Browse Items (5511 total)
Sort by:
-
Assessment of the strength of grignard reagent for the synthesis of secondary and tertiary alcohols of terpenes using metal plate flow reactor
The secondary and tertiary alcohols of terpenes were synthesized from aldehydes, and ketones using allyl magnesium chloride by the continuous metal flow reactor method. The flow process was conducted using metal plate reactors of 10 ml capacity in the presence of solvent mixtures, instead of large amounts of pure solvent like tetrahydrofuran. The products were isolated, and confirmed using gas chromatography and Nuclear magnetic resonance techniques respectively. Subsequently, the optimization studies were conducted to obtain mild, and economical reaction conditions, by varying the amount of allyl magnesium chloride, temperature, pressure, retention time, and flow rates. A comparison between batch processes and flow processes proved the advantages of the flow process in terms of reproducibility and product yield without the requirement of excess reagents compared to the batch process. The product yield was found to be excellent (6097 %) and reproducible at (150) gram scale through flow process. The scope of the reaction was studied by synthesizing terpene alcohols using different carbonyl compounds at optimized reaction conditions, which resulted in high product yield. This research addresses a crucial gap in terpene alcohol synthesis, offering a scalable and environmentally friendly approach with broad applicability. 2024 -
Micro Borrowing an Amalgam of Structure and Strategy: Evidence from India
Micro borrowing was either an outcome of structure in the credit environment (termed the outreach stream), or a strategic response of the borrowers (termed the sustainability stream). Furthermore, borrower personal effects drove borrowing behaviour. This study draws variables from both the streams of literature and tests them against the amount borrowed and purposes loans are borrowed for. Results show how borrowing behaviour is neither an outcome of pure structure nor pure strategy, but rather, is an interplay of both, and further influenced by personal effects. The survey data (consisting of 839 rural borrower responses, from four districts of erstwhile Andhra Pradesh in South India) was subjected to a rigorous statistical analysis. Results show how a larger number of banks in the villages (a structural constraint), enabled the borrowers to receive larger loans, who defaulted more (a strategic response). Men borrowed larger sums (a personal effect). A similar amalgam of structure, strategy and personal effects drive borrowing behaviour even after controlling for loan purpose and district fixed effects. Yet, when district effects are introduced, amount borrowed is agnostic to personal effects, and is driven purely by structure and strategy. JEL Classifications: C25, C83, G51, Z13 2022 SAGE Publications India Pvt. Ltd. -
Formal banks, semi-formal SHGs or informal moneylenders, who is better? a study of borrower credit preference in India
The present study explores the factors driving borrowers preference for formal banks, self-help groups (SHGs) and moneylenders. The study is based on a systematic survey of 839 rural borrowers from southern India, sampled from four districts with varied levels of credit access (surplus, constrained and moderate credit). The data was analysed using multinomial logistic regression in SPSS. Results show how banks and moneylenders exclude borrowers based on relative wealth and gender. SHGs service women borrowers but are preferred more by wealthier borrowers, highlighting intragroup inequalities. Yet, the three lenders service a variety of purposes, justifying their demand in the market. The study enhances understanding of rural borrowers constraints concerning various credit sources. The implications of this study are as follows: one is identifying the lacunae in the formal banking system, which policy amendments could address. Two, the study recommends an investigation of intragroup inequalities within SHGs. Third, the study underscores the demand for multiple players in the rural credit markets and their contribution to the borrowers credit needs. (2024), (Indian Academy of Sciences). All rights reserved. -
Value Ingredients Private Limited: engaging farmers for achieving triple bottom line
Learning outcomes: After completion of this case study, students will be able to apply the triple bottom line concept to a spice manufacturing and export company (RBT 3); to examine the options before Value Ingredients Private Limited (VIPL), namely, to cultivate spices in the traditional way versus adopting integrated pest management (IPM) to cater to international markets (RBT 4); to analyse the returns for an IPM farmer vis-vis a conventional farmer, and to compare the returns therein (RBT 4); and to evaluate the ways and means of engaging farmers to change their way of cultivation (RBT 5) Case overview/synopsis: The COVID-19 pandemic heightened awareness about the benefits of spices and buoyed its demand worldwide, which presented an opportunity to VIPL, a spice manufacturing company based in Chennai, to expand its business. However, the export markets demanded residue-free spices grown with little or no use of pesticides. Traditional farmers supplying spices to VIPL were accustomed to spraying pesticides whenever there was a pest attack. This case study discussed the options that the protagonist Mr Sijil Karim, managing director and CEO of VIPL, had, who wanted to onboard farmers for pesticide-free cultivation. The options before him were either to continue traditional farming or adopt IPM. This case study discussed the merits, demerits and challenges of each of these options. The triple bottom line concept discussed three Ps people, planet and prosperity for this case as follows: The farmers and the consumers constituted the people in the spice supply chain. The farmers supplying organic, export-worthy spices under the guidance of VIPL gained 30% more than regular spice farmers, which were accrued through cost savings and better prices. The consumers benefitted from the pesticide-free, organic spices through accrued health gains. The manufacture of organic, pesticide-free spices helped the planet, as the process did not release hazardous chemicals into the atmosphere. VIPL manufactured pesticide-free spice with a focus on prosperity. Complexity academic level: The case study can be introduced in a course on sustainability while discussing the triple bottom line concept. This case study showed how a for-profit company grew without losing sight of the planet or its focus on people. This case is best suited for students who have preliminary knowledge of supply chain management, operations and sustainability. Therefore, it is suited for sophomore-year students of MBA. Supplementary materials: Teaching notes are available for educators only. Subject code: CSS 11: Strategy. 2023, Emerald Publishing Limited. -
Heat transfer in the flow of blood-gold Carreau nanofluid induced by partial slip and buoyancy
Dynamics of blood containing gold nanoparticles on a syringe and other objects with a nonuniform thickness is of importance to experts in the industry. This study presents the significance of partial slip (i.e. combination of linear stretching and velocity gradient) and buoyancy on the boundary layer flow of blood-gold Carreau nanofluid over an upper horizontal surface of a paraboloid of revolution (uhspr). In this report, the viscosity of the Carreau fluid corresponding to an infinite shear-rate is assumed as zero, meanwhile, the viscosity corresponding to zero shear-rate, density, thermal conductivity, and heat capacity were assumed to vary with the volume fraction of nanoparticles. The governing equation that models the transport phenomenon were non-dimensionalized and parameterized using suitable similarity variables and solved numerically using classical RungeKutta method with shooting techniques and MATLAB bvp4c package for validation. The results show that temperature distribution across the flow decreases more significantly with buoyancy-related parameter when the influence of partial slip was maximized. Maximum velocity of the flow is ascertained at larger values of partial slip and buoyancy parameters. At smaller values of Deborah number and large values of volume fraction, maximum local skin friction coefficient, and local heat transfer rate are ascertained. 2018 Wiley Periodicals, Inc. -
Challenges to state control of territory: Comparative analysis of Yemen, Afghanistan and Myanmar
States around the world have lost control over their territory to armed non-state actors, including states like Yemen, Afghanistan and Myanmar in the Asian region. This article aims to understand why these states are unable to exercise control over all of their territory. The study identifies and examines four major challenges faced by states in maintaining control over their territory lack of state legitimacy and effectiveness, strategic motives of armed non-state actors, socio-economic motives of armed non-state actors and external intervention. A comparative analysis of the cases of Yemen, Afghanistan and Myanmar illustrates the wide relevance of these challenges faced by the states with respect to territorial control. The Author(s) 2021. -
An efficient scheme for water leakage detection using support vector machines (SVM)-Zig
Water is one of the most essential and valuable resources for all living beings, yet in the present day, there is a scarcity of it. Half of the water loss in large cities and industries is due to leaks and illegal lines. 10%-20% of water loss can be reduced by detecting leaks but without the presence of advanced monitoring systems, this problem is typically worsened. Monitoring the consumption and leak detection for such large areas is a challenging task. To overcome this issue a small prototype is prepared called Zig. Zig is designed for both household and industrial purposes. Its main aim is to monitor the flow and consumption of water at different levels of a building like a first-floor and so on which may represent some industrial and household situation. This work focuses on pressure/flow monitoring method to reduce the operational cost and also to detect leakage. One of the machine learning algorithms, Support Vector Machines (SVM) has been applied to detect the leakage and it is compared with Random Forest algorithm to show that proposed scheme is detecting water leakage better. BEIESP. -
Impact of social-emotional learning intervention on emotional intelligence of adolescents
Adolescents face a variety of challenges, some of which include social, emotional, cognitive, and interpersonal. In order to help them with their emotions, adolescents should be taught a variety of skills to regulate and handle emotions better. With this intent in mind, a social-emotional learning (SEL) intervention module was developed by the researchers. This module covered aspects related to self-awareness, social awareness, responsibility, empathy and decision-making. These components also form the basis for emotional intelligence (EI) which is defined as the ability to perceive, understand, and regulate emotions of oneself and others. The present study aimed to understand if there arises any difference in scores of EI post the SEL intervention. Second, the gender differences with respect to EI were also be analyzed. The EI Scale (2014) was administered to 80 students between the age group of 13-14 years, from a CBSE school in Chennai. These adolescents were selected through the convenience sampling, and the four subscales were also analyzed. The findings from the study revealed a significant difference in scores from pretest to posttest (t = -4.66, P < 0.05). With respect to gender, no significant difference was found. On the subscales, two of four subscales showed significant difference in understanding emotions (Z = -4.63, P < 0.05) and handling emotions (Z = -4.023, P < 0.05). Indian Journal of Social Psychiatry. All Rights Reserved. -
LGBTQIA+ rights, mental health systems, and curative violence in India
This commentary examines the spaceattitudeadministrative complex of mainstream mental health systems with regard to its responses to decriminalisation of nonheteronormative sexual identities. Even though the Supreme Court, in its 2018 order, instructed governments to disseminate its judgment widely, there has been no such attempt till date. None of the governmentrun mental health institutions has initiated an LGBTQIA+ rights-based awareness campaign on the judgment, considering that lack of awareness about sexualities in itself remains a critical factor for a noninclusive environment that forces queer individuals to end their lives. That the State did not come up with any awareness campaign as mandated in the landmark judgment reflects an attitude of queerphobia in the State. Drawing on the concept of biocommunicability, analysing the public interfaces of staterun mental health institutions, and the responses of mental health systems to the death by suicide of a queer student, I illustrate how mental health institutions function to further antiLGBTQIA+ sentiments of the state by churning out customerpatients out of structural violence and systemic inequalities, benefitting the mental health economy at the cost of queer citizens on whom curative violence is practised. Indian Journal of Medical Ethics 2022. -
Farmers' Protests, Death by Suicides, and Mental Health Systems in India: Critical Questions
Ongoing farmers' protests have once again brought back the spotlight on the agrarian crisis in India. Even though upstream factors that perpetuate farmers' suffering, including the role of the state in promoting agrocapitalism, have been discussed extensively by scholars and activists across the spectrum, mental health discourses almost always frame it as a mental health problem to be addressed by increasing access to psychopharmaceuticals. Drawing on developments around farmers' protests and analysis of articles published in flagship journals of largest professional bodies of clinical psychologists and psychiatrists in India, I highlight the intimate relationship between neoliberal state and farmers' distress to which the mental health system shuts its ears and eyes obscuring and downplaying socio-structural determinants of farmers' mental health. Copyright 2021 Springer Publishing Company, LLC. -
Global iPhone Local Labour: Exploring ICT Production, Labour and Cultural Production
A theory of value pertinent to the contemporary iPhone era focuses on formal and informal labour circuits. This study extends this framework by examining a labour dispute in an iPhone factory near Bangalore, delving into its dissemination through media and the broader critical political economy surrounding the recent iPhone production in India. Furthermore, it incorporates a geographical perspective into the circuit framework to illustrate the movement of capital and labour in Bangalore, rekindling discussions on coreperiphery dynamics in the context of capital and labour migration. Further, this research builds upon the typography of worker-generated content by illustrating a specific category of such content within the iPhone labour dispute. Utilising a critical political economy of media approach, this article aims to assess the broader implications of the updated framework and to open new avenues for research within the emerging field of information communication technologies, cultural production and labour. 2024 South Asian University. -
The Persistence of Untouchability: Working Conditions of Dalit Journalists in India
This article can be viewed as an extension of the Oxfam report of 2019, which revealed that Indian news media is dominated by upper castes and the near absence of Dalit and Adivasi journalists. Using critical political economy as a framework, and undertaking qualitative interviews of self-identifying Dalit journalists, their conditions of work in mainstream news media are examined. In addition to the problems faced by journalists in general, this research reveals that Dalit journalists experience considerable psychological stress and extra intensity of work. They tolerate a toxic work environment that results in mental trauma and have to navigate rigid caste networks. Supplementing in-depth interviews with secondary data, the article argues that the conditions within which Dalit journalists function contain all dimensions of untouchability: exclusion, humiliation, and exploitation. The article concludes with a call to end this untouchability, revive the Working Journalists Act to ameliorate the conditions of work of Indias fourth estate. Specific legislation is required to ensure favorable conditions of work for Dalit journalists. Further, the article calls for a theoretical revamping of critical political economy to include caste, particularly when analyzing South Asian media. The Author 2024 -
Classification of adaptive back propagation neural network along with fuzzy logic in chronic kidney disease
A steady deterioration in kidney function over months or years is known as chronic kidney disease (CKD). Through a range of techniques, such as pharmacological intervention in moderate cases and hemodialysis and renal transport in severe cases, early identification of CKD is crucial and has a substantial influence on reducing the patient's health development. The outcomes show the patient's kidneys' present state. It is suggested to develop a system for detecting chronic renal disease using machine learning. Finding the best feature sets typically involves using metaheuristic algorithms since feature selection is an NP-hard issue with amorphous polynomials. Semi-crystalline tabu search (TS) is frequently used for both local and global searches. In this study, we employ a brand-new hybrid TS with stochastic diffusion search (SDX)-based feature selection. The adaptive backpropagation neural network (ABPNN-ANFIS) is then classified using fuzzy logic. Fuzzy logic may be used to combine the ABPNN findings. Consequently, these techniques can aid experts in determining the stage of chronic renal disease. The Adaptive Neuron Clearing Inference System (ABPNN-ANFIS) was utilised to develop adaptive inverse neural networks using the MATLAB programme. The outcomes demonstrate that the suggested ABPNN-ANFIS is 98 % accurate in terms of efficiency. 2024 -
Phytochemical analysis and antioxidant activity of leaf extracts of some selected plants of the family acanthaceae
The present era of scientific research has witnessed an enumerable amount of evidences to showcase the immense potential of medicinal plants. In the present investigation, the phytochemical analysis of Phlogacanthus pubinervius T. Anderson., Adhatoda vasica (L.) Nees,Phlogacanthus thyrsiflorus Nees, Phlogacanthus curviflorus (Wall.) Nees, and Ruellia tuberosa L. was carried out for the different plants extracted with methanol. Analysis was carried out to estimate the quantity of phenols, carbohydrates, tannins, flavonoids and proteins. The antioxidant property of these plants were analysed using DPPH method. The concentration of the plant samples required to decrease the DPPH concentration by 50% was calculated by interpolation from linear regression analysis and denoted IC50 value (g/ml). The qualitative analysis showed the presence of alkaloids, tannins, saponins, proteins, carbohydrate and phenols in all the sample extracts. The highest amount of tannins and phenols was observed in P. thyrsiflorus. P. pubinervius (77.83%), A. vasica (74.81%), P. curviflorus (94.20%), and R. tuberosa (70.78%) which showed highest antioxidant activity of DPPH-scavenging at 150 g/ml of methanol extract. The high percent of scavenging activities of those plants add value to their medicinal properties. The presence of the high amount of phytochemical compounds suggests that the plants have high amount of medicinal compounds and can be extensively used to extract the natural compounds. Kripasana & Xavier (2020). This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited (https://creativecommons.org/licenses/by/4.0/). -
Design of a new curve based cipher
This work aims to develop a model with curve based cryptographic scheme which supports Confidentiality and Authentication at low computing resources and equal security. T TARU PUBLICATIONS. -
Statistical tests for key strength identification in cryptography
The cryptographic study involves three algorithms, one for Encryption of Plain text to Cipher text, one for Decryption for Cipher text back to Plain text and third for the generation of the Key. Key generation algorithm works on the principle of Randomness. In this work, the randomness of Key is studied by using Statistical methods like Runs Up & Runs Down test, Runs (Above and Below the mean), Chi Square test & Auto correlation test for its usability in Cryptographic study. 2020 IJSTR. -
Predicting and improvising the performance of rocket nozzle throat using machine learning algorithms
This paper is a study of one dimensional heat conduction with thermo physical properties like K, row, Cp of a material varying with temperature. The physical problem is characterized by a cylinder of infinite length and thickness L, imposed with a net heat flux at x= 0, with the other end being insulated. The temperatures at the insulate end are measured by placing thermocouples. As the temperatures at the other end are very high, it is not possible to measure temperatures by keeping thermocouples which will burn away. So the problem is initialized with known sensor values near insulated end. By proper predicting values by ARIMA Model, the temperature distribution in Rocket Nozzle throat system (RNT) is calculated. The outcome of the work is processed with Machine Learning algorithm like Genetic algorithm in identifying the optimal location of sensor position which helps in improvising the performance of RNT. 2020, Institute of Advanced Scientific Research, Inc. All rights reserved. -
Security Analysis for a Revocable Multi-Authority ABE-Attribute-Based Mechanism
Due to the tremendous increase in data, groups or even organizations are storing data with third-party providers to solve storage problems. Ciphertext policy attribute based encryption helps to outsource data, which means encrypt the data at the data owners end and uploading it to third-party storage with some access policy. In normal Identity-based encryption, if a data owner wants to send information to a data user, it will be sent with some identity of the data user, such as mail id, so that only that particular user can read the message. The main problem is that the data owner should know each users identity. For instance, in some organizations where a data owner wants to send a message to a group of people with an identical designation, it can be sent with the help of the users attribute using attribute-based encryption. Here, the data owner does not need to know the specific details of each user; instead, with the help of attributes and the provided access policy, they can access this message. This research mainly focuses on three aspects of CP-ABE: access policy, number of attribute authorities, and revocation. When it comes to access policy, the currently existing access policies are not secure due to their linearity in nature because shares are always calculated using the same linear equation. So, for this problem, this work has developed a non-linear SS-secret-sharing model that increases the confidentiality of the model. 2024 Seventh Sense Research Group. -
Revocable and Secure Multi-Authority Attribute-Encryption Scheme
Security is an important factor as nowadays many systems generates and process huge amount of data. This also leads many of us to rely on a third-party service provider for storing sensitive and confidential data. Providing outsourcing means the data owner will encrypt and store the data in a third-party storage system. In this paper, we are proving solutions for two main problems. The first issue is what if the attribute authority itself can access the data because the attributes and secret keys are known by attribute. This issue is called the key escrow problem. For solving it we are proposing a multi-authority system with Elliptic Curve Cryptography. The second issue that we addressed in this paper is the revocation problem, which means when someone leaves the system should be prohibited from accessing subsequent data this is called forward security and as a second case when someone joins the system should be prevented from accessing previous shared date this is called backward security. In this paper, we address both forward and backward security. For solving this problem we are using the concept of the Lagrange interpolation technique for generating and verifying secret keys. Based on this technique secret key will be dynamically altered and used for encryption and due to this can achieve greater security. 2023, Ismail Saritas. All rights reserved. -
A machine learning model for population analysis among different states in India which influences the socio, demographic and economic needs of society
In this work Data from 2011 census is taken to identify the state which influences more in Population census among the different states identified. The data is considered from Madhya Pradesh, followed with Utter Pradesh, then to Bihar, Bengal and Orissa. Similarly other case studies are also done for Southern Indian states and North Eastern States. Genetic algorithm will be tried to find the optimal location for the given study. A fitting function is calculated for the population data of 2011 using Lagrange Interpolation technique. This fitting function is given as input to Genetic algorithm to find the optimal state which have maximum influence in the population growth among different states of India as per the Case studies done. BEIESP.
