Browse Items (11858 total)
Sort by:
-
Crowd Monitoring System Using Facial Recognition
The World Health Organization (WHO) suggests social isolation as a remedy to lessen the transmission of COVID-19 in public areas. Most countries and national health authorities have established the 2-m physical distance as a required safety measure in shopping malls, schools, and other covered locations. In this study, we use standard CCTV security cameras to create an automated system for people detecting crowds in indoor and outdoor settings. Popular computer vision algorithms and the CNN model are implemented to build up the system and a comparative study is performed with algorithms like Support Vector Machine and KNN algorithm. The created model is a general and precise people tracking and identifying the solution that may be used in a wide range of other study areas where the focus is on person detection, including autonomous cars, anomaly detection, crowd analysis, and manymore. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Crowdsourcing in Higher Education: Theory and Best Practices
The widespread use of crowdsourcing strategies in higher education institutions improves the performance of students by using collective initiatives to enhance the skills of each student, efficiently optimizes the lecturing process by exchanging and pooling research materials, and also improves the financial situation of alumni by encouraging crowdfunding of tuition. We identify four main areas in this study where the use of crowdsourcing strategies plays an important role in the success of alumni in institutions of higher education. The proposed crowd teaching approach optimizes lecturing, allowing lecture notes to be shared and exchanged according to the various curricula of Higher Education Studies. With crowd learning, students learn by execution on collaborative projects in which different students share (effectively) teaching each other under the guidance of the lecturer, learn the necessary skills to achieve the projects goals and solve the proposed issue. In relation to accessing funding, the tuition fees of students can be financed by crowdsourcing approaches through crowd tuition and even crowdfunding can be used to procure laboratory and classroom content or the learning stays of students abroad. Using this crowdsourcing tool, students can find assistance in paying university taxes and also have an interest in further learning with other students. The application of crowdsourcing to education allows for optimization of the institutions budget and a more effective use of learning time, leading eventually to better outcomes for students. 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Crown shaped broadband monopole fractal antenna for 4G wireless applications
This paper proposes a novel crown shaped fractal antenna design suitable for 4G wireless applications. One of the promising approaches in miniaturizing the antenna size is to use the fractal geometries. Several efforts have been made by various investigators around the globe to amalgamate benefits of fractal structures with electromagnetic concepts and applications. This paper outlines a new approach in designing broadband monopole 2.1 GHz fractal antenna. The design starts with square patch antenna and goes up to third iteration for obtaining better performance and impedance matching. The proposed antenna was designed and simulated using the HFSS EM simulator. Performance analysis of the antenna was done with characteristics such as return loss, VSWR, efficiency and radiation pattern found to be good at 2.1 GHz. Wireless application demands miniaturization in system as well as antenna size with better performance, hence attempts have been made to reduce the size and improve the gain, efficiency and bandwidth of the proposed antenna. 2017 IEEE. -
Crude oil prediction using a hybrid radial basis function network
In the recent years, the crude oil is one of the most important commodities worldwide. This paper discusses the prediction of crude oil using artificial neural networks techniques. The research data used in this study is from 1st Jan 2000- 31st April 2014. Normally, Crude oil is related with other commodities. Hence, in this study, the commodities like historical datas of gold prices, Standard & Poors 500 stock index (S & P 500) index and foreign exchange rate are considered as inputs for the network. A radial basis function is better than the back propagation network in terms of classification and learning speed. When creating a radial basis functions, the factors like number of radial basis neurons, radial layers spread constant are taken into an account. The spread constant is determined using a bio inspired particle swarm optimization algorithm. A hybrid Radial Basis Function is proposed for forecasting the crude oil prices. The accuracy measures like Mean Square Error, Mean Absolute Error, Sum Square Error and Root Mean Square Error are used to access the performance. From the results, it is clear that hybrid radial basis function outperforms the other models. 2005 - 2015 JATIT & LLS. All rights reserved. -
Crumpled and porous graphene for supercapacitor applications: a short review
Research on Graphene and its importance in the field of energy conversion and storage devices such as fuel cells, batteries, supercapacitors and solar cells has gained momentum recently. It is studied to be the most suitable electrode material for enhanced performance of supercapacitors in terms of chargedischarge cycles, specific capacitance, high power and energy densities and so on, specifically due to its high conductivity and large theoretical surface area. Unfortunately, it posits lot of challenges due to its irreversible stacking between the individual sheets resulting in the decrease in the Specific Surface Area (SSA) compared to the theoretically reported values. Numerous studies have been carried out to prevent this stacking in order to increase the surface area, thereby being a more suitable material for the manufacture of electrodes for supercapacitors as its capacitance greatly depends on the electrode material. To solve this problem, the conversion of two-dimensional graphene sheets to three-dimensional crumpled graphene structure has been verified to be the most effective approach. The study of crumpled graphene has been one of the recent trends in the field of energy storage applications in consumer electronics and hybrid vehicles as the process of crumpling can be controlled to suit the prospective device applications. 2021, Korean Carbon Society. -
Crux role of neurocomputing in teaching learning pedagogy
The advent of brain-based learning in the early 1990s has limelighted the syndication between the educational learning process and neurosciences. Through educational learning ability, an individual can gather and assimilate anecdotes or come up with new notions with logical conclusions to form an organizational memory. Supreme level of knowledge assimilation ability results in developing new crucial knowledge for strategic renewal for the betterment of the learning process. Earlier efforts to link neuroscience and learning mode were controversial. However, continuous researches imply the significant role of neurosciences in the field of education and its deep-rooted involvement in building reformed educational pedagogy related to curriculum and general teaching-learning practices. Educational neurosciences help in interpreting brain-behaviour intricacy to provide latest teaching-learning strategies. Education is the most robust cognitive skill developer, and it must be provided to all irrespective of age and gender as it makes the person flexible and provides strength to cope with the adversities. Through this report, we would like to covey the deep association between the teaching-learning process with neurological sciences along with providing measures to be taken for holistic development in the educational setups. Learning is a by-product of human behaviour towards the external environment. Recent advanced tools of neuroimaging aid in more in-depth insight linked to adaptive neural mechanics, knowledge attainment, new skill acquisition and building neuroscience network for human learning. The neuroscience research shows intricacy between emotions and cognition as mediators between mind and body that are then followed by the social behaviour and learning, by indulging in subjective interpretations of person's goals, feelings, actions and experiences, ultimately resulting in learning new theories through neurobiological shreds of evidence. The Author(s), under exclusive license to Springer Nature Switzerland AG 2021. All rights reserved. -
Cryogenian magmatism and crustal reworking in the Southern Granulite Terrane, India
Understanding Neoproterozoic crustal evolution is fundamental to reconstructing the Gondwana supercontinent, which was assembled at this time. Here we report evidence of Cryogenian crustal reworking in the Madurai Block of the Southern Granulite Terrane of India. The study focuses on a garnet-bearing granite-charnockite suite, where the granite shows in situ dehydration into patches and veins of incipient charnockite along the contact with charnockite. The granite also carries dismembered layers of Mg-Al-rich granulite. Micro-textural evidence for dehydration of granite in the presence of CO2-rich fluids includes the formation of orthopyroxene by the breakdown of biotite, neoblastic zircon growth in the dehydration zone, at around 870C and 8 kbar. The zircon U-Pb ages suggest formation of the granite, charnockite, and incipient charnockite at 836 73, 831 31, and 772 49 Ma, respectively. Negative zircon ?Hf (t) (-5 to -20) values suggest that these rocks were derived from a reworked Palaeoproterozoic crustal source. Zircon grains in the Mg-Al-rich granulite record a spectrum of ages from ca. 2300 to ca. 500 Ma, suggesting multiple provenances ranging from Palaeoproterozoic to mid-Neoproterozoic, with neoblastic zircon growth during high-temperature metamorphism in the Cambrian. We propose that the garnet-bearing granite and charnockite reflect the crustal reworking of aluminous crustal material indicated by the presence of biotite + quartz + aluminosilicate inclusions in the garnet within the granite. This crustal source can be the Mg-Al-rich layers carried by the granite itself, which later experienced high-temperature regional metamorphism at ca. 550 Ma. Our model also envisages that the CO2 which dehydrated the garnet-bearing granite generating incipient charnockite was sourced from the proximal massive charnockite through advection. These Cryogenian crustal reworking events are related to prolonged tectonic activities prior to the final assembly of the Gondwana supercontinent. 2015 Taylor & Francis. -
Cryptic species and taxonomic troubles: A rebuttal of the systematic treatment of the Asian ladies' tresses orchids (Spiranthes species; Orchidaceae) by Pace et al. (2019)
In a recent research article by Pace et al. (2019), the authors claimed to have used information from phenology, morphology and molecular phylogenetics in their nomenclatural review of the Spiranthes sinensis complex. However, there are several scientific and botanical nomenclature issues with the Pace et al. (2019) paper in addition to its many errors and misinformation, which can be severely misleading and have the potential to affect our understanding of the highly complex Asian Spiranthes group. Here, we compare and critique their study in light of our study published prior to the article in the Botanical Journal of the Linnean Society. We suggest that the authors should have resorted to improved and new molecular data and a truly integrative analysis to support: (1) re-circumscription of the S. sinensis species complex for each of the six species they recognized, and the treatment of S. hongkongensis as a hybrid; and (2) all the new synonymies they proposed for Asian Spiranthes. 2020 The Linnean Society of London, Botanical Journal of the Linnean Society, 2020, 194, 375-381 -
Cryptocurrencies: An Epitome of Technological Populism
From a global perspective, which holds significant cryptocurrencies, this study discusses the volatility and spillover effect between the whales cryptocurrencies. Volatility in cryptocurrency markets has always been a time-varying concept that changes over time. As opposed to the stock market, which has historically and recently, the cryptocurrency market is much more volatile. The markets have evidenced many fluctuations in the prices of cryptos. As a result, countries are transforming their policies to suit financial technologies in their economic practices. Blockchain technology allows people to obtain more benefits in a financial transaction and breaks hurdles in the financial system. The study has found no ARCH effect in BinanceCoin, BT Cash, Bitcoin, Vechain, and Zcash. It is discovered that there is an ARCH effect in the case of Ethereum, Tether, Tezos, and XRP. Whale cryptocurrencies have an ARCH effect. Daily closing prices of ten cryptocurrencies, including bitcoin, from January 1, 2019, to December 31, 2020, to determine the price volatility where the bitcoin whales hold significant cryptocurrency values. It has given significant results in case of volatility since we also found that Bitcoin's largest cryptocurrencies among the sample taken for the study have less volatility than other currencies. 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Cryptocurrency Market Anomaly: The Day-of-the-Week-Effect
Cryptocurrency has emerged as a fad amongst investors, academicians and policy-makers as a financial asset, making it important to empirically test the price behaviour of this emerging market. This paper is designed to investigate the presence of a well-known day-of-the-week effect in the young and emerging cryptocurrency market returns from August 2015 to March 2019. Using varied statistical techniques, this anomaly is examined for six cryptocurrencies (Bitcoin, Ethereum, Ripple, Litecoin, Stellar and Tether). The study applies both parametric and non-parametric statistical tests, i.e.,Bar Graph, Heat map, Students t-test, Analysis of Variance (ANOVA),regression analysis with dummy variables and the Kruskal Wallis Test. The studys findings show that no sample cryptocurrency returns exhibit the day-of-the-week effect phenomenon.The statistically insignificant result of the day-of-the-week effect in thecryptocurrency returns showcases the evidence of market efficiency in the cryptocurrency market. Indian Institute of Finance. -
Cryptocurrency Security and Privacy Issues: A Research Perspective
Cryptocurrency has developed as a new mode of money exchange since it has become easier, faster and safer. The first cryptocurrency was introduced in 2009 and since then, the growth rate of cryptocurrency has been increasing drastically. As of 2020, the cryptocurrency exchange all over the world has exceeded 300%. The researchers face many challenges during their research on the various cryptocurrencies. For example, most of the high-tech companies still do not support bitcoin on mobile platforms. High-tech companies like Google and Apple are also thinking into banning the bitcoin wallet from their app stores. The work provides a review of cryptocurrency and its types, scope on the investment plans and its advantages also discussed. The growth and comparison between bitcoins and gold is also discussed. The challenges researchers face and the security issues concerning it. This review provides an overview of how the different forms of cryptocurrency are increasing from over a decade. It explains the different types and the year in which they were invented. It also gives a brief comparison with respect to bitcoin, which is one of the most used cryptocurrency. Furthermore, it gives a brief explanation on investments, and schemes for those who are new in the cryptomarket. Later emphasizes on the security issues faced by this technology. It talks about proof of work and the different data attacks the software faced and how the issues were overcome. In the end, it talks about the challenges researchers face while researching cryptocurrency. 2021 IEEE. -
Cryptographic key distribution using artificial intelligence for data security and location privacy in VANET
Location privacy & data security in VANET are now becoming most important in todays paradigm of information age. Unauthorized access to location information of vehicles may pose a significant security threat, thus it is necessary to secure this information from intruders. In proposed work, Artificial intelligence based RF range approximation is used with multi key controlled cryptography for enhancement of location privacy and data security in service location protocol of VANETS. 2022 Taru Publications. -
Cryptographic Protocols for Securing Internet of Things (IoT)
Cryptographic protocols are used to relax the ever-developing quantity of linked gadgets that make up the net of things (IoT). Those cryptographic protocols have been designed to make certain that IoT tool traffic stays cozy and personal, even while nevertheless allowing tool-to-device and cloud-to-tool communications. Examples of these protocols consist of TLS/SSL, PGP/GPG, IPsec, SSL VPN, and AES encryption. Every one of these protocols enables authentication, message integrity, and confidentiality via encryption and key trade. Moreover, a lot of these protocols are carried out in the form of diverse hardware and software answers, such as smart playing cards and gateways, to make certain that IoT traffic is secured. With the appropriate implementation of those cryptographic protocols, establishments can ensure that their IoT facts are blanketed and securely transmitted. 2024 IEEE. -
Cryptography: Advances in Secure Communication and Data Protection
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the threats posed by bad actors. This abstract examines the evolution of secure communication protocols and data protection techniques as it relates to the advancements in cryptography. The development of post-quantum cryptography is the most notable development in cryptography discussed in this study. As quantum computers become more powerful, they pose a serious threat to traditional cryptographic algorithms, such as RSA and ECC. Designing algorithms that are immune to attacks from quantum computers is the goal of post-quantum cryptography. Lattice-based, code-based, and multivariate-based cryptography are only a few of the methods that have been investigated in this context. 2023 EDP Sciences. All rights reserved. -
Crystal and Molecular Structure of 1,1-Bis(methylthio)-5-(4-chlorophenyl)-1,4-pentadien-3-one
Journal of Crystallography, pp. 2014. -
Crystal shape engineering and studies on the performance of vapour deposited InSe platelets
The influence of growth conditions on the morphology of stoichiometric indium monoselenide (InSe) crystals has been explored. Crystalline habits such as microfibres, needles, platelets and spherulites were obtained from physical vapour deposition by optimizing supersaturation, which sturdily depends on the temperature difference between charge (TC) and substrate (TS) zones ?T, (= TC ? TS). Morphology and growth mechanism were investigated with the aid of scanning electron microscopy and high-resolution transmission electron microscopy, which justified the layer by layer addition of atoms as per the KosselStranskiVolmer model. Thermogravimetric measurements revealed the stability of InSe, confirming its melting point, M.P. = 611C, which reflects the formation of monophase. The mobility and carrier concentration calculated from the Hall effect experiment are found to be 11.14cm2V?1s?1 and 1.52 1020cm?3 respectively. Furthermore, optical characterizations such as UVVisNIR and photoluminescence spectrometric analysis established the value of band gap as 1.45eV, manifesting the versatility of the grown semiconducting platelets for photovoltaic applications. 2018, Springer Science+Business Media, LLC, part of Springer Nature. -
Crystal structure of 1,7-bis(4-chlorophenyl)-4-(1,3-dithiolan-2-ylidene)-1, 6-heptadiene-3,5-dione
The synthesis and crystal structure of 1,7-bis(4-chlorophenyl)-4-(1,3- dithiolan-2-ylidene)-1,6-heptadiene-3,5-dione is described. This compound is a curcuminoid analogue, configurationally symmetric about the C4-C5 atoms and also retains the two fold axis in the crystal phase. This compound crystallizes in the space group C2/c with unit cell parameters a = 19.203(1) b = 13.147(1) c = 8.801(1) ? = 112.99(1), with half a molecule in the asymmetric unit. The ketenedithioacetal functionality present between the carbonyl groups prevents the possibility of keto-enol tautomerization in this compound. The push-pull nature of the ketenedithioacetal functionality organizes the cinnamoyl groups parallel to each other. 2008 Springer Science+Business Media, LLC. -
Crystal structure of 4-{(E)-[2-(pyridin-4-ylcarbonyl)hydrazin-1-ylidene]methyl}-phenyl acetate monohydrate
The asymmetric unit of the title compound, C15H13N3O3H2O, comprises a 4-{(E)-[2-(pyridin-4-ylcarbonyl)hydrazinyl-idene]methyl}phenyl acetate molecule and a solvent water molecule linked by O - H?O and O - H?N hydrogen bonds from the water molecule and a C - H?O contact from the organic molecule. The compound adopts an E conformation with respect to the azomethine bond and the dihedral angle between the pyridine and benzene rings is 21.90 (7). The azomethine bond [1.275 (2) distance is very close to the formal C=N bond length, which confirms the azomethine bond formation. An extensive set of O - H?O, O - H?N, N - H?O and C - H?O hydrogen bonds builds a two-dimensional network progressing along the c axis. -
Crystal structures of 1,7-bis(furyl)-4-(1,3-dithiolan-2-ylidene)-1, 6-heptadiene-3,5-dione and 1,7-bis(thienyl)-4-(1,3-dithiolan- 2-ylidene)-1,6-heptadiene-3,5-dione
The title compounds (bis(alkenoyl) ketene dithioacetals) were prepared starting from the cyclic acyl ketene dithioacetal and aromatic aldehydes. These compounds were characterized by IR, 1H NMR, mass spectral studies and X-ray crystal structure analysis. The bis(furyl) ketene dithioacetal crystallized in the space group P1? with unit cell dimensions a = 7.7626(12) , b = 9.0217(13) , c = 26.827(5) , ? = 86.271(14), ? = 87.643(14), ? = 66.286(11) and the structure was refined to an R-factor of 0.0528 while bis(thienyl) ketene dithioacetal crystallized in the space group P21/c with unit cell dimensions a = 10.2433(9) , b = 10.4142(6) , c = 18.0973(18) , ? = 106.0 and the structure was refined to an R-factor of 0.0446. The ketenedithioacetal functionality present between the carbonyl groups prevents the possibility of keto-enol tautomerization in these compounds. In both the crystal structures, the crystal packing is stabilized by C-H?O hydrogen bonds as well as van der Waals interactions. Springer Science+Business Media, LLC 2011.

