutoto, and Irkisongo. It tested three hypotheses: first, whether there’s a notable link between teachers’ qualifications and academic performance in Mathematics across boarding and day secondary schools …

Factors Affecting Students Academic Performance in Mathematics: A Comparative Study between Boarding and Non-Boarding Secondary Schools in Monduli District, Tanzania Read More »

Show Management Innovation on Wayang Orang Sriwedari as the Public Diplomacy of Indonesia

Culture can be an important aspect of public diplomacy. It could also have an impact on a country’s national brand. But living in the globalization era means that there will be more challenges to tackle in terms of culture. Because advanced technology changes the on how people enjoy art. With that, it is needed to …

Show Management Innovation on Wayang Orang Sriwedari as the Public Diplomacy of Indonesia Read More »

Contribution of Sanggar Wayang “Gogon” to Build the Image of Surakarta as a City of Culture

This research aims to explore the contribution of Sanggar Wayang “Gogon” in building the image of Surakarta City as a cultural center using a city branding and cultural diplomacy approach. Surakarta City has a rich cultural heritage, such as Wayang Kulit which is an integral part of the city’s identity. This study uses a qualitative …

Contribution of Sanggar Wayang “Gogon” to Build the Image of Surakarta as a City of Culture Read More »

The Impact of Graph Colouring and Map Colouring Approach in Preventing Cheating at Higher Learning Institution: A Case of Institute of Accountancy Arusha

This abstract explores the integration of low-power Bluetooth and Radio-Frequency Identification (RFID) technologies as a solution for enhancing inventory tracking within the supply chain. The increasing complexity and scale of modern supply chains necessitate efficient and accurate inventory management. Low-power Bluetooth technology facilitates seamless communication between devices, enabling real-time data exchange with minimal energy consumption. …

The Impact of Graph Colouring and Map Colouring Approach in Preventing Cheating at Higher Learning Institution: A Case of Institute of Accountancy Arusha Read More »

Low-power Bluetooth/RFID devices to Track Inventory in the Supply Chain

This abstract explores the integration of low-power Bluetooth and Radio-Frequency Identification (RFID) technologies as a solution for enhancing inventory tracking within the supply chain. The increasing complexity and scale of modern supply chains necessitate efficient and accurate inventory management. Low-power Bluetooth technology facilitates seamless communication between devices, enabling real-time data exchange with minimal energy consumption. …

Low-power Bluetooth/RFID devices to Track Inventory in the Supply Chain Read More »

Cost-Effective Inventory Management Using Augmented Reality

The ever-growing complexity of supply chains and the dynamic nature of modern business environments demand innovative solutions for efficient and cost-effective inventory management. This paper introduces a novel approach to address these challenges through the integration of Augmented Reality (AR) technology. Our proposed system leverages AR to enhance the accuracy, speed, and adaptability of inventory …

Cost-Effective Inventory Management Using Augmented Reality Read More »

Ai-Based Solutions for Improving Cybersecurity and Its Significance in Defending Evolving Cyber Threats in Enterprises

Artificial Intelligence and its sub-domain Machine learning contribute to the system development by learning from previous data, making logical judgements, spotting patterns with little to no human intervention. Cybersecurity approaches offer modern solutions to provide security against the attacks and threats. Consequent to the ability of attackers to evade conventional security solutions, the previous and …

Ai-Based Solutions for Improving Cybersecurity and Its Significance in Defending Evolving Cyber Threats in Enterprises Read More »

A Study on Awareness Towards Trading and Investment Among the Youth of Mangaluru City

The younger generation nowadays shows a preference for innovation and technological proficiency. However, when it comes to trading, investment, and financial diversification, we notice a huge deficiency in knowledge and understanding among the youth. They do not possess an inclination toward saving for the future. The so-called investment appetite is found lacking among the youth. …

A Study on Awareness Towards Trading and Investment Among the Youth of Mangaluru City Read More »

Deciphering the Politics of Identity in the Multicultural Context of Chitra Banerjee Divakaruni’s Oleander Girl

The surge in immigration to the United States after the passage of the Immigration Act of 1965, altered both its demographic and cultural composition. The shift in its ‘melting pot’ theory that advocated immigrants to assimilate into America’s cultural core to embracing a multicultural outlook, enhanced the nation’s status as home to diverse cultures. However, …

Deciphering the Politics of Identity in the Multicultural Context of Chitra Banerjee Divakaruni’s Oleander Girl Read More »

A Comprehensive Analysis of GPT Applications in Third-Party Vendor Security Enhancement

As organizations increasingly rely on third-party vendors for various services and products, the need for robust security measures to safeguard sensitive data has become paramount. This study delves into the application of Generative Pre-trained Transformers (GPT) in enhancing third-party vendor security. GPT, a state-of-the-art natural language processing model, offers a versatile framework for addressing security …

A Comprehensive Analysis of GPT Applications in Third-Party Vendor Security Enhancement Read More »

Scroll to Top