Browse Items (9795 total)
Sort by:
-
AN IOT-BASED COMPUTATIONAL INTELLIGENCE MODEL TO PERFORM GENE ANALYTICS IN PATERNITY TESTING AND COMPARISON FOR HEALTH 4.0
Parental comparison and parenthood testing are essential in various legal and medical scenarios. The accuracy and reliability of these tests heavily rely on the gene analysis algorithms used. However, analyzing the quality of succession data are quite challenging due to the presence of detrimental characteristics. To address this issue, we propose using machine learning-based algorithms such as clustering (Correlation-based) and Classification (Modified Naive Bayesian) to separate these characteristics from the parent-child gene array. This progression helps to identify, validate, and select tools, techniques for scrutinizing indecent sequences, leading to accurate and reliable results. In this paper, we present an IoT-based intelligence tool for parental comparison that uses a secure gene analysis algorithm. The model employs multiple sensors and devices to collect genetic data, which is then securely processed and analyzed using contemporary algorithms. The suggested model uses advanced techniques such as encryption and decryption to ensure the privacy and confidentiality of the genetic information. Our experimental consequences reveal that the proposed model is reliable, secure, and provides accurate results. The model has the potential to be used in various legal and medical contexts where the security and reliability of genetic data are critical. 2023 Little Lion Scientific. -
Optimized task group aggregation-based overflow handling on fog computing environment using neural computing
It is a non-deterministic challenge on a fog computing network to schedule resources or jobs in a manner that increases device efficacy and throughput, diminishes reply period, and maintains the system well-adjusted. Using Machine Learning as a component of neural computing, we developed an improved Task Group Aggregation (TGA) overflow handling system for fog computing environments. As a result of TGA usage in conjunction with an Artificial Neural Network (ANN), we may assess the models QoS characteristics to detect an overloaded server and then move the models data to virtual machines (VMs). Overloaded and underloaded virtual machines will be balanced according to parameters, such as CPU, memory, and bandwidth to control fog computing overflow concerns with the help of ANN and the machine learning concept. Additionally, the Artificial Bee Colony (ABC) algorithm, which is a neural computing system, is employed as an optimization technique to separate the services and users depending on their individual qualities. The response time and success rate were both enhanced using the newly proposed optimized ANN-based TGA algorithm. Compared to the present works minimal reaction time, the total improvement in average success rate is about 3.6189 percent, and Resource Scheduling Efficiency has improved by 3.9832 percent. In terms of virtual machine efficiency for resource scheduling, average success rate, average task completion success rate, and virtual machine response time are improved. The proposed TGA-based overflow handling on a fog computing domain enhances response time compared to the current approaches. Fog computing, for example, demonstrates how artificial intelligence-based systems can be made more efficient. 2021 by the authors. Licensee MDPI, Basel, Switzerland. -
Impact of boundary conditions on Rayleigh-Bard convection: stability, heat transfer and chaos
The paper compares the results of Rayleigh-Bard convection problem for rigid-rigid-isothermal, rigid-free-isothermal and free-free isothermal boundaries. A minimal Fourier-Galerkin expansion yields the generalized-Lorenz-model whose scaled version is reduced to the Stuart-Landau-model using the multiscale-method. Nusselt number is estimated for both steady and unsteady regimes. Regular, chaotic, and periodic natures of the solution are studied using the Hopf-Rayleigh-number and by means of a bifurcation diagram. The linear and weakly-nonlinear-analyses reveal that the onset of regular and chaotic motions in the case of rigid-free-isothermal boundaries happens later than that of free-free isothermal boundaries but earlier than rigid-rigid-isothermal boundaries. It is shown that the scaled-Lorenz-model possesses all the features of the classical-Lorenz-model. Beyond the value of the Hopf-Rayleigh-number, we observe chaotic-motion between two consecutive spells of periodic motion. It is found that one can also have a window of periodicity for all three boundaries. 2024 Informa UK Limited, trading as Taylor & Francis Group. -
RayleighBard magnetoconvection with asymmetric boundary condition and comparison of results with those of symmetric boundary condition
The paper concerns two RayleighBard magnetoconvection problems, one in a mono-nanofluid (H2OCu) and the other in a hybrid nanofluid (H2OCuAl2O3) bounded by asymmetric boundaries. A minimal FourierGalerkin expansion is used to obtain the generalized Lorenz model (GLM) which is then reduced to an analytically solvable GinzburgLandau equation using the multiscale method. The results of asymmetric boundaries are extracted by using the Chandrasekhar function with appropriate scaling of the Rayleigh number and the wave number. The solution of the steady-state version of the GLM is used to estimate the Nusselt number analytically, and the unsteady version is solved numerically to estimate the time-dependent Nusselt number and also to study regular, chaotic, and periodic convection. Streamlines are plotted and analyzed in both steady and unsteady states. The analytical expression for the HopfRayleigh number, rH , coincides with the value predicted using the bifurcation diagram. This number determines the onset of chaos. For r?> rH , one observes chaotic motion with spells of periodic motion in between. For r?< rH , one sees non-chaotic motion (regular motion). It is found that by increasing the strength of the magnetic field, we can prolong the existence of regular motion by suppressing the manifestation of chaos. The Lorenz attractor is a signature of chaos since it is found that the attractor appears only for r?> rH . The magnitude of the influence of the asymmetric boundary on rH is between those of the two symmetric boundary conditions with the freefree isothermal boundary being the one that most favors chaotic motion: A result also seen in the context of regular convection. 2023, Akadiai Kiad Budapest, Hungary. -
Trigonometric Cosine, Square, Sawtooth and Triangular Waveforms of Internal Heating Modulations for Three-Component Convection in a Couple Stress Liquid: A Detailed Analysis
In this paper, the main focus is to study the effect of internal heating modulations of sinusoidal and non-sinusoidal waveforms on a three-component convection in a couple stress liquid. This three-component layer is heated from below and salted with two solutes at the bottom. In order to facilitate a solution to the problem, linear case is formulated using the Venezian approach for modulations while the non-linear case is modeled using 7-mode generalized Lorenz equations. With the aim of quantifying the heat and mass transfer, average Nusselt and average Sherwood numbers are computed. The investigation reveals that, internal heating modulations show a stabilizing or destabilizing trend that precisely depends on the modulated frequency and appropriate waveforms. The effect of heat source and sink is recorded on different convection processes. The effect of the pertinent parameters and waveforms on the stability of the system and on heat and mass transfer have been captured via graphs. The results confirm that the heat and mass transfer escalates to its maximum due to the square waveform. In this research paper, six problems involving three types of convection in two different liquids are solved as limiting cases of the problem. 2022, The Author(s), under exclusive licence to Springer Nature India Private Limited. -
Digital transactional tools and their optimum use in language learning: An interdisciplinary approach /
IOSR Journal of Humanities and Social Science, Vol.19, Issue 11, pp.230-233, ISSN No: 2279-0845. -
MOOCs: A disruptive teaching-learning process in interdisciplinary boundaries /
International Journal of Language & linguistics, Vol.1, Issue 2, pp.54-61, ISSN No: 2374-8869. -
Challenges and Solutions of Using Social Internet of Things (SIoT) in Healthcare and Medical Domains
The revolutionary idea that combines social networks with the Internet of Things (IoT) is called the Social Internet of Things (SIoT). SIoT is a term that refers to the modelling of social networks formed by connecting people and things. SIoT was designed to assist organizations in achieving specific goals, such as boosting usability, scalability, and productivity and satisfying business service requirements. The application layer of the SIoT model performs several tasks like managing the relationship, discovering the services, configuring services, and managing reliability among the devices. The information collected about SIoT is categorized by identifying the relationships between devices. SIoT creates an event identity based on data from IoT applications. This identity may then be transferred with the SIoT network and made available to other IoT apps. Thus, the SIoT network offers guidance services for reusing data from IoT applications across many IoT applications and customizing IoT solutions to meet the unique needs of individual users, hence boosting overall communication. SIoT technology entails the more efficient use of recent data to create favorable patient outcomes in healthcare and medicine. The enormous volume of data generated by SIoT-connected devices has allowed various developments and applications in the healthcare domain. SIoT leverages sensors and other connected devices in these domains to boost social solutions efficiency. Without question, sensors used for creating this kind of network model that can collect vast amounts of data are on the verge of becoming a pervasive part of our lives. If the processing and management are not carried out optimally in SIoT, there is a significant risk that the data will lose its efficacy. This chapter examines SIoT challenges and approaches in the healthcare and medical domain. SIoT approaches may assist users in detecting a patients aberrant behaviour. These approaches are capable of detecting and forecasting patients health states. The SIoTs relational models, such as community sharing, equality matching, and equality matching, also provide IoT services to users. The sensing layers functionalities are compared to those of the network layer and application when assessing SIoT services. The proposed hierarchical network model uses gateways, switches, and IoT devices to establish social relationships. CISCO packet tracer is used to construct and operate this mainly built social network for healthcare. This specially designed social network for the healthcare domain can easily be implemented and controlled by any hospital management. 2023 selection and editorial matter, Gururaj H L, Pramod H B, and Gowtham M; individual chapters, the contributors. -
CPAODV: Classifying and Assigning 3 Level Preference to the Nodes in VANET Using AODV Based CBAODV Algorithm
Vehicles communicate with nearby vehicles to share high routing and traffic information in Vehicular Ad hoc Networks (VANETs) environment. Congestion and Delay in the transmission may occur due to the density of the nodes in the network. Traffic condition depends on the vehicles in Rural and Urban environment. Increase or Decrease in vehicles speed makes significant network changes when compared to the MANET environment. Road Side Terminals (RSTs) plays a major role in bridging the connection between the sender and the receiver nodes. The traditional AODV algorithm performs better when there are shortest path and link lifetime between the nodes in VANET. Giving 3 Level Preference to the nodes as High Preference (HP), Average Preference (AP) and Less Preference (LP) gives chances to nodes that have High Preference when compared to Less Preference. CPAODV model is proposed by implementing Classifying and giving preference to the RREQ to mitigate latency to the nodes. RST sends RREQ wisely based on the early model of Route Discovery stage itself. NS2 Simulator is used to analyze the strength of the proposed algorithm using QoS metrics like Throughput, Packet Delivery Ratio and End to End delay. This proposed CPAODV method performs better when compared to traditional AODV and CBAODV algorithm. 2020, Springer Nature Switzerland AG. -
Internet of Things and Blockchain in Healthcare: Challenges and Solutions
The Internet of Things (IoT) enables Internet-connected devices to transmit data to private blockchain networks, allowing for the creation of tamper-resistant documents with shareable exchanges. IoT blockchain technology enables you to communicate and connect IoT data with key stakeholders, while avoiding the need for extensive management and control. Each transfer can be checked to ensure there are no disagreements and to build trust in the network. Blockchain technology protects data from being changed, restricts access to Internet-connected devices, and allows vulnerable IoT devices to be shut down. Blockchain encryption eliminates the possibility of someone overwriting existing data records. In addition, storing IoT data on the blockchain adds an extra layer of security, preventing malicious attackers from accessing the system. The many blockchain IoT firms provide significant value in revolutionizing company operations and daily routines. IoT blockchain firms demonstrate the possibility of blockchain and IoT integration. For instance, Helium is a successful blockchain IoT company specializing in securing Internet connections. This chapter presents the vital role of the Internet of Things and blockchain in the healthcare domain. The integration of blockchain technology in the healthcare industry has given us a chance to solve some problems with IoT networks. In recent years, the need for blockchain-enabled IoT transactions has become an essential technology that will change how users share data. A scenario has been developed to enhance this study to analyse the integration, need, and obstacles associated with blockchain-enabled IoT transactions in the healthcare area. As a result, there is also an IoT model designed using devices for hospitals that take into account all of these people and their needs and the office space where they work. The Author(s), under exclusive license to Springer Nature Switzerland AG. 2024. -
Exploring social networking data sets
A network is a collection of objects/devices that are linked to one another through wired and wireless communication. Networks are everywhere, and they are formed to share resources among users. Nodes and edges form a network structure. Nodes describe the objects, whereas edges represent the connections between them. Network analysis is advantageous in a wide variety of live application activities. It enables us to get a thorough knowledge of the structure of a connection in social networks, the structure or process of development in environmental events, and even the study of organisms' biological systems. Additionally, network analysis allows the estimation of complex network patterns, and the network structure may be examined to disclose the network's basic features. If anyone examines a social connection among Facebook users, for example, the nodes indicate the target people and the edges reflect the connections between users, such as friendships or group memberships. The objective of this chapter is to describe and visualize social network analysis (SNA) using Python and NetworkX, a Python framework for analyzing the structure, dynamics, and functions of complex networks. 2022 Scrivener Publishing LLC. All rights reserved. -
Signature based key exchange for securing data and user from web data stealing attacks
Due to the immense technological growth, web and its related applications are becoming a major part of everyday life. The growth of the internet and technology not only increases the positive benefits but also increases negative activities such as data theft. As web applications are used frequently for many online services, it is the most common and valuable target for the adversary to host any web vulnerabilities. Data theft or data stealing attacks are quite common in the web and the internet with severe consequences. The private data are generally stored on the system which gives an opportunity for the attacker to steal the data from the storage or during transit. However, apart from stealing the critical data from the user, the attacker also steals the sensitive data from the web applications. This type of attack takes several forms for stealing perilous information from the user and web application. Unfortunately, these attacks are easy to execute as the attacker needs only the internet connection, a web server and technical knowledge which are readily available. Several prevention strategies exist to thwart the user and the application from the web attacks, however, they do not provide the complete solution. This paper presents the signature based key exchange to prevent the user as well as the web application from several variations of data stealing attacks through mutual attestation. The experimental results show that the proposed method prevents the user and application from data theft than any other existing methods. BEIESP. -
Cognitive technology in human capital management: a decision analysis model in the banking sector during COVID-19 scenario
Cognitive technologies are products of the artificial intelligence (AI) domain which execute tasks that only humans used to perform. The impact of cognitive technologies on the management of human capital (HC) has a massive effect in the banking sector. This paper studies the transformation of cognitive technology to human capital management (HCM) in the banking sector during the COVID-19 pandemic. The study draws data from 201 bank employees working in private, public, and foreign banks using a multi-stage sampling method in India. A number of hypotheses were framed and tested using multivariate and regression analyses. The results from the study indicate a significant change in the performances of bank employees statistically during the transformation of cognitive technologies. Cognitive technologies such as payment, product customisation, self-services, workload alleviation, automated back-office function, and a personalised experience significantly contribute to the HCM. 2024 Inderscience Enterprises Ltd. -
Cryptocurrencies: An Epitome of Technological Populism
From a global perspective, which holds significant cryptocurrencies, this study discusses the volatility and spillover effect between the whales cryptocurrencies. Volatility in cryptocurrency markets has always been a time-varying concept that changes over time. As opposed to the stock market, which has historically and recently, the cryptocurrency market is much more volatile. The markets have evidenced many fluctuations in the prices of cryptos. As a result, countries are transforming their policies to suit financial technologies in their economic practices. Blockchain technology allows people to obtain more benefits in a financial transaction and breaks hurdles in the financial system. The study has found no ARCH effect in BinanceCoin, BT Cash, Bitcoin, Vechain, and Zcash. It is discovered that there is an ARCH effect in the case of Ethereum, Tether, Tezos, and XRP. Whale cryptocurrencies have an ARCH effect. Daily closing prices of ten cryptocurrencies, including bitcoin, from January 1, 2019, to December 31, 2020, to determine the price volatility where the bitcoin whales hold significant cryptocurrency values. It has given significant results in case of volatility since we also found that Bitcoin's largest cryptocurrencies among the sample taken for the study have less volatility than other currencies. 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Determinants of Loan Repayment Behaviour of Bank Borrowers - A Relative Study with evidence from Bengaluru
The present study aimed to review the various factorsthat influence the credit score and find the effect of credit score and other financial aspects of an individuals loan repayment and whether they had ever defaulted. Primary data was collected through a questionnaire from 516 customers of twelve different banks in Bengaluru city during July-August 2019 using a stratified sampling method. The results revealed that credit score, loan amount, and loan repayment amount did not affect the loan repayment behaviour of individuals. However, the type of loan obtained and the kind of bank the loan is received significantly influence individuals loan repayment behaviour. Home loans, education loans, other loans and the loan obtained from a foreign bank were particularly significant in affecting the loan repayment of individuals. The high beta value for other loans indicates that most individuals who have no other loans have defaulted in repaying their dues. Indian Institute of Finance. -
Big data, artificial intelligence, and machine learning support for e-learning frameworks
Today's e-rendering frameworks are essential in various fields such as computer graphics, virtual reality, and augmented reality to provide an effective and impressive education to modern society. The integration of big data, artificial intelligence (AI), and machine learning (ML) techniques into e-rendering frameworks hold significant potential for enhancing rendering efficiency, optimizing resource allocation, and improving the quality of rendered outputs. With the advent of big data, massive amounts of rendering-related data can be collected and analyzed. This data includes rendering parameters, scene descriptions, user preferences, and performance metrics. By applying data analytics, important information can be derived, allowing for more informed decision-making in rendering processes. Additionally, AI techniques, such as neural networks and deep learning, can be employed to learn from the collected data and generate more accurate rendering models and algorithms. 2024, IGI Global. All rights reserved. -
Future research directions for effective e-learning
In recent years, with the rapid advancement of technology and the global shift towards digital education, e-learning has gained significant momentum from education sectors. However, there are still several challenges and areas for improvement in the field of e-learning. This work discusses several future research directions that contribute to the effective implementation and enhancement of e-learning in solving real world problems. Also, various components like pedagogical strategies, technology integration, learner support and engagement, assessment and evaluation, accessibility and inclusivity, professional development for educators, quality assurance and accreditation, and ethical and legal issues are explained towards implementation of e-learning. Hence, this chapter explains the effectiveness, accessibility, and inclusivity of e-learning as providing effective educational opportunities for learners globally. 2024, IGI Global. All rights reserved. -
Effective HR practices in family business in technology disruption era
Today's world of 21st-century business is said to be a VUCA (Volatility-Uncertainty-Complexity-Ambiguity) world. VUCA describes the fast pace of change in the business environment. It has largely been led by the disruption brought about by technology-led human resources departments within organisations to revise strategy approaches and methods to face these emerging challenges. Research studies show that more than two-thirds of the companies in the world belong to family businesses. In the family business, the owners and HR should see what is going on in the business environment and update the situation. As most family businesses have family members in key positions, the tricky issues faced by family businesses are mostly about handling family and non-family members and creating effective HR policies. The COVID-19 pandemic in 2019 and 2020 has disrupted their business in unexpected ways. This chapter explores different HR practices adopted by the family business and suggests effective HR practices and procedures to meet the multiple challenges in the family business. The chapter also analyses the strategies of HR practices followed by some top family business firms worldwide. The chapter is formed as a meta-synthesis. It provides more qualitative inputs related to recent challenges and effective HR practices adopted in the technologically competitive era and during the COVID-19 pandemic period. 2022 World Scientific Publishing Co. Pte. Ltd. -
Blockchain: Opportunities in the healthcare sector and its uses in COVID-19
As the world grapples with the COVID-19 pandemic and major populations are getting vaccinated, increasing realization processes healthcare industry needs to be augmented. It includes managing supply chains, healthcare records, and patient care. With a scarcity of time and resources, adaptation of blockchain technology will help mitigate the pressures on existing infrastructure. A blockchain distributed ledger helps to exchange health information securely without complex intermediation of trust with secure access. The organizations and persons in the blockchain network can verify and authorize the data, thus protecting patient identity, privacy, medical information system, and reducing transaction costs. The chapter examines managing and protecting electronic medical records and personal health records data using blockchain. It also analyses issues in healthcare, blockchain implementation, and its uses in the COVID-19 pandemic. The authors put forward the idea that even after the world is free of the Coronavirus, there will be pressures on the healthcare industry and Blockchain technology is the way to alleviate this pressure. 2022 Elsevier Inc. All rights reserved. -
Role of Blockchain in the Healthcare Sector: Challenges, Opportunities and Its Uses in Covid-19 Pandemic
As the world grapples with the Covid-19 pandemic and major populations are getting vaccinated, increasing realisation processes healthcare industry needs to be augmented. It includes managing supply chains, healthcare records, and patient care. With a scarcity of time and resources, adaptation of blockchain technology will help mitigate the pressures on existing infrastructure. A blockchain distributed ledger helps to exchange health information securely without complex intermediation of trust with secure access. The organisations and persons in the blockchain network can verify and authorise the data, thus protecting patient identity, privacy, medical information system, and reducing transaction costs. The paper examines managing and protecting electronic medical records and personal health records data using blockchain. It also analyses issues in healthcare, blockchain implementation, and its uses in the Covid-19 pandemic. 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.