Browse Items (1473 total)
Sort by:
-
A Study on Measures of Central Tendency of Some Distance Parameters of Connected Graphs
This dissertation sets out to examine the implications of various mea- sures of central tendencies of graphs by introducing the unique concept of ?graphs. A ?graph is defined as a simple, finite, connected and undirected graph in which the basic centrality measures: mean, median and mode of eccentricities are equal. It takes a formal approach to the exploration of ?graphs by applying the principles of Graph Theory. Various graphs are looked into to compare the centrality measures, and the possibility of those being ?graphs. Earlier graph theoretical research in notions of centrality, distance and eccentricity are reviewed. It describes the development of a new elicitation tool that examines the effect of measures of central tenden- cies in graphs, by analyzing their eccentricity sequences. Using this new ap- proach the central values of certain graphs are obtained. The concept found would be helpful to develop a more complex interpretation of the notion of centrality measures in graph theory. Keywords: Eccentricity; Eccentricity sequence; Distance; Degree; Cen- trality; Mean; Mode; Median; ?graph; Central value -
Antimagic labeling and its variations in graphs
Graph theory is a branch of discrete Mathematics with its results having significant applications in many areas of computing, social, and natural sciences. Graph labeling is one of the fascinating areas of graph theory with wide-ranging applications. The concept was first introduced in the 1960s where the vertices and edges are assigned real values or newlinesubsets of a set subject to certain conditions. The labeling dealt in the thesis is edge labeling basically, that is, assigning a label to the edges of the graph. Depending on the conditions applied in labeling give way to magic, super-magic, antimagic labelings. Hartsfield and Ringel introduced the notion of antimagic labeling in the year 1990. In this thesis, three variations in graph labeling are dealt namely, equitable antimagic labeling, equitable difference labeling and extension of equitable irregular labeling with an introduction of k-equitable irregular labeling. For a given graph G = (V,E), an equitable antimagic labeling (EAL) of G is a bijective edge-labeling f: E(G) and#8594; {1,2,3,...,m = |E(G)|} such that |W_f (u)-W_f (v)| and#8804; 1 for any pair of adjacent vertices u and v of G, where W_f (v) is the sum of the labels of the edges incident with the vertex v. A graph admitting an EAL is called an equitable antimagic graph (EAG). In Chapter 2, we initiate a study of this new edge labeling of graphs. A diand#64256;erence labeling of a graph G is realized by assigning distinct integer values to each vertex and then associating with each edge, the absolute diand#64256;erence of those values assigned to its end vertices. That is, it is an injective function f: V(G) and#8594; N together with function f^*: E(G) and#8594; N deand#64257;ned by f^* (uv)=|f(u)-f(v)|for any edge uv in G. The function f^* is called the weight function induced by f. An irregular labeling f: E(G) and#8594; N with the property that S_f (u) and#8800; S_f (v) for any two vertices u and v of G, where S_f (u) denotes the sum of the labels of the edges incident with the vertex u. The sum S_f (u) is called the vertex sum of u under f. -
Synthesis of benzothiazinones, benzothiazines and their selenium analogues through novel synthetic routes /
Benzo fused N-heterocyclic scaffolds containing oxygen, sulphur or selenium have found wide interest in the field of drug-discovery. Among these N-heterocycles, benzothiazine, benzoxazine, benzoselenazine and benzothiazinone derivatives are a unique class of compounds and have a larger scope towards the development of efficient and simple synthetic methodologies for their synthesis with readily available substrates. -
Synthesis of Benzothiazinones Benzothiazines and Their Selenium Analogues Through Novel Synthetic Routes
Benzo fused N-heterocyclic scaffolds containing oxygen, sulphur or selenium have found wide interest in the field of drug-discovery. Among these N-heterocycles, benzothiazine, benzoxazine, benzoselenazine and benzothiazinone derivatives are a unique class of compounds and have a larger scope towards the development of efficient and simple synthetic methodologies for their synthesis with readily available substrates. newlineDuring the course of the present thesis a convenient and simple synthetic procedures were developed for the synthesis of benzothiazines, benzoxazines, benzoselenazines and benzothiazinones in an onepot methodology. 2-aryl/alkyl substituted 1,3-benzothiazines and selenazines were synthesized by reacting 2-amino benzyl alcohols and thio or seleno benzamides in the presence of T3P.A reagent controlled methodology was developed for the synthesis of 2-amino substituted 1,3-benzothiazines and oxazines. Initially, various 2-amino benzylalcohols are reacted with newlineisothiocyanates to form the corresponding thioureas. The formed thioureas undergo newlinecyclodehydration in the presence of T3P to yield 2-amino substituted 1,3-benzothiazines newlineand on the other hand molecular iodine facilitates desulfurization of the thiourea to yield 2-amino substituted 1,3-benzoxazines. 2-amino substituted 1,3-benzothiazinones were synthesized by reacting anthranilic acids and isothiocyanates in the presence of EDC.HCl. 2-aryl substituted 1,3-benzothiazinones were synthesized by employing thiobenzamides in the presence of T3P. All the compounds synthesized were characterized by 1HNMR, 13C, Mass spectroscopic (LCMS, HRMS) analysis. Docking studies against TANKYRASE-1 enzyme for colorectal cancer (CRC) and antibacterial studies were also discussed. -
Design and Development of Adaptive Authentication Model to Detect User Behavior Anomalies
The password-based authentication system has recently become more secure as the riskbased authentication system(RBA) is indentured. Recent research in the area has shown the significant use of 2 Factor Authentication (2FA) and Multi-Factor Authentication(MFA) in many commercial applications using Risk Based newlineAuthentication(RBA). The RBA system monitors the parameters extracted during the user login process, and based on the proposed model, the system raises a multi-factor newlineauthentication to the user. As the vulnerability has increased concerning passwords, fingerprints easy access to any web application may result in a security flow; the reason can be the existing methodology of the RBA system and also the unavailability of the data of the users during the initial login process, which hinders the authentication system during the initial login process as there is no standard method to incorporate RBA in the authentication system. Few researchers have proposed novel approaches to improve the authentication system. Still, to the best of our knowledge, no research has suggested methods to address the authentication system during the initial login process and also provide a robust way, a combination of Machine Learning (ML) and statistical newlineapproaches. Hence, a novel method is proposed for the RBA system during the initial newlinelogin phase using a Hierarchical Sub-Feature Based Model -(HSFBM) for different user newlinecategories. The FAR is comparatively better in our proposed model against the standard newlinemodel, with minimal re-authentication requests for the user. -
COMPARATIVE ANALYSIS OF ORGINAL MOVIES AND ITS REMAKES IN INDIA
The remake is a phenomenon both well-known and immediately recognizable but in India it is not theoretically analyzed. However, by analyzing these remakes, we can understand how these films reflect some specific cultural differences between one state and other State in India. Here researcher has taken four original and its remake films to understand the phenomena of remake. The highly intensed watching the films has helped researcher to understand the difference of films original and remakes. Researcher took one Tamil Movie and its remake in Hindi and also a Malayalam Movie and its remake in Tamil. Films are Tamil Singam to Hindi Singam and Malayalam Manichithrathazhu to Tamil Chandramukhi. All the changes made in movies are on the basis of the cultural differences between the regions where the film is introduced. As researcher have done two Tamil movies he came to know that Tamil Industry possess one culture even though it is a remade they try to change it according to their culture. The basic element of films are the audience, a film is made according to them. So that film Industry sticks to the culture of the audiences. -
Web User Access Log Analytics Using Neural Learning, Regression and Logit Boost Clustering Techniques for Accurate User Behavioural Pattern Identification
Web Usage Mining (WUM), is the process of mining user behaviour patterns from huge log fles. Weblogs provide substantial input to learning the identity of an online user. Analysis of these patterns extracted from the weblog datasets is currently being explored by various researchers. Due to the recent advent of automation, mining patterns from weblogs are automated. These automated mining processes focus on browsing habits and usage patterns. To make this process of gathering better, there are many ways to look at how users act and put them into relevant groups.Identifying, detecting, and classifying features that demarcate specifc traits that are related is an important task. Conventional research is designed to discover web usage mining strategies through clustering and classifcation methods. However, there is a need to focus on and improve the accuracy of the prediction systems that classify acquired features to fgure out the patterns of web users. Deep learning methods are used to mine weblog data to improve accuracy and precision. To improve user behaviour pattern mining, a two-level clustering process is introduced as Ensemble Fuzzy K-Means with Logit Boost Clustering (EFK-LBC) technique to extract the weblog. In this technique, a preprocessing step is included to remove redundant data and choose reliable log fles. The Fuzzy-K means clustering technique is used to identify behavioural patterns exhibited by recurrent users. Finally, the Logit Boost Clustering method is introduced to the data,that help in generating a strong cluster. Clustering of web users frequent behavioural patterns using the Logit Boost ensemble technique helps the proposed EFK-LBC method to improve newlinethe accuracy up to 88% and reduce the clustering time by 20% compared with existing approaches. Though the proposed EFK-LBC technique performs better for user identifcation, the different initialization of clusters provides various fnal clustering results. -
Artificial Intelligence - Based Steganography Model for Social Media Data Set
Steganography, one of the data security mechanisms under our investigation, shields legitimate messages from hackers and spies by employing data hiding. Data protection is newlinecurrently the top priority due to the signifcant advancements in information technology due to high-security concerns. Traditional techniques for maintaining data confdentiality include steganography and cryptography; the distinction is that steganography does not naturally arouse suspicion, whereas cryptography does. Traditional linguistic steganographic methods suffer from limitations in automation, accuracy, and the volume of concealed text. The robustness and undetectability properties of these approaches also require improvement. Third-party vulnerability is often too high for conventional techniques to handle. Artifcial intelligence is increasingly replacing traditional model creation in steganography. Despite the fact that steganography ensures security, information sent over online social networks (OSN) is plainly not safe. Steganography along newlinewith encryption can make a difference with regard to privacy of information in transit. newlineThe research study aims to build algorithms or models and assess steganography s robustness, security, undetectability, and embedding ability. Two distinct types of data newlineconcealing employed for investigation: text and image. The results were encouraging newlinewhen we initially tested our Laplacian model using image steganography and compared newlinewith benchmark methods. The second experiment, which is based on AI, generates the cover text using secret information, examines the security and robustness of steganography. The study compared suggested text steganography model, 3-bit data concealing, with other existing techniques in order to ascertain the undetectability factor. The frst experiment used MATLAB tools, and the second used the markovify python module, RNN (Recurrent Neural networks), and the Huffman tree. Further format-based steganography methods utilized in the following experiment. -
Comparative analysis of original movies and its remakes in India /
The remake is a phenomenon both well-known and immediately recognizable but in India it is not theoretically analyzed. However, by analyzing these remakes, we can understand how these films reflect some specific cultural differences between one state and other State in India. Here researcher has taken four original and its remake films to understand the phenomena of remake. The highly intensed watching the films has helped researcher to understand the difference of films original and remakes. Researcher took one Tamil Movie and its remake in Hindi and also a Malayalam Movie and its remake in Tamil. Films are Tamil Singam to Hindi Singam and Malayalam Manichithrathazhu to Tamil Chandramukhi. -
Passive control of four storied reinforced concrete structure subjected to blast loads
In the recent past in major cities all over the world, public structures are vulnerable to blast loads caused by explosions either accidentally or intentionally. The intentional causes are not on hardened military targets but on important civilian structures, like commercial, financial and civic centers. The study of reinforced concrete Ground + 3 Storied structure subjected to blast loads have gained importance, as conventionally the reinforced newlineconcrete structures are not designed for blast loads as many of the loading codes do not mandate for the same and also due to the fact that quantifying the magnitude of the blast load is difficult to estimate. However, the structures are susceptible to damage from the explosion. To protect the life of people and to minimize the damage to the structure, it has become imperative to consider the effect of blast loads too, in addition to newlinethe conventional loads, considered as per the prevailing codes, during the analysis and design of all public buildings. The charge weights of the explosive used on the structure are 8kg, 16 kg and 24kg. The equivalent blast pressure subjected on the structure is determined, to study its corresponding effects for stand-off distances of 3000 mm and 6000mm using surface blast load. The behavior of the structure is newlinestudied by varying the parameters and verified which of these parameters can newlinebe critical to the performance of the structure. The response of the ground floor + 3 upper storied reinforced concrete skeletal structure is studied for understanding the variation of the displacements, strains and stresses for the parameters considered. Using PTC CREO 3.0 the 3D modeling of structure and structural elements were generated. HYPERMESH was used for the discretization (meshing) of structure and its elements. Static analysis and blast load analysis was carried out using ANSYS. -
A study on operational efficiency of scheduled commercial banks in India
Banking institutions play an important role in the economic development of the entire nation. Financial services industry is dominated by banking sector. Performance of any economy largely depends on the efficiency of commercial banks. Efficiency of banks depends upon diversified banking system that attracts savings and channelizes them into productive investments to generate income. The strength of the bank depends on newlineefficiency of these operations. Banks need to convert its deposits into loans, advances and investments efficiently. Efficiency in operations results in productivity. Productivity brings in faster economic growth. The cost of these operations should be kept to the minimum in order that they are efficient. With stiff competition that characterises banking industry, the competitive advantage that one bank has over the other depends on various efficiencies. This research attempts to measure the various efficiencies of scheduled commercial banks in India and investigate the factors that influence the same. Review of related newlineLiterature has been carried out to identify the research gap. Scheduled commercial banks in India include public sector banks, private newlinesector banks, foreign banks and regional rural banks. Regional rural banks are excluded from the study. As per the RBI report, currently (as on 31 March 2014) there are 26 public sector banks, 22 private sector newlinebanks and 43 foreign banks. However, this study considers the banks which have existed before, during and after the study period in order to measure the technical and cost efficiency of each bank and compare those efficiencies within the group as well as across the group. Accordingly 25 PSBs, 18 PvSBs and 25 FBs have been considered for the present study. Operational efficiency in this study includes the banks with technical and newlinecost efficiency. Technical efficiency is measured using the primary operating variables like fixed assets, loanable funds, employees, loans and advances and investments. -
Outward Foreign Direct Investment From India ; A Sectoral Analysis
New opportunities have arisen as the global economy has been more integrated, with globalization and liberalization of government policies. As the world becomes more globalized, businesses boost their investments to keep up with demand. Trade and foreign investments are two notable paths to global integration, with trade being the traditional path. As an FDI pioneer and promoter, the FDI of the upper-middle-income countries became an essential source of integration with the low and middle-income countries. With globalization and liberalization policies India has become the most significant emerging economy. Economic policies urged Indian enterprises to compete internationally to keep up with fierce competitive environment and the adoption of new technology, such as expanding into new markets, acquiring assets and resources, and integrating their overseas operations. Outward FDI (OFDI) has been used by Indian enterprises to meet these strategic needs. India's overseas investments have increased significantly since the 1990s. The majority of empirical research has focused on FDI from upper-middle-income nations. As low- and middle-income nations like India become more important players in the FDI flow, it's necessary to understand the patterns, motivations, and factors that influence the location and impact of OFDI from these countries. Existing Studies focused on Inward FDI (IFDI), but this study focuses on Outward FDI (OFDI) from India. Earlier OFDI research has mostly focused on firm-specific advantages. This study examines India's OFDI trends, as well as changes in host country location determinants, sectoral composition, and their influence on both the home and host countries. In view of the changing direction of OFDI in India, this study compares investment motives and location factors between the upper-middle-income and low and middle-income countries complying with the international categorization established by the United Nations Conference on Trade and Development (UNCTAD) in its publication, the World Investment Report (WIR). This study analyzes the determinants and impact of India's OFDI in the home and host country during the period 1991-2020 in the context of Dunning's eclectic paradigm (OLI paradigm) and Investment Development Path (IDP) theory, using OFDI data from 1991 to 2020, which is longer than other studies by India's OFDI. This study employs panel data methodologies to identify crucial aspects and empirically test the nature of India's OFDI, which includes market seeking, resource seeking, technology and strategic asset seeking. The study uses a time series method to empirically test the relationship between India's OFDI, Trade and GDP. The results reveal that India's OFDI is motivated by market seeking, resource seeking, and technology seeking motives in upper-middle-income and low and middle-income countries. The results emphasize strategic assets as a significant motivation for investing in upper-middle-income countries rather than low and middle-income countries. India's OFDI is also actively linked to host country policies such as openness, corruption and market size. OFDI from India affects exports, as OFDI and exports are two means of internationalization. Theoretically, OFDI leads to further exports (positive or complements) or replaces exports with production (negative or substitution). Empirical testing of the OFDI-trade relationship shows a significant long-term positive relationship between the two. The study divided into five chapters. Chapter one comprises the introduction, backdrop of Global Outward FDI, India's FDI inflows and outflows, India's outward FDI, Need and Significance of the study. The second chapter consists of the literature review, theories of FDI, Statement of Problem. The third chapter deals with the methodology, research gap, research question, objectives of the study, and statistical tools used for the study. The fourth chapter focuses on the determinants of India's OFDI towards upper-middle and low and middle-income countries and the impact of India's OFDI on upper-middle and low and middle-income countries are analyzed in chapter three. It followed by a Geographical and sectoral analysis of India's OFDI in upper-middle and low and middle-income countries and a region-wise analysis in chapter five. Chapter six presents the study results, factors affecting India's Outward FDI among upper-middle and low and middle-income countries, followed by practical, theoretical and policy implications of the Study. -
A Study on Retirement Preparedness of Information Technology and Education Sector Employees in relation to Attitude and Knowledge
Retirement planning is a process of analysing the current financial situation, identifying the future financial need of the person upon retirement, investing on a disciplined basis through appropriate instruments and deriving benefits out of it when the need arises. With changing socio-economic factors, there is a great interest among academicians and practitioners alike, to find answers for inevitable post retirement survival crisis. This study is primarily based on a problem How well prepared are IT and Education sector employees to take up the post retirement financial survival? The objectives of the study are - to know the association between attitude, knowledge and retirement preparedness and whether attitude and knowledge has any relationship with the retirement preparedness. This study is based on primary data collected from 400 respondents (200 IT sector employees and 200 Education sector employees) using questionnaire. This study takes Attitude and Knowledge as independent variables and Retirement preparedness as dependent variable. With the help of statistical tools like Chi-square tests, ANOVA and Canonical Correlation, the association and relationship were tested. This study reveals that Attitude and Knowledge has relationship with retirement preparedness. The result is of great significance for government in policy making, for media and personal financial planners in pro actively influencing investment decisions of investors. -
Action genre in tollywood-A study of Pawan Kalyan films /
The present study deals with analyze how dialogue delivery seeped through action sequences by noting the chronological changes in the Telugu films, as well as analyzing four movies of a famous Telugu movie celebrity who has indulged his fans by delivering smart witty dialogues while beating up the baddies.Various aspects of the protagonist’s roles have been explored in order to elicit the importance of these elements and their contribution to the overall plot.