Browse Items (11810 total)
Sort by:
-
Acidified groundnut cake for enhanced bio adsorption of anionic textile dye Reactive Red 195
This study focuses on the improvement of bioremediation of textile dye Reactive Red 195 using agro-industrial waste, groundnut oil cake (GNOC) obtained after oil-pressing. The treatment of GNOC with 1 N H2SO4 had resulted in physiochemical changes on the insoluble porous adsorbent, which improved their adsorption efficiency. The dye removal efficiency increased from 55% to 94% on acidification of GNOC. The raw groundnut oil cake (RGNOC) and acid-treated groundnut oil cake (AGNOC) were characterized using Fourier-transform infrared spectroscopy (FTIR), scanning electron microscopy (SEM), X-ray diffraction, and zeta potential. The rate and efficiency of dye adsorption were examined using adsorption kinetics and isotherm models. The results confirm that acid-treated GNOC eliminates impurities, alter the surface functional groups, and significantly increase porous surface areas of RGNOC. The investigation of key factors such as contact time, initial concentration of dye, static/agitation impact, particle size, and adsorbent dose had significantly influenced adsorption capacity of GNOC. Adsorption of dye fits best into the Langmuir model and equilibrium data of dye on AGNOC was explained by psuedo-second-order reaction with maximum adsorption capacity of 12.65 mg/g. This emphasis AGNOC has a very excellent potential to remove the textile dye Reactive Red dye from industrial effluent. 2024 Taylor & Francis Group, LLC. -
Investigating Salt-Finger Convection Under Time-Dependent Gravity Modulation in Micropolar Liquids
This paper investigates how gravity modulation affects salt-finger convection in a micropolar liquid layer confined between two parallel, infinitely long plates separated by a thin gap. The system is heated and has solute added from above. The study uses linear stability analysis to examine when and how salt-finger convection, driven by the salt-finger process, begins. To analyze this, the partial differential equations governing the system are solved numerically using normal mode analysis. The Venezian approach is applied to find the critical Rayleigh number and the solutal Rayleigh number, which are key to understanding the onset of convection. Also, the paper explores how different micropolar fluid parameterssuch as the coupling parameter, micropolar heat conduction parameter, couple stress parameter, and inertia parameteraffect the system when gravity modulation is present. It is found that gravity modulation can either stabilize or destabilize convection, depending on its frequency. At very high frequencies (approaching infinity), the effect of gravity modulation becomes minimal, having little impact on the convection process. The paper also examines the relationship between the critical Rayleigh number and the solutal Rayleigh number, which are related to heat and solute concentration, respectively. 2024 Wiley Periodicals LLC. -
Synthesis methods of chitosan nanoparticles: A review
Biopolymeric nanoparticles are found to be very effective in potential applications in different fields, especially in biomedical field. Chitosan nanoparticles (CSNPs) are one of those kind of nanoparticle with great research potential owing to its nontoxicity, biodegradability, and high permeability. The extraction of chitosan biopolymer and the production of CSNPs are both vibrant research areas. Emulsification, complexing, phase inversion etc. are the conventional synthesis methods; new synthesis methods are being developed to overcome the disadvantages of traditional approaches. Here we provide a glimpse into the methodological and mechanistic underpinnings of the synthesis methods of CSNPs. This chapter provides a complete overview of the synthesis methods used for the production of CSNPs, their benefits, drawbacks, and obstacles, as well as their future prospects. 2025 Elsevier Ltd. All rights reserved. -
Electrochemical Hydrogenation of Organic Compounds: A Sustainable Approach
Conventional methods for hydrogenation of organic compounds generally use corrosive catalysts and reagents, along with extreme conditions like high temperatures and pressures. Quenching of corrosive materials does not deter its negative impact on the environment, nor is one safe when it comes to working with high temperature and pressure. Electrochemical hydrogenation (ECH) has proven to be safe and green since most of the efficient reactions are conducted at ambient pressure and temperature, minimizing, and sometimes even negating the use of toxic catalysts and corrosive reagents as compared to conventional methods. This review therefore provides different strategies used for ECH in the past, modification of different electrodes, half reactions taken up for efficient energy usage and catalysts used for different hydrogenation reactions. It presents the advances in electrochemical hydrogenation reactions of organic compounds, starting from simple aliphatic compounds to complex polyaromatics and heterocyclic aromatic compounds. 2023 Wiley-VCH GmbH. -
Ferrocenyl aniline modified electrode for the electrochemical synthesis of 2-(4-methoxyphenyl)-1H-benzo[d]imidazole
Ferrocenyl aniline is an excellent catalyst used conventionally for heterocyclic syntheses. The use of ferrocenyl aniline, in the presence of electropolymerized thiophene-3-acetic acid (TAA) on carbon fibre paper is novel and found to be an exceptional electrocatalyst, for the synthesis of a proven anti-fungal, anti-proliferative and anti-bacterial, 2-(4-methoxyphenyl)-1H-benzo[d]imidazole. The electrode performance was examined with activity studies and EIS, along with surface characterizations including optical profilometry, FE-SEM, FT-IR and XPS. The synthesis was performed in a single-cell three electrode system, using platinum as counter and saturated calomel electrode (SCE) as the reference, with ethanol as the electrolyte and lithium perchlorate supporting electrolyte. The reaction was performed with o-phenylenediamine and anisaldehyde as starting materials at ambient temperature and pressure, at 1.35 V constant potential for 3 h, and product was isolated and purified using column chromatography to obtain 91% yield and characterized with GCMS and NMR. This synthesis method is noteworthy, due to its environmentally friendly performance, and high yield for a benzimidazole derivative that is pharmacologically vital. 2024 -
BRICS: Advancing Cooperation and Strengthening Regionalism
In the era of regional international relations and more interdependence, organisations like the Brazil, Russia, India, China and South Africa (BRICS) can play a meaningful role in international level as well as regional in years to come. The recent summit of the BRICS reiterates that more cooperation is needed at various levels. In Delhi declaration, it is called for a more representative international financial architecture, with an increase in the voice and representation of developing countries and the establishment and improvement of a just international monetary system that can serve the interests of all countries and support the development of emerging and developing economies. Moreover, these economies having experienced broad-based growth are now significant contributors to global recovery. This is true. One must acknowledge the fact that the roles of the BRICS countries are composed of various political systems, various subcontinent, but in the changed context, all these countries are coming under the purview of the developing countries in broader terms. That makes the BRICS beyond the regional boundaries to set a benchmark in the regional cooperation. Chinas permanent status in the United Nations makes the BRICS more strategically oriented and pragmatic aspects of foreign policy engagement in the twenty-first century. The political leadership and vision is equally important with economic engagement. The four major theories of the international relations (IR) are striking in this respect which includes liberalism, realism, constructivism and Marxism. Theoretical framework relevant to regionalism in focusing on IR theories is also analysed in this article. The main argument of the article is that there is no prescribed regional model and BRICS has to tune to the member countries regional and political frameworks to engage with. Therefore, the framework of analysis is more or less critical about the Western engagement and it is region focused. 2012 Indian Council of World Affairs. -
A Study of Customer Discernment, on Organic Products in Sikkim
Asian Journal of Research in Business Economics and Management, Vol. 7, Issue 1, pp. 10-15, ISSN No. 2249-7307 -
A Critical Study in ADR Mechanism in India with Reference to Court Annexed Mediation in Family Disputes
Mediation has been in vogue in India since time immemorial. Sadly, it is yet to evolve into a major dispute resolution mechanism. Alternative dispute resolution (ADR) mechanisms like arbitration, mediation, conciliation, courtannexed ADR, and summary jury trial would help in resolving all types of disputes, including those of a civil, commercial, industrial and family nature. newlineGenerally, ADR mechanisms would use a neutral third party that help the parties to communicate, discuss their differences and resolve the dispute. With matrimonial dispute numbers rising and the significance attaching to matrimonial bond in our country, the researcher set out to examine the country s court-annexed mediation mechanism to ascertain how the flaws, if any, that obtain in the mechanism can be addressed. It should lead the researcher to recommend a strategy for a seamless and hassle-free implementation of the relevant regulatory provisions. The researcher embarked on descriptive research, employing the survey method, in the newlinecircumstances. She collected data from primary and secondary sources for the newlinepurpose. The ensure bias minimisation and accuracy of findings, she interviewed two categories of respondents, namely, litigants numbering 100 and mediators numbering 100. She used a 4-point Likert scale to elicit the newlinerespondents replies to the queries raised in the Interview Schedule. Since the two variables used in the study were categorical and nonordinal, she used the Chi-square test to examine the relationship. The researcher s analysis of the data led her to conclude that there obtains a certain degree of lack of clarity in terms of the enforceability of the outcomes of mediation. For example, in court-annexed mediation, a settlement reached newlineby the parties is not enforceable automatically. It is unfortunately assumed in newlineour country that mediation is resorted to by litigants who do not have a strong newlinecase. It is also assumed that the litigant that chooses mediation is the one that newlineblinks first. -
Implementation of multicloud strategies for healthcare organisations to avoid cloud sprawl
Healthcare organisations are being overwhelmed by data, devices and apps, and disjointed multiple cloud services. Well-heeled multicloud can provide a unified cloud model that provides greater control and scalability at reduced costs. Healthcare multicloud is turning into an appealing path for associations to manage the blast of advanced healthcare information in digital health, internet of things, associated gadgets and healthcare applications. As more human services associations grasp distributed computing, they are progressively going to a blend of open, private, and hybrid cloud administrations and foundation. In fact most of the healthcare service organisations plan to utilise different cloud vendors over the upcoming years. While having multiple cloud vendors can give organisations more flexibility and redundancy, managing multiple clouds can be a challenge. It can lead to cloud sprawl, unauthorised cloud use known as shadow IT, disjointed cloud solutions, inefficiencies, and waste. Copyright 2022 Inderscience Enterprises Ltd. -
Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm
The cloud computing is interlinked with recent and out-dated technology. The cloud data storage industry is earning billion and millions of money through this technology. The cloud remote server storage is on-demand technology. The cloud users are expecting higher quality in minimal cost. The quality of service is playing a vital role in any latest technology. The cloud user always depends on thirty party service providers. This service provider is facing higher competition. The customer is choosing a service based on two parameters one is security and another one is cost. The reason behind this is all our personal data is stored on some third party server. The customer is expecting higher security level. The service provider is choosing many techniques for data security, best one is encryption mechanism. This encryption method is having many algorithms. Then again one problem is raised, that is which algorithm is best for encryption. The prediction of algorithm is one of major task. Each and every algorithm is having unique advantage. The algorithm performance is varying depends on file type. The proposed method of this article is to solve this encryption algorithm selection problem by using tabu search concept. The proposed method is to ensure best encryption method to reducing the average encode and decode time in multimedia data. The local search scheduling concept is to schedule the encryption algorithm and store that data in local memory table. The quality of service is improved by using proposed scheduling technique. 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. -
Securing cloud data against cyber-attacks using hybrid aes with MHT algorithm
Cloud computing is dealing with large amount of data during data communication. This data processing is named as big data. The big data is growth of the demand in accessing the storage, computation and communication. This big data has the major defects. A raising issue in emerging big data is cost minimization. The architecture of big data ranges over multiple machines and cluster which have sub system. The major challenge of this big data is preprocessing and analysing the data patterns. This research article is dealing with different data pre-processing and secure data storage. There are many research challenges during this data process. The possible gap and drawbacks in the technology are identified through this survey and the efficient big data service is provided through MHT and AES algorithm. The main aim of this proposed method is to provide better data security during larger data process. The proposed hybrid MHT with AES algorithm is to minimize the encryption and decryption time apart from that it reduces the attacker ratio. All these parameters automatically increase the Quality of Service. Copyright Research Institute for Intelligent Computer Systems, 2020. All rights reserved. -
Parallel queue scheduling in Dynamic Cloud environment using Backfilling algorithm
Cloud Computing reshapes the entire computing paradigm. In general, cloud computing means outsourcing available services and data storage in centralized scenario. In cloud computing task allocation is a major problem because multiple numbers of tasks are allocated to multiple numbers of processors for simultaneous processing. From the given list, tasks are queued according to the ascending order based on their duration. This paper is designed to solve the Task Scheduling problem, by using our proposed effective new approach of Backfilling algorithm. Depending upon the task duration, tasks are split into multiple threads for processing. Multiple thread tasks are processed in the basic concept of "gang scheduling" technique. Here we implement new backfilling algorithm concept to minimize the idle processing time of the processors. The existing Simple Backfilling Algorithm (SBA) is used to minimize the ideal time processing. Whereas comparatively Dynamic Cloud Scheduling using Backfilling Algorithm (DCBA) is designed to reduce the ideal time processing than SBA to carry out the process of both LQueue and SQueue simultaneously. At the outset, DCBA reduces the average waiting time. As mentioned the algorithm which is specified in the previous line that contains three level which represent the working speed of the algorithm. The first and second level of DCBA algorithm is comparatively similar to the performance of SBA algorithm. The maximum better performance was given in a queue size (q=1.5) by DCBA algorithm as compare to SBA algorithm. The existing type (Gang Scheduling) consist of two approaches namely Adaptive First Come First Serve (AFCFS) and Largest Job First Served (LJFS) that focus on non-parallel jobs with deadline. When compare to existing gang scheduling algorithm and SBA algorithm the average waiting time of DCBA has slight improvement in the loader level of the key. As the separation of the queue like LQ and SQ the waiting time and average waiting time is reduced comparatively. 2018, Intelligent Network and Systems Society. -
Business transaction privacy and security issues in near field communication
The main objective of this chapter is to discuss various security threats and solution in business transactions. The basic working principle and theoretical background of near field communication (NFC) technology is discussed. A component of NFC communication section is to be discussed on various NFC operation modes and RFID tags. NFC technology is used in various fields such as electronic toll collection and e-payment collection for shopping. This device-to-device payment system is facing major security issues. This NFC communication data is transferred from one terminal to another terminal by using short-range radio frequency. Data hackers try to access this radio frequency and attack the business transaction. This hybrid encryption algorithm is used to solve business transaction data security issues. This chapter deals with both key encryption and data encryption processes. 2021, IGI Global. -
Threats and security issues in smart city devices
The main objective of this chapter is to discuss various security and privacy issues in smart cities. The development of smart cities involves both the private and public sectors. The theoretical background is also discussed in future growth of smart city devices. Thus, the literature survey part discusses different smart devices and their working principle is elaborated. Cyber security and internet security play a major role in smart cities. The primary solution of smart city security issues is to find some encryption methods. The symmetric and asymmetric encryption algorithm is analyzed and given some comparative statement. The final section discusses some possible ways to solve smart city security issues. This chapter showcases the security issues and solutions for smart city devices. 2022, IGI Global. -
Cloud Enabled Smart Firefighting Drone Using Internet of Things
Internet of Things is fasted booming sector. This technology is evolved in various fields. The frequent updates in concerning the progress of Skyscraper fire or high-rise fire it is essential for us to ensure effective and safe firefighting. Since high-rise fire is typically inaccessible by ground vehicles due to some constraints or parameters. Due to less advancement in technology most skyscrapers are not furnished with proper fire monitoring and prevention system. To solve this issue this article is propose Unmanned Air Vehicles (UAVs) are making an appearance and making promises to prevent such kind of incidents. In this system, UAV can be launched from the Fire Control Unit (FCU). The proposed methodology is implemented with the help of Internet of Things (IoT). Sensors which are installed at the skyscraper detects the presence of fire and immediately send stress signals to the command and control unit from where further possible action can be taken. The pilot at the fire control unit continuously monitors the flight path and receives the video and fire scan information from the UAV. Upon detection of a stress signal or fire signal the Skyscraper position is determined with the help of Global Positioning System (GPS) and permission is requested from the applicable security agency to launch the extinguisher vehicle. The permission is granted, the coordinates of the location are filled in the system and the nearest station sends the UAV to the location. The fire suppressant are deployed it comes back to the nearest landing location and re-loaded with another fire suppressant to be carried to the fire location. The proposed methodology should improve the Quality of Service. 2019 IEEE. -
Community based open source geographical classical data analysis
The traditional Geographical Information Systems (GIS) have to be migrated to the internet eventually much like every other software today. The article has explored ways of utilizing the Open Geospatial Consortium (OGC) standards to come up with ways of achieving a workflow for the development of a service-based implementation of a customized Web Processing Service (WPS). The proposed concept has explored multiple workflows using various combinations of the publishing and development options and the simplest and the least resource intensive one has been identified as the outcome of this project. The workflow identified was then split into two section to make it even more simplify and adaptable, aiding development from the WPS that has to publish. The development process used for the final workflow is done without the use of a resource intensive IDE keeping in mind the major aim of the proposed model is to reduce the dependency on resource intensive software and services. The proposed model is built solely on open source platforms which are in tandem with second stipulation of proposed model is promoting community-based development. The proposed system provides the better execution time and retrieval time. The execution time is compared with similar system, open source Geographical system provide less execution time. The retrieval time is also reduced this indicated Quality of Service is increased. BEIESP. -
Equitable and inclusive online learning: A framework for supporting students with disabilities
Online learning has become a widely adopted mode of education, particularly during the COVID-19 pandemic. In general, individuals with disabilities face challenges when using non-technology components for studying. This chapter proposes a framework for equitable and inclusive online learning practices that support students with disabilities. The framework is based on a review of current research and best practices for online learning and disability accommodations. The framework emphasizes a collaborative, student-centered approach to online learning that acknowledges the unique needs and experiences of students with disabilities. Depending on the disabilities, the framework is divided into two phases namely: Prevalent Learning, and Discrete Learning. The former comprised components: Accessibility, Accommodation, and Engagement, and later has components like Methodology, Evaluation. The framework proposed provides a roadmap for addressing the challenges faced by students with disabilities in online learning environments. 2023 by IGI Global. All rights reserved. -
Deep Learning Algorithms Comparison forMultiple Biological Sequences Alignment
In this paper, deep learning algorithms are compared for aligning multiple biological molecular sequences such as DNA, RNA, and protein. Efficient algorithms are necessary for sequence alignment to identify significant insights, but there is a trade-off between time and accuracy. This study compares deep learning algorithms for multiple sequence alignment with better accuracy, using a new similarity measure to choose the best resemblance sequences in a set. Using a benchmark dataset, the algorithms compared include CNN, VAE, MLPNN, DBNs, Deep Boltzmann Machine, and GAN. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Securing her digital footprint: AI for women's safety
This chapter emphasizes the importance of artificial intelligence (AI) tools, analysis about the existing AI tools, and recommendations for future AI tools for women's safety. AI is experiencing significant growth and influence in the current era. Several key trends and developments highlight the role of AI in various domains: AI is being used for medical diagnosis, drug discovery, and patient care. Machine learning models are helping doctors analyse medical images, predict disease outcomes, and personalize treatment plans. Self-driving cars and drones are utilizing AI algorithms for navigation, obstacle detection, and decision-making. These technologies are advancing transportation and logistics. Natural language processing models like GPT-3 are transforming language-related tasks, from chatbots and virtual assistants to content generation, translation, and sentiment analysis. This chapter highlights the AI tools that exist for women's safety in the digital world and future apps needs for the same. 2024, IGI Global. All rights reserved.