Browse Items (11810 total)
Sort by:
-
Silicon photonic modulators for high-speed applications-a review
[No abstract available] -
Role of Perceived Social Support and Sense of Coherence Towards Quality of Life Among People Seeking Treatment for Substance Use
A significant portion of individuals diagnosed with substance use disorder confront societal neglect and escalating stigma. This heightened pressure contributes to increased stress and the emergence of comorbid psychiatric conditions alongside their existing affliction. Considering it to be a significant untouched area, the current empirical research was undertaken to explore the role of psychological factors towards quality of life among people seeking treatment for substance use. To accomplish the proposed objectives a correlation design had been adopted and standardized psychological measures were administered on a sample of 100 participants who were registered under residential rehabilitation programs. The data was analyzed using SPSS statistical software and the findings revealed a significant positive correlation of perceived social support and a sense of coherence with quality of life, i.e., r = 0.72 (p <.001) and r = 0.68 (p <.001), respectively. Further, perceived social support and sense of coherence also emerged as predictors (R2 = 55%) of quality of life among people seeking treatment for substance use. Findings provide strong advocacy that people seeking treatment for substance use should be provided with social support which in turn helps them to hold a sense of coherence and ultimately both contributes to their overall quality of life. 2024 selection and editorial matter, Dr. Sundeep Katevarapu, Dr. Anand Pratap Singh, Dr. Priyanka Tiwari, Ms. Akriti Varshney, Ms. Priya Lanka, Ms. Aankur Pradhan, Dr. Neeraj Panwar, Dr. Kumud Sapru Wangnue; individual chapters, the contributors. -
Internet of Things-Based Smart Agriculture Advisory System
The Internet era provides a lot of automation tools for data analysis, and it is the need of the hour to develop new analytical tools to manage the big data. For task automation, machine learning and expert systems are of primary importance to study the behavior of computer thinking to involve computers in sensible work, known as computational intelligence. The data involves varied formats such as structured, unstructured, as well as semi-structured, and it is an automation tool that uses computational intelligence to extract valid and potential information from the sources. The specific purpose of this proposed work is to meet out computing demands which highly rely on computational intelligence. Computational intelligenceinvolves the design and deployment of an analytical tool for multidimensional data analytics. The proposed integrated framework focuses on multidimensional data analytics, for crop and plant data, especially plants that contain medicinal values and components. This research works main aim is to create a secured data tool for agriculture crop data management through big data (crops and plants) analytics. The data security is enhanced through applied cryptography, and the final phase prediction on crops is done by various machine and deep learning algorithms. The specific objective of this research work is to help farmers in making informed decisions for the enhancement of cultivation and information. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Digital platforms for business applications
[No abstract available] -
Sexual health and safety of adolescents with intellectual disability: Challenges and concerns among special educators in India
Sexual health education among adolescents with intellectual disabilities is an area of concern among parents and educators. Special educators play a vital role in teaching sexual health and safety to their students with disabilities. The present study explores special educators' concerns in teaching sexual health among adolescents with intellectual disabilities. The participants included 35 special educators working with adolescents with intellectual disabilities in India. Summative content analysis of the data collected using a semi-structured interview schedule highlights the neglect of the issues related to sexual health among adolescents with disabilities. Special educators reported the challenges in providing sexual health education. Teachers lacked skills in imparting sexual health education. Developmentally and culturally appropriate sexual health education can help adolescents with a disability learn healthy life skills. The paper emphasizes the need for professional support and training among special educators on sexual health education. The Author(s) 2022. -
Edge, IIoT with AI: Transforming industrial engineering and minimising security threat
[No abstract available] -
Deep Convolutional Neural Networks Network with Transfer Learning for Image-Based Malware Analysis
The complexity of classifying malware is high since it may take many forms and is constantly changing. With the help of transfer learning and easy access to massive data, neural networks may be able to easily manage this problem. This exploratory work aspires to swiftly and precisely classify malware shown as grayscale images into their various families. The VGG-16 model, which had already been trained, was used together with a learning algorithm, and the resulting accuracy was 88.40%. Additionally, the Inception-V3 algorithm for classifying malicious images into family members did significantly improve their unique approach when compared with the ResNet-50. The proposed model developed using a convolution neural network outperformed the others and correctly identified malware classification 94.7% of the time. Obtaining an F1-score of 0.93, our model outperformed the industry-standard VGG-16, ResNet-50, and Inception-V3. When VGG-16 was tuned incorrectly, however, it lost many of its parameters and performed poorly. Overall, the malware classification problem is eased by the approach of converting it to images and then classifying the generated images. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Distributed Maximum Power Point Tracking for Mismatched Modules of Photovoltaic Array
The multiple peaks in the output P-V characteristics of the photovoltaic (PV) module and the complete loss of shaded modules generation due to the existing bypass diode-based scheme are eliminated through the implementation of proven distributed maximum power point tracking (DMPPT). Considering the unique behavior of each PV Module, the artificial neural network is used in the DMPPT algorithm to track the MPP at every instant by learning the unique behavior of each PV module in this chapter. This eliminates the effect of manufacturing dispersion. Though the unique MPP is identified, the inability of the DMPPT algorithm in maintaining the PV modules in its own MPP is eliminated by the compensator circuits which are introduced in the array configuration along with the DMPPT in this chapter. These compensators enabled the maintenance of each PV module in its own MPP by providing the deficient current of each module and the deficient voltage of each string. So, this configuration increases the output power by including the generation of shaded modules instead of bypassing it. The results show that the proposed configuration avoids the multiple peak condition in P-V characteristics and improves the efficiency of the PV array under partially shaded conditions. 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Low cost ANN based MPPT for the mismatched PV modules
Due to manufacturing dispersal, the photovoltaic (PV) panels of similar rating and manufacturer have distinctive characteristics in practical. As the maximum power point tracking (MPPT) becomes essential to optimally utilize the solar PV panel, distributed maximum power point tracking (DMPPT) is considered in this paper to follow the MPP of each panel. As the common MPP value is used in the existing DMPPT method to control all the panels, it fails to consider the uniqueness of each panel. By considering the uniqueness of each panel, the ANN based MPPT is implemented in this paper. As the ANN is trained using the actual characteristics of each panel based on the operating current, voltage and temperature, it is able to track the actual MPP. Due to the solar irradiance free MPPT, the costly pyranometer is not required in the actual PV system for MPPT. It reduces the cost of the system and also provides the interruption free tracking due to its independent nature on Voc and Isc values. Also, because of the looping free behaviour of the proposed algorithm, it is capable of following the MPP at rapidly varying condition. The proposed technique and the verified outcomes are discussed here in detail. Published under licence by IOP Publishing Ltd. -
Does Cultural Intelligence & Emotional Intelligence Differ by Region in India? A Comparative Study; [??????????? ?? ?????????? ? ????????????? ?????????????? ? ???????? ?????? ????????????? ????????????]
Students from various parts of India periodically migrate to universities for academic and professional reasons. They reflect various cultural diversities and have to overcome obstacles like intergroup prejudice and acculturative stress. Although these factors can differ by region, the response tendency may be influenced by their respective cultural intelligence/quotient (CQ) and emotional intelligence/quotient (EQ). The comparisons of CQ and EQ across students from significant regions of India, however, have never been recorded in a prior study. This study attempted to examine the level of CQ and EQ among students who were enrolled in educational institutions in Kalaburagi City, who belong to three major regions of India (North, South-East, and South-West). A total of 385 students between the ages of 18 and 31 (mean age: 20.56; standard deviation: 2.633) were recruited for the study. Surprisingly, there were significant geographical disparities in the use of emotions and metacognitive CQ. Compared to students from the other two regions, students from the south-eastern area performed better while using emotional EQ and scored less while using meta-cognitive CQ. The study deduced the plausible factors and potential explanations for CQ EQ disparities and inter-regional acceptability among students from three major regions, which may be used to develop a CQ & EQ training program for usage across Indias educational system 2023, Cultural-Historical Psychology.All Rights Reserved. -
Generative AI-human collaboration in higher education: Applications, challenges, and strategies
The advent of GenAI has brought about substantial progress and prospects in diverse sectors, including education. We are witnessing significant progress in this field of artificial intelligence, with the emergence of chatbots such as ChatGPT and the proliferation of remarkably realistic AI-generated graphics. Generative AI, as an emerging technology, has the potential to bring significant and transformative improvements to education. Generative AI encourages higher education institutions to embrace and utilize the potential of these technologies to enhance several aspects such as student experience, faculty workload, intellectual property, etc. This chapter has explored the application of generative AI in the context of higher education, in light of its increasing prevalence. Although generative artificial intelligence offers a great deal of promise to improve education, the technology is not entirely devoid of difficulties. The chapter also discusses challenges and strategies related to generative AI in higher education. 2024 by IGI Global. -
The Industrial Revolution From Mechanisation (1.0) to Smart Automation (5.0)
The Industrial Revolution was a transformative event of unprecedented magnitude, profoundly altering many facets of society, including consumption patterns, social structures, cultural norms, and global arrangements. Contrary to popular belief, there is not a one Industrial Revolution, but rather a sequence of stages characterised by gradual advancements. We are currently on the verge of the Fifth Industrial Revolution, which is expected to have a greater impact than the cumulative effect of the preceding four revolutions. Industry 5.0 is the latest term gaining popularity in the business sector, with significant claims to fundamentally transform our lifestyle. Industry 5.0 is expected to drive more progress in the field of intelligent automation within the manufacturing sector. This chapter specifically examines the transition of industry sector from version 1.0 to version 5.0. 2025 selection and editorial matter, Payal Bansal, Rajeev Kumar, Ashwani Kumar and Daniel D. Dasig, Jr.; individual chapters, the contributors. -
Role of blockchain technology for user data security in metaverse
The metaverse is generating widespread interest among organizations of various scales, as companies acknowledge its capacity for profound transformation. Prominent organizations are actively adopting the metaverse concept to improve their operations and interact with clients in innovative and captivating manners. This chapter examines the vital function that blockchain plays in bolstering user data security as it explores the urgent problem of data breaches in the metaverse sector. The authors also carefully examine recent data breach cases in the metaverse sector, such as sandbox incursions, deepfake attacks, and digital avatar assaults. By outlining these practical difficulties, they make clear how urgent it is to come up with reliable ways to safeguard user data in the metaverse. The study findings have emphasized the dynamic and evolving nature of the metaverse industry, which is now undergoing substantial development and continuous exploration. They have also focused on significant blockchain technologies that demonstrate potential in ensuring data security. 2024, IGI Global. All rights reserved. -
Unlocking IoT: AI-enabled green fintech innovations
Meeting ESG (environmental, social, and governance) standards is becoming an essential goal for businesses, one that is supported by both investors and customers. FinTech can help companies evaluate and reduce their environmental effect, as well as investors channel their operations toward more sustainable assets. Embracing sustainability has become one of the priorities for many fintech companies today. Green fintech innovations have provided technologically enabled solutions for financial services that help in increasing the flow of financial resources for sustainable development. Recognizing the importance of green fintech in today's scenario, this chapter will initially focus on the components of the fintech ecosystem and IoT and AI-enabled fintech innovations in India, drivers of green fintech potentials of green fintech IoT, and AI-enabled green fintech from global perspective and has highlighted the green fintech solutions provided by the topmost companies. 2022, IGI Global. All rights reserved. -
Traditional finance vs. web 3: A comparative analysis of key features and characteristics for better readability purposes
Web3 is a ground-breaking invention that has the ability to address the shortcomings of web1 and web2. The industry witnessing its major impact is the finance sector. A wave of innovation in traditional finance has been inspired by the introduction of Web3. It is also referred to as the decentralised web and is a developing movement that is upending conventional finance by providing a more open, safe, and decentralised substitute. Traditional banking should work to adopt the features that Web3 offers, including stability, scalability, interoperability, security, performance, extensibility, management, and openness. In order for TradFi to maintain its relevance and expertise in the face of the widespread adoption of digital financial modes, it is now necessary to embrace several Web3 capabilities. Keeping into consideration the relevance and importance of Web3 in finance, this chapter will basically focus on analysing the key features and characteristics of Web3 in comparison to traditional finance. 2023 by IGI Global. All rights reserved. -
Leveraging transparency and privacy through blockchain technology
Blockchain is a conveyed record innovation that can be utilized to keep exchanges in a safe and straightforward way. This makes it a promising innovation for various applications, for example inventory network the executives, monetary administrations, and medical services. One of the vital advantages of blockchain is its capacity to guarantee information consistency. This is on the grounds that all information on the blockchain is put away in a disseminated way, and every hub in the organization has a duplicate of the record. This makes it truly challenging for any one party to mess with the information. One more key advantage of blockchain is its straightforwardness. All exchanges on the blockchain are public, and anybody can see them. This can assist with building trust and straightforwardness among partners. Blockchain can likewise present difficulties regarding information security. This is on the grounds that all information on the blockchain is put away in a public record. This implies that anybody with admittance to the blockchain can see the information, including delicate data, for example individual recognizable proof numbers (PII). There are various ways of tending to the difficulties of information protection in blockchain. One methodology is to utilize encryption to safeguard delicate information. Another 2024, IGI Global. All rights reserved. -
Model Selection Procedure in Alleviating Drawbacks of the Electronic Whiteboard
Deep learning has paved the way for critical and revolutionary applications in almost every field of life in general. Ranging from engineering to healthcare, machine learning and deep learning has left its mark as the state-of-the-art technology application which holds the epitome of a reasonable high benchmarked solution. Incorporating neural network architectures into applications has become a common part of any software development process. In this paper, we perform a comparative analysis on the different transfer learning approaches in the domain of hand-written digit recognition. We use two performance measures, loss and accuracy. We later visualize the different results for the training and validation datasets and reach to a unison conclusion. This paper aims to target the drawbacks of the electronic whiteboard with simultaneous focus on the suitable model selection procedure for the digit recognition problem. 2021 IEEE. -
A post covid machine learning approach in teaching and learning methodology to alleviate drawbacks of the e-whiteboards
Deep learning has paved the way for critical and revolutionary applications in almost every field of life in general. Ranging from engineering to healthcare, machine learning and deep learning has left its mark as the state-of-the-art technology application which holds the epitome of a reasonable high benchmarked solution. Incorporating neural network architectures into applications has become a common part of any software development process. In this paper, we perform a comparative analysis on the different transfer learning approaches in the domain of hand-written digit recognition. We use two performance measures, loss and accuracy. We later visualize the different results for the training and validation datasets and reach to a unison conclusion. This paper aims to target the drawbacks of the electronic whiteboard with simultaneous focus on the suitable model selection procedure for the digit recognition problem. 2021 Tamkang University. All Rights Reserved. -
Secured and Provisioned Access Authentication using Subscribed User Identity in Federated Clouds
Cloud computing has become an essential source for modern trade or market environments by abled frameworks. The exponential growth of cloud computing services in the last few years has resulted in extensive use, especially in storing and sharing the data on various cloud servers. The current trend in the cloud shows that the cloud owners use relative functions and target areas in such a way that cloud customers access or store their data either in the same servers or related servers. Simultaneously, from the security point of view, the lack of confidence about the customer's data on the cloud server is still questionable. The hour's need is to provide the cloud service in a single port way by forming the joint management policy to increase customer satisfaction and profitability. In addition to this, the authentication steps also need to be improvised. This paper discusses issues on the security authentication and access provisioning of the cloud service consumers in federated clouds using subscribed user identity. This work proposes the user identity verification module (UidVM) in the cloud service consumer's authentication process to serve as a cloud broker to minimize the work overloads on the central cloud federation management system, thus enhancing the cloud security. 2021. All Rights Reserved.