Browse Items (5511 total)
Sort by:
-
Design requirements of a spectropolarimeter for solar extreme-ultraviolet observations and characterization of a K-mirror based on Brewster's angle
Measuring the linear polarization signal in extreme-ultraviolet (EUV) spectral lines, produced by the Hanle effect, offers a promising technique for studying magnetic fields in the solar corona. The required signal-to-noise ratio for detecting the Hanle polarization signals is on the order of 101 (off-limb) to 106 (disk center). Measuring such low signals in the photon starved observations demands highly efficient instruments. In this paper, we present the design of an instrument, SpectroPOLarimeter for Extreme-ultraviolet Observations (SPOLEO), which utilizes reflective components with suitable mirror coatings and thicknesses to minimize the throughput losses. We analyze the system performance within the spectral range from 740 to 800 The K-mirror-based polarimeter model provides a polarizing power of 20%40% in this wavelength range. Based on the system throughput and polarizing power, we discuss various possibilities for achieving the required signal-to-noise ratio, along with their limitations. Due to lack of facilities for fabrication and testing in the EUV, we have calibrated a prototype of the reflection-based polarimeter setup in the laboratory at the visible wavelength of 700 nm. 2024 Optica Publishing Group. -
Shell script to clone AODV routing protocol in network Simulator-2
Background and Objective: Most of the research that are carried in ad hoc routing protocol is through simulation. While working with a simulator, the codes are enclosed in a component that is accessible to all the developers. The difficulty arises as there is no enough documentation and users find it difficult to modify different C++ and TCL files. Even if one component is modified then the entire Network Simulator-2 (NS-2) suite must be reconfigured. Cloning the protocol manually takes a lot of time and prone to error. Our objective is to ease the work of developers and researchers by showing the procedure to clone the AODV protocol automatically using a script. Methodology: In this study, a shell script is developed that will clone the AODV protocol by modifying 18 C++ and TCL files of the protocol and NS-2 suite by automatically inserting the code in exact files at exact position. It also configures the NS-2 and installs the entire NS-2 suite along with setting the path in .bash files. Results: In this research work, a comparison of cloned protocol with AODV protocol is done based on throughput time and packet loss metrics and the results generated are exactly same for both the protocols. The results of the study reveal that the proposed script clones the AODV protocol successfully. Conclusion: This work proves that the proposed script can clone the AODV protocol faster with just one execution of shell script. This methodology will save the time and help the developers or research to focus more on their study on the protocol. 2018 Authors. -
Comparing machine learning and ensemble learning in the field of football
Football has been one of the most popular and loved sports since its birth on November 6th, 1869. The main reason for this is because it is highly unpredictable in nature. Predicting football matches results seems like the perfect problem for machine learning models. But there are various caveats such as picking the right features from an enormous number of available features. There have been many models which have been applied to various football-related datasets. This paper aims to compare Support Vector Machines a machine learning model and XGBoost an Ensemble learning model and how Ensemble Learning can greatly improve the accuracy of the predictions. Copyright 2019 Institute of Advanced Engineering and Science. All rights reserved. -
Marine macrolides as an efficient source of FMS-like tyrosine kinase 3 inhibitors: A comprehensive approach of in silico virtual screening
Marine organisms are a definitive source of antibiotics and kinase inhibitors which provide cues for discovering novel drug leads. Marine macrolides are getting much attraction due to their enzyme inhibitory potential. The present study comprehensively dealt with the virtual screening and structure-based prediction of macrolide compounds against FMS-like tyrosine kinase 3 receptors (FLT3). The FLT3 was chosen as a biological target against the 990 marine macrolides. Before the virtual screening of macrolide compounds, validation of molecular docking was carried out by re-docking of co-crystallized Gilteritinib within the FLT3. Among the selected 990 candidates of marine macrolides, 311 were failed due to the generation of insufficient conformers. Amongst the successful compounds, 22 compounds were also failed to dock within the receptor, while the remaining 657 marine macrolide entities elicited successful docking. The HYBRID Chemguass4 Score ranged from -10.17 to -0.02. This vast difference in the HYBRID ChemGuass4 score is attributed to the difference in binding potential with the receptor's binding pocket. The top ten compounds were selected based on the HYBRID ChemGuass4 Score lower than -8.0 against FLT3. The pharmacokinetics and ADME properties revealed the drug likeliness of the macrolides. 2022 SAAB -
Did Russia's Invasion of Ukraine Induce Herding Behavior in the Indian Stock Market?
This study empirically examines the herding behavior of the Indian stock market investors during the heightened geopolitical tensions between Russia and Ukraine in 2022. An intensified Russia-Ukraine geopolitical event window was constructed, and the high-frequency trading data (intraday) of the Nifty index was analyzed using Multifractal Detrended Fluctuation Analysis (MFDFA) to compute the 5th-order Hurst exponent (Hq (5)) that detects herding behavior. The study's empirical results revealed the presence of profound herding behavior during the intensified Russia-Ukraine geopolitical event window. The study contributes to the existing literature on herding behavior by examining the impact of a geopolitical event on the Indian stock market. Additionally, the study utilizes MFDFA to compute Hurst exponents, a relatively new approach to detecting herding behavior in financial markets. The findings of this study may assist investors and policymakers in understanding the impact of geopolitical events on financial markets and the potential for herding behavior among investors during times of heightened uncertainty. The study's results demonstrate the interconnectedness of global events and financial markets, highlighting the need for policymakers to consider the potential social and economic consequences of geopolitical events. 2023 The Author(s). -
Do all shocks produce embedded herding and bubble? An empirical observation of the Indian stock market
Herding has a history of igniting large, irrational market ups and downs, usually based on a lack of fundamental support. Intuitively, most herds start with an external shock. This empirical study seeks to detect shock-induced herding and the creation of nascent bubbles in the Indian stock market. Initially, the multifractal form of the detrended fluctuation analysis was applied. Then the Reformulated Hurst exponent for the Bombay stock exchange (BSE) was determined using Kantelhardt's calibration. The investigation found evidence of high-level herding and a bubble in 2012, with a high value of Hurst Exponent (0.7349). The other years of the research period (2011, 2013, 2016, 2018, 2020-2021) observed mild to significant herding with comparatively lower Hurst values. The results confirm that herding behavior occurs during a crisis and harsh situations emitting shocks. The study concludes that shock-based herding is prevalent in all six shocks: the economic meltdown, commodities and currency devaluation, geo-political problems, the Central Bank's decision on liquidity management, and the Pandemic. Additionally, the years following the Financial Crisis and the years of the Pandemic are when herding and bubble are prominent. Tabassum Khan, Suresh G., 2022. -
ENHANCING FAKE NEWS DETECTION ON SOCIAL MEDIA THROUGH ADVANCED MACHINE LEARNING AND USER PROFILE ANALYSIS
Social media news consumption is growing in popularity. Users find social media appealing because it's inexpensive, easy to use, and information spreads quickly. Social media does, however, also contribute to the spread of false information. The detection of fake news has gained more attention due to the negative effects it has on society. However, since fake news is created to seem like real news, the detection performance when relying solely on news contents is typically unsatisfactory. Therefore, a thorough understanding of the connection between fake news and social media user profiles is required. In order to detect fake news, this research paper investigates the use of machine learning techniques, covering important topics like feature integration, user profiles, and dataset analysis. To generate extensive feature sets, the study integrates User Profile Features (UPF), Linguistic Inquiry and Word Count (LIWC) features, and Rhetorical Structure Theory (RST) features. Principal Component Analysis (PCA) is used to reduce dimensionality and lessen the difficulties presented by high-dimensional datasets. The study entails a comprehensive assessment of multiple machine learning models using datasets from "Politifact" and "Gossipofact," which cover a range of data processing methods. The evaluation of the XGBoost classification model is further enhanced by the analysis of Receiver Operating Characteristic (ROC) curves. The results demonstrate the effectiveness of particular combinations of features and models, with XGBoost outperforming other models on the suggested unified feature set (ALL). 2023 Little Lion Scientific. -
Fake News Detection Using TF-IDF Weighted with Word2Vec: An Ensemble Approach
Social media platforms' utilization for news consumption is steadily growing due to their accessibility, affordability, appeal, and ability to propagate misinformation. False information, whether intentionally or unintentionally created, is being disseminated across the internet. Certain individuals spread inaccurate information on social media to gain attention, financial benefits, or political advantage. This has a detrimental impact on a substantial portion of society that is heavily influenced by technology. It is imperative for us to develop better discernment in distinguishing between fake and genuine news. In this research paper, we present an ensemble approach for detecting fake news by using TF-IDF Weighted Vector with Word2Vec. The extracted features capture specific textual characteristics, which are converted into numerical representations for training the models and balanced dataset with the Random over Sampling technique. The implementation of our proposed framework utilized the ensemble approach with majority voting which combines 2 machine learning models like Random Forest and Decision Tree. The proposed strategy was adopted empirically evaluated against contemporary techniques and basic classifiers, including Gaussian Nae Bayes, Logistic Regression, Multilayer Perceptron, and XGBoost Classifier. The effectiveness of our approach is validated through the evaluation of the accuracy, F1-Score, Precision, Recall, and Auc curve, yielding an impressive accuracy score of 94.24% on the FakeNewsNet dataset. 2023, Ismail Saritas. All rights reserved. -
Education suffering within structural inequalities: A Critical Discourse Analysis of a policy framework
Education acts as an important catalyst for socioeconomic and democratic evolution in society and is a critical tool for building an equitable system. In our paper, we have historicized one of the most important educational policies, viz. Samagra Shiksha Abhiyan (SAMSA) in India that carries large expectations to minimize the educational divide. We have studied the policy through the lens of Political Economy and have further critiqued it through the framework of Critical Discourse Analysis. We find in our paper that the budget allocated to SAMSA was revised in 2022, from its preceding years with a 28 per cent slash. We critically reflect on the principles mentioned in the policy and find that although there has been an attempt to mitigate the hazards of banking education the Public-Private Partnership initiative reinforces struggles for equitable education, and further, the privatization sets the government free from any accountability. Moreover, a constitutional right like the Right to Education (RTE) is not sufficient enough to meet the goals of universalisation of education. Besides, we analyse the principles such as Education for All, Equity, Equal Opportunity, Access, Gender Concern, Centrality of teacher, Moral Compulsion, and Convergent and integrated system of education management, and argue that although some of the facets of societal structural inequalities are addressed, however, there exists hardly a proper roadmap that could be monitoring the process of creating an inclusive educational paradigm. 2023, Institute for Education Policy Studies. All rights reserved. -
A comparative study on decision tree and random forest using konstanz information miner (KNIME)
With vast amounts of data floating around everywhere, it is imperative to comprehend and draw meaningful insights from the same. With the proliferation of Internet and Information Technology, data has been increasing exponentially. The 5 Vs of data i.e. Value, volume, Velocity, variety and veracity will only make sense if we are able to examine the data and uncover the hidden, yet meaningful insights. With large data becoming a norm, a lot of data mining algorithms are available that help in data mining. We have tried to compare two classification algorithms, primarily Decision trees and Random forest. A total of 10 datasets have been taken from UCI Repository and Kaggle and with the help of Konstanz Information Miner (KNIME) workflows, a comparative performance has been made pertaining to the accuracy statistics of Random Forest and decision Tree. The results show that Random Forest gives better and accurate results for a dataset as compared to decision trees. 2020 SERSC. -
A First Report of Docosahexaenoic Acid-Clocked Polymer Enveloped Gold Nanoparticles: A Way to Precision Breast Cancer and Triple Negative Breast Cancer Therapy and Its Apoptosis Induction
Functionalized gold nanoparticles (GNPs) are extensively utilized in various disciplines due to their excellent bioactivity, biocompatibility, and extended drug half-life, influenced by the ligands and size that are changed on surfaces. In this study, we successfully fabricated GNPs coated with ligands containing docosahexaenoic acid (DHA) and polyethylene glycol (PEG) clocked by a carboxyl group. These nanoparticles are referred to as MPA@GNPs-PEG-DHA. The cytotoxicity results demonstrate that MPA@GNPs-PEG-DHA exhibits superior cell selectivity, explicitly inhibiting the proliferation of breast cancerous cells than noncancerous cell lines. Apoptosis is involved in the reduction of cell proliferation by MPA@GNPs-PEG-DHA, as demonstrated clearly through many assays measuring apoptotic index, including AO/EB staining, DAPI, annexin V-FITC staining, mitochondrial membrane potential (MMP), and reactive oxygen species (ROS) measurement. The efficacy of MPA@GNPs-PEG-DHA in inducing apoptosis was demonstrated by its inhibition of mitochondrial dysfunction by ROS. MPA@GNPs-PEG-DHA has the potential to improve the induction of apoptosis in breast cancerous cells. 2024 Wiley Periodicals LLC. -
Creating inclusive spaces in virtual classroom sessions during the COVID pandemic: An exploratory study of primary class teachers in India
The research paper reports insights into the primary class teachers experiences and inclusive methodologies in India during virtual class sessions. Teaching online during the COVID pandemic has turned out to be an adaptive and transformative challenge for teachers. Though Indian teachers are used to the chalk-and-talk method, an online setup has compelled them to discover innovative strategies to maintain an inclusive classroom. It was found that teachers are using puppetry, storytelling, energizers, ice-breakers in their sessions to make it engaging. An in-depth study was undertaken to understand the experiences of five primary class teachers from private schools in India. Data thus collected were analyzed qualitatively. The study results demonstrated that the teachers had improved professionally they have become independent in using the internet and exploring new ways of teaching them per their needs. Nevertheless, it was also found that the schools lack support, fear among the teachers of being asked to quit the job, blocking students from the online class if they fail to pay the fees, and exorbitant salary cuts. The challenges related to young students were - lack of proper resources for online sessions, low attention span, technical distractions, lack of physical development, excessive interference of the parents and lack of socialization. The paper concludes with policy proposals regarding standardized online education platforms and provisions for proper resources for virtual class sessions to marginalized families to minimize India's digital divide. 2021 -
Voicing Out Parental Experiences of Schooling Their Children with Learning Disabilities: A Qualitative Study of Inclusive Government Schools of India
The paper shone light on the lived experiences of parents of children with learning disabilities. The specific objective was to understand the challenges, experiences and aspirations of parents for their children. A phenomenological study was adopted for the study so as to focus on the experiences of the parents. Participants were parents (female- 17 and male- 3) of children in primary classes, who were identified through purposive sampling from government schools of Delhi, NCR from 3 underdeveloped areas of Delhi - Nangloi, Mangolpuri and Ranhaula. The data was collected by semi-structured interviews and later thematically analyzed. The findings were on the basis of the past and present experiences and further their future aspirations for the children. They revealed that the parents faced challenges with applying and issuance of the UDID certificates, but with the collaborative efforts of the special educator and the parents along with various support systems that are provided by the school their experiences became positive. It was also brought to light that the mother was the main caregiver in most of the cases. All the parents were worried, what will happen to their children if they are not there with them. They aspired that the students will be financially independent and have a safe future ahead of them. They dream of a society where all the students are equal in an inclusive environment. The Author(s) 2025. -
We wear multiple hats: Exploratory study of role of special education teachers of public schools in India
The role of special education teachers (SETs) is multifaceted. A gap was recognised in the literature in the lack of studies on the roles and responsibilities of SETs in India and the field realities of carrying out the role. The aim was to explore to what extent the special education teachers fulfil their roles and responsibilities. The following is an exploratory study, using open-ended questions that interviewed 12 SETs from five public schools in Delhi, India. The policy documents shared that the SETs were responsible for direct instruction to special needs students, parentteacher collaboration and documentation, including IEPs for students with special needs. But in practice, there were not any clear-cut boundaries, the SETs played multiple rolesSubject teacher, taking substitution periods, para teachers, these were keeping the SETs away from their core responsibilities. The results of the study demonstrated an undervaluation of the work of SETs and lack of support from the principal and regular teachers. The results concluded with recommendations for policy proposal with regards to defining the role of all stakeholders in an inclusive education school and improvements for the teacher education program. 2024 National Association for Special Educational Needs. -
Household waste management policy and practices in bengaluru
Households play a very important role in waste management policy development and its implementation in any city. This study is done among households of 12 wards in Urban Bengaluru(India). It is observed that waste management is open of the most important issue among households and households in general are not satisfied by waste collection, segregation its transport service and maintenance of public places, provided by local municipal body. Garrett's ranking method is also used to give ranking for various waste management practices adopted by various wards. The results suggest that problems faced by households across the city is not same, also perception towards the policy and practices of local bodies towards waste management differs significantly across the city. Cleanliness of public places and waste collection process should be given highest priority by the policy makers. The study also determines a different perspective towards understanding behaviour of household. the policymakers may use this technique to identify specific geographic areas where immediate action is required. BEIESP. -
The Capital structure puzzle
International Journal of Research in Commerce & Management Vol.4, No.03, pp.134-136 ISSN No. 0976-2183 -
Gut Homeostasis; Microbial Cross Talks In Health and Disease Management
The human gut is a densely populated region comprising a diverse collection of microorganisms. The number, type and function of the diverse gut microbiota vary at different sites along the entire gastrointestinal tract. Gut microbes regulate signaling and metabolic pathways through microbial cross talks. Host and microbial interactions mutually contribute for intestinal homeostasis. Rapid shift or imbalance in the microbial community disrupts the equilibrium or homeostatic state leading to dysbiosis and causes many gastrointestinal diseases viz., Inflammatory Bowel Disease, Obesity, Type 2 diabetes, Metabolic endotoxemia, Parkinsons disease and Fatty liver disease etc. Intestinal homeostasis has been confounded by factors that disturb the balance between eubiosis and dysbiosis. This review correlates the consequences of dysbiosis with the incidence of various diseases. Impact of microbiome and its metabolites on various organs such as liver, brain, kidney, large intestine, pancreas etc are discussed. Furthermore, the role of therapeutic approaches such as ingestion of nutraceuticals (probiotics, prebiotics and synbiotics), Fecal Microbial Treatment, Phage therapy and Bacterial consortium treatment in restoring the eubiotic state is elaborately reviewed. 2021 The Author(s). Published by Enviro Research Publishers. -
Author profiling: Age prediction of blog authors and identifying blog sentiment
Authorship profiling is about finding out different characteristic of an author like age, gender, native languages, education background etc., by finding out the patterns in their writing. Blog authors write about a lot of topics like purchase decisions, digital advertising, personality development, fitness, technology updates etc., and these authors play an influential role on its readers. In this paper, we are categorizing the blog authors in three different age groups based on the content available from the blog. Natural Language Toolkit (NLTK) is a set of libraries used for natural language processing to distinguish among the different writing pattern of the author based on the different age groups. NLTK helps to make analysis on the words of the blogs which is an important feature in our research. We also wanted to conduct sentiment analysis on the blog in order to understand the insight on how the author feels about the blog topic. Thus, we have used Nae Bayes Classifier for doing the analysis and considered two sentiments for the same: positive and negative. An average accuracy of 66.78% was achieved in predicting the age of authors. From the sentiment analysis we figured out that elder authors tend to have more positivity in their blogs as compared to younger authors. 2019, Institute of Advanced Scientific Research, Inc.. All rights reserved. -
Complicated Grief during COVID-19: An International Perspective
Cultures across the globe have evolved time-tested rituals to honor those who die and offer solace and support to survivors with the goal of helping them to accept the reality of the death, cope with the feelings of loss, adjust to life without the deceased, and find ways to maintain a connection to the memory of the deceased. The COVID-19 pandemic has disrupted these rituals and brought significant changes to the way we mourn. Specifically, public health responses to COVID-19 such as social distancing or isolation, delays or cancellations of traditional religious and cultural rituals, and shifts from in-person to online ceremonies have disrupted rituals and thus made it more difficult to access support and complete the psychological tasks typically associated with bereavement. This paper conceptualizes the common bereavement tasks including emotion-focused coping, maintaining a connection to the deceased, disengagement and reframing death and loss, and problemfocused coping. It provides examples of how the COVID-19 pandemic has altered mourning rituals across several cultures and religions and contributed to prolonged grief disorder as defined by the ICD-11 that includes depressive symptoms and post-traumatic stress. Early evidence suggested that the suddenness of loss, the social isolation, and the lack of social support often associated with COVID-19-related death are salient risk factors for complicated grief. As a consequence, psychological assessments, grief counseling, and mental health support are needed by families of patients who died from COVID-19. These services must be essential components of any comprehensive public health response to the pandemic. 2022 Hogrefe Publishing. -
An empirical analysis of android permission system based on user activities
In today's world there has been an exponential growth among smart-phone users which has led to the unbridled growth of smart-phone apps available in Google play store, app store etc., In case of android application, there are many free applications for which the user need not shell out a penny to use the services. Here the magic word is "free" which entices millions of pliant people into installing those apps and giving unnecessary access to their data and device control. Current studies have shown that over 70% of the apps in market, request to gather data digressive to the most functions of apps that might cause seeping of personal data or inefficient use of mobile resources. Of late, couple of malignant applications gather unobtrusive information of the user through third-party applications by increasing their permissions to high-level on the Android Operating System. Android permission system provides, the user access to the third party apps and in return based on the permissions granted by the user, an app can access the related resource from the user's mobile. A user is bound to grant or deny permits during the installation of the application. For the most part, users don't focus on the asked permissions, or sometimes users do not understand the meaning of the permission and install the app on their device. They allow a way for attackers to perform the malicious task by demanding for more than expected set of permissions. These extra permissions permit the attacker to exploit the device and also retrieve sensitive information from it. In this research paper we describe how permission system security can create an awareness among the users that would assist them in deciding on permission grants. This improved and responsible user activities in Android OS can help the users in utilizing their device securely. 2018 Ankur Rameshbhai Khunt and P. Prabu.
