Browse Items (9795 total)
Sort by:
-
Cross-disciplinary collaborations and partnerships for sustainability education: Including community-based learning, industry partnerships, and international collaborations
Multidisciplinary collaboration is crucial to sustainable education. It places a strong emphasis on combining many academic disciplines to address complex environmental issues and promote sustainable lifestyles. Students can put their knowledge into practice and raise awareness of the world through community-based learning, corporate partnerships, and international collaborations. The chapter emphasizes effective methods for evaluating the effectiveness and impact of collaborative activities. It highlights how crucial innovation, knowledge sharing, and international cooperation are to building a sustainable future. Social justice, action-oriented learning, and lifetime professional growth are all components of sustainability education. Institutional barriers, cultural differences, and resource constraints impact these cooperative initiatives. Future generations' perceptions of the Earth can be affected via interdisciplinary collaboration and partnerships. 2024, IGI Global. All rights reserved. -
Cross-language contributions of rapid automatized naming to reading accuracy and fluency in young adults: evidence from eight languages representing different writing systems
Rapid automatized naming (RAN) is a strong predictor of reading across languages. However, it remains unclear if the effects of RAN in first language (L1) transfer to reading in second language (L2) and if the results vary as a function of the orthographic proximity of L1L2. To fill this gap in the literature, we examined the role of RAN in reading accuracy and fluency in eight languages representing different writing systems. Seven hundred and thirty-five university students (85 Chinese-, 84 Japanese-, 100 Kannada-, 40 Oriya-, 115 English-, 115 Arabic-, 105 Portuguese-, and 91 Spanish-speaking) participated in our study. They were assessed on RAN (Digits and Objects) and reading (accuracy and fluency) in both L1 and L2 (English). Results of hierarchical regression analyses showed significant effects of L1 RAN on L2 reading accuracy in the Chinese-, Portuguese-, and Spanish-speaking groups. In addition, L2 RAN was a significant predictor of reading fluency in L1 in the same language groups. No cross-language transfer was observed in the other languages. These findings suggest first that L1 and L2 RAN capture similar processes and controlling for one does not leave unique variance for the other to explain. Second, to the extent there is cross-language transfer of RAN skills, this appears to be independent of the orthographic proximity of the languages. 2021, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. -
Cross-layer hidden Markov analysis for intrusion detection
Ad hoc mobile cloud computing networks are affected by various issues, like delay, energy consumption, flexibility, infrastructure, network lifetime, security, stability, data transition, and link accomplishment. Given the issues above, route failure is prevalent in ad hoc mobile cloud computing networks, which increases energy consumption and delay and reduces stability. These issues may affect several interconnected nodes in an ad hoc mobile cloud computing network. To address these weaknesses, which raise many concerns about privacy and security, this study formulated clustering-based storage and search optimization approaches using cross-layer analysis. The proposed approaches were formed by cross-layer analysis based on intrusion detection methods. First, the clustering process based on storage and search optimization was formulated for clustering and route maintenance in ad hoc mobile cloud computing networks. Moreover, delay, energy consumption, network lifetime, and link accomplishment are highly addressed by the proposed algorithm. The hidden Markov model is used to maintain the data transition and distributions in the network. Every data communication network, like ad hoc mobile cloud computing, faces security and confidentiality issues. However, the main security issues in this article are addressed using the storage and search optimization approach. Hence, the new algorithm developed helps detect intruders through intelligent cross layer analysis with the Markov model. The proposed model was simulated in Network Simulator 3, and the outcomes were compared with those of prevailing methods for evaluating parameters, like accuracy, end-to-end delay, energy consumption, network lifetime, packet delivery ratio, and throughput. 2022 Tech Science Press. All rights reserved. -
Cross-Modal Ingredient Recognition and Recipe Suggestion using Computer Vision and Predictive Modeling
This paper is focused on the development of a novel system known as 'IngredEye.' It involves various approaches that can be grouped into categories, such as computer vision, including YOLOv8, a KNN prediction model, and a Flutter framework that hosts all of them in a mobile application environment. Previous studies have analyzed the application of computer vision and OpenCV recognition in cooking and proved that such approaches could enhance the level of convenience in the culinary field. This paper addresses issues like changes in lighting, occlusions, and other factors that have to be solved by the algorithms envisaged for real applications. The objective of this paper solely relies on integrating the OpenCV object detection method with comprehensive machine learning techniques specialized for the culinary field. Presenting the end-user with recipe recommendations based on the visual input they have given. 2024 IEEE. -
Crossing numbers of complete bipartite graphs and complete graphs
The crossing number of a graph is the smallest number of two edge crossings over all planar representations of the graph. In this paper, we investigate the crossing numbers of complete bipartite and complete graphs. Further, we identify optimal drawings and present results on crossing numbers of these classes of graphs. In addition, Zarankiewicz's conjecture on complete bipartite graphs and Guy's conjecture on complete graphs are verified to be true. 2018 Sanjith Hebbar, Tabitha Agnes Mangam. -
Crowd Monitoring System Using Facial Recognition
The World Health Organization (WHO) suggests social isolation as a remedy to lessen the transmission of COVID-19 in public areas. Most countries and national health authorities have established the 2-m physical distance as a required safety measure in shopping malls, schools, and other covered locations. In this study, we use standard CCTV security cameras to create an automated system for people detecting crowds in indoor and outdoor settings. Popular computer vision algorithms and the CNN model are implemented to build up the system and a comparative study is performed with algorithms like Support Vector Machine and KNN algorithm. The created model is a general and precise people tracking and identifying the solution that may be used in a wide range of other study areas where the focus is on person detection, including autonomous cars, anomaly detection, crowd analysis, and manymore. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Crowdsourcing in Higher Education: Theory and Best Practices
The widespread use of crowdsourcing strategies in higher education institutions improves the performance of students by using collective initiatives to enhance the skills of each student, efficiently optimizes the lecturing process by exchanging and pooling research materials, and also improves the financial situation of alumni by encouraging crowdfunding of tuition. We identify four main areas in this study where the use of crowdsourcing strategies plays an important role in the success of alumni in institutions of higher education. The proposed crowd teaching approach optimizes lecturing, allowing lecture notes to be shared and exchanged according to the various curricula of Higher Education Studies. With crowd learning, students learn by execution on collaborative projects in which different students share (effectively) teaching each other under the guidance of the lecturer, learn the necessary skills to achieve the projects goals and solve the proposed issue. In relation to accessing funding, the tuition fees of students can be financed by crowdsourcing approaches through crowd tuition and even crowdfunding can be used to procure laboratory and classroom content or the learning stays of students abroad. Using this crowdsourcing tool, students can find assistance in paying university taxes and also have an interest in further learning with other students. The application of crowdsourcing to education allows for optimization of the institutions budget and a more effective use of learning time, leading eventually to better outcomes for students. 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Crown shaped broadband monopole fractal antenna for 4G wireless applications
This paper proposes a novel crown shaped fractal antenna design suitable for 4G wireless applications. One of the promising approaches in miniaturizing the antenna size is to use the fractal geometries. Several efforts have been made by various investigators around the globe to amalgamate benefits of fractal structures with electromagnetic concepts and applications. This paper outlines a new approach in designing broadband monopole 2.1 GHz fractal antenna. The design starts with square patch antenna and goes up to third iteration for obtaining better performance and impedance matching. The proposed antenna was designed and simulated using the HFSS EM simulator. Performance analysis of the antenna was done with characteristics such as return loss, VSWR, efficiency and radiation pattern found to be good at 2.1 GHz. Wireless application demands miniaturization in system as well as antenna size with better performance, hence attempts have been made to reduce the size and improve the gain, efficiency and bandwidth of the proposed antenna. 2017 IEEE. -
Crude oil prediction using a hybrid radial basis function network
In the recent years, the crude oil is one of the most important commodities worldwide. This paper discusses the prediction of crude oil using artificial neural networks techniques. The research data used in this study is from 1st Jan 2000- 31st April 2014. Normally, Crude oil is related with other commodities. Hence, in this study, the commodities like historical datas of gold prices, Standard & Poors 500 stock index (S & P 500) index and foreign exchange rate are considered as inputs for the network. A radial basis function is better than the back propagation network in terms of classification and learning speed. When creating a radial basis functions, the factors like number of radial basis neurons, radial layers spread constant are taken into an account. The spread constant is determined using a bio inspired particle swarm optimization algorithm. A hybrid Radial Basis Function is proposed for forecasting the crude oil prices. The accuracy measures like Mean Square Error, Mean Absolute Error, Sum Square Error and Root Mean Square Error are used to access the performance. From the results, it is clear that hybrid radial basis function outperforms the other models. 2005 - 2015 JATIT & LLS. All rights reserved. -
Crumpled and porous graphene for supercapacitor applications: a short review
Research on Graphene and its importance in the field of energy conversion and storage devices such as fuel cells, batteries, supercapacitors and solar cells has gained momentum recently. It is studied to be the most suitable electrode material for enhanced performance of supercapacitors in terms of chargedischarge cycles, specific capacitance, high power and energy densities and so on, specifically due to its high conductivity and large theoretical surface area. Unfortunately, it posits lot of challenges due to its irreversible stacking between the individual sheets resulting in the decrease in the Specific Surface Area (SSA) compared to the theoretically reported values. Numerous studies have been carried out to prevent this stacking in order to increase the surface area, thereby being a more suitable material for the manufacture of electrodes for supercapacitors as its capacitance greatly depends on the electrode material. To solve this problem, the conversion of two-dimensional graphene sheets to three-dimensional crumpled graphene structure has been verified to be the most effective approach. The study of crumpled graphene has been one of the recent trends in the field of energy storage applications in consumer electronics and hybrid vehicles as the process of crumpling can be controlled to suit the prospective device applications. 2021, Korean Carbon Society. -
Crux role of neurocomputing in teaching learning pedagogy
The advent of brain-based learning in the early 1990s has limelighted the syndication between the educational learning process and neurosciences. Through educational learning ability, an individual can gather and assimilate anecdotes or come up with new notions with logical conclusions to form an organizational memory. Supreme level of knowledge assimilation ability results in developing new crucial knowledge for strategic renewal for the betterment of the learning process. Earlier efforts to link neuroscience and learning mode were controversial. However, continuous researches imply the significant role of neurosciences in the field of education and its deep-rooted involvement in building reformed educational pedagogy related to curriculum and general teaching-learning practices. Educational neurosciences help in interpreting brain-behaviour intricacy to provide latest teaching-learning strategies. Education is the most robust cognitive skill developer, and it must be provided to all irrespective of age and gender as it makes the person flexible and provides strength to cope with the adversities. Through this report, we would like to covey the deep association between the teaching-learning process with neurological sciences along with providing measures to be taken for holistic development in the educational setups. Learning is a by-product of human behaviour towards the external environment. Recent advanced tools of neuroimaging aid in more in-depth insight linked to adaptive neural mechanics, knowledge attainment, new skill acquisition and building neuroscience network for human learning. The neuroscience research shows intricacy between emotions and cognition as mediators between mind and body that are then followed by the social behaviour and learning, by indulging in subjective interpretations of person's goals, feelings, actions and experiences, ultimately resulting in learning new theories through neurobiological shreds of evidence. The Author(s), under exclusive license to Springer Nature Switzerland AG 2021. All rights reserved. -
Cryogenian magmatism and crustal reworking in the Southern Granulite Terrane, India
Understanding Neoproterozoic crustal evolution is fundamental to reconstructing the Gondwana supercontinent, which was assembled at this time. Here we report evidence of Cryogenian crustal reworking in the Madurai Block of the Southern Granulite Terrane of India. The study focuses on a garnet-bearing granite-charnockite suite, where the granite shows in situ dehydration into patches and veins of incipient charnockite along the contact with charnockite. The granite also carries dismembered layers of Mg-Al-rich granulite. Micro-textural evidence for dehydration of granite in the presence of CO2-rich fluids includes the formation of orthopyroxene by the breakdown of biotite, neoblastic zircon growth in the dehydration zone, at around 870C and 8 kbar. The zircon U-Pb ages suggest formation of the granite, charnockite, and incipient charnockite at 836 73, 831 31, and 772 49 Ma, respectively. Negative zircon ?Hf (t) (-5 to -20) values suggest that these rocks were derived from a reworked Palaeoproterozoic crustal source. Zircon grains in the Mg-Al-rich granulite record a spectrum of ages from ca. 2300 to ca. 500 Ma, suggesting multiple provenances ranging from Palaeoproterozoic to mid-Neoproterozoic, with neoblastic zircon growth during high-temperature metamorphism in the Cambrian. We propose that the garnet-bearing granite and charnockite reflect the crustal reworking of aluminous crustal material indicated by the presence of biotite + quartz + aluminosilicate inclusions in the garnet within the granite. This crustal source can be the Mg-Al-rich layers carried by the granite itself, which later experienced high-temperature regional metamorphism at ca. 550 Ma. Our model also envisages that the CO2 which dehydrated the garnet-bearing granite generating incipient charnockite was sourced from the proximal massive charnockite through advection. These Cryogenian crustal reworking events are related to prolonged tectonic activities prior to the final assembly of the Gondwana supercontinent. 2015 Taylor & Francis. -
Cryptic species and taxonomic troubles: A rebuttal of the systematic treatment of the Asian ladies' tresses orchids (Spiranthes species; Orchidaceae) by Pace et al. (2019)
In a recent research article by Pace et al. (2019), the authors claimed to have used information from phenology, morphology and molecular phylogenetics in their nomenclatural review of the Spiranthes sinensis complex. However, there are several scientific and botanical nomenclature issues with the Pace et al. (2019) paper in addition to its many errors and misinformation, which can be severely misleading and have the potential to affect our understanding of the highly complex Asian Spiranthes group. Here, we compare and critique their study in light of our study published prior to the article in the Botanical Journal of the Linnean Society. We suggest that the authors should have resorted to improved and new molecular data and a truly integrative analysis to support: (1) re-circumscription of the S. sinensis species complex for each of the six species they recognized, and the treatment of S. hongkongensis as a hybrid; and (2) all the new synonymies they proposed for Asian Spiranthes. 2020 The Linnean Society of London, Botanical Journal of the Linnean Society, 2020, 194, 375-381 -
Cryptocurrencies: An Epitome of Technological Populism
From a global perspective, which holds significant cryptocurrencies, this study discusses the volatility and spillover effect between the whales cryptocurrencies. Volatility in cryptocurrency markets has always been a time-varying concept that changes over time. As opposed to the stock market, which has historically and recently, the cryptocurrency market is much more volatile. The markets have evidenced many fluctuations in the prices of cryptos. As a result, countries are transforming their policies to suit financial technologies in their economic practices. Blockchain technology allows people to obtain more benefits in a financial transaction and breaks hurdles in the financial system. The study has found no ARCH effect in BinanceCoin, BT Cash, Bitcoin, Vechain, and Zcash. It is discovered that there is an ARCH effect in the case of Ethereum, Tether, Tezos, and XRP. Whale cryptocurrencies have an ARCH effect. Daily closing prices of ten cryptocurrencies, including bitcoin, from January 1, 2019, to December 31, 2020, to determine the price volatility where the bitcoin whales hold significant cryptocurrency values. It has given significant results in case of volatility since we also found that Bitcoin's largest cryptocurrencies among the sample taken for the study have less volatility than other currencies. 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Cryptocurrency Market Anomaly: The Day-of-the-Week-Effect
Cryptocurrency has emerged as a fad amongst investors, academicians and policy-makers as a financial asset, making it important to empirically test the price behaviour of this emerging market. This paper is designed to investigate the presence of a well-known day-of-the-week effect in the young and emerging cryptocurrency market returns from August 2015 to March 2019. Using varied statistical techniques, this anomaly is examined for six cryptocurrencies (Bitcoin, Ethereum, Ripple, Litecoin, Stellar and Tether). The study applies both parametric and non-parametric statistical tests, i.e.,Bar Graph, Heat map, Students t-test, Analysis of Variance (ANOVA),regression analysis with dummy variables and the Kruskal Wallis Test. The studys findings show that no sample cryptocurrency returns exhibit the day-of-the-week effect phenomenon.The statistically insignificant result of the day-of-the-week effect in thecryptocurrency returns showcases the evidence of market efficiency in the cryptocurrency market. Indian Institute of Finance. -
Cryptocurrency Security and Privacy Issues: A Research Perspective
Cryptocurrency has developed as a new mode of money exchange since it has become easier, faster and safer. The first cryptocurrency was introduced in 2009 and since then, the growth rate of cryptocurrency has been increasing drastically. As of 2020, the cryptocurrency exchange all over the world has exceeded 300%. The researchers face many challenges during their research on the various cryptocurrencies. For example, most of the high-tech companies still do not support bitcoin on mobile platforms. High-tech companies like Google and Apple are also thinking into banning the bitcoin wallet from their app stores. The work provides a review of cryptocurrency and its types, scope on the investment plans and its advantages also discussed. The growth and comparison between bitcoins and gold is also discussed. The challenges researchers face and the security issues concerning it. This review provides an overview of how the different forms of cryptocurrency are increasing from over a decade. It explains the different types and the year in which they were invented. It also gives a brief comparison with respect to bitcoin, which is one of the most used cryptocurrency. Furthermore, it gives a brief explanation on investments, and schemes for those who are new in the cryptomarket. Later emphasizes on the security issues faced by this technology. It talks about proof of work and the different data attacks the software faced and how the issues were overcome. In the end, it talks about the challenges researchers face while researching cryptocurrency. 2021 IEEE. -
Cryptographic key distribution using artificial intelligence for data security and location privacy in VANET
Location privacy & data security in VANET are now becoming most important in todays paradigm of information age. Unauthorized access to location information of vehicles may pose a significant security threat, thus it is necessary to secure this information from intruders. In proposed work, Artificial intelligence based RF range approximation is used with multi key controlled cryptography for enhancement of location privacy and data security in service location protocol of VANETS. 2022 Taru Publications. -
Cryptographic Protocols for Securing Internet of Things (IoT)
Cryptographic protocols are used to relax the ever-developing quantity of linked gadgets that make up the net of things (IoT). Those cryptographic protocols have been designed to make certain that IoT tool traffic stays cozy and personal, even while nevertheless allowing tool-to-device and cloud-to-tool communications. Examples of these protocols consist of TLS/SSL, PGP/GPG, IPsec, SSL VPN, and AES encryption. Every one of these protocols enables authentication, message integrity, and confidentiality via encryption and key trade. Moreover, a lot of these protocols are carried out in the form of diverse hardware and software answers, such as smart playing cards and gateways, to make certain that IoT traffic is secured. With the appropriate implementation of those cryptographic protocols, establishments can ensure that their IoT facts are blanketed and securely transmitted. 2024 IEEE. -
Cryptography: Advances in Secure Communication and Data Protection
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the threats posed by bad actors. This abstract examines the evolution of secure communication protocols and data protection techniques as it relates to the advancements in cryptography. The development of post-quantum cryptography is the most notable development in cryptography discussed in this study. As quantum computers become more powerful, they pose a serious threat to traditional cryptographic algorithms, such as RSA and ECC. Designing algorithms that are immune to attacks from quantum computers is the goal of post-quantum cryptography. Lattice-based, code-based, and multivariate-based cryptography are only a few of the methods that have been investigated in this context. 2023 EDP Sciences. All rights reserved. -
Crystal and Molecular Structure of 1,1-Bis(methylthio)-5-(4-chlorophenyl)-1,4-pentadien-3-one
Journal of Crystallography, pp. 2014.