Browse Items (1473 total)
Sort by:
-
Critical analysis of national and international laws in relations to intimate partner violence :
The term violence refers to varied perceptions of unacceptable behaviour. The newlinenature of the act suggests that it is inflicted by the superior over the inferior. newlineThus gender constitutes a significant factor of the study. The research identifies that women are subjected to gender based inequalities in different areas of life newlineand domestic environment is not an exception. Domestic Violence , a manifestation of gender inequality, is prevalent in many forms. The most newlinecommon form of domestic violence is identified as Intimate Partner Violence newline(IPV) by the national and international statistics. newlineThe research is drawn upon the objective to understand the different factors that newlinecontribute to IPV and to critically examine the legal framework for the protection of women against IPV in India. Research adopts a human rights based approach to understand the inferior status of women drawn upon gender newlineinequality and thus to critically examine the legal framework in India for protection of women against IPV. newlineThe study is divided into five chapters which specifically analyses the status of women in the Indian society and the role of law to protect women in intimate relationships. Comparative study of UK and US laws with special reference to international instruments is conducted. Identifying the major drawback of law, the study proves that the existing legal framework is inadequate to protect women from intimate partner violence . newline newline newline -
Study on Graphs Associated with Groups
In this dissertation, the notions of non-inverse graphs, order sum graphs and coset newlinecomponent graphs associated with groups are introduced. These graphs are simple graphs whose vertices are the elements of the group and the adjacency between the vertices depends on certain properties of the group concerned. Vertices belonging to non-inverse graphs are adjacent if they are not inverses of each other in the group. The vertices in order sum graphs are adjacent if the sum of their orders is strictly greater than the order of the group. The vertices belonging to the coset component graphs are adjacent if their left cosets or right cosets of the subgroups of groups are equal. These algebraic graphs are studied in detail in terms of their structural characteristics, parametric properties and spectral properties. Various characterisations of these graphs are obtained in the study concerned. These notions are further extended to the concept of signed graphs and domination. Properties of signed graphs such as balance, clusterability, consistency, sign-compatibility and so on are investigated for these algebraic signed graphs. The relations between various types of domination are obtained for non-inverse graphs, order sum graphs, complement and line graphs of order sum graphs. -
A Frame Work For Continous Indian Sign Language Recognition Using Computer Vision
Sign language is a non-vocal, visually oriented natural language used by the hearing newlineimpaired and the hard-for-hearing part of society. It combines multiple modalities newlinelike hand movements, facial expressions and body poses. Static gestures involve basic finger movements such as numbers and alphabets, dynamic signs include words, and a sign sentence consists of grammatically connected and meaningful dynamic words. Sign Language Translation (SLT) models have been an actively evolving research topic under computer vision. One of the most challenging aspects in earlier iterations of SLTs was accurately capturing the intricate and constantly changing hand movements and facial expressions characteristic of sign language. newlineHowever, the advent of deep learning models has facilitated significant advancements in the field, particularly in the realm of continuous sign language translation. newlineThe research endeavours to develop a lightweight deep-learning framework newlinespecifically tailored for the translation of Indian Sign Language (ISL) into text and newlineaudio. The proposed framework introduces two collaborative deep-learning components that extract and classify features synergistically. The ISL video sequence serves as the input, which undergoes feature extraction utilizing the Inception V3 architecture, enabling the extraction of features from each frame. Classification models tend to be bulky and intricate, consuming substantial memory space and requiring extended training periods. This challenge has been addressed by introducing a lightweight LSTM model, which effectively utilizes the feature map generated by the Inception model for accurate classification. It is important to note that each sign possesses unique characteristics yet exhibits similar feature maps. The performance of the framework is assessed based on the speed and accuracy achieved in converting the input video into text and audio formats. -
A Mixed methods study of psyhosocial factors in career decision making in adolescents
Career choice is an important developmental task in adolescence and is influenced by many factors. Using a mixed methods research design, this study aimed to understand career decision making and factors influencing the same in adolescents. In the quantitative phase the relationship between career maturity and perceived parenting style, personality traits, metacognition, socio- economic status, gender, college type, stream of study and decision status was studied in students studying in II Year Pre- University in Bangalore, India. Career decisions, personal and family factors in career decision making were explored in the qualitative phase. Informed consent was obtained from the participants and parents of the participants of the study. newlineQuantitative data was collected from 548 students studying in Arts, Science and Commerce stream in second year Pre- University in Bangalore. Students from eight private and seven government colleges were recruited for the study. Quantitative data was collected using a socio- demographic data sheet, Career Maturity Inventory, Parental Authority Questionnaire, Neo Five Factor Inventory and Metacognitive Awareness Inventory. The scales were translated to Kannada and back translated. In the qualitative phase, data was collected through a semi- structured interview schedule designed for this study. 30 students who were a part of the quantitative phase took part in this phase. The interviews were audio-recorded and transcribed for analysis. Statistical analysis was done to analyze quantitative data. Descriptive statistics, correlation, regression analysis, t tests and one-way ANOVA was done. Qualitative data was analyzed by template analysis and themes were derived from the data. The results revealed associations between personality traits neuroticism, openness and conscientiousness and specific aspects of career maturity attitude and competence. -
Studies on K X Ray fluorescence parameters of low and medium Z elements
K X-ray fluorescence parameters for pure elements have been determined using different single and double reflection geometry by several researchers over the years. Horakeri et al.have shown that the K X-ray fluorescence parameters can also be determined by a simple 2and#960;-geometrical configuration method and a NaI(Tl) detector spectrometer for high Z elements. newlineHowever, in order to study the K XRF parameters for low Z elements, high resolution detector spectrometers are required.But in high resolution detectors like HPGe and Si(Li), due to the gap between window and the active area of the detector, the solid angle subtended by the detector at the target is not 2and#960;. Hence a suitable geometry correction is required for accurate newlinemeasurement of incident photons and the emitted K X-ray photons in order to determine the K XRF parameters in low Z elements. In the present study, employing a nearly 2and#960;-geometrical configuration and applying suitable geometry correction, we have determined the K X-ray fluorescence parameters of a few low and medium Z elements in the range of 27 and#8804; Z and#8804; 30 and 42 and#8804; Z and#8804; 47 respectively. The elements were procured in the form of thin foils and were irradiated by a weak radioactive source. The emitted K X-ray photons were detected using a low energy high resolution HPGe detector spectrometer. The incident photons, emitted K X-ray photons and the transmitted photons at newlinethe incident energy is measured and were corrected for window attenuation, efficiency, self-attenuation and geometry correction newlineto obtain the true intensities of incident photons, emitted K Xray photons and the transmitted photons at the incident energy. -
Analysing different appeals in Cadbury India commercials /
Appeals are an important aspect in the field of advertising that are used widely to promote or market a product by persuading its consumers. Television is one of the strongest medium that brings out the clarity of advertising appeals. This study aims to analyse the different appeals that are used by the brand Cadbury in India. -
Heat amd Mass Transfer Analyses of Nanofluid in a Multilayer Model
The study offers an in-depth exploration into the dynamics and properties of multilayered nanofluids and hybrid nanofluid flow in newlinedifferent geometries. The in-vestigation ranges from sinusoidal channels with micropolar hybrid nanoliquids to concentric cylinders that exhibit electrokinetic effects and rotating disks. Also, the DarcyForchheimer model is introduced to assess non-Newtonian and Newtonian fluid interplay, emphasizing the role of asymmetric slip conditions which reduces the fluid flow. Moreover, the study on bioconvection obtained newlineby addition of gyrotac-tic microorganisms which enhances mass and heat transfer in multilayer Newtonian fluid channels. Studies explain the importance of interfacial regions in achieving optimal system temperature. The subsequent study examines the two-layer hybrid nanofluid (HNF) with magnetohydrodynamic properties between two newlineidentical ro-tating disks. The governing equations of the mathematical models are explained using PDE and solutions are attained using numerical and semi-analytical methods such as the DTM and Range Kutta method. Further, the obtained results have been explained with the help of tables and graphs. The study reveals that the immisci-bility of the base fluids forms an interfacial layer, revealing that the addition of two different fluids restricts the fluid motion nearer to the interfacial region, maintaining an optimum temperature in the system. Collectively, these findings pave the way for advanced applications in industries like solar, nuclear, biomedical, and electronic cooling, promising enhanced newlineperformance and efficiency. -
A Revocable Multi-Authority Attribute Based Encryption Scheme Based On Nonlinear Access Policy
Due to the tremendous increase of data, currently individuals and organizations are increasingly opting to store their data with third-party providers as a solution to their storage issues. Ciphertext Policy Attribute Based Encryption facilitates data outsourcing by encrypting the data at the source and uploading it to a third-party storage provider with some restricted access which is mentioned using access policy. In classical Identity-based Encryption (IBE), when a data owner needs to transmit a message to a data user, they would send it together with the data user's specific identity, such as their email address. This ensures that only the intended recipient can access and read the message. The primary issue is that the data owner must possess knowledge of the identity of each user. Other than the traditional IBE, a data owner can utilize attribute-based encryption to deliver a message to a group of individuals who have the same attributes. Here, the data owner does not need to be aware of every user's identity; instead, he can send messages using the attributes and access policies that have been provided, such as which users can access this message. This research work primarily focuses on three CP-ABE aspects: access policy, number of attribute authority, and revocation. The current access policies are insecure due to their linear character, as they always calculate shares using the same linear equation. For this particular issue in this work, a non-linear secret sharing model that enhances the security of the model is proposed. For addressing the key escrow problem, a solution using multiauthority systems were introduced. These systems involve multiple attribute authorities, each responsible for holding a specific subset of attributes for each user. And access policy will be based on non-linear secret sharing scheme. In the third aspect related to revocation, this work has addressed both user and attribute revocation so that it will make this model a perfect implementation model in terms of improved security. Some of the existing approach for revocation are re-encryption, periodic updating of ciphertext instead this work used a polynomial called Lagrange polynomial which helps to address this problem in less complex and more efficient way. These features will make the proposed scheme a real model that is secure and can be implement in any organization. -
Investment Decisions : Behavioral Biases in Selected Less Volatile Asset Classes
This study investigates the behavioral biases in selected less volatile asset classes and their influence on investment decisions(IDs). This study compares and contrasts demographic factors(DF) that influence behavioral biases(BB), examines the relationship between behavioral biases(BB) and risk-taking newlinebehaviors (RTB), determines whether BBs can be used to predict RTB and IDs, and looks at covariance patterns between factors that influence BBs, RTB, and IDs.A comprehensive analysis was conducted, considering various DF such as age, gender, education, annual income, marital status, total annual savings newlinepercentage, and the number of dependents in the family. The findings revealed no statistically significant interaction effects between these demographic variables and the combined dependent variables. Additionally, no significant main effects of age, gender, annual income, education, marital status, or paying tax were observed on the combined dependent variables. The study identified several correlations among the behavioral biases examined, including overconfidence(OC), representativeness(R), anchoring(A), herding(H), mental accounting(MA), and conservatism bias(CB). Positive correlations were found between OC and R, A and OC, A and R, H and OC, H newlineand R, MA and OC, MA and R, CB and OC, CB and R, CB and A, CB and H, CB and MA, risk-taking behaviors and overconfidence, risk-taking behaviors and representativeness, risk-taking behaviors and anchoring, risk-taking newlinebehaviors and herding, risk-taking behaviors and mental accounting, and risktaking behaviors and conservatism bias. Furthermore, herding and conservatism bias was significantly associated with risk-taking behaviors, while anchoring, herding, mental accounting, and conservatism bias were associated considerably with IDs. As part of the assessment techniques utilized in this study, seven characteristics or latent constructs were examined using various observable variables or scale items. -
Topologies Emanating From Graphs
A topology on a set is a collection of its subsets, including the set itself and the empty set, which is closed under union and fnite intersections. This dissertation introduces the notions such as graph topology, spanning graph topology, generalised graph topology, and generalised spanning graph topology by considering subgraphs and spanning subgraphs of a graph. Analogous to the set-theoretic notion, a graph topology is a collection of subgraphs of a given graph, including the null graph K0 and the graph itself, that is closed under newlineany union and any intersection. At the same time, a spanning graph topology of a graph is a collection of spanning subgraphs, including the spanning empty graph Nn, where n is the order of the graph and the graph G, which is closed under any union and any intersection. The topological concepts such as open sets, closed sets, base, subbase, neighbourhood, interior, subspace, and connectedness of spaces are extended to graph topology and spanning graph topology. In order to study the closed graphs in the above-mentioned graph topologies, two new graph complements are introduced in these graph topologies, such as decomposition and neighbourhood complements, to defne decomposition closed newlineand neighbourhood closed graphs. The decomposition complement is defned with respect to the edge set and the neighbourhood complement with respect to the vertex set. Since all the members of a spanning graph topology have the same vertex set, the neighbourhood closed graphs are described in terms of the edge set. The notion and characteristics of subspaces of both these graph topologies are defned, and the properties of closed graphs in these subspaces are also studied. Connectedness in topology holds a prominent role and applications in various felds of mathematics. The idea of connectedness is extended newlineto these graph topologies, and the same is characterised in the context of graph newlinetopology. -
Modified Carbon-Based Composites and Their Electrochemical Studies
Energy storage has emerged as the world's most important issue, attracting the focus of researchers and commercial developers due to the economy's rapid growth and the rise in the usage of portable electronics and electronic vehicles. These devices make it possible to efficiently capture and store the excess energy produced during times of high generation, so that it can be used when there is little or no generation. Devices for storing renewable energy contribute to grid stability and lessen the reliance on fossil fuel-based power plants. Moreover, they contribute to the decarbonization of the energy industry, mitigating climate change, and promoting a sustainable future. This thesis explores the potential of modified carbon-based composites as advanced materials for energy storage applications particularly supercapacitors and solar thermal fuels. The research focuses on the careful design and synthesis of ternary composites, incorporating carbonaceous materials such as carbon nanotubes, graphene oxide, and graphitic carbon nitrides, metal sulphides, nitrogen rich moieties, and conductive additives like polyaniline and polypyrrole. A wide variety of methodologies were used to describe the structural and morphological characteristics of the composite materials. Thermogravimetric analysis, Fourier transform infrared spectroscopy, X-ray diffraction, Raman spectroscopy, X-ray photoelectron spectroscopy, scanning electron microscopy, and other techniques were used. These methods gave important information about the composite materials' chemical structure, type of bonding and arrangements, surface morphology, and thermal stability. Electrochemical techniques, such as cyclic voltammetry, galvanostatic charge-discharge, and electrochemical impedance spectroscopy, have been extensively employed to investigate the performance and behaviour of supercapacitor electrodes and devices. The results demonstrate significant improvements in electrochemical performance, including enhanced specific capacitance, excellent cycling stability, and remarkable rate capability. These findings indicate that the modified carbon-based ternary composites hold promise for high-performance energy storage devices. Ultimately, this research contributes to the development of next-generation energy storage technologies, offering more efficient and sustainable solutions for storing energy. -
Studey of different types of modulations on double diffusive convection in lodroyd-b liquids
The problem aims to find the effects of temperature modulation in viscoelastic newlinefluids namely Oldroyd B liquids subjected to double diffusive convection. Both linear as well as a non-linear study has been carried out. A regular perturbation technique has been employed to determine the correction Rayleigh number. The results show that the Lewis number and strain retardation parameter induces stability to the system whereas stress relaxation parameter destabilizes the system for synchronous modulation. Truncated Fourier series represents the non-linear newlineanalysis. Mean Nusselt number and mean Sherwood number are used to quantify the newlineheat and mass transfer respectively. Strain retardation parameter and the Lewis number decrease the heat and mass transfer for synchronous modulation while stress relaxation parameter increases them. The opposite results are obtained for newlineasynchronous and lower wall modulations. Modulation is shown mostly to give rise newlineto super critical motion.