Browse Items (5511 total)
Sort by:
-
Impact of video product presentation and scarcity claim on mobile-based impulse buying
The introduction of mobile shopping apps has resulted in the growth of impulse buying or excessive compulsion, especially in the fashion industry. This paper aims to establish a relationship between app stimuli (including performance expectancy, effort expectancy, atmosphere, layout, and privacy and security) and impulse buying behaviour. Besides this, it also examines the moderating effects of the video product presentation and product scarcity claim and the mediating effects of impulse buying intention and user satisfaction. The study was carried out in two phases. In the first phase, a paired t-test analysis was carried out to compare the mean of each set. This was followed by multi-group structural equation modelling to check the models validity. The results show that while video product presentation produced a significant difference between impulse buying intention and impulse buying behaviour for both the male and female respondents, scarcity claims achieved positive results only for male participants. The SEM results, meanwhile, demonstrated that both the mediating variables bear a relationship to performance expectancy, privacy and security, and impulse buying behaviour. However, effort expectancy was only related to impulse buying intention, while atmosphere and layout were exclusively associated with user satisfaction. Based on the findings of the study, theoretical and managerial implications are presented. 2023 Korean Scholars of Marketing Science. -
Impact of visual merchandising on consumers' purchase decision in apparel retail /
International Journal of Business and Administration Research, Vol.2, Issue 6, pp.271-279, ISSN No: 2348-0653. -
Impact of Voluntary Disclosure on Valuation of Firms: Evidence from Indian Companies
This article investigates the effect of voluntary corporate disclosures on the firm value from the market value perspective. Financial reporting includes disclosures as prescribed by regulators, but few companies go beyond mandatory requirements and provide additional information voluntarily. This study empirically tests the extent of such voluntary disclosures using Corporate Voluntary Disclosure Index containing 81 items of both financial and non-financial information and panel data regression to test the hypotheses. The sample for this study is the non-financial companies in the BSE 100 Index and the period is five financial years from 20102011 to 20142015. This study finds a positive association between voluntary disclosures and firm value as measured by Tobins Q. Especially the market gives a higher valuation for companies disclosing optional information on social and environmental, corporate governance and financial information. This finding has a significant implication for emerging economies like India and it supports various disclosure theories such as agency, stakeholders and positive accounting theories. 2020 Management Development Institute. -
Impact on cardioprotective effect of Psidium guajava leaves extract in streptozotocin-induced Wistar mice with molecular in silico analysis
Cardiovascular disease (CVD) and its complications have been regarded as the leading cause of morbidity and mortality. The drugs available in the market are effective to treat CVD, but with many adverse reactions. Nowadays, herbal products are the attention of researchers because of their less adverse effects. In this study, the cardioprotective effects of ethanolic leaves extract of Psidium guajava Linn. (Guava) (P. guajava) were evaluated in streptozotocin (STZ)-treated animal models. Mice acquired for the study were divided into five groups, each consisting of six mice. The toxin-induced mice were treated with the ethanolic leaves extract of P. guajava (300 mg/ kg body weight [b.w.]). The results were compared to the standard drug (glibenclamide)-treated mice (3 mg/kg b.w.). The following parameters were considered for further investigations: creatine kinase-muscle brain (CK-MB), creatine kinase (CK), troponin, lysosomal, and mitochondrial enzymes. Then the docking study was accomplished. The levels of cardiac marker enzymes and lysosomal enzymes increased significantly in the toxin-induced mice, while the level of mitochondrial enzyme decreased significantly. During treatment with the ethanolic leaves extract of P. guajava, the levels of all parameters were notably reversed to normal range (P < 0.05). Further, in docking analysis, the interaction of compounds, such as alpha-terpineol, cyclopentanecarboxamide, guaiol (a sesquiterpenoid alcohol), 1H-cyclopropanaphthalene, tetracyclotridecan-9-ol, dormin/abscisic acid, and epiglobulol, with the respective protein molecules, evidenced the cardioprotective effect of P. guajava leaves. Hence, it was concluded that the ethanolic leaves extract of P. guajava leaves have a cardioprotective effect. 2023 Codon Publications. -
Impacts of imprisonment of women on the rights of their children: An Indian perspective /
International Journal of Advanced Research, Vol.3, Issue 10, pp.1297-1303, ISSN No: 2320-5407. -
Impacts of Pore Scale Gas Diffusion Layer Deformation on PEMFC Performance at Sub Zero Operation
Highlights Impact of assembly pressure on species and charge transport during cold start operation. Inhomogeneous GDL compression and intrusion is considered in the study. The intrusion effect leads to intense ice accumulation under the channels at 2 MPa. The importance of applying appropriate clamping pressure is highlighted in the study. 2023 The Electrochemical Society (ECS). Published on behalf of ECS by IOP Publishing Limited -
Impedance, Electrical and Dielectric behaviour of Tin Oxide Nanoparticle doped with Graphite, Graphene Oxide and Reduced Graphene Oxide
Nanostructured materials have attained incredible interest in recent days due to their distinctive chemical, physical, mechanical, magnetic and optoelectronic properties. In the present study, metal nano particle (SnO2) was doped with graphite, graphene oxide (GO) and reduced graphene oxide (rGO) with various composition (1:100), (1:1) and (100:1) by weight ratio. The citrate-nitrate gel combustion method was used to prepare nanocrystalline SnO2 while GO and rGO were synthesized through modified Hummer's method. The preparation of SnO2-rGO composites was done using a one-step hydrothermal process. The electrical and structural behaviour of the composites of graphite, GO and rGO mixed with SnO2 were elucidated by the impedance analyzer in the frequency range from 10Hz to 1MHz. It is observed that the composite of SnO2 with graphite and reduced graphene oxide have similar broad characteristics while SnO2 mixed with GO is exhibiting different properties which could be attributed to the presence of oxygen functionaries. 2021 The Authors. Published by ESG. All Rights Reserved. -
Impediments of product recovery in circular supply chains: Implications for sustainable development
Product recovery has fascinated the concentration of organizations and is prominent among industry practitioners and researchers due to improved environmental concerns, social awareness, and economic benefits. Circular supply chain (CSC) compounds the concept of product recovery in global supply chain management to present a sustainable perspective. Therefore, this study aims to determine impediments of product recovery and CSC toward sustainable production and consumption in the background of manufacturing organizations. This study determines potential impediments from literature and in consultation with experts. Further, a fuzzy VIKOR approach is practiced to prioritize the impediments of product recovery and CSC. Then, a sensitivity analysis is conducted to verify the robustness of the framework attained. The results from the study reflect that lack of collaboration from supply chain performers, lack of tax policies for facilitating CSC models and limited expertise, technology, information on CSC practices are the critical impediments to product recovery in CSCs. The findings of the study could assist industry managers and practitioners in developing procedures and strategies to attain sustainable development. 2022 The Authors. Sustainable Development published by ERP Environment and John Wiley & Sons Ltd. -
Imperative of revisiting the operational risk control architecture in public sector banks cyjdf (PSBs) in India: A qualitative analysis
The banking sector in India has contributed to economic growth, parity and equity while equally keeping focus on profit and social objectives. The successive prudential and regulatory reforms introduced in the banking sector have made it more robust and stronger to withstand the bubbles and external shocks. Still, the Indian banking sector in general and public-sector banks (PSBs) in particular have been suffering from the bank frauds. This study endeavors to cover the increasing incidences of banking frauds in PSBs and probes the weaknesses and chinks in the operational risk architecture at the PSBs in India. This study selects Punjab National Bank as a true representative of PSBs and treats it as a critical case study to apply the learning and findings to the PSBs in India. This qualitative analysis of the study revealed that the chinks in the operational risk control mechanism and lax corporate governance are the main reasons behind the increasing incidences of frauds at PSBs. The findings of the study showed that a strong corporate governance and compliance framework, robust risk management architecture, investment in people, technology and systems will go a long way in achieving tighter control and supervision, streamlining processes and, most of all, adhering to a culture of checks and balances. 2019 LLC CPC Business Perspectives. All Rights Reserved. -
Implementation and Investigation of an Optimal Full Adder Design for Low Power and Reduced Delay Conditions
Full adder is one of the important components in electronics, used for various fundamental processing algorithms such as addition and multiplication. The application of these full adders is included in but not limited to Very Large-Scale Integration (VLSI) and Digital Signal Processing (DSP). To provide scalability and reliability to the advanced algorithms for high-end applications, the designing system of full adder should be enhanced. So, in this paper, we intended to improve the efficiency of a full adder circuit to work under low power and delay conditions. The software we used in this project is MENTOR GRAPHICS using 180nm technology. The efficiency of the proposed transistor design is evaluated by analysing the power consumption, delay, PDP, capacitor load, delay w.r.t capacitance and PDP w.r.t capacitance. The parameters are compared between our proposed design and the literature schemes such as OLPFAD, DFEFA, DTLPCFA, and DPEHFA, respectively. It is evident that our proposed design outperforms the other. 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. -
Implementation challenges of Total Quality Management (TQM) in dairy sector /
Smart Journal of Business Management Studies, Vol.15, Issue 1, pp.1-9, ISSN No: 2321-2012. -
Implementation of a Heart Disease Risk Prediction Model Using Machine Learning
Cardiovascular disease prediction aids practitioners in making more accurate health decisions for their patients. Early detection can aid people in making lifestyle changes and, if necessary, ensuring effective medical care. Machine learning (ML) is a plausible option for reducing and understanding heart symptoms of disease. The chi-square statistical test is performed to select specific attributes from the Cleveland heart disease (HD) dataset. Support vector machine (SVM), Gaussian Naive Bayes, logistic regression, LightGBM, XGBoost, and random forest algorithm have been employed for developing heart disease risk prediction model and obtained the accuracy as 80.32%, 78.68%, 80.32%, 77.04%, 73.77%, and 88.5%, respectively. The data visualization has been generated to illustrate the relationship between the features. According to the findings of the experiments, the random forest algorithm achieves 88.5% accuracy during validation for 303 data instances with 13 selected features of the Cleveland HD dataset. 2022 K. Karthick et al. -
Implementation of digital signature using hybrid cryptosystem
Security is a major concern when it comes to electronic data transfer. Digital signature uses hash function and asymmetric algorithms to uniquely identify the sender of the data and it also ensures integrity of the data transferred. Hybrid encryption uses both symmetric and asymmetric cryptography to enhance the security of the data. Digital Signature is used to identify the owner of the document but it does not hide the information while transferring the document. Anyone can read the message. To avoid this, data sent along with the signature should be secured. In this paper, Digital signature is combined with hybrid encryption to enhance the security level. Security of the data or the document sent is achieved by using hybrid encryption technique along with digital signature. 2018 Authors. -
Implementation of FOAF, AIISO and DOAP ontologies for creating an academic community network using semantic frameworks
Web 2.0 delivers the information which is then displayed in human readable content, omitting the crucial information which can be drawn from the data by the applications. Web 3.0 or semantic web is an extension to the current web, with an ambition to determine the drawbacks of the current web. The semantic web has already proven its influence in several communities around the globe, such as social media, music industry, healthcare domain, online blogs or articles, etc.; Among the several tools and technologies, ontologies or vocabularies are the foundation pillar for the semantic web. In this paper, the developed system aims at improving the collaboration and academic relations among staff which is directly related to our education community by providing a better networking platform which lets the agents discuss their achievements, titles, domain interests, and various other activities. Results have been analyzed to show how new facts, information can be implied from the presented knowledge of several agents and help generate a relationship graph by utilizing various semantic tools. The system discussed in this paper processes all the information in a format which can be understood by both humans and the machines, to interpret the underlying meaning about it and provide effective results. Copyright 2019 Institute of Advanced Engineering and Science. All rights reserved. -
Implementation of hybrid machine learning approach for intrusion detection system
The Intrusion Detection System (IDS) enforces information security and is responsible to identify attacks and vulnerabilities inside a network. It does this by analyzing the packet stream throughout the network. In traditional IDS systems, the analysis is done by looking for signatures of known attacks or deviations of normal activity as described by the rules provided for the IDS system. Machine learning helps in deriving predictive knowledge and this makes it ideal to apply Machine learning in an IDS system to detect attacks. This paper focuses on creating a hybrid model that is best to implement in an IDS system. A hybrid model is implemented which combine multiple machine learning algorithms using Ensemble method. The experiments include evaluating machine learning algorithms such as Decision Tree, MLP (Multi-Layer Perceptron), Gradient Boosting etc. The algorithms with the best results are taken to construct Hybrid model. This Hybrid approach will improve the accuracy and efficiency for identifying the attacks by the IDS system. Depending on the type of attack, the IDS system can classify packets as DoS (Denial of Service), Probe, R2L (Root to Local), U2R (User to Root) or Normal. The experiments are carried using NSL-KDD Dataset. 2019, Institute of Advanced Scientific Research, Inc.. All rights reserved. -
Implementation of multicloud strategies for healthcare organisations to avoid cloud sprawl
Healthcare organisations are being overwhelmed by data, devices and apps, and disjointed multiple cloud services. Well-heeled multicloud can provide a unified cloud model that provides greater control and scalability at reduced costs. Healthcare multicloud is turning into an appealing path for associations to manage the blast of advanced healthcare information in digital health, internet of things, associated gadgets and healthcare applications. As more human services associations grasp distributed computing, they are progressively going to a blend of open, private, and hybrid cloud administrations and foundation. In fact most of the healthcare service organisations plan to utilise different cloud vendors over the upcoming years. While having multiple cloud vendors can give organisations more flexibility and redundancy, managing multiple clouds can be a challenge. It can lead to cloud sprawl, unauthorised cloud use known as shadow IT, disjointed cloud solutions, inefficiencies, and waste. Copyright 2022 Inderscience Enterprises Ltd. -
Implementation of OpenId connect and O Auth 2.0 to create SSO for educational institutes
Increase in the number of users is directly proportional to the need of verifying them. This means that any user using any website or application has to be authenticated first; this leads to the creation of multiple credentials of one user. Now if these different websites or applications are connected or belong to one single organization like a college or school, a lot of redundancy of data is there. Alo ng with this, each user has to remember a wide range of credentials for different applications/websites. So in this paper, we addre ss the issue of redundancy and user related problems by introducing SSO using OpenId Connect in educational institutes. We aim to mark the di fference between the traditional system and proposed login by testing it on a group of users. 2018 Authors. -
Implementation of survivability aware protocols in WSN for IoT applications using Contiki-OS and hardware testbed evaluation
The Internet of Things is a network of devices capable of operating and communicating individually and working for a specific goal collectively. Technologically, many networking and computing mechanisms have to work together with a common objective for the IoT applications to function, and many sensing and actuating devices have to get connected to the Internet backbone. The networks of resource-constrained sensor devices constitute an integral part of IoT application networks. Network survivability is a critical aspect to consider in the case of a network of low-power, resource-constrained devices. Algorithms at different layers of the protocol stack have to work collectively to enhance the survivability of the application network. In this article, the survivability-aware protocols for wireless sensor networks for IoT applications are implemented in real network scenarios. The routing strategy, Survivable Path Routing protocol, and the channel allocation technique, Survivability Aware Channel Allocation, are implemented in Contiki-OS, the open-source operating system for IoT. Furthermore, the implementation scenarios are tested with the FIT IoT Lab hardware testbed. Simulated results are compared with the results obtained from the testbed evaluation. 2023 Elsevier B.V. -
Implementation of vendor-managed inventory in hospitals: an empirical investigation
This research aims to determine critical success components for implementing the vendor-managed inventory (VMI) and test their influence on the inventory in Indian hospitals. The independent and dependent components of the research are identified from the extensive literature review. The independent variables are top management commitment, supply chain strategy, business process integration, continuous improvement, resource sharing, and information technologies adoption. The dependent variable identified is the adoption of vendor-managed inventory. The study results suggest that the proposed latent variables significantly impact the VMI and significantly contribute to VMIs implementation and sustainability. The study highlights the importance of VMI in Indian hospitals, and therefore, it will help the management focus on the VMI for enhanced operational efficiency. Previous studies have not empirically tested the impact of the suggested practices for VMI in Indian hospitals. The analysis would help evaluate VMI adoption in Indian hospitals. Copyright 2024 Inderscience Enterprises Ltd. -
Implementing a programmable drop voltage controller vlsi
This study offers a new synchronized practice area door array (FPGAs), to minimize electricity usage. Concurrent bit-serial architecture is shown in the figure to minimize energy consumption and timing synchronization of switching structures. Researchers offer a fine-grained energy control system with each Look-up database to minimize the Static energy by the channel length, which is now equivalent to the dynamical one (LUT). A 90 nm Processor is the planned field-programmable VLSI. Its electricity consumption is 42 percent lower than that of sequential design. 2021, SciTechnol, All Rights Reserved.

