Browse Items (9795 total)
Sort by:
-
Electrochemical Hydrogenation of Organic Compounds: A Sustainable Approach
Conventional methods for hydrogenation of organic compounds generally use corrosive catalysts and reagents, along with extreme conditions like high temperatures and pressures. Quenching of corrosive materials does not deter its negative impact on the environment, nor is one safe when it comes to working with high temperature and pressure. Electrochemical hydrogenation (ECH) has proven to be safe and green since most of the efficient reactions are conducted at ambient pressure and temperature, minimizing, and sometimes even negating the use of toxic catalysts and corrosive reagents as compared to conventional methods. This review therefore provides different strategies used for ECH in the past, modification of different electrodes, half reactions taken up for efficient energy usage and catalysts used for different hydrogenation reactions. It presents the advances in electrochemical hydrogenation reactions of organic compounds, starting from simple aliphatic compounds to complex polyaromatics and heterocyclic aromatic compounds. 2023 Wiley-VCH GmbH. -
Ferrocenyl aniline modified electrode for the electrochemical synthesis of 2-(4-methoxyphenyl)-1H-benzo[d]imidazole
Ferrocenyl aniline is an excellent catalyst used conventionally for heterocyclic syntheses. The use of ferrocenyl aniline, in the presence of electropolymerized thiophene-3-acetic acid (TAA) on carbon fibre paper is novel and found to be an exceptional electrocatalyst, for the synthesis of a proven anti-fungal, anti-proliferative and anti-bacterial, 2-(4-methoxyphenyl)-1H-benzo[d]imidazole. The electrode performance was examined with activity studies and EIS, along with surface characterizations including optical profilometry, FE-SEM, FT-IR and XPS. The synthesis was performed in a single-cell three electrode system, using platinum as counter and saturated calomel electrode (SCE) as the reference, with ethanol as the electrolyte and lithium perchlorate supporting electrolyte. The reaction was performed with o-phenylenediamine and anisaldehyde as starting materials at ambient temperature and pressure, at 1.35 V constant potential for 3 h, and product was isolated and purified using column chromatography to obtain 91% yield and characterized with GCMS and NMR. This synthesis method is noteworthy, due to its environmentally friendly performance, and high yield for a benzimidazole derivative that is pharmacologically vital. 2024 -
BRICS: Advancing Cooperation and Strengthening Regionalism
In the era of regional international relations and more interdependence, organisations like the Brazil, Russia, India, China and South Africa (BRICS) can play a meaningful role in international level as well as regional in years to come. The recent summit of the BRICS reiterates that more cooperation is needed at various levels. In Delhi declaration, it is called for a more representative international financial architecture, with an increase in the voice and representation of developing countries and the establishment and improvement of a just international monetary system that can serve the interests of all countries and support the development of emerging and developing economies. Moreover, these economies having experienced broad-based growth are now significant contributors to global recovery. This is true. One must acknowledge the fact that the roles of the BRICS countries are composed of various political systems, various subcontinent, but in the changed context, all these countries are coming under the purview of the developing countries in broader terms. That makes the BRICS beyond the regional boundaries to set a benchmark in the regional cooperation. Chinas permanent status in the United Nations makes the BRICS more strategically oriented and pragmatic aspects of foreign policy engagement in the twenty-first century. The political leadership and vision is equally important with economic engagement. The four major theories of the international relations (IR) are striking in this respect which includes liberalism, realism, constructivism and Marxism. Theoretical framework relevant to regionalism in focusing on IR theories is also analysed in this article. The main argument of the article is that there is no prescribed regional model and BRICS has to tune to the member countries regional and political frameworks to engage with. Therefore, the framework of analysis is more or less critical about the Western engagement and it is region focused. 2012 Indian Council of World Affairs. -
A Study of Customer Discernment, on Organic Products in Sikkim
Asian Journal of Research in Business Economics and Management, Vol. 7, Issue 1, pp. 10-15, ISSN No. 2249-7307 -
Implementation of multicloud strategies for healthcare organisations to avoid cloud sprawl
Healthcare organisations are being overwhelmed by data, devices and apps, and disjointed multiple cloud services. Well-heeled multicloud can provide a unified cloud model that provides greater control and scalability at reduced costs. Healthcare multicloud is turning into an appealing path for associations to manage the blast of advanced healthcare information in digital health, internet of things, associated gadgets and healthcare applications. As more human services associations grasp distributed computing, they are progressively going to a blend of open, private, and hybrid cloud administrations and foundation. In fact most of the healthcare service organisations plan to utilise different cloud vendors over the upcoming years. While having multiple cloud vendors can give organisations more flexibility and redundancy, managing multiple clouds can be a challenge. It can lead to cloud sprawl, unauthorised cloud use known as shadow IT, disjointed cloud solutions, inefficiencies, and waste. Copyright 2022 Inderscience Enterprises Ltd. -
Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm
The cloud computing is interlinked with recent and out-dated technology. The cloud data storage industry is earning billion and millions of money through this technology. The cloud remote server storage is on-demand technology. The cloud users are expecting higher quality in minimal cost. The quality of service is playing a vital role in any latest technology. The cloud user always depends on thirty party service providers. This service provider is facing higher competition. The customer is choosing a service based on two parameters one is security and another one is cost. The reason behind this is all our personal data is stored on some third party server. The customer is expecting higher security level. The service provider is choosing many techniques for data security, best one is encryption mechanism. This encryption method is having many algorithms. Then again one problem is raised, that is which algorithm is best for encryption. The prediction of algorithm is one of major task. Each and every algorithm is having unique advantage. The algorithm performance is varying depends on file type. The proposed method of this article is to solve this encryption algorithm selection problem by using tabu search concept. The proposed method is to ensure best encryption method to reducing the average encode and decode time in multimedia data. The local search scheduling concept is to schedule the encryption algorithm and store that data in local memory table. The quality of service is improved by using proposed scheduling technique. 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. -
Securing cloud data against cyber-attacks using hybrid aes with MHT algorithm
Cloud computing is dealing with large amount of data during data communication. This data processing is named as big data. The big data is growth of the demand in accessing the storage, computation and communication. This big data has the major defects. A raising issue in emerging big data is cost minimization. The architecture of big data ranges over multiple machines and cluster which have sub system. The major challenge of this big data is preprocessing and analysing the data patterns. This research article is dealing with different data pre-processing and secure data storage. There are many research challenges during this data process. The possible gap and drawbacks in the technology are identified through this survey and the efficient big data service is provided through MHT and AES algorithm. The main aim of this proposed method is to provide better data security during larger data process. The proposed hybrid MHT with AES algorithm is to minimize the encryption and decryption time apart from that it reduces the attacker ratio. All these parameters automatically increase the Quality of Service. Copyright Research Institute for Intelligent Computer Systems, 2020. All rights reserved. -
Parallel queue scheduling in Dynamic Cloud environment using Backfilling algorithm
Cloud Computing reshapes the entire computing paradigm. In general, cloud computing means outsourcing available services and data storage in centralized scenario. In cloud computing task allocation is a major problem because multiple numbers of tasks are allocated to multiple numbers of processors for simultaneous processing. From the given list, tasks are queued according to the ascending order based on their duration. This paper is designed to solve the Task Scheduling problem, by using our proposed effective new approach of Backfilling algorithm. Depending upon the task duration, tasks are split into multiple threads for processing. Multiple thread tasks are processed in the basic concept of "gang scheduling" technique. Here we implement new backfilling algorithm concept to minimize the idle processing time of the processors. The existing Simple Backfilling Algorithm (SBA) is used to minimize the ideal time processing. Whereas comparatively Dynamic Cloud Scheduling using Backfilling Algorithm (DCBA) is designed to reduce the ideal time processing than SBA to carry out the process of both LQueue and SQueue simultaneously. At the outset, DCBA reduces the average waiting time. As mentioned the algorithm which is specified in the previous line that contains three level which represent the working speed of the algorithm. The first and second level of DCBA algorithm is comparatively similar to the performance of SBA algorithm. The maximum better performance was given in a queue size (q=1.5) by DCBA algorithm as compare to SBA algorithm. The existing type (Gang Scheduling) consist of two approaches namely Adaptive First Come First Serve (AFCFS) and Largest Job First Served (LJFS) that focus on non-parallel jobs with deadline. When compare to existing gang scheduling algorithm and SBA algorithm the average waiting time of DCBA has slight improvement in the loader level of the key. As the separation of the queue like LQ and SQ the waiting time and average waiting time is reduced comparatively. 2018, Intelligent Network and Systems Society. -
Business transaction privacy and security issues in near field communication
The main objective of this chapter is to discuss various security threats and solution in business transactions. The basic working principle and theoretical background of near field communication (NFC) technology is discussed. A component of NFC communication section is to be discussed on various NFC operation modes and RFID tags. NFC technology is used in various fields such as electronic toll collection and e-payment collection for shopping. This device-to-device payment system is facing major security issues. This NFC communication data is transferred from one terminal to another terminal by using short-range radio frequency. Data hackers try to access this radio frequency and attack the business transaction. This hybrid encryption algorithm is used to solve business transaction data security issues. This chapter deals with both key encryption and data encryption processes. 2021, IGI Global. -
Threats and security issues in smart city devices
The main objective of this chapter is to discuss various security and privacy issues in smart cities. The development of smart cities involves both the private and public sectors. The theoretical background is also discussed in future growth of smart city devices. Thus, the literature survey part discusses different smart devices and their working principle is elaborated. Cyber security and internet security play a major role in smart cities. The primary solution of smart city security issues is to find some encryption methods. The symmetric and asymmetric encryption algorithm is analyzed and given some comparative statement. The final section discusses some possible ways to solve smart city security issues. This chapter showcases the security issues and solutions for smart city devices. 2022, IGI Global. -
Cloud Enabled Smart Firefighting Drone Using Internet of Things
Internet of Things is fasted booming sector. This technology is evolved in various fields. The frequent updates in concerning the progress of Skyscraper fire or high-rise fire it is essential for us to ensure effective and safe firefighting. Since high-rise fire is typically inaccessible by ground vehicles due to some constraints or parameters. Due to less advancement in technology most skyscrapers are not furnished with proper fire monitoring and prevention system. To solve this issue this article is propose Unmanned Air Vehicles (UAVs) are making an appearance and making promises to prevent such kind of incidents. In this system, UAV can be launched from the Fire Control Unit (FCU). The proposed methodology is implemented with the help of Internet of Things (IoT). Sensors which are installed at the skyscraper detects the presence of fire and immediately send stress signals to the command and control unit from where further possible action can be taken. The pilot at the fire control unit continuously monitors the flight path and receives the video and fire scan information from the UAV. Upon detection of a stress signal or fire signal the Skyscraper position is determined with the help of Global Positioning System (GPS) and permission is requested from the applicable security agency to launch the extinguisher vehicle. The permission is granted, the coordinates of the location are filled in the system and the nearest station sends the UAV to the location. The fire suppressant are deployed it comes back to the nearest landing location and re-loaded with another fire suppressant to be carried to the fire location. The proposed methodology should improve the Quality of Service. 2019 IEEE. -
Community based open source geographical classical data analysis
The traditional Geographical Information Systems (GIS) have to be migrated to the internet eventually much like every other software today. The article has explored ways of utilizing the Open Geospatial Consortium (OGC) standards to come up with ways of achieving a workflow for the development of a service-based implementation of a customized Web Processing Service (WPS). The proposed concept has explored multiple workflows using various combinations of the publishing and development options and the simplest and the least resource intensive one has been identified as the outcome of this project. The workflow identified was then split into two section to make it even more simplify and adaptable, aiding development from the WPS that has to publish. The development process used for the final workflow is done without the use of a resource intensive IDE keeping in mind the major aim of the proposed model is to reduce the dependency on resource intensive software and services. The proposed model is built solely on open source platforms which are in tandem with second stipulation of proposed model is promoting community-based development. The proposed system provides the better execution time and retrieval time. The execution time is compared with similar system, open source Geographical system provide less execution time. The retrieval time is also reduced this indicated Quality of Service is increased. BEIESP. -
Equitable and inclusive online learning: A framework for supporting students with disabilities
Online learning has become a widely adopted mode of education, particularly during the COVID-19 pandemic. In general, individuals with disabilities face challenges when using non-technology components for studying. This chapter proposes a framework for equitable and inclusive online learning practices that support students with disabilities. The framework is based on a review of current research and best practices for online learning and disability accommodations. The framework emphasizes a collaborative, student-centered approach to online learning that acknowledges the unique needs and experiences of students with disabilities. Depending on the disabilities, the framework is divided into two phases namely: Prevalent Learning, and Discrete Learning. The former comprised components: Accessibility, Accommodation, and Engagement, and later has components like Methodology, Evaluation. The framework proposed provides a roadmap for addressing the challenges faced by students with disabilities in online learning environments. 2023 by IGI Global. All rights reserved. -
Deep Learning Algorithms Comparison forMultiple Biological Sequences Alignment
In this paper, deep learning algorithms are compared for aligning multiple biological molecular sequences such as DNA, RNA, and protein. Efficient algorithms are necessary for sequence alignment to identify significant insights, but there is a trade-off between time and accuracy. This study compares deep learning algorithms for multiple sequence alignment with better accuracy, using a new similarity measure to choose the best resemblance sequences in a set. Using a benchmark dataset, the algorithms compared include CNN, VAE, MLPNN, DBNs, Deep Boltzmann Machine, and GAN. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Securing her digital footprint: AI for women's safety
This chapter emphasizes the importance of artificial intelligence (AI) tools, analysis about the existing AI tools, and recommendations for future AI tools for women's safety. AI is experiencing significant growth and influence in the current era. Several key trends and developments highlight the role of AI in various domains: AI is being used for medical diagnosis, drug discovery, and patient care. Machine learning models are helping doctors analyse medical images, predict disease outcomes, and personalize treatment plans. Self-driving cars and drones are utilizing AI algorithms for navigation, obstacle detection, and decision-making. These technologies are advancing transportation and logistics. Natural language processing models like GPT-3 are transforming language-related tasks, from chatbots and virtual assistants to content generation, translation, and sentiment analysis. This chapter highlights the AI tools that exist for women's safety in the digital world and future apps needs for the same. 2024, IGI Global. All rights reserved. -
Differential Laccase Production among Diverse Fungal Endophytes in Aquatic Plants of Hulimavu Lake in Bangalore, India
The ability of plants to acclimatise and thrive in stressed environments can be attributed, in part, to the reserve of endophytic fungi that they harbour, that help enhance physiological and immunological defence and tolerance to various biotic and abiotic stressors. The present work has focussed on screening laccase producing endophytic fungi residing in different aquatic plants isolated from Hulimavu Lake, Bengaluru. This lake is well known for its water pollution contributed by anthropogenic factors. Survival of plants in this lake can hence be associated with their rich repertoire of endophytic fungi that enhance host plant defence towards stressors. Upon isolation and culturing of endophytic fungi, qualitative laccase detection using laccase specific growth media and quantitative laccase estimation using ABTS (2,2-azino-bis(3-ethylbenzothiazoline-6-sulfonic acid)) substrate were performed. Differential production rates were observed for the laccase enzyme by different endophytic fungi; production rates also varied between fungi isolated from different parts like node, stem, root and leaf of the same plant species too. Phylogenetic analysis of fungal isolates with highest laccase production was performed and the species was found to be Cladosporium tenuissimum. Even the crude extract of this strain displayed laccase production of 42.16U/L, as revealed by ABTS assay. Hence this strain is a promising candidate for optimization studies for utilisation in the domain of bioremediation and industrial applications. The Author(s) 2023. -
Bioprospecting of Fungal Endophytes in Hulimavu Lake for Their Repertoire of Bioactive Compounds
Fungal endophytes hold a prominent position in the research world, in part due to the rich repertoire of bioactive compounds useful for industrial and environmental applications. The present study aims at bioprospecting few endophytic fungi isolated from Hulimavu lake flora (Bengaluru) for characterization of biological applications of their bioactive compounds. Among the lake plants screened, Alternanthera philoxeroides, Ricinus communis and Persicaria glabra were taken forward for isolation of fungal endophytes. Subsequent biochemical analyses were performed to quantify few fungal enzymes and bioactive compounds, followed by antimicrobial and cytotoxic assays. In conclusion, this pilot study aims to probe the plethora of bioactive compounds present in fungal endophytes that possess wide ranging biological properties. Due to the species richness and diversity of fungal endophytes across different host plants and habitats, bioprospecting fungal endophytes remains a very extensive yet promising topic for research, representing broad ranging environmental and industrial applications. The Electrochemical Society -
Citrus for wellness: Exploring the bioactive properties of Citrus medica fruit peel with emphasis on its anticancer, antioxidant, antimicrobial and anthelmintic properties
Citrus medica (Citron) is an underutilised plant consisting of various bioactive elements with numerous medicinal benefits. The present study aimed to evaluate the bioactive properties, including anthelmintic, antimicrobial, antioxidant and anticancer activities, of chloroform extract obtained from the of fruit peel of C. medica. The different types of phytochemicals present in the chloroform extract were analysed using GC-MS. The major components detected included n-hexadecanoic acid, octadecanoic acid, t-tetradecenal, 1-nonadecene etc. Anthelmintic study was conducted using Eisenia fetida as a test organism, revealing a significant anthelmintic effect in the C. medica fruit peel extract compared to the standard drug. Antimicrobial properties were assessed against five test bacterial and fungal strains. Antibacterial tests showed zones of inhibition ranging from 8 to 11 mm, while no prominent zones of inhibition were observed in antifungal tests. The DPPH assay demonstrated significant antioxidant properties of Citron fruit peel extract compared to the standard ascorbic acid. The Chloroform extract of citron fruit peel exhibited significant cytotoxic properties against FaDu (human hypopharyngeal tumour) cell line. The present study indicates the potential of the chloroform extract of C. medica fruit peel to be employed as an anthelmintic, antibacterial, antioxidant and anticancer agent. Hence, it emphasises the prominence that can be given to the dietary consumption of citrus fruit peel in various forms, such as dried peel, powder etc. The Author(s). -
Performance investigation of PID controller in trajectory control of two-link robotic manipulator in medical robots
Robot-assisted surgical procedures have gained much coverage in recent years and favored over manually conducted operations. The medical robots are comprised of manipulators arm that is the multi-degree of freedom positioning devices with a highly non-linear nature to perform various surgical tasks. Due to non-linear effects, robots offer a severe challenge to the control system. Therefore, the control techniques are required for controlling the robots that should be fast enough to accommodate the rapid changes in the system parameters. In this article, the Proportional-Integral-Derivative (PID) controllers performance has been investigated in trajectory control of the Two-Link Robotic Manipulator (TLRM) for reliable functioning of these robots. Tracking error and Control input factors have been used to investigate the PID controllers robustness in trajectory control of TLRM. Eulers-lagrange approach has been used for dynamic analysis of TLRM. This work has been accomplished in the MATLAB/ Simulink environment. 2021 Taru Publications. -
Hotel Managers Perspective of Managerial Competency Among Graduating Students of Hotel Management Programme
Indian Streams Research Journal, Vol-4 (2), pp. 1-14. ISSN-2230-7850