Browse Items (5511 total)
Sort by:
-
Dark matter, dark energy, and alternate models: A review
The nature of dark matter (DM) and dark energy (DE) which is supposed to constitute about 95% of the energy density of the universe is still a mystery. There is no shortage of ideas regarding the nature of both. While some candidates for DM are clearly ruled out, there is still a plethora of viable particles that fit the bill. In the context of DE, while current observations favour a cosmological constant picture, there are other competing models that are equally likely. This paper reviews the different possible candidates for DM including exotic candidates and their possible detection. This review also covers the different models for DE and the possibility of unified models for DM and DE. Keeping in mind the negative results in some of the ongoing DM detection experiments, here we also review the possible alternatives to both DM and DE (such as MOND and modifications of general relativity) and possible means of observationally distinguishing between the alternatives. 2017 COSPAR -
Data analysis in road accidents using ann and decision tree
Road accidents have become some of the main causes for fatal death globally. A report tells that road accident is the major cause for high death rate other than wars and diseases. A study by World Health Organization (WHO), Global status report on road safety 2015 says over 1.24 million people die every year due to road accidents worldwide and it even predicts by 2020 this number can even increase by 20-50%. This can affect the GDP of the Country, for developing countries this can affect adversely. This paper shows the use of data analytics techniques to build a prediction model for road accidents, so that these models can be used in real time scenario to make some policies and avoid accidents. This paper has identified the attributes which has high impact on accident severity class label. IAEME Publication. -
Data encryption and decryption using graph plotting
Cryptography plays a vital role in today's network. Security of data is one of the biggest concern while exchanging data over the network. The data need to be highly confidential. Cryptography is the art of hiding data or manipulating data in such a way that where no third party can understand the original data while transmission from source to destination. In this paper, a modified affine cipher algorithm has been used to encrypt the data. The encrypted data will be plot onto a graph. Later, graph will be converted into image. This system allows sender to select his/her own keys to encrypt the original data before plotting graph. Then, Receiver will use the same key to decrypt the data. This system will provide the better security while storing the data in cloud in the form of secret message embedding in graphical image file in network environment. IAEME Publication. -
Data encryption in public cloud using multi-phase encryption model
Cloud computing the most used word in the world of Information Technology, is creating huge differences in IT industry. Nowadays huge amount of data is being generated and the researchers are finding new ways of managing these data. Basically, the word cloud refers to a virtual database that stores huge data from various clients. There are three types of cloud public, private and hybrid. Public cloud is basically for general users where users can use cloud services free or by paying. Private cloud is for any particular organizations and hybrid one is basically combine of both. Cloud offers various kind of services such as IAAS, PAAS, SAAS where services like platform for running any application, accessing the huge storage, can use any application running under cloud are given. The cloud also has a disadvantage regarding the security for the data storage facility. Basically, the public cloud is prone to data modification, data hacking and thus the integrity and confidentiality of the data is being compromised. Here in our work the concern is to protect the data that will be stored in the public cloud by using the multi-phase encryption. The algorithm that we have proposed is a combination of Rail Fence cipher and Play Fair cipher. 2018 Snata Choudhury, Dr. Kirubanand V.B. -
Data journalists perception and practice of transparency and interactivity in Indian newsrooms
Data journalism research recorded exponential growth during the last decade. However, the extant literature lacks comparative perspectives from the Asian region as it has been focused on select geographies (mainly Europe and the US). In this backdrop, the present study examined data journalism practices in the Indian media industry by conducting intensive interviews with 11 data journalists to investigate their perception of transparency and interactivity which are two of the core aspects of data journalism practice. Further, a content analysis of data stories published by two Indian news organizations for two years was conducted to assess the status of transparency and interactivity options in these stories. The findings showed that Indian data journalists acknowledge the importance of transparency and interactivity, but exhibit a cautious approach in using them. There is general apathy in practicing transparency among journalists in legacy organizations, drawing a stark contrast with their counterparts in digitally-native organizations. 2022 Asian Media Information and Communication Centre. -
Data Security-Based Routing in MANETs Using Key Management Mechanism
A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resist using the existing security approaches. Therefore, various secure routing protocols have been developed to strengthen the security of MANETs. In this paper, a secure and energy-efficient routing protocol is proposed by using group key management. Asymmetric key cryptography is used, which involves two specialized nodes, labeled the Calculator Key (CK) and the Distribution Key (DK). These two nodes are responsible for the generation, verification, and distribution of secret keys. As a result, other nodes need not perform any kind of additional computation for building the secret keys. These nodes are selected using the energy consumption and trust values of nodes. In most of the existing routing protocols, each node is responsible for the generation and distribution of its own secret keys, which results in more energy dissemination. Moreover, if any node is compromised, security breaches should occur. When nodes other than the CK and DK are compromised, the entire networks security is not jeopardized. Extensive experiments are performed by considering the existing and the proposed protocols. Performance analyses reveal that the proposed protocol outperforms the competitive protocols. 2022 by the authors. Licensee MDPI, Basel, Switzerland. -
Data visualization and toss related analysis of IPL teams and batsmen performances
Sports play a very significant role in the development of the human persona. Getting involved in games like Cricket and other various sports help us to build character, discipline, confidence and physical fitness. Indian Premier League, IPL provides the most successful form of cricket as it gives opportunities to young and talented players to show case their talents on various pitch. Decision-makers are the utmost customers for all fundamentals in the sports analytics framework. Sports analytics has been a smash hit in shaping success for many players and teams in various sports. Sports analytics and data visualization can play a crucial role in selecting the best players for a team. This paper is about the Toss Related analysis and the breadth of data visualization in supporting the decision makers for identifying inherent players for their teams. Copyright 2019 Institute of Advanced Engineering and Science. All rights reserved. -
Database aware memory reconstruction for object oriented programming paradigm
Data storage is a big challenge in front of industries and researchers when its growing enormously. Traditional data storage strategy was fulfilling the business needs till the data was in structured format. But now due to Internet of Things (IoT) compatible devices unstructured data is more than structured one. In such cases traditional data storage strategy won't work efficiently. Initially data storage devices used to store the data irrespective of its logical storage. It means the record was stored either in array format or block format. Such type of storage was not matching physical and logical structure. Logically, structured data is generated as an attribute of particular entity, but physically it gets stored in a sequential memory storage either as file or as memory block. Object Based Storage pattern(OBS) stores the data in the way object gets generated by the programmer and accordingly memory is allocated for that object. Object contains all the data related to that particular entity which makes it easy to retrieve it back. Current study includes comparative advantages, operations and study of different service providers of object-based storage. We also focused on the current need of object-based storage structure for big data analysis and cloud computing. International Journal of Scientific and Technology Research. All rights reserved. -
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre
The heterogeneous resource-required application tasks increase the cloud service provider (CSP) energy cost and revenue by providing demand resources. Enhancing CSP profit and preserving energy cost is a challenging task. Most of the existing approaches consider task deadline violation rate rather than performance cost and server size ratio during profit estimation, which impacts CSP revenue and causes high service cost. To address this issue, we develop two algorithms for profit maximization and adequate service reliability. First, a belief propagation-influenced cost-aware asset scheduling approach is derived based on the data analytic weight measurement (DAWM) model for effective performance and server size optimization. Second, the multiobjective heuristic user service demand (MHUSD) approach is formulated based on the CPS profit estimation model and the user service demand (USD) model with dynamic acyclic graph (DAG) phenomena for adequate service reliability. The DAWM model classifies prominent servers to preserve the server resource usage and cost during an effective resource slicing process by considering each machine execution factor (remaining energy, energy and service cost, workload execution rate, service deadline violation rate, cloud server configuration (CSC), service requirement rate, and service level agreement violation (SLAV) penalty rate). The MHUSD algorithm measures the user demand service rate and cost based on the USD and CSP profit estimation models by considering service demand weight, tenant cost, and energy cost. The simulation results show that the proposed system has accomplished the average revenue gain of 35%, cost of 51%, and profit of 39% than the state-of-the-art approaches. 2021 M. S. Mekala et al. -
DDoS Intrusions Detection in Low Power SD-IoT Devices Leveraging Effective Machine Learning
Security and privacy are significant concerns in software-defined networking (SDN)-applied Internet of Things (IoT) environments, due to the proliferation of connected devices and the potential for cyberattacks. Hence, robust security mechanisms need to be developed, including authentication, encryption, and distributed denial of service (DDoS) attack detection, tailored to the constraints of low-power IoT devices. Selecting a suitable tiny machine learning (TinyML) algorithm for low-power IoT devices for DDoS attack detection involves considering various factors such as computational complexity, robustness in dealing with heterogeneous data, accuracy, and the specific constraints of the target IoT device. In this paper, we present a two-fold approach for the optimal TinyML algorithm selection leveraging the hybrid analytical network process (HANP). First, we make a comparative analysis (qualitative) of the machine learning algorithm in the context of suitability for TinyML in the domain of SD-IoT devices and generate the weights of suitability for TinyML applications in SD-IoT. Then we evaluate the performance of the machine learning algorithms and validate the results of the model to demonstrate the effectiveness of the proposed method. Finally, we see the effect of dimensionality reduction with respect to features and how it affects the precision, recall, accuracy, and F1 score. The results demonstrate the effectiveness of the scheme. 1975-2011 IEEE. -
De novo synthesis of 2,2-bis(dimethylamino)-3-alkyl or benzyl 2,3-dihydroquinazolin-4(1H)-one compounds
A new versatile and efficient strategy for the synthesis of 2,2-bis(dimethylamino)-3-alkyl or benzyl 2,3-dihydroquinazoline-4(1H)-one compounds has been developed by one-pot multicomponent reaction with isatoic anhydride, amines followed by in situ-generated Vilsmeier reagent. The reaction has also been studied with different amines and solvents. 2017 Taylor & Francis. -
Death of Vernaculars and Language Hegemony: An ethnography of the higher education sector in 21st century India
The paper examines how new age pedagogies and neoliberal policies consciously work towards naturalizing English languages hegemony in institutions of Higher Education (IHE) in India. An ethnographic study the paper foregrounds the precarious positioning of non-English Indian languages vis-vis the pervading discourses of internationalization and education as job/skill oriented. Hegemony of English in the present is coupled with a restructuring of language departments as well as fleeting market demands for human capital. The paper also brings into question the role of the Internet and related technologies in reorganizing the linguistic dynamics of HE. Instead of democratizing, the Internet produces new monopolies in knowledge production, controls knowledge traffic from global North to South and further legitimizes the language hegemony. The paper argues that, in the last two decades, the neoliberal rupture has been leading HE institutions to a death of vernaculars within their physical, cultural and academic spaces. 2024, Hiroshima University,Research Institute for Higher Education,. All rights reserved. -
Death Rituals and Change Among Hindu Nadars in a South Indian Village
This article examines changes in the death rituals performed among Hindu Nadars in a South Indian village. It emphasises the importance of understanding ritual changes within their specific micro-level local contextual framework, including changing social structures at household and village level. This empirical evidence showcases how changing rituals connected to death reflect various adaptations through imitation, substitution and alteration of specific ritual elements and performants. It also identifies emerging class distinctions among Nadars and their connection with changes in rituals associated with death. This analysis of the changes depicts how Nadars use ritual actions in pragmatic ways, symbolically expressing and realising their aspirations for status enhancement through such ritual performances. 2021 SAGE Publications. -
Death-worlds, Necropolitics and Decoloniality Colonial Negotiations in Mah
The boundaries of sovereignty are mostly relegated to modern and late modern political thoughts that focus on biopolitical and democratic theories. This paper marks a shift of sovereign subjectivity to the interstitial spaces of life and death of the colonial subjects. Through the study of the necropolitics of colonial control in the erstwhile French colony of Mah as narrated in the novel On the Banks of the Mayyazhi, this paper argues that colonial subjectivity and the idea of sovereignty have decentred itself from the traditional notions of political control and violence to newer avenues of life and death. The perusal of the decolonial approach to necropolitics will examine how colonial logic has shaped the idea of sovereignty. 2024 Economic and Political Weekly. All rights reserved. -
Deciphering the Nature and Dynamics of Gig-Platform Jobs: Workers Hidden Precarity
The technology-driven gig-platform sector has emerged as a new source of employment generation both globally as well domestically. This recent transformation in the labour market is reshaping the nature of labour practices, labour relations, workers rights, and contracts. The sector has huge potential to generate millions of job opportunities by leveraging the use of digital technology. As this sector continues to generate more jobs, such jobs are portrayed as fostering economic growth, while creating meaningful jobs, which are mutually beneficial to workers and employers in terms of providing flexibility and freedom, better earning opportunity, and promoting social inclusion, by which it implies that women are increasingly equipped to find better jobs. This article critically examines the developmental roles of platform jobs which are being particularly highlighted within the policy circle, in academic literature, and tech companies through workers lens. It delves deeper into the discussion on those very aspects of platform jobs just listed, including the flexibility and freedom debate, workers income, and the gender aspect of jobs. In doing so, it carefully examines these aspects with respect to their implications on workers in terms of working conditions and regulatory aspects. The article brings out the workers precarity hidden within those developmental aspects of gig-platform jobs. 2024 CSD. -
Deciphering the non-linear nexus between government size and inflation in MENA countries: an application of dynamic-panel threshold model
Contradictory to conventional economic theory, which foresees any increase in the size of government as inflationary, this article provides evidence that the reaction of price levels to changes in the size of government is nonlinear. The price levels do not necessarily increase in response to a rise in the size of the government but only up to a certain threshold or optimal level. Accordingly, this paper utilizes the dynamic panel threshold model to examine the threshold effects of government size (measured as government final consumption expenditure as a proportion of GDP) on inflation using a sample of 10 selected MENA countries from 1980 to 2019. The findings of this study stand out in several ways. First, the results support the nonlinear relationship between government size and inflation in the study area. Second, the government sizes estimated threshold level is equivalent to 12.46%. Third, government size negatively impacts inflation in the regime of small governments up to the threshold level. The impact turns positive once the government size goes beyond the threshold level in a regime of large size of government. These findings have ramifications for the conduct of fiscal policy. Policymakers in the MENA region can increase the size of government till it reaches the threshold level without exerting any upward pressure on price levels. The Author(s) 2024. -
Deciphering the properties of UV upturn galaxies in the Virgo cluster
The UV upturn refers to the increase in UV flux at wavelengths shorter than 3000 observed in quiescent early-type galaxies (ETGs), which still remains a puzzle. In this study, we aim to identify ETGs showing the UV upturn phenomenon within the Virgo galaxy cluster. We utilized a colourcolour diagram to identify all potential possible UV upturn galaxies. The spectral energy distributions (SED) of these galaxies were then analysed using the CIGALE software; we confirmed the presence of UV upturn in galaxies within the Virgo cluster. We found that the SED fitting method is the best tool to visualize and confirm the UV upturn phenomenon in ETGs. Our findings reveal that the population distributions regarding stellar mass and star formation rate properties are similar between UV upturn and red sequence galaxies. We suggest that the UV contribution originates from old stellar populations and can be modelled effectively without a burst model. Moreover, by estimating the temperature of the stellar population responsible for the UV emission, we determined it to be 13 000 K to 18 000 K. These temperature estimates support the notion that the UV upturn likely arises from the contribution of low mass evolved stellar populations (extreme horizontal branch stars). Furthermore, the Mg2 index, a metallicity indicator, in the confirmed upturn galaxies shows higher strength and follows a similar trend to previous studies. This study sheds light on the nature of UV upturn galaxies within the Virgo cluster and provides evidence that low-mass evolved stellar populations are the possible mechanisms driving the UV upturn phenomenon. 2024 The Author(s). -
Decision making framework for foreign direct investment: Analytic hierarchy process and weighted aggregated sum product assessment integrated approach
Foreign direct investment (FDI) plays a paramount role in economic and social growth of every country. FDI acts as a source of external capital and helps in economic growth of the host country. Making decision for FDI during uncertain business environment is a challenge for all stakeholders. Therefore, in this study, we are proposing a decision making framework for FDI. Through literature review, we have identified the factors, on which FDI depends. A process-based, multi-criterion, integrated hierarchical approach for deciding about FDI, has been illustrated. In this study, five sectors are considered, that is, petroleum and natural resource, retailing and e-commerce, healthcare, information technology, and road and highways for illustrating the proposed framework. It is observed that information technology sector has got top priority for FDI followed by retailing and e-commerce and health care sector. Findings will help in taking appropriate decision by stakeholders for FDI. Ultimately it will also help in creating employment, economic growth, and welfare of society at large in the host country. 2021 John Wiley & Sons, Ltd. -
Decision Tree Based Routing Protocol (DTRP) for Reliable Path in MANET
In mobile ad hoc network due to node movements, there exists route failure in active data transmission which results in data loss and communication overheads. Hence, in such a dynamic network, routing through reliable path is one of the tedious tasks. In this paper, we propose a novel Decision Tree based Routing Protocol (DTRP) a data mining technique in route selection process from source to destination. The proposed DTRP protocol selects the one hop neighbors based on the parameters such as speed, Link Expiration Time, trip_time and node life time. Thus the performance of a route discovery mechanism is enhanced by selecting the stable one-hop neighbors along the path to reach the destination. The simulated results show that the lifetime of the route is increased and hence the data loss and end to end delay are minimized thereby increasing the throughput of the network using the proposed DTRP routing protocol compared to existing routing protocols. 2019, Springer Science+Business Media, LLC, part of Springer Nature. -
Decision-making using regression analysis: a case study on Top Tier Holidays LLP
Research methodology: This study aims to investigate the factors that contribute to the overall tour experience and services provided by Top Tier Holidays. The study is mixed in nature, and the researchers have used analytical tools to analyse the data factually. Multiple regression using MS Excel is used in the study. Case overview/synopsis: This case is based on the experiences of a real-life travel and tour company located in New Delhi, India. The case helps understand regression analysis to identify independent variables significantly impacting the tour experience. The CEO of the company is focused on improving the overall customer experience. The CEO has identified six principal determinants (variables) applicable to tour companies success. These variables are hotel experience, transportation, cab driver, on-tour support, itinerary planning and pricing. Multiple regression analysis using Microsoft Excel is conducted on the above determinants (the independent variables) and the overall tour experience (the dependent variable). This analysis would help identify the relationship between the independent and dependent variables and find the variables that significantly impact the dependent variable. This case also helps us appreciate the importance of various parameters that affect the overall customer tour experience and the challenges a tour operator company faces in the current competitive business environment. Complexity academic level: This case is designed for discussion with the undergraduate courses in business management, commerce and tourism management programmes. The case will build up readers understanding of linear regression with multiple variables. It shows how multiple linear regression can help companies identify the significant variables affecting business outcomes. 2023, Emerald Publishing Limited.