Browse Items (1473 total)
Sort by:
-
Design and development of load balancing algorithm for enhance cloud computing performance
Software Applications have taken a leadership position in the field of Information Technology to reduce the human workload. In the case of distributed applications, the scalability of the application is a matter of newlineconcern in the present dynamic scenario. The fast developments in computing resources have reduced the cost of hardware and increased the processing capability of the system remarkably. Still, hosting a distributed newlineapplication in a higher end system is not recommended due to many reasons. Firstly, when there is a massive demand in the usage of the application which is beyond the limit of the system, there is no way to scale newlineit. The second reason is that when the system usage of the application is minimal, the entire infrastructure dedicated to the targeted application will remain idle. newlineDue to the wide acceptability of the industry on cloud computing, the variety of applications are designed to target the cloud platform which is one of the challenges for efficient load balancing in the cloud newlineenvironment. A fair distribution of workload among the available resources is mandatory to improve the efficiency of the cloud platform. To share the workload, a useful load balancing strategy, as well as a timely invocation of the plan, is essential. Invocation of the approach known as triggering policy can be different in centralised and distributed scenarios. Since cloud applications are running in a distributed situation, through this research newlinework, the researcher puts forward a complete framework for balancing load in different types of the request generated in Infrastructure as a Service (IaaS) platform. newlineAs a progressive model, this research work continuously focuses on improving the performance of the load balancer in the IaaS platform. Since the cloud data centres are spread across the globe, a centralised monitoring system to monitor and analyse the resource utilisation in different data newlinecentres is an essential requirement to see the load fluctuations in different clusters. -
Design and Fabrication of Differential Thermal Analyser for Thermal Characterization of Materials
Thermal analysis techniques are widely used in both industrial and scientific domains to understand the changes in structural and chemical composition of materials. The structural and chemical composition of most of the materials undergoes changes when heated. Using various thermal analysis techniques such changes are monitored in various atmospheres of interest. Through these analytical experimental techniques the physical properties of the substance can be studied as a function of temperature. These techniques can be used to characterize, qualitatively and quantitatively a huge range of materials over a substantial temperature range. Results from the thermal analysis instruments can be obtained quickly and henceforth it has wide variety of applications. These thermal methods find widespread use for both quality control and research applications on polymers, pharmaceutical preparations, clay, minerals, metals and alloys. Differential thermal analysis is one of the thermal analysis methods, which records the difference in temperature (??T) between a substance and an inert reference material as a function of furnace temperature or time. Any transformation ?? change in specific heat or an enthalpy of transition ?? can be detected by Differential Thermal Analyser (DTA). The automated DTA is available readily from various manufacturers but it is expensive. Therefore researchers usually prefer to design and build their own instruments as per the individual requirements of experiments under various specialized conditions. Furnace, sample holder, controlled heating source, low noise-high gain amplifier and differential recorder are the main units of a differential thermal analyser. In the present work, we have made an attempt to design and fabricate a low cost differential thermal analyser for the thermal analysis of materials. -
Design and Implementation of Low Complexity Multiplier-Less Reconfigurable Band Tuning Filter Structure with Sharp Sub-Bands
Digital flter banks are extensively used for communication purposes for channelization. Reconfgurable non-uniform multi-channels with sharp transition widths are necessary for channelization in digital channelizer and spectrum sensing in wireless communication networks. The aim of this research work is to design reconfgurable flter structures featuring non-uniform and sharp transition newlinewidth channels with reduced number of flter coeffcients. The four different flter structures are proposed in this research for achieving low complexity reconfgurable structure for the design of multiple non-uniform sharp transition width arbitrary bandwidth channels. The foundational newlineelement of this research is centered around the design of a prototype flter. This prototype flter serves as a basis for developing various reconfgurable flter structures. Leveraging the prototype newlineflter s bandwidth characteristics, these structures are categorized into two main groups: narrow band prototype flters and wide band prototype flters. The narrow band prototype flter category comprises structures capable of designing a single fnite impulse response flter with a narrow passband characterized by sharp transition widths. In contrast, the wide band prototype flter category includes structures capable of designing a single FIR flter with a wide passband also characterized by sharp transition widths. A novel flter structures are designed with the help of interpolated newlinefnite impulse response, cosine modulation technique, complex exponential modulation technique and frequency response masking techniques. The proposed method is evaluated using MATLAB R2019b, where the linear phase FIR flter coeffcients are computed based on the Parks-McClellan algorithm. The examples are employed to illustrate the effcient operation of the proposed designs. The results point to the fact that the proposed designs have less multiplier complexity than existing cuttingedge techniques. -
Design of new access control structure for provenance based on secret sharing
Access control is one of the important elements in providing confidentiality to the secured data. Access specifiers helps us understand degree of rights given to the users in utilizing data records in a right manner. Tampering the records by unauthorized parties is a high concern in secure communication. Tamper detection plays an important role in trouble shooting an issue associated with network/ host intrusion scenario. The advances in information technology have driven the modern world to focus on the Web for digital information. People across the globe rely on the internet for all the data from generic information to distribution of personal data over heterogeneous networks. Technology has grown so wide to an extent, where almost all of the financial transactions are taking place through online portals. On the other hand, there has been high rise in the security threats towards users confidential data. This information is however shared by the online users while performing financial transaction in e-commerce portals. In order to maintain security mechanism over the untrusted networks various authentication techniques available in this regard. All these security procedures are said to be stubborn and adequate on contextual basis, on the other hand over a period of time the intruders would find out ways to break into systems. Data theft and intrusion into the information systems would increase on a daily basis if defensive measures are not in place. In this concern a new mechanism for securing the data using majority voting concept is proposed. Majority voting for securing the provenance data is applied. Provenance data is data of origin, genesis data and often observed as sensitive data. Provenance is a record of events, timestamps, versions, transformations occurred for the data of interest. Elicitation of an entity's genesis is termed provenance. This understanding is called as data provenance for data objects and their relationships. In most of the cases provenance data is tend to be sensitive, and a small variation or regulation paves way to changes to entire lineage of the connected data. This origin needs to be protected and only approved parties should have right to use the data. Specific description or classification of an instance's historical record or data object is called data provenance. It has many implications in different disciplines in terms of its significance for the acquisition of data flow mechanisms. Personal control of data privacy is a common scenario and various solutions towards security exists. In this regard a unique model is proposed where control of data and its related allies is available with several bodies but however not one; and if access control is to be permitted for a cause based on context, all the entities holding their right keys will have to agree and share on a common platform for accessing the data. Combining these shares in a peculiar pattern allows the grant for accessing data. The method of allocating controls to multiple bodies and allowing grants based on the combination of stakes is called a mechanism for secret sharing. Share separation may be derived from the concept of visual encryption methodology We integrate concepts of secret sharing and provenance to provide an indigenous solution for parameters of information security namely confidentiality, integrity and availability. It is with the availability of exceptional wireless internet access in mobile motivated situations, users and usage data has become massive with respect to media. For example, financial related operations carried out over online platforms by users in many ways were found insecure and unauthenticated. Procedure with appropriate algorithms are available for safe data communication in various modes, however lacks to attain high accuracy and performance with regards to the basic goals of security; confidentiality, integrity, availability at a significant level. Security is the main aspect of any communications among untrusted networks in the current world. Sincere gratitude to many researchers for their tremendous contributions to effective security algorithms despite various threats that compromise the computer systems vulnerabilities. The origin of the data, i.e., by which the transaction thread was created, is the pertinent question to be answered while the financial operation is finalized. This definition of 'data antiquity ' has received good interest from researchers in different fields for many decades and is often termed as data provenance. However, security in provenance has made some progress with recent research, particularly in the field of cyber security. This study emphases on the safety characteristics of data provenance with a distinctive cryptographic approach. The combination of these principles produces unique results for safeguarding the genesis data. -
Design, Analysis and Validation of Electric Vehicle Control and Safety for Different Path Profiles and Braking Conditions
Energy conservation and Environmental pollution are two major challenges today for our society. Currently, utilization of the latest technology, to reduce energy consumption and harmful emissions from vehicles, is gaining significance in the contexts related to automobile, energy and power industries. Considerations of these contexts enable us to form a more realistic newlineperspective and a need for developing fuel efficient, comfortable and affordable electric vehicles. The importance of design and development of electric vehicle (EV) is better perceived when, there is a major impact on our future society due to (i) the energy saving aspect from newlineboth the customer side on individual expenditure as well as from the national economy viewpoint and (ii) the huge benefit due to reduction of emissions from internal combustion engines using fossil fuels. EV offers the best solution which not only avoids emissions but overcome the dependency on petroleum resources as well. Due to fewer moving parts, monitoring and controlling of EV are also smooth and relatively much easier. The embedded control techniques used in EV also contribute for a better controllable, observable, predictable newlineand efficient vehicle drive. This current research work focuses mainly on Electric Vehicle Mobility and Control aspects for a deeper study. This research work addresses topics related to mathematical modelling and simulation studies for design and analysis of EV control and safety. Validations of the several case studies done during this research are supported by software tools namely MATLAB/Simulink and IPG Carmaker Virtual Driving Simulation Platform. Starting from modelling, throughout the various stages of this work, realistic vehicle parameters and specifications are considered. The newlinedifferent levels of testing, validation and trial runs of the model-based designs are also validated by software in loop and hardware in loop approaches. Automotive Safety Integrity Level B/C hardware was used for the implementation purpose. -
Design, Synthesis, and Applications of Carbon Dots with Controlled Physicochemical Properties
Modification of carbon dots (CDs) is essential to enhance their photophysical newlineproperties and applicability. Physical (e.g., composite material blending, coreshell architecture) and chemical (e.g., doping, surface passivation) methods exist to modify CDs. Different precursors can impart varied functionalities and heteroatomic dopants on CDs. Despite several modification strategies, the reproducibility and scalability of CDs still need to be improved. Newer approaches for modifying CDs are thus essential to ensure lab-to-lab and batchto-batch consistency. Our study focused on developing novel strategies for the physicochemical modifications of CDs. The theoretical simulation we performed for surface-functionalised CDs with the aid of density functional theory and time-dependent density functional theory helped to predict the mechanism of photoluminescence (PL) and to analyse the effect of hydrogen bonding on the newlineproperties of CDs (Chapter 3). We have developed a novel and general method for preparing amine functionalized CDs from modified paper precursors (Chapter 4). This strategy allows us to prepare CDs with customized functionalities, alleviating the post-synthesis modification. A novel ionimprinting strategy involving CDs synthesised from modified paper precursors newlinewas also developed through our research (Chapter 5). In another work, we utilized silk fibers as a matrix for immobilising CDs (Chapter 6). CDs prepared from mulberry leaves were fed to silkworms to produce CD-embedded silk fibres, which could be used to detect dopamine. In addition, we prepared CDs newlinefrom an unreported natural source (frankincense), which were used to detect lead ions (Chapter 7). We demonstrated the heavy metal sensing application of these newlineCDs in combination with a UV-light LED chip and a smartphone, which is relevant in resource-limited areas. The research results presented in the thesis are expected to inspire further investigations and applications related to CDs. -
Design, Training, and Implementation of A New Individualized Education Plan (IEP) Format For Special Educators And Students With Intellectual Disabilities At Selected Special Schools
An individualized Education Plan (IEP) is a multidisciplinary, teamdeveloped plan required for every child receiving special education services. The researcher delved into concerns surrounding Individualized newlineEducation Programs (IEPs) for students with intellectual disabilities. Two significant hurdles were discovered: existing IEPs lacked essential intervention areas, and special education teachers felt inadequately newlineequipped to construct effective plans. newlineThe study tackled these concerns head-on through a multi-pronged approach. Firstly, a meticulous analysis of existing IEPs revealed crucial sections missing from intervention plans, hindering their effectiveness. newlineThis analysis served as the blueprint for crafting a more comprehensive IEP format that addressed the identified gaps and provided a robust framework for intervention. Next, the study focused on empowering special education teachers. Sixty special education teachers certified by the Rehabilitation Council of newlineIndia, participated in training sessions on the new format, undergoing a vital skills and knowledge upgrade in IEP development. This equipped them with the tools and understanding necessary to create more effective plans tailored to individual student needs. The theory then transitioned to practice. Students with intellectual newlinedisabilities were included in interventions based on the improved IEPs, with their progress closely tracked and evaluated. The results were highly promising. Teachers demonstrated a tangible improvement in knowledge, translating into their ability to create more effective IEPs. More importantly, students thrived with the enhanced format. Those involved in interventions using the improved IEPs exhibited significant progress in various domains, highlighting the positive impact of the new approach. The study culminated in key recommendations for further newlineimprovement. Ongoing teacher training sessions were suggested to ensure teachers remain updated on best practices and evolving methodologies. -
Designing A New Encryption - Then - Compression System for Grayscale Images Utilizing Entropy Encryption
In the digital era, images and video sequences have dramatically increased newlinebecause of the rapid growth of the Internet and the widespread utilization of multimedia systems. The advancement in technology facilitates a faster way of transmitting data; however, the channel used for communication is an untrusted medium. The proposed research focus on the secure newlinetransmission of grayscale images over a social networking site (SNS) provider called the untrusted channel. Rigorous research has been conducted on the secure transmission of images and proposed different models, namely Compression-then-Encryption (CtE) Systems and newlineEncryption-then-Compression (EtC) Systems. In EtC, the encrypted information is transmitted over the channel. However, the channel is newlinecompressing the information to reduce the overall traffic. Due to the compression performed by the channel, the decryption process may fail on the receiver side. Constructing an efficient EtC model, as good as the standard compression algorithms, will address the gap in research. Four objectives were formulated, and schemes were proposed for each objective to address the problem. Two schemes were developed to address the first objective, eliminating noise incurred during transmission through the channel. The first scheme eliminates the noise using a two-pass hybrid mean and median filter. In the second scheme, a supervised curve fitting a linear regression model with a mean filter is applied. To secure the transmission of images over the untrusted channel, the objectives two and three address the scrambling and encryption of images. A hybrid of improved Arnold transforms and ElGamal encryption is experimented with in the first scheme to address scrambling and encryption. In this initially, a Block-wise scrambling is applied to the image, followed by pixels-wise newlinescrambling within the block followed by Arnolds transform. The outcome is given to ElGamal encryption. -
Destination Resilience and Smart Tourism Ecosystem : A Destination Management Framework for Competitiveness
Over the past many decades, the travel and tourism industry has been at the forefront of adapting to new changes and accepting the latest technologies. Today's travelers are sophisticated and knowledgeable, as they have all the information available to them easily, which contributes to fast and quick decision making. The world is gradually changing into a much more intelligent and advanced platform that makes it possible to employ techniques like augmented reality, virtual reality, and artificial intelligence. This has proven to be very successful in a variety of fields, including education, healthcare, marketing, and communication. The current study focuses on incorporating smart tourism strategies to build a sustainable ecosystem at destinations, which enhances the competitiveness of the destination and makes it easier for value co- creation among the different stakeholders. Research suggests that although industry-led and government-initiated projects seem to prioritize the use of smart applications in destinations in theory, practical implementation appears to lag behind. Less research has been done in India on gamification, smart wearable technology at travel destinations, and the practical application of AR and VR tools. The study revolves around the South Indian State of Kerala, which has been a pioneer in tourism promotion in the country. In addition to proposing a framework for destination management and tourism competitiveness with smart tourism applications, this study aims to investigate the practical implications of smart tourism tools and technologies at destinations. To shed more light on the findings, a mixed methodology approach is used to analyze the data using a mix of quantitative and qualitative methods. The study's conclusions have significant ramifications for destination management, strategic planning, and the application of smart technologies at travel locations. -
Determinants and Impacts of Mergers and Acquisitions in the Drugs and Pharmaceutical Industry in India
Mergers and Acquisitions (MandAs) are inorganic growth strategies adopted by firms for achieving the objective of long-term growth maximization. Compared to other inorganic growth strategies like joint ventures and strategic alliances, MandAs offer deeper restructuring opportunities and better control over business over a long-term newlinebasis. During the third wave of globalization which started in early 1990s, MandAs became a popular strategy for firms to expand their businesses beyond the national boundaries. newlineIndian economy has been witnessing buzzling activity in the MandA landscape. A sectoral analysis of MandA trends identifies pharmaceutical sector as one of the top 5 newlinesectors with the highest MandA deal values during the period 2013-2016. Though Pharma sector has witnessed a decline in deal values during few years in the recent past, the resilience of the sector is visible through its ability to bounce back with record newlinebreaking deal values. Due to the continuous regulatory changes occurring in the domestic and foreign markets, pharma companies have to constantly change their strategies to survive and grow in the industry. MandAs enable pharma companies to adapt to these changes quickly. This study explores how the firms in the pharmaceutical sector use MandA as a strategy to navigate through the dynamic competitive landscape. The objectives of this research are threefold developing an understanding of the motives behind MandA decisions of the pharma firms, identification of the firm level determinants of acquisition probability and assessment of impact of MandAs. This study newlineuses qualitative content analysis for identification of MandA motives. The firm level newlinedeterminants of acquisition probability have been explored using Random Effect Logistic (REL) regression using panel data. Case study approach has been employed to assess the MandA impact by comparing the MandA motives with the post MandA outcomes. -
Determinants of Charitable Giving of Employees in the Organized Sector: A Case Study in Bengaluru Urban District.
The study aims at identifying the determinants of charitable giving among working professionals who are into white collar jobs in the organized sector in Bengaluru urban district. The study also tries to understand the effect of Income and Non-Income factors that could affect decisions made by individuals towards charitable donations. The study captures charity donations in terms of money, time and gifts, based on its objectives; the focus is on monetary donations. Thus, based on the various available models based on demographic variables and attitudinal factors, the study has developed a comprehensive function that that includes both demographic and attitude related factors that could predict the charity behavior of an individual and in this case it is the working professional. The population includes all the white collar jobs and the sample size was 132 respondents. This includes both charity givers and non-givers. The sampling technique used was purposive random sampling and data was collected through questionnaire method and the questionnaire begins with an introductory question seeking if the respondent have made any donations in the last 12 months and based on their answer they are directed towards the three sections such as section A, B and C for those who said yes to the question and B and c for those who said no to the question. Section A is about the charity activities of the respondents, B is about the demographic details and C measures altruism, prestige, care and other attitude related factors using a 5 point Liker scale. Factor analysis was made used for the purpose of model testing. However, prior to the model testing, bi-variate and multi-variate exploratory analysis was done using cross tabulation in SPSS and python to understand the association between variables used in the study. To further clarify and conclude the relationship and strength of association between variables, Pearson???s Chi square was conducted. Based on these results most of the demographic variables seem to have positive relationship with charitable giving and few had partially negative relation with the incidence of giving. For example Gender, where being male have less chance of making charitable donations. Religion has no impact on the likelihood of making donations. viii Certain other variables such as age, education level and income have a positive relationship with charity giving. In other words as age, income, level of education are higher, the chances of making monetary donations increases. From the results of exploratory bi -variate analysis, certain variables were removed and were not part of factor analysis towards testing the model. The results of factor analysis shows that charitable giving (monetary) is the function of three factors namely benevolence, socioeconomic status and warm glow giving and thus it proves the model developed by the study. Thus the major determinants or predictors of charitable giving (monetary) are benevolent behaviour, socioeconomic status and warm glow giving. -
Determinants of consumer product return behavior with respect to online shopping of apparels
This research aims at finding the determinants of consumer product return newlinebehavior with respect to online shopping of apparel in Bangalore city. The study was administered to 600 respondents, and the response received was from 465 respondents. The convenience sampling method was used to collect samples across Bangalore city. Product return behavior was measured using a newlinefive-point Likert scale for 34 items. The literature review was conducted extensively, covering both Indian and international context. This research is designed to address the literature gaps. Many hypotheses were proposed in the thesis and were examined using structural equation modeling. The hypotheses were tested with the software newlineAMOS 25 and SPSS 25 to fulfill the research objectives. Confirmatory factor analysis was done on the data to confirm the instrument reliability and validity. Confirmatory factor analysis was used to verify the constructs developed from the detailed literature review. ANOVA post hoc test was done to check the relationship among the demographic variables. Descriptive statistics were used newlineto interpret the data. With the help of structural equation modeling, the causal newlinerelationship between the dependent variable and the independent variables were identified. The study on the determinants of product return behavior has provided a lot of newlineinsights. Customer attitude has a significant and negative impact on product return behavior. The customers with a positive attitude towards online apparel purchases will be less likely to return products. The previous customer experience and their consumption pattern have a significant and negative impact on product return behavior. The customers with a bad experience with newlinebuying online apparel products, tend to return their products more. The perceived risk of online apparel purchases has a significant and positive impact on product return behavior. The customers with a high perceived risk of online apparel purchases will be more likely to return their products. -
Determinants of consumer product return behaviour with respect to online shopping of apparels
This research aims at finding the determinants of consumer product return behavior with respect to online shopping of apparel in Bangalore city. The study was administered to 600 respondents, and the response received was from 465respondents. The convenience sampling method was used to collect samples across Bangalore city. Product return behavior was measured using a five-point Likert scale for 34 items. -
Determinants of customer loyalty and retention : A Study of supermarket customers in Bangalore
Considering the ever dynamic lifestyle of the customers in Bangalore,the proposed study tried to find out the expectations and aspirations of supermarket customers in Bangalore.Most of the currently available studies are based on conceptual understanding and don t have an empirical backup. The proposed study is designed to determine the customer loyalty and retention of Supermarket Customers in Bangalore. newlineThe literature initiates an exhaustive discussion of various constructs leading to customer retention. Based on references from the literature constructs identified for customer retention are customer satisfaction, switching costs and customer loyalty and for customer loyalty the constructs identified are trust,commitment and customer satisfaction.For determining satisfaction the constructs identified in the proposed study are convenience of location, store atmosphere,promotion, customer relationship management practices and merchandise. Through extensive literature review,hypotheses were derived and the proposed conceptual model is developed. newlineObjectives of the proposed study are to empirically validate a model linking customer satisfaction, customer loyalty and customer retention with select antecedents. Research Methodology explains about the population spread from which the samples are collected, the justification for using the particular sampling technique and also about the tool employed for data collection. The techniques employed for checking the reliability and validity of the tool and pilot data analysis are also explained. Data collection was conducted using a structured questionnaire designed using Likert scale measurement. The pilot sample data consisted of 250 respondents.The questionnaires were analyzed using SPSS(v.20,software using Cronbach Alpha, Intra Class Correlation and Confirmatory factor analysis. newlineThe data collected from 600 respondents in Bengaluru city was used for the full fledged study. -
DETERMINANTS OF ORGANISATIONAL CITIZENSHIP BEHAVIOUR OF EMPLOYEES IN BUSINESS PROCESS OUTSOURCING SECTOR
Organizational Citizenship Behaviour is defined as the voluntary behaviour in which employees go beyond what is formally expected of them to contribute to the well being of the organisation and people involved in it. The present study investigated whether Big five Personality Traits and Psychological Contract have significant influence on Organisational Citizenship Behaviour of employees in Business Process Outsourcing Sector. Convenience sampling was adopted to administer the questionnaire (questionnaires were administered to the target sample from the business process outsourcing companies that gave permission, and through the online). Judgmental sampling method was adopted for deciding whom to administer the questionnaire. Employees must have worked for minimum 2 years in the present company to complete the questionnaire. 500 questionnaires were distributed and 381 fully completed questionnaires were compiled for analysis (76.2% response rate). In the present study the dimensions of Big Five Personality Traits ?? Extraversion, Agreeableness, Conscientiousness, Neuroticism and Openness to Change, the Psychological Contract Variables - Relational Contract, Transactional Contract, Employer Commitment, and Employee Commitment, and the dimensions of Organisational Citizenship Behaviour- Altruism, Conscientiousness, Courtesy, Civic Virtue and Sportsmanship were measured on 381 employees of top 10 BPO companies listed by NASSCOM . The result of the present study indicated that extraversion dimension of Big Five Personality Traits had a significant influence on Organisational Citizenship Behaviour. Psychological Contract variables Relational Contract, Transactional Contract and Employer Commitment had a significant influence on Organisational Citizenship Behaviour. In this study we have analyzed the implications based on the results found. Some of the implications of the study were the BPO employees high on extraversion, may display more citizenship behaviours towards the organisation. The employees who scored high on the psychological contract measures may result in exhibiting voluntary behaviour towards the organisation. It is suggested for the future researchers to replicate the study to determine how the findings reported here correspond to the results of studies conducted in other work environments to ensure proper generalization. Future researches also need to consider the moderating influences of person and situation-based factors on the relationship between Big Five personality Traits, Psychological Contract and OCB. Additionally, researcher may consider the respondents position in future studies as findings. A dyadic response from both the managers and employees can be a better study to avoid bias and self rating. Key words: Organisational Behaviour, Big Five, Psychological Contract, Organisational Citizenship Behaviour, Human Resource Management.









