Browse Items (5511 total)
Sort by:
-
Cu/Pd bimetallic supported on mesoporous TiO2 for suzuki coupling reaction /
Bulletin of Chemical Reaction Engineering & Catalysis, Vol.13, Issue 2, pp. 1-11, ISSN No. 1978-2993. -
Cubic spline curve public key cryptography
In this work, a cubic spline curve is considered for Asymmetric mode encrypting data. A Cubicspline curve is used to generate a set of points under initial known boundary conditions. This set of points is considered as generator points. Given the field, known the generator points, considering for some time and space steps and for a considered private key, Public key will be generated based on Discrete Logarithm problem. Thus for a set of public and private keys, data can be transmitted securely with features like Authenticity of users, Security & Confidentiality of data transmitted. Going by the construction of the algorithm, Encryption is being done on blocks of data for which it consumes less computing resources. Going by complexity of the algorithm, the key length needed is about 120 bit lengths to provide sufficient strengths against cryptoanalysis. 2017 Taru Publications. -
Cuda implementation of non-local means algorithm for GPU processors
Non-Local Means algorithm (NLM) is a prominent image denoising algorithm. One of the major limitations of NLM algorithm and its variants is the time requirement. In this era of high performance computing, an efficient alternative to reduce the time complexity of any algorithm is its parallelization. In this paper, a parallelized version of basic NLM algorithm using CUDA architecture is proposed. The algorithm is developed on NVIDIA GeForce 940M GPU which follows Maxwell architecture with 3 SMs and 384 CUDA cores. Experiments are carried out using selected set of natural and medical images of various sizes. Our proposed parallelized version of NLM algorithm reduces the time requirement approximately by 50% in comparison to its basic version and also achieves comparable denoising performance in terms of PSNR, SSIM and FSIM evaluation metrics. The proposal is a model which can be customized for newer GPU architectures. 2020, Engg Journals Publications. All rights reserved. -
Culinary influence on Bengaluru as a tourism destination /
International Journal of Recent Technology And Engineering, Vol.8, Issue 4, pp.766-774, ISSN No: 2277-3878. -
Cultural Expression of Anxiety Symptoms in Kannada Language: A Qualitative Study
Background: In anxiety disorders, culture is important in symptom presentation and help-seeking. Most tools for anxiety disorders are not validated in India and thus might not capture culture-specific aspects of anxiety. This study aims to identify and generate culturally specific terms to describe symptoms of anxiety as part of the development of the Kannada version of the Panic and Anxiety National Indian Questionnaire (PANIQ). The PANIQ is a tool under development to identify anxiety and panic in Indian settings. Methods: This study used qualitative methods like focus group discussions (FGDs) and in-depth interviews (IDIs) to identify and generate items related to anxiety and panic in Kannada from stakeholders like individuals with anxiety disorders, their caregivers, healthcare workers, and mental health professionals who treat individuals with anxiety and panic disorders. Five FGDs (n = 28), one triad (n = 3), and 34 IDIs (n = 34) were conducted. Results: The mean age of the participants was 38.9 (standard deviation: 12.28) years; 57.1% were from rural areas. We generated 615 Kannada items. These were classified into 21 domains and facets. Items in domains like Somatic symptoms, Fear, and Impairment in day-to-day life were higher than those noted in existing tools for anxiety that focus more on cognitive symptoms of anxiety. Conclusions: This study generated culturally specific items of anxiety through a qualitative process of tool development incorporating subjective experiences of persons with anxiety disorders and other stakeholders. This is among the first steps toward the development of PANIQ. 2022 The Author(s). -
Cultural Violence, Violent Gendering, and Abjection: Discourses on Sites of Violence through Trans Womens Narratives from India
The conventional cultural construct of gender and sexuality embedded in the dichotomous paradigm makes it challenging for people with queer and trans identities to fit into an assigned social role. Violent gendering takes place where women are seen as secondorder beings, disciplined and controlled by men, the first-order beings. The process of feminization and femininity is linked to women, which fixates on the idea that one is born a woman rather than one becomes a woman. This violent process of acculturation to these set norms comes with a lot of vulnerability for trans people in the form of abiding by the parameters of femininity and the threat of physical violence against their intersecting and transitioning bodies. Kristevas conception of abjection can be used to understand the discriminatory behavior against outcasts whose sexual or gender practices fall outside of the normative standards and conventions. At the same time, cultural violence, which Charlotte Bunch (2015) describes, is the culturally embedded practice and assumption of domination over women in virtually all societies. She also emphasizes that there is a need to understand that all violence against women is supported by cultural attitudes, which she argues is the real cultural challenge of violence. Keeping in perspective the idea put forth by Bunch, this article critically examines the violence reinforced by culture, and the process of gendering, with a central focus on the intersectional experiences of trans bodies as abject between gender, sex, and culture. This leads to the systematic violence enacted upon them by the invisible disciplinarians. The article considers 21st-century trans womens narratives, Laxmi Narayan Tripathis Me Hijra, Me Laxmi (2015) and Red Lipstick: The Men in my Life (2016). This article contextualizes and situates trans narratives, which provide insight into how trans womens bodies are seen as abject and have gone through the violent process of gendering and culturing 2022 Journal of International Womens Studies -
Curcumin Analogues as Organic Fluorophores for Latent Fingerprint Imaging
Synthesis and characterization of two curcumin analogues BAA and Br-AA via a condensation reaction was reported. Both the synthesized organic luminophores exhibited aggregation-induced emission (AIE) with bright yellow and green emission respectively. Increase in the water% enhanced the emission by both the compounds confirmed the AIE property. A detailed study of latent fingerprints visualization was also carried out for both the analogues. Both the compounds showed good to normal capability to develop latent fingerprints (LFPs). Compound BAA performed better as a fluorescent material to develop LFPs compared to Br-AA. The LFPs developed were analyzed to obtain 13 level of fingerprint patterns under UV 365 nm illumination. The LFPs developed using BAA exhibited excellent efficiency, sensitivity, high contrast with low background interreference. All three levels of fingerprint patterns were identified by BAA. However, Br-AA showed inability to develop high clarity images of latent fingerprints. The solid-state emission nature of the analogues was also evaluated from their emission spectra and CIE coordinates were found to be were (0,187, 0.518) and (0.265, 0.484) for BAA and Br-AA respectively. 2024 Wiley-VCH GmbH. -
Curcumin inhibits spike protein of new SARS-CoV-2 variant of concern (VOC) Omicron, an in silico study
Background: Omicron (B.1.1.529), a variant of SARS-CoV-2 is currently spreading globally as a dominant strain. Due to multiple mutations at its Spike protein, including 15 amino acid substitutions at the receptor binding domain (RBD), Omicron is a variant of concern (VOC) and capable of escaping vaccine generated immunity. So far, no specific treatment regime is suggested for this VOC. Methods: The three-dimensional structure of the Spike RBD domain of Omicron variant was constructed by incorporating 15 amino acid substitutions to the Native Spike (S) structure and structural changes were compared that of the Native S. Seven phytochemicals namely Allicin, Capsaicin, Cinnamaldehyde, Curcumin, Gingerol, Piperine, and Zingeberene were docked with Omicron S protein and Omicron S-hACE2 complex. Further, molecular dynamic simulation was performed between Crcumin and Omicron S protein to evaluate the structural stability of the complex in the physiological environment and compared with that of the control drug Chloroquine. Results: Curcumin, among seven phytochemicals, was found to have the most substantial inhibitory potential with Omicron S protein. Further, it was found that curcumin could disrupt the Omicron S-hACE2 complex. The molecular dynamic simulation demonstrated that Curcumin could form a stable structure with Omicron S in the physiological environment. Conclusion: To conclude, Curcumin can be considered as a potential therapeutic agent against the highly infectious Omicron variant of SARS-CoV-2. 2022 Elsevier Ltd -
Curvit: An open-source Python package to generate light curves from UVIT data
Curvit is an open-source Python package that facilitates the creation of light curves from the data collected by the Ultra-Violet Imaging Telescope (UVIT) onboard AstroSat, Indias first multi-wavelength astronomical satellite. The input to Curvit is the calibrated events list generated by the UVIT-Payload Operation Center (UVIT-POC) and made available to the principal investigators through the Indian Space Science Data Center. The features of Curvit include: (i) automatically detecting sources and generating light curves for all the detected sources and (ii) custom generation of light curve for any particular source of interest. We present here the capabilities of Curvit and demonstrate its usability on the UVIT observations of the intermediate polar FO Aqr as an example. Curvit is publicly available on GitHub at https://github.com/prajwel/curvit. 2021, Indian Academy of Sciences. -
Customer preferences to select a restaurant through smart phone applications: An exploratory study
The increasing number of Smart Phone Applications (SPA) user and fast growing restaurant industry proves the great potential of using SPA as business marketing opportunity in Malaysia. The constant growth in mobile technology has created a prospect for the restaurant industry to use SPA as a restaurant promotion tool. The growing attention of use of SPA among the Malaysian customer, marketing research remains understudied in the field of SPA based restaurant promotion activities. The aim of this study is to explore the increase in customer acceptance to use SPA based restaurant promotion and to identify the customer preference to use SPA to select the restaurant. Thus, this paper mainly focuses on restaurant information on product and promotion as antecedents of customer acceptance of smart phone apps by underpinning the Unified theory of acceptance and use of technology (UTAUT) model. A conceptual model and hypotheses are tested with a sample of 116 students from a private university at Selangor district, Malaysia. The findings indicate that there is a positive relationship to increase customer acceptance level through SPA based restaurant product information and also strong relationship with the restaurant promotion information. It also indicates that customer acceptance of SPA through experience and satisfaction has a positive significant effect on customer preference to select a restaurant. Based on the results, this paper rounds off with conclusion, recommendations for future marketing research and provides a new marketing strategy to formulate among the restaurant business sector. 2015 American Scientific Publishers. All rights reserved. -
Customers response to online food delivery services during COVID-19 outbreak using binary logistic regression
This study aims to empirically measure the distinctive characteristics of customers who did and did not order food through Online Food Delivery services (OFDs) during the COVID-19 outbreak in India. Data are collected from 462 OFDs customers. Binary logistic regression is used to examine the respondents characteristics, such as age, patronage frequency before the lockdown, affective and instrumental beliefs, product involvement and the perceived threat, to examine the significant differences between the two categories of OFDs customers. The binary logistic regression concludes that respondents exhibiting high-perceived threat, less product involvement, less perceived benefit on OFDs and less frequency of online food orders are less likely to order food through OFDs. This study provides specific guidelines to create crisis management strategies. 2020 John Wiley & Sons Ltd -
Customers satisfaction towards online banking services of public sector banks
At present the banking industry around the world has been undergoing a rapid transformation. The deepening of information technology has facilitated better tracking and fulfillment of commitments, multiple delivery channels for online customers and faster resolution of issues. Customer satisfaction is important criteria for banks sustenance, now banks are offers online banking services according to the customer needs and requirements. This study analysed customers satisfactions towards online banking services of public sector banks in Tiruchirappalli district. It is understand from the present study that bank websites and technology platforms has to offer various knowledge features on financial services. To retain the existing customers, banks has to conduct regular surveys on the customer satisfaction. The results of the study shows that variables like prompt response, security and Website design and ease of use are top three factors affected customer satisfaction. IJSTR 2020. -
Customized mask region based convolutional neural networks for un-uniformed shape text detection and text recognition
In image scene, text contains high-level of important information that helps to analyze and consider the particular environment. In this paper, we adapt image mask and original identification of the mask region based convolutional neural networks (R-CNN) to allow recognition at 3 levels such as sequence, holistic and pixel-level semantics. Particularly, pixel and holistic level semantics can be utilized to recognize the texts and define the text shapes, respectively. Precisely, in mask and detection, we segment and recognize both character and word instances. Furthermore, we implement text detection through the outcome of instance segmentation on 2-D feature-space. Also, to tackle and identify the text issues of smaller and blurry texts, we consider text recognition by attention-based of optical character recognition (OCR) model with the mask R-CNN at sequential level. The OCR module is used to estimate character sequence through feature maps of the word instances in sequence to sequence. Finally, we proposed a fine-grained learning technique that trains a more accurate and robust model by learning models from the annotated datasets at the word level. Our proposed approach is evaluated on popular benchmark dataset ICDAR 2013 and ICDAR 2015. 2023 Institute of Advanced Engineering and Science. All rights reserved. -
Cutting across the Durand: Water dispute between Pakistan and Afghanistan on river Kabul
All nations firmly believe in the absolute sovereignty over the waters flow in their areas and that only riparian states have any legal right, apart from an agreement, to use the water from the shared river. To address some of their water concerns, the co-riparian states compete to have more quantity of waters. Significantly, no water agreement exists between upper riparian Afghanistan and lower riparian Pakistan, despite sharing nine big and small rivers. The simmering water dispute between them on the River Kabul is rarely noted mainly because it is overshadowed by their political tensions, differences, and the dispute over the Durand Line. Using an analytical framework, this article examines three aspects of the River Kabul water dispute: its context, identifying the challenges that hinder a formalized bilateral agreement from being implemented, and its future. 2020 Policy Studies Organization -
Cyanogenic glycosides: A sustainable carbon and nitrogen source for developing resilient Janus reversible oxygen electrocatalysts for metal-air batteries
Most of the transition metal based heteroatom doped carbon electrocatalysts, utilizes the fossil fuel derived commercially available precursors as source of nitrogen and carbon which may question our environmental generosity. Herein, we have developed Ni-based efficient bifunctional electrocatalysts using apple seeds (that contains cyanogenic glycosides) as the precursor for nitrogen and carbon. With tuning the temperature, we were able to optimize the nitrogen doping up to ?3 at.%. The optimized electrocatalyst catalyses the oxygen reduction reaction (ORR) process with muted peroxide generation (for 0.7500.1 V the % HO2 ? generation ?3 - 2%), preferential 4e? reduction pathways (n ? 3.93 to 3.98 in 0.750.1 V range) and electron transfer via inner-sphere electron transfer mechanism which ensures the maximum utilization of instituted active centres owing to the direct interaction of reactant species. Alike to ORR, the superior oxygen evolution reaction (OER) performance with smaller Eonset, EJ=10, Tafel slope and enduring accelerated stability test advocates its potential as a bifunctional oxygen electrocatalyst. Moreover, smaller potential gap ?E (EJ10_OER - E1/2_ORR) of 0.845 V further warrants the energy efficient OER/ORR process. A porotype of Al-air battery system using our catalysts as oxygen electrode and chocolate wafer as anode material is well capable of powering the light emitting diodes. This study hopefully opens a new avenue to explore cyanogenic glycosides plants product to develop multifunctional electrocatalysts. 2019 Elsevier Ltd -
Cyber-Threat Landscape in Healthcare Industry and Legal Framework Governing Personal Health Information in India
2021 and 2022 have been the years of frequent cyberattacks. India remains in the top 25 countries severely affected by the continuous cyber-attacks and tops the list. The healthcare department is amongst the most affected area. In 2020, the healthcare department suffered a severe impact with around 348K cyber-attacks alone on Indian healthcare infrastructure. The recent occurrence of cyber-attack on AIIMS hospital in December 2022 followed by several other incidences of data breaches have made the concerned authorities pro-active on exercising vigilance and reforming the legal and technical system to protect the health infrastructure. This paper has been developed on extensive literature and focuses on describing the nature of electronic health records, the risks they are exposed to along with as to why they are so susceptible to these cyber-risks. Furthermore, the paper also deals with different kinds of threats affecting the privacy and security of electronic health records specifically. The paper analyzes Indian legal framework, briefly compares it with international legal framework (specifically US & EU) and highlights the shortcomings in Indian legislative framework followed by laying down certain recommendations primarily highlighting the possible changes required in Indian legal framework and practices that can be adopted at organizational level to overcome and mitigate such risks. N. Raizada, P. Srivastava, 2024. -
Cyclic property of iterative eccentrication of a graph
The eccentric graph of a graph G, denoted by Ge, is a derived graph with the vertex set same as that of G and two vertices in Ge are adjacent if one of them is an eccentric vertex of the other. The process of constructing iterative eccentric graphs, denoted by Gek is called eccentrication. A graph G is said to be ?-cyclic(t,l) if G,Ge,Ge2,...,Gek,Gek+1,...,Gek+l are the only non-isomorphic graphs, and the graph Gek+l+1 is isomorphic to Gek. In this paper, we prove the existence of an ?-cycle for any simple graph. The importance of this result lies in the fact that the enumeration of eccentrication of a graph reduces to a finite problem. Furthermore, the enumeration of a corresponding sequence of graph parameters such as chromatic number, domination number, independence number, minimum and maximum degree, etc., reduces to a finite problem. 2023 World Scientific Publishing Company. -
Cytogenetic Consequences Of Food Industry Workers Occupationally Exposed To Cooking Oil Fumes (Cofs)
Background: Cooking oil fumes (COFs) with smoking habits is a substantial risk that aggravates genetic modifications. The current study was to estimate the biological markers of genetic toxicity counting Micronucleus changes (MN), Chromosome Aberrations (CA) and DNA modifications among COFs exposures and control subjects inherent from South India. Materials and Methods: Present analysis comprised 212 COFs with tobacco users and equivalent number of control subjects. Results: High frequency of CA (Chromatid type: and chromosome type) were identified in group II experimental subjects also high amount of MN and DNA damage frequency were significantly (p < 0.05) in both subjects (experimental smokers and non-smokers). Present analysis was observed absence of consciousnessamong the COFs exposures about the destructive level of health effects of tobacco habits in working environment. Conclusion: COFs exposed workers with tobacco induce the significant alteration in chromosomal level. Furthermore, a high level of rate of genetic diseases (spontaneous abortion) were identified in the experimental subjects. This finding will be helpful for preventive measures of COFs exposed workers and supportive for further molecular analysis 2021,Asian Pacific Journal of Cancer Prevention. All Rights Reserved. -
Damaged Relay Station: EEG Neurofeedback Training in Isolated Bilateral Paramedian Thalamic Infarct
Stroke is a major public health concern and leads to significant disability. Bilateral thalamic infarcts are rare and can result in severe and chronic cognitive and behavioral disturbances - apathy, personality change, executive dysfunctions, and anterograde amnesia. There is a paucity of literature on neuropsychological rehabilitation in patients with bilateral thalamic infarcts. Mr. M., a 51 years old, married male, a mechanical engineer, working as a supervisor was referred for neuropsychological assessment and rehabilitation with the diagnosis of bilateral paramedian thalamic infarct after seven months of stroke. A pre-post comprehensive neuropsychological assessment of his cognition, mood, and behavior was carried out. The patient received 40 sessions of EEG-Neurofeedback Training. The results showed significant improvement in sleep, motivation, and executive functions, however, there was no significant improvement in memory. The case represents the challenges in the memory rehabilitation of patients with bilateral thalamic lesions. 2024 Neurology India, Neurological Society of India. -
DarcyForchheimer Nanoliquid Flow and Radiative Heat Transport over Convectively Heated Surface with Chemical Reaction
Abstract: Improving the heat transport of energy transmission fluids is a vital challenge in numerous engineering applications such as photovoltaic thermal management, heat exchangers, transport and energy-saving processes, solar collectors, automotive refrigeration, electronic equipment refrigeration, and engine applications. Nanofluids address the challenges of thermal management in engineering applications. The DarcyForchheimer flow of magneto-nanofluid initiated by a stretched plate is investigated with application of the Buongiorno model. The features of the nth order chemical reaction, Rosseland thermal energy radiation, and non-uniform heat sink/source are also scrutinized. The Buongiorno nanoliquid model is implemented, which includes the frenzied motion of the nanoparticles and the thermal diffusion of the nanoparticles (NPs). Thermal and solutal convection heating boundary conditions are also incorporated. Boundary layer approximations are used in the mathematical derivation. The non-linear control problem is deciphered with application of the RungeKutta shooting method (RKSM). The results for the relevant parameters are analyzed in dimensionless profiles. In addition, the friction factor on the plate, the heat transport rate, and the mass transport rate of the nanoparticles are calculated and analyzed. 2022, Pleiades Publishing, Ltd.
