Browse Items (1422 total)
Sort by:
-
Probiotics as an alternative food therapy: A review on the influence of microbial nutraceuticals in disease management
Antibiotics have been responsible for the evolution of multidrug-resistant microbes. The side-effects of existing drugs and increased treatment costs have led to nutraceuticals gaining popularity. Nutraceuticals have therapeutic applications due to the ability of the probiotics to be viable in encapsulated pills and drinks. Due to their ability to exclude carcinogenic microorganisms by limiting the nutrients available and by competing for receptors nutraceuticals are useful against cancers. Nutraceuticals are useful against diabetes by controlling the genes involved in the insulin-signaling pathway. The future perspective for nutraceuticals includes an increase in production, reduction in manufacturing cost, and enhanced benefits. 2020 by IGI Global. All rights reserved. -
The social psychology of COVID-19 stigma
The spread of infectious diseases and the associated stigmatisation of people is an evidenced history. The present chapter is an attempt to explain the stigma of race, class and religion in India with the help of the established intergroup theories of social psychology to highlight the psychosocial consequences resulting out of an outbreak of infectious diseases, i.e., COVID-19. In order to present the implicational value of intergroup theories in explaining the practices of COVID-19-generated stigmatisation of people in India on the basis of their belongingness to particular race, class and religion, a systemic review of the COVID-19-generated stigmatisation of people and groups was carried out. Anecdotal presentations of stigmatised treatments against the several social groups in India are explained from the vantage of intergroup theoretical approaches of social psychology. In our review, intergroup theories of social psychology were found instrumental in explaining COVID-19-generated stigmatised treatments directed against people based on race, class and religion. Intergroup Emotions Theory could explain the stigmatisation of Northeast Indians. Scapegoat theory was found instrumental in explaining the stigmatisation of poor and migrants. Stigmatisation against Muslims could be justifiably explained in the light of social identity theory. At last, the chapter attempts to make certain recommendations aimed to reduce or combat negative psychosocial responses to infectious diseases like COVID-19. 2025 selection and editorial matter, Asma Parveen and Rajesh Verma; individual chapters, the contributors. -
Social media advertising: A dimensional change creator in consumer purchase intention
The chapter discusses the importance of social media platforms, especially Instagram and YouTube, in advertising for influencing the consumer purchase intention of Generation Z. Various methods of business expansion through social media advertising have been explored. The authors examine in detail several key characteristics of social media advertising that affect consumer purchase intentions, including emotional appeal, interactivity, trust, creativity, and the role of e-word of mouth. The impact of Web 2.0 technologies on the development and effectiveness of social media advertising is emphasized, highlighting the close relationship between the Web 2.0 systems to enable the delivery of advertisements based on usage and preferences to accurately target, increasing the efficiency and effectiveness of advertising campaigns mobile, Web 2.0. Implicit communication, mobile-related advertising, and mobile-specific content have become important parts of social media advertising. Researchers from various fields have drawn on rapidly evolving social media platforms, each with its own unique perspective. 2024, IGI Global. All rights reserved. -
Integration of Intelligent System and Big Data Environment to Find the Energy Utilization in Smart Public Buildings
Buildings are the leading consumer of energy in the setting of smart cities, and public structures such as hospitals, schools, government offices, and additional institutions have high energy needs owing to their frequent use. However, there needs to be adequate use of the latest innovations in machine learning inside the big data context in this field. Controlling the energy efficiency of public subdivisions is a crucial aspect of the smart city concept. This chapter aims to address the challenge of integrating big data platforms and machine learning algorithms into an intelligent system for this purpose to forecast how much energy various Croatian government buildings will consume, prediction models were constructed using deep learning neural networks, Rpart regression tree models, and random forests using variable reduction techniques. The evaluation of all three techniques considered critical aspects, and the random forest methodology yielded the most precise model. The MERIDA intelligent system aims to enhance energy efficiency in public buildings by integrating big data and predictive algorithms. This research examines the technological requirements for a platform that facilitates public administration in planning public building reconstruction, reducing energy consumption and expenses, and connecting intelligent public buildings in smart cities. Digitizing energy management may improve public administration efficiency, service quality, and environmental health. 2025 Scrivener Publishing LLC. All rights reserved. -
Blockchain and Its Integration in IoT
IoT devices have become an integral part of our lives. The world has witnessed an exponential growth in the number of IoT devices. Managing these devices and the data generated by them has become very crucial. Data security and users privacy are becoming more difficult as the number of devices grows. Blockchain, the technology behind Bitcoin, is known for data security and managing and efficiently maintaining huge amounts of data. Blockchain stores data in a chronological manner and in an immutable way. Integration of blockchain in IoT infrastructure has many advantages. This paper discusses various applications and challenges in blockchain. It highlights the adoption of blockchain in IoT infrastructure and reviews recent papers in this field. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Trade in renewable energy technologies: A comparison of India and China
[No abstract available] -
The role of financial inclusion in driving women's economic empowerment
The current chapter examines the impact of financial inclusion on women's economic empowerment. The data was gathered from 1,140 women in slums through a structured schedule on a five-point Likert scale. The schedule was pretested and validated using reliability and validity tests. The exploratory and confirmatory factor analysis were performed to validate the questions. The impact was tested using linear regression, and results of regression model indicated women's financial inclusion significantly contributes to their economic empowerment. The findings of the study indicate that women in urban slums do not lack access to financial institutions. The results of the study have critical implications for policymakers and stakeholders involved in the financial inclusion process such as bankers, self-help groups, and others to reorient themselves towards financial inclusion practices. 2023, IGI Global. -
Real-time video segmentation using a vague adaptive threshold
For the last two decades, video shot segmentation has been a widely researched topic in the field of content-based video analysis (CBVA). However, over the course of time, researchers have aimed to improve upon the existing methods of shot segmentation in order to gain accuracy. Video shot segmentation or shot boundary analysis is a basic and vital step in CBVA, since any error incurred in this step reduces the precision of the other steps. The shot segmentation problem assumes greater proportions when detection is preferred in real time. A spatiotemporal fuzzy hostility index (STFHI) is proposed in this work which is used for edge detection of objects occurring in the frames of a video. The edges present in the frames are treated as features. Correlation between these edge-detected frames is used as a similarity measure. In a real-time scenario, the incoming images are processed and the similarities are computed for successive frames of the video. These values are assumed to be normally distributed. The gradients of these correlation values are taken to be members of a vague set. In order to obtain a threshold after defuzzification, the true and false memberships of the elements are computed using a novel approach. The threshold is updated as new frames are buffered in and is referred to as the vague adaptive threshold (VAT). The shot boundaries are then detected based on the VAT. The VAT for detecting the shot boundaries is determined by using the three-sigma rule on the defuzzified membership values. The effectiveness of the real-time video segmentation method is established by an experimental evaluation on a heterogeneous test set, comprising videos with diverse characteristics. The test set consists of videos from sports, movie songs, music albums, and documentaries. The proposed method is seen to achieve an average F1 score of 0.992 over the test set consisting of 15 videos. Videos from the benchmark TRECVID 2001 are selected for comparison with other state-of-the-art-methods. The proposed method achieves very high precision and recall, with an average F1 score of 0.939 on the videos chosen from the TRECVID 2001 dataset. This is a substantial improvement over the other existing methods. 2020 Elsevier Inc. -
Internet of Things Enabled Device Fault Prediction System Using Machine Learning
Internet of Things (IOT) started as a niche market for hobbyists and has evolved into a huge industry. This IoT is convergence of manifold technologies, real-time analytics, machine learning and Artificial Intelligence. It has given birth to many consumer needs like home automation, prior device fault detection, health appliances and remote monitoring applications. Programmed recognition and determination of different kinds of machine disappointment is a fascinating process in modern applications. Different sorts of sensors are utilized to screen flaws that is discovers vibration sensors, sound sensors, warm sensors, infrared cameras, light cameras, and other multispectral sensors. The modern devices are becoming ubiquitous and pervasive in day to day life. This device is need for reliable and predicate algorithms. This article is primarily emphases on the prediction of faults in real life appliances making our day to day life easier. Here, the database of the device includes previous faults which are restored in online by using cloud computing technology. This will help in the prediction of the faults in the devices that are to be ameliorated. It additionally utilizes Nae Bayes calculation for shortcoming location in the gadgets. The proposed model of this article is involves the monitoring of each and every home appliance through internet and thereby detect faults without much of human intervention. Springer Nature Switzerland AG 2020. -
AI and Real-Time Business Intelligence
Timely and accurate knowledge that can be provided to different stakeholders in an enterprise improves the performance and decision-making capabilities with better insight. The information, be it qualitative or quantitative, when made available to decision makers becomes the basis of the business intelligence (BI) that improves functionality, scalability and reliability. The knowledge is managed by application of various data warehousing techniques, and artificial intelligence comes into play by providing an ample number of data mining and machine learning techniques. The chapter aims at analyzing the origin, evolution and development of BI systems and their relationship with artificial intelligence (AI). The chapter also aims to provide new research horizons in the scientific activities and advancements in BI, knowledge management and analysis. 2024 selection and editorial matter, Hemachandran K., Raul V. Rodriguez, Umashankar Subramaniam, and Valentina Emilia Balas; individual chapters, the contributors. -
Safety andWelfare of Children Under Institutional Care in India: A Situation Analysis
A large number of children worldwide live under institutional care due to certain compulsions. The reasons for institutional stay vary on the basis of geopolitical situations and the nature of the children. Some of the reasons include premature loss of parents, poverty, lack of social support, parents substance dependence, neglect, involvement of children in socially undesirable behaviour and/or violation of law, abuse, exploitation and so on. The broad objective of this chapter is to discuss the evolution of childcare measures adopted by the Government of India after independence, highlight upon the need for institutional care and examine the issues and challenges faced by the children under institutional care in India. At the end of the chapter, the way forward measures are suggested for ensuring safety of the children under institutional care, creating improved living environments for them and for creating congenial social and psychological environments through empowerment of the care providers, with knowledge and information for healthy child upbringing. Cooperation from the larger society, by involving retired persons in the institutions for education of the children is suggested, justifying the need for the same. For a holistic child growth and development, the need for extra-curricular activities, physical exercises, as well as group activities, are emphasized upon. Building resilience among these children to develop confidence and face life challenges are also discussed in the chapter. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022. -
Financial Vulnerability in Households: Dissecting the Roots of Financial Instability
The phenomenon of household financial vulnerability, defined by unexpected shocksin income and expenditures, carries major implications for both individual households and the overall economy of a nation. For a considerable time, household debt has been widely acknowledged as the primary determinant of household financial vulnerability. This study aims to extend the analysis beyond the scope of household debt. Middle-income households may experience financial difficulties when faced with unexpected changes in income and expenses. These challenges can arise from several circumstances, including the inability to engage in discretionary activities such as dining out or vacations. For a very long time, it has been posited that low-income households exclusively experience financial vulnerability. Hence, it is imperative to thoroughly examine the concept of household financial vulnerability and its underlying factors to enhance households' ability to withstand adversities and better clarify the matter. In light of the prevailing economic recession triggered by the global pandemic and the ongoing confrontation between Russia and Ukraine, the significance of the matter is further underscored. This study aims to comprehensively define household financial vulnerability and examine its relationship with financial capability, digitalized payments, financial stress, and financial socialization. The current study anticipates establishing a foundational framework for future research endeavors in this specific field. Moreover, this paper also explores potential avenues for future research. The Author(s), under exclusive license to Springer Nature Switzerland AG 2025. -
The path to resilience: Exploring household financial vulnerability
Household financial vulnerability represents a significant financial challenge, predominantly impacting low and middle-income households when faced with sudden changes in income or expenses. At the household level, this vulnerability might arise as short-term liquidity issues or long-term solvency concerns. While household debt is a primary factor contributing to this vulnerability, elements like financial capability and the use of digital payments also play roles. The repercussions of household financial vulnerability encompass financial stress and potential bankruptcy, underscoring the critical need to comprehend its dynamics. Thus, this chapter aims to extensively explore household financial vulnerability, including its determinants, theoretical frameworks, assessment methodologies, and strategies for mitigation. 2024 by IGI Global. All rights reserved. -
The Need for Universal Design for Learning in Higher Education for the Specially-AbledAn Essay
Educators at any grade level or subject area can apply Universal Design for Learning (UDL), which is a set of principles for curriculum development that attempts to give all students an equal opportunity to learn. The provision of instructional alignment between objectives, instructional design, methods of delivery and assessment of learning outcomes, which could be individualized and which works for all is blueprinted in a UDL framework. The approaches and methods for instruction in UDL are adaptable and not the same for all the learners or it is not one size fits all approach according to the National Center for Universal Design for Learning (Harper, 2018). The guiding principles of UDL include acceptance and practice of various means of equivalent representation or acquiring information, various means of equivalent expression or demonstrating the learning and various means of equivalent engagement to enhance learning. Given the multiple potentials of specially-abled (SA) students, inclusive learning through UDL provides an environment of diversity and unison. The key attempt is to provide instructional delivery of the same topic to different learners with different learning abilities and approaches in the same course, resulting in comparable outcomes. This chapter highlights the various strategies of UDL that may be extended to assist SA students transition through the pandemic, some of which include customizing learning contents with assured accessibility, individualizing learning goals as per student potential, flexible/customized assessments, and qualitative grading. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023, corrected publication 2024. -
Future Inclusive Education
The United Nations (UN) Sustainable Development Goals (SDGs) ensure inclusive and equitable quality education for promoting lifelong learning. Inclusive education fosters an environment for access to quality education by addressing diversity and barriers that can cause exclusion. COVID-19 has reimagined Higher Education with new challenges and opportunities for the present and future. Digital divide, gender inequality, addressing specially-abled students, and a non-inclusive learning environment are the major barriers to inclusive education. Inclusive education ensures that no one leaves behind, and higher education institutes can enhance their capacity building to promote inclusivity for the common good. Employability is one of the key concepts in higher education that builds the workforce and contributes to nation-building. With COVID-19, nature of work has seen radical changes; hence, graduate attributes have evolved with the 21st-century skills. The chapter emphasizes the role of inclusive education and reimagining higher education with suggestions to using existing strategies in life-long and futuristic inclusive learning. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023, corrected publication 2024. -
Securing patient information: A multilayered cryptographic approach in IoT healthcare
The increasing integration of devices utilising the of Internet of Things (IoT) in healthcare has resulted in the collection of an unparalleled volume of patient data. Personal identifiers, insurance information, medical history, and health monitoring measures are all included in a complete dataset. Ensuring security and privacy of IoT devices is crucial in the healthcare sector. The goal of this project is to combine steganography with three different cryptographic algorithms to develop a hybrid cryptographic technique. Among the algorithms under investigation are steganography, Caesar cipher, columnar transposition cipher, and one-time pad. Every encryption scheme uses three keys to encrypt patient data. The encrypted data is subsequently encoded into an image file through image-based steganography. To ensure confidentiality and authentication, an authorised user can decrypt the file through a designated decryption process, maintaining the integrity of patient data. 2025 selection and editorial matter, Keshav Kumar and Bishwajeet Kumar Pandey; individual chapters, the contributors. -
Correlation of Surface Properties and Catalytic Activity of Metal Aluminophosphates
Alumina and its modified forms have gained significant interest in recent years as potential material for a wide variety of industrial applications. Aluminophosphates were reported as one of the promising catalytic materials in organic transformations. The catalytic activity of a material is always associated with the nature of active centers available on the surface of a catalyst. The incorporation of metal ions into aluminophosphates is of particular interest for the design of the novel catalysts. The post and pretreatment methods followed for the synthesis of the material determines the structural and textural properties of the material. The transition metal loading over aluminophosphates play a significant role in the generation of surface-active sites. This chapter deals with simple ecofriendly synthesis, physico-chemical characterization and catalytic activity of metal aluminophosphates. The chapter mainly explains the correlation of surface properties and catalytic activity of metal aluminophosphates in industrially important organic transformations. 2023 selection and editorial matter, Anitha Varghese and Gurumurthy Hegde; individual chapters, the contributors. -
A secure bio-hash-based multiparty mutual authentication protocol for remote health monitoring applications
Remote health monitoring can benefit a large number of stake holders in healthcare industry, and it has the potential to make healthcare facilities available to a large number of masses at a reduced cost. Wireless Body Area networks (WBAN) comprising of sensors, capable of capturing and transferring physiological parameters of patients, provide an efficient and cost-effective solution for remote health monitoring. Data security is one among the major concerns preventing the widespread adoption of this technology by patients and healthcare sector. This chapter on remote health monitoring, presents a biometric-based authentication protocol. The work also proposes a multiparty mutual authentication protocol for authenticating the entities, such as users, sensors, personal devices, and medical gateway, participating in a WBAN. In the proposed protocol, a verifier table is not required to store the password of users. Formal security analysis and verification of the discussed protocols are performed using Scyther tool, and the results reveal that the protocols are resistant to privileged-administrator resilience attack, man-in-the-middle attack, replay attack, and impersonation attack. The Author(s), under exclusive license to Springer Nature Switzerland AG 2021. -
Key management solutions for database as a service: A selective survey
In todays scenario, efficient data processing is a fundamental and vital issue for almost every scientific, academic, or business organization. To tackle this issue, organizations end up installing and managing database systems to satisfy different processing needs. In case of adopting a traditional solution, the organization needs to purchase the necessary hardware, deploy database products, establish network connectivity, and hire professional people who run the system. But this solution is getting impractical and expensive as the database systems and problems become larger and complicated (El-Khoury et al., 2009). Again, traditional solution entails different costs from the perspective of the investments involved. These concerns are handled efficiently to a great extent by the fast developing technology that goes by the name, cloud computing.. 2014 by Taylor & Francis Group, LLC.