Browse Items (1422 total)
Sort by:
-
Role of medicinal plants against lung cancer
Nowadays for treatment of various diseases, scientific studies are conducted using the medicinal plants of both domestic and wild for curing purpose. Every plant contain compounds that have medicinal properties and can be isolated from the plants parts. Due to plants diversity in India and use in Ayurveda, Unani and Siddha, India is known as medicinal hub. Lung cancer is the third most common cancer, that develops in lung tissue and are of two type's non-small cell lung cancer and small cell lung cancer. Many factors cause lung cancer; tobacco smoking is the prominent cause of lung cancer. The individuals who smoke have 20-30% more chance of developing lung cancer than non-smokers. The conventional treatment of lung cancer, are chemotherapy, stem cell therapy, and electrochemical treatments. Plants and the compounds present can be used for treating lung cancer. So in this chapter will focus on plants Acalypha indica, Solanum trilobatum, Justicia adhatoda, Coleus amboinicus and Piper nigrum in lung cancer treatment and on the medicinal properties. 2024, IGI Global. -
Role of Perceived Social Support and Sense of Coherence Towards Quality of Life Among People Seeking Treatment for Substance Use
A significant portion of individuals diagnosed with substance use disorder confront societal neglect and escalating stigma. This heightened pressure contributes to increased stress and the emergence of comorbid psychiatric conditions alongside their existing affliction. Considering it to be a significant untouched area, the current empirical research was undertaken to explore the role of psychological factors towards quality of life among people seeking treatment for substance use. To accomplish the proposed objectives a correlation design had been adopted and standardized psychological measures were administered on a sample of 100 participants who were registered under residential rehabilitation programs. The data was analyzed using SPSS statistical software and the findings revealed a significant positive correlation of perceived social support and a sense of coherence with quality of life, i.e., r = 0.72 (p <.001) and r = 0.68 (p <.001), respectively. Further, perceived social support and sense of coherence also emerged as predictors (R2 = 55%) of quality of life among people seeking treatment for substance use. Findings provide strong advocacy that people seeking treatment for substance use should be provided with social support which in turn helps them to hold a sense of coherence and ultimately both contributes to their overall quality of life. 2024 selection and editorial matter, Dr. Sundeep Katevarapu, Dr. Anand Pratap Singh, Dr. Priyanka Tiwari, Ms. Akriti Varshney, Ms. Priya Lanka, Ms. Aankur Pradhan, Dr. Neeraj Panwar, Dr. Kumud Sapru Wangnue; individual chapters, the contributors. -
Role of plant tissue culture medium components
The plant tissue culture technique is one of the most acquainted techniques and has been practiced since 1902 for the development of disease-free plants with desired quality, at a larger production rate within a short span of time, irrespective of the season. Each plant has its own morphology and nutritional requirements. Moreover, the nutritional requirement for the tissues in each part of the plant varies. Thus, for the optimal growth of the desired plant, the composition and choice of the suitable media are crucial factors. The formulation of the nutrient medium for the specific tissue and the specific plant plays a vital role in the development of suitable plant tissue culture techniques. This chapter discusses the main components of the plant tissue culture media: basic components which include macroelements, microelements, nitrogen sources (including amino acids), carbon sources, organic supplements (mainly vitamins and other supplements), growth regulators like auxins, cytokinins, gibberellins, abscisic acid, ethylene, and solidifying agents. The basic components have to be incorporated at a fixed concentration. The plant growth regulators are supplemented for organogenesis and the balance between the growth regulators depends on the type of tissue culture technique adopted. The additional supplements are incorporated into the media to achieve specific responses which include activated charcoal, antioxidants, ethylene inhibitors, and complex organic additives, and antibiotics/antifungal agents are supplemented to prevent plant loss due to contamination. The chapter also emphasizes the sterilization techniques and their importance in the plant tissue culture medium. The significance of the adoption of automated media preparation and incorporation of nanoparticles in the tissue culture media is also discussed. 2022 Elsevier Inc. All rights reserved. -
Role of social media in the digital transformation of business
A digital transformation endeavor is the use of technology and digital processes to enhance business operations and consumer experiences. These projects frequently include the use of new technology like social media platforms, artificial intelligence (AI), and analytics, as well as the execution of digital processes like cloud computing, omnichannel commerce, data analytics, and automation. An organization needs to integrate digital transformation initiatives into its current systems if it wants to stay current with the rapidly evolving technology landscape of today. Social media is now an essential part of contemporary life, and businesses are increasingly using it to connect with their clients and other stakeholders. To take advantage of social media's huge potential, businesses are incorporating it into their digital transformation initiatives. Copyright 2023, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. 2023 by IGI Global. All rights reserved. -
Role of social media influencers in fashion and clothing
This study provides an overview of the influence of social media influencers in the fashion and clothing industry. With the increasing presence of social media in people 's lives, individuals are easily influenced by what they see online, leading to the adoption of trends promoted by influencers. Influencers, who have established their personal brand and gained a substantial following, play a key role in shaping consumer preferences and driving sales. Social media platforms allow fashion brands to connect with their audience, democratizing fashion shows and enabling direct interaction. The rise of fast fashion and the influence of fashion influencers have contributed to the growth of the clothing industry. Businesses are now utilizing AI-powered analytics and dedicated platforms to enhance their influencer marketing strategies. In summary, social media influencers have a significant impact on consumer behavior, driv- ing sales and shaping trends in the fashion and clothing industry. 2023, IGI Global. All rights reserved. -
Role of Triguna Personality Towards Emotional Expression in Relation to Emotional Regulation
With the changing times, people are more aware of their emotions regarding how to express and regulate them. The present generation is more active and expressive than the previous generation as they understand the significance of emotions in ones life. The body of literature claims that a person with better emotional understanding and expression is expected to have meaningful emotional regulation irrespective of the generation they represent. Traditional Indian Philosophy defines three essential characteristics, Sattva (purity, harmony), Rajas (activity, passion), and Tamas (resistance, darkness), that influence human behavior and experience. The degree to which one of the gunas predominates in an individual, to that extent, we characterize that person with that guna. The complicated interactions between Trigunas personality, emotional expression, and emotional regulation are examined. Considering the available facts, the present research focuses on exploring the association between emotional expression and emotion regulation strategies and the effect of the triguna personality in it, across two generations within the family. To accomplish this, a cross-sectional research design will be used to explore the generational difference, followed by a correlational research design to study the associations among variables for participants within each group. Participants would include the parents (mothers, 45 to 50 years) and their children (siblings, 18 to 24 years). The data was collected from 30 families. 2024 selection and editorial matter, Dr. Sundeep Katevarapu, Dr. Anand Pratap Singh, Dr. Priyanka Tiwari, Ms. Akriti Varshney, Ms. Priya Lanka, Ms. Aankur Pradhan, Dr. Neeraj Panwar, Dr. Kumud Sapru Wangnue; individual chapters, the contributors. -
Role of women in food and agricultural development: Breaking barriers for sustainable growth
The role of women in food and agricultural development in India is vital as it has an essential impact on the country's agricultural development. Despite all the contributions, they often face major obstacles, such as limited access to resources such as land, credit, innovation, and technology, and addressing these barriers is important. In this chapter, the authors have examined areas and levels of farm women's participation, such as the crops they grow, post- harvest activities, the workload they carry, and, despite all the struggles, how the women are underestimated. Their contribution is not limited to crop cultivation but also includes dairy, poultry, fishing, aquaculture, and forestry such as the wood processing sector. Due to men moving towards urban areas for better jobs and quality of life, women in rural areas are pressured to work in the fields; due to this, agriculture is feminized, and women shoulder a heavier workload than men. The underrepresentation of women is also seen in the employment rate and the pay they receive during seasonal, non- seasonal, and part- time employment. 2024, IGI Global. All rights reserved. -
RPA Revolution in the Healthcare Industry During COVID-19
Over the last year, the evolution in Robotic Process Automation (RPA) has been staggering. The automation it brings to applications has yielded efficiency, reduced operating costs, and decreased the time of research, development, and production. Industries have already integrated RPA into their workflow and are profoundly transforming into an intelligent automated industry with minimum human intervention, calling this the fourth industrial revolution. In this race of transformation, the healthcare industry is quite ahead of many other industries. It stood the test of time when COVID-19 was spreading rapidly and was also resilient against all odds. The system did experience an unprecedented crisis that depicted its weakness, fragility, and unpreparedness. The healthcare system was forced to adapt to a new paradigm. And though there was the loss of life and economy, we learned to evolve as a community to tackle this crisis. This chapter sheds light on the role of RPA and covers how these technologies can assist healthcare workers in their day-to-today activities, reviewing what the fourth industrial revolution would look like in the healthcare sector. The intelligent, automated system would provide a seamless experience of gathering information by various means, processing, and assisting healthcare workers to deliver quality treatment. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Saccharomyces - eukaryotic probiotic for human applications
Probiotics are viable microorganisms which are meant to confer health benefits to host after ingestion. Any probiotic strain has a special characteristic to survive in the extremely acidic and hostile conditions of stomach and intestine. Among all the commercially available probiotic strains, prokaryotes constitute the bulk of it, with quite a few belonging to eukaryotic yeasts. Eukaryotic probiotics are very limited and currently there are only two yeast strains (Saccharomyces boulardii and Kluyveromyces sp.), which are approved for human consumption and are available commercially in market. S. boulardii has been reported to have tremendous therapeutic potential. The main mechanism of action for S. boulardii includes strong antagonistic effect against a number of enteric pathogens, trophic effects on the intestinal mucosa, neutralisation of bacterial toxins as well as modification of host cell signaling pathways involved in inflammatory and non-inflammatory intestinal disease. Pertaining to these advantages, S. boulardii have been reported to be exceptionally effective against diarrheal diseases and intestinal inflammatory conditions including inflammatory bowel disease (IBD). Increasing scientific reports confirming the therapeutic potential of eukaryotic probiotics and their advantages over prokaryotic probiotic strains have dramatically increased the worldwide interest in these probiotics. 2019 Scrivener Publishing LLC. -
Sacred gastronomy trails: Exploring the divine fusion of religion, food, and tourism
This study seeks to explain the complex relationships among these three constantly evolving fields, i.e., religion, food, and tourism. The primary objective is to examine the strong link between food and religion by breaking down culinary customs and examining how they influence the formation of gastronomic identities across a range of religious traditions. The second objective explores the connection between food and travel, with a special emphasis on the cultural relevance of pilgrimage food travels. The third goal is to broaden the investigation to include the connection between religion and travel. Through the integration of results from the three aforementioned goals, the research aims to develop a theoretical framework that elucidates the intricate relationship between these components, offering a thorough comprehension of the interdependence of religion, cuisine, and travel in forming personal encounters and cultural environments. 2024 by IGI Global. All rights reserved.. -
Safeguarding the future through the prevention of cybercrime in the quantum computing era
Quantum computing is an emerging field that holds great promise for solving complex problems at an unprecedented speed by harnessing the principles of quantum mechanics. However, this disruptive technology also introduces new challenges, particularly in the realm of cybersecurity. Quantum computing can lead to cyberattacks such as cryptographic attacks, data breaches, blockchain vulnerabilities, social engineering, and phishing attacks. It is important to note that, at present, these risks are largely theoretical, as practical, large-scale quantum computers capable of breaking current cryptographic systems are not yet available. However, it is crucial for researchers, organisations, and policymakers to anticipate and address these potential threats in advance by developing quantum-resistant cryptographic algorithms, improving security protocols, and raising awareness about the evolving landscape of cyberthreats in the quantum computing era. There is a need for preparing safeguard measures form the quantum threat by investing in quantum-safe technologies, training cybersecurity professionals in quantum-resistant techniques, and fostering collaboration among industry, academia, and government entities. As quantum computing progresses, the landscape of cybercrime is expected to evolve, necessitating the development of robust laws to mitigate potential threats. The chapter aims at understanding the intersection of quantum computing and cybercrime, highlighting the potential implications and risks associated with quantum advancements in the context of cybersecurity. The chapter also emphasises the need for proactive measures and policies to mitigate the risks posed by quantum computing to cybersecurity. 2025 selection and editorial matter, Keshav Kumar and Bishwajeet Kumar Pandey; individual chapters, the contributors. -
Safety andWelfare of Children Under Institutional Care in India: A Situation Analysis
A large number of children worldwide live under institutional care due to certain compulsions. The reasons for institutional stay vary on the basis of geopolitical situations and the nature of the children. Some of the reasons include premature loss of parents, poverty, lack of social support, parents substance dependence, neglect, involvement of children in socially undesirable behaviour and/or violation of law, abuse, exploitation and so on. The broad objective of this chapter is to discuss the evolution of childcare measures adopted by the Government of India after independence, highlight upon the need for institutional care and examine the issues and challenges faced by the children under institutional care in India. At the end of the chapter, the way forward measures are suggested for ensuring safety of the children under institutional care, creating improved living environments for them and for creating congenial social and psychological environments through empowerment of the care providers, with knowledge and information for healthy child upbringing. Cooperation from the larger society, by involving retired persons in the institutions for education of the children is suggested, justifying the need for the same. For a holistic child growth and development, the need for extra-curricular activities, physical exercises, as well as group activities, are emphasized upon. Building resilience among these children to develop confidence and face life challenges are also discussed in the chapter. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022. -
SAMPLE TEMPLATES FOR ORGANIZING TEACHING INTERNSHIP
The previous chapter discussed assessment in internship, while this chapter introduces various templates for such assessments and presentations in teaching internship. There are various tasks provided to preservice teachers, such as making reflections, observations, and lesson plans. These tasks are evaluated during the completion of the internship. A rubric for this evaluation is also provided in this chapter. The chapter also provides templates for a permission letter seeking leave and a template for successful completion of internship. The templates provided in this chapter can serve as a valuable resource for teacher educators, researchers and stakeholders in the field of teacher education for internship practices. 2023 selection and editorial matter G.S. Prakasha and Anthony Kenneth; individual chapters, the contributors. -
Secure and Private Federated Learning through Encrypted Parameter Aggregation
This chapter is dedicated to cross-silo private parameter aggregation. ML/DL has demonstrated promising results in a variety of application domains, especially when vast volumes of data are collected in one location, such as a data center or a cloud service. The goal of FL is to improve the quality of ML/DL models while minimizing their drawbacks. Participating devices in an FL task could range in size from a single smartphone or watch to a global corporation housing multiple data centers. It was originally believed that just a little amount of information about the original training data would be carried over into subsequent model updates as FL interactions occurred. The differential privacy framework is concerned with restricting the release of private information while sharing the outcomes of computations or queries performed on a dataset. Recently, many researchers have begun to employ differential privacy while training models in a federated setting. 2024 Saravanan Krishnan, A. Jose Anand, R. Srinivasan, R. Kavitha and S. Suresh. -
Secured Health Insurance Management
Many Low- and Middle-Income Countries (LMICs) have expanded their healthcare coverage over the past decade thanks to reforms and investments motivated by Universal Health Coverage (UHC). UHC strives to guarantee that all individuals have access to high-quality healthcare, protecting them from public health hazards and financial hardship caused by the need to treat sick family members. With UHC as its end objective, this study examines health insurances function as a policy instrument to address health funding. Here, researchers study the laws to ensure that all Indians have access to health care and how technology facilitates quicker participation in health insurance programs. The data was collected between August and October of 2022. The study was designed as a cross-sectional case study: (i) the research on the effects of UHC, (ii) documents about Indias health insurance systems (HIS), and (iii) a discussion of the benefits and challenges of using MedStrat, a homegrown digital Health Insurance Management System (HIMS), to run health insurance programs across different states in India. Data from research and document evaluations, as well as health insurance statistics, were triangulated with modern technology adoption models to determine (i) factors that influence the rate at which digital insurance plans are adopted, (ii) the effect of technology on increasing peoples access to health insurance; and (iii) the potential for the digital insurance intervention to be scaled further. Digital insurance administration systems can increase insurance enrolment, especially among low-income households. There are three enabling contexts for digital insurance plan adoption: supportive regulation, public-private partnerships, and ongoing stakeholder contact and education. There are three essential requirements for digital health insurance programs to be widely adopted in India and other similar situations. (i) user-friendliness; (ii) an established network for digital insurance policies; and (iii) confidence, which may be shown through measures like encrypted data storage, complete audit trails, and built-in fraud protection. Our results prove that digital health technologies hold great promise for achieving UHC in LMICs. 2024 Scrivener Publishing LLC. -
Securing Automated Systems with BT: Opportunities and Challenges
The use of automated systems is becoming increasingly prevalent in various industries; however, they pose significant security risks. In order to enhance the security of these systems, Blockchain Technology (BT) provides a promising solution. This chapter discusses the opportunities and challenges associated with using BT to secure automated systems. The role of BT in securing automated systems is discussed, emphasizing its ability to improve security and transparency. Additionally, BT-based systems with enhanced security are examined, such as decentralized data management, immutable and transparent ledgers, reduced cyber-attacks, and secure data sharing. Despite these opportunities, challenges such as high computational power requirements, integration challenges, BT scalability, and regulatory challenges must be addressed. Utilizing BT can create a more secure and transparent system that can help to prevent fraud, hacking, and other forms of cyber-attacks, ultimately enhancing the reliability and safety of automated systems. In conclusion, this paper highlights the potential of using BT for securing automated systems and the need for continued research and development to overcome the challenges associated with its implementation. 2024 selection and editorial matter, Nidhi Sindhwani, Rohit Anand, A. Shaji George and Digvijay Pandey; individual chapters, the contributors. -
Securing end user computing environments using blockchain
COVID-19's phenomenal effect has expedited the adoption of digital technologies over several years, indicating that several of these breakthroughs are here to stay. Several enabling technologies are currently being implemented as major solutions for improving and responding to the pandemic's numerous issues, with blockchain being one of the preferred solution options. Blockchain can be used to re-structure processes, resulting in most effective operational and business models (e.g., democratising quality cancer detection with advanced artificial intelligence based radiomics technologies). The authors posit here that while there is a lot of anticipation about using blockchain to improve business capabilities, the lessons learned from the many pilots and proofs of concept so far should be considered. The necessity for a structured, formal decision-making process, based on good business logic and an awareness of the problem's process lifecycle, is however critical. Blockchain is a means to an end, not an end in and of itself. 2024, IGI Global. All rights reserved. -
Securing her digital footprint: AI for women's safety
This chapter emphasizes the importance of artificial intelligence (AI) tools, analysis about the existing AI tools, and recommendations for future AI tools for women's safety. AI is experiencing significant growth and influence in the current era. Several key trends and developments highlight the role of AI in various domains: AI is being used for medical diagnosis, drug discovery, and patient care. Machine learning models are helping doctors analyse medical images, predict disease outcomes, and personalize treatment plans. Self-driving cars and drones are utilizing AI algorithms for navigation, obstacle detection, and decision-making. These technologies are advancing transportation and logistics. Natural language processing models like GPT-3 are transforming language-related tasks, from chatbots and virtual assistants to content generation, translation, and sentiment analysis. This chapter highlights the AI tools that exist for women's safety in the digital world and future apps needs for the same. 2024, IGI Global. All rights reserved. -
Securing patient information: A multilayered cryptographic approach in IoT healthcare
The increasing integration of devices utilising the of Internet of Things (IoT) in healthcare has resulted in the collection of an unparalleled volume of patient data. Personal identifiers, insurance information, medical history, and health monitoring measures are all included in a complete dataset. Ensuring security and privacy of IoT devices is crucial in the healthcare sector. The goal of this project is to combine steganography with three different cryptographic algorithms to develop a hybrid cryptographic technique. Among the algorithms under investigation are steganography, Caesar cipher, columnar transposition cipher, and one-time pad. Every encryption scheme uses three keys to encrypt patient data. The encrypted data is subsequently encoded into an image file through image-based steganography. To ensure confidentiality and authentication, an authorised user can decrypt the file through a designated decryption process, maintaining the integrity of patient data. 2025 selection and editorial matter, Keshav Kumar and Bishwajeet Kumar Pandey; individual chapters, the contributors.