Browse Items (11810 total)
Sort by:
-
Blockchain-Enabled Smart Contracts in Agriculture: Enhancing Trust and Efficiency
This study explores the important role of blockchain technology in the transformation of agriculture and presents a new way to integrate chatbots and smart contracts to solve the problem of persistence. Leverage the decentralized structure and security of the blockchain to increase traceability, transparency and fairness in agricultural product prices. A user-friendly chatbot built in Python using Tkinter that acts as a bridge between farmers and the Ethereum-based blockchain pricing algorithm. Smart contracts used in Solidity dynamically adjust crop prices based on the weather in real time, making it possible for prices to react and adjust. Simulations and tests in Ganache validate the proposed method, confirming its economic value and effectiveness in many agricultural cultures. This study delves into analytics, including latency and production time, to demonstrate the benefits of the blockchain model in creating transparent, farmer-centric and region-specific crop prices. The importance of this research is to support continuous change in agricultural technology, paving the way for the introduction of appropriate and fair prices. According to the amendment, the integration of advanced machine learning, further integration and collaboration with agricultural stakeholders should be developed in the future. This work sets a good path for agriculture, promoting transparency, fairness and quick access to the best crop prices, thus ensuring security and agricultural technology. 2024 IEEE. -
Integrated IoT-Based Secure and Efficient Key Management Framework Using Hashgraphs for Autonomous Vehicles to Ensure Road Safety
Autonomous vehicles offer various advantages to both vehicle owners and automobile companies. However, despite the advantages, there are various risks associated with these vehicles. These vehicles interact with each other by forming a vehicular network, also known as VANET, in a centralized manner. This centralized network is vulnerable to cyber-attacks which can cause data loss, resulting in road accidents. Thus, to prevent the vehicular network from being attacked and to prevent the privacy of the data, key management is used. However, key management alone over a centralized network is not effective in ensuring data integrity in a vehicular network. To resolve this issue, various studies have introduced a blockchain-based approach and enabled key management over a decentralized network. This technique is also found effective in ensuring the privacy of all the stakeholders involved in a vehicular network. Furthermore, a blockchain-based key management system can also help in storing a large amount of data over a distributed network, which can encourage a faster exchange of information between vehicles in a network. However, there are certain limitations of blockchain technology that may affect the efficient working of autonomous vehicles. Most of the existing blockchain-based systems are implemented over Ethereum or Bitcoin. The transaction-processing capability of these blockchains is in the range of 5 to 20 transactions per second, whereas hashgraphs are capable of processing thousands of transactions per second as the data are processed exponentially. Furthermore, a hashgraph prevents the user from altering the order of the transactions being processed, and they do not need high computational powers to operate, which may help in reducing the overall cost of the system. Due to the advantages offered by a hashgraph, an advanced key management framework based on a hashgraph for secure communication between the vehicles is suggested in this paper. The framework is developed using the concept of Leaving of Vehicles based on a Logical Key Hierarchy (LKH) and Batch Rekeying. The system is tested and compared with other closely related systems on the basis of the transaction compilation time and change in traffic rates. 2022 by the authors. Licensee MDPI, Basel, Switzerland. -
An Introduction to Business Intelligence
The quality of managerial decisions impacts the performance of any business, and this decision mainly depends on the reliability, inclusiveness, correctness, and trustworthiness of the data used for this purpose. Nowadays, business intelligence (BI) has become a key buzzword. BI supports better business decision-making by transforming data into actionable insights. The digitalization or digitization of business is accommodating and embracing the new BI to endure and stand for consistency and competitiveness for business development toward technological or digital transformation. In this digital or computer era, only those businesses will be profitable and successful that are well furnished to digitally (or binary) shift their practices in the technological or information age. In the new technological age, high powered by data analytics capabilities, meaningful and systematic data assimilation has become a new challenge for an organization to transfer data into BI. BI is a technology-driven process for analyzing data into information; information into knowledge; and knowledge into plans that manage and regulate the organization. BI presents actionable information to help corporate executives; business managers, and other end-users and makes more informed business decisions. BI software systems provide historical, current, and predictive views of business operations. Dashboards; Forecasting; Graphical Reporting; Graphical Online Analytical Processing (OLAP); and Key Performance Indicators (KPIs) are the modules of BI. BI helps in organizing teams, keeping them mindful and aware of KPIs. The awareness of KPIs through dashboards and reports keeps teams aligned and more focused on their goals. The optimal aim of BI is to enable a business to make informed decisions. BI helps business managers or leaders utilize data in a way that is coherent and dynamic. The key elements of BI involved are Advanced Analytics or Corporate Performance Management; BI; Data Sources; Data Warehousing and OLAP. With the latest technology and innovations, there are countless BI applications available for varied types of data analysis. BI software or technologies can deal with multiple structured and unstructured data to identify, develop, and create new strategies business opportunities. Its purpose is to enable clear and accessible interpretation of the huge data, to identify new opportunities and execute effective strategies. Strategic BI (SBI) is always associated with reporting from an analytical data source or data warehouse. Essentially, SBI improves the business process by analyzing a predetermined set of data pertinent to that process and provides the historical background of that data. SBI assembles on four crucial and necessary criteria or frameworks, namely collection and storage of data; Optimization of data for analysis; Identification of important business drivers through past data records; and seeking answers to key business questions. Hence, BI provides procedures and technologies, and tools for current business leaders to alter and modify dynamically and effectively lead their companies with correct data decisions. This research paper is qualitative and based on secondary data. This chapter aims to provide insights into BI and highlights the recent innovations and future of BI. 2023 selection and editorial matter, Deepmala Singh, Anurag Singh, Amizan Omar & S.B Goyal. -
Patents and Innovations for Digital Sustainability
With technology growing at a rapid pace, a major issue which is being faced is the problem of effective energy usage and sustainability such that the future generation does not have to bear the brunt of our actions. Through the course of the chapter, the various innovations and patents in the field of digital sustainability are explored which are vital for the preservation of the planet. Patents play a crucial role in promoting innovations and development, as well as protecting the rights of inventors. The varied recent developments in the field of energy sustainability and explaining their work while assessing their contribution to the field are the focus of this chapter. The chapter also provides a comprehensive overview of the relationship between patents and innovations in digital sustainability, offering insights and guidance for researchers, practitioners, and policymakers working in this field. 2024 selection and editorial matter, Vandana Sharma, Balamurugan Balusamy, Munish Sabharwal, and Mariya Ouaissa. -
Model between mind share branding factors and trustworthiness /
Patent Number: 202111055024, Applicant: Dr.Vikas Singla.
The importance of Mindshare branding (MB) strategy in building long-term and sustainable psychological links with consumers had been sufficiently highlighted in literature. However, very few research attempted to provide a structured tool for its measurement. This study proposed a 13-point four-factor multidimensional scale which could be used to measure MB formally. Dimensions measuring MB were derived from literature and then examined on different brands in order to achieve a reliable and valid scale. -
Artificial intelligence and deep learning based driverless cars to reduce the road accident, death rate using python /
Patent Number: 202221047470, Applicant: Rashel Sarkar.
2% of global deaths each year are caused by automobile accidents. This corresponds to around 3,287 each day, or 1,300,000 per year. 20 million to 50 million people are seriously injured in automobile accidents annually. Why do these recurring problems persist People do make errors. One careless or foolish action is all it takes to transform a safe drive into one that could kill someone. This holds true regardless of whether the driver is preoccupied, intoxicated, or simply careless or irresponsible. In terms of technology, Artificial Intelligence (AI) has always been ahead of the curve. -
A Theoretical Article: Exploring the Evolutionary Dynamics of Couples and Family Therapy
This article provides a comprehensive review of how the field of family therapy has evolved, tracing its roots from early practices influenced by eugenics to its current diverse theoretical frameworks, which are ever-expanding. In the mid-20th century, family therapy expanded beyond its eugenic roots, embracing diverse theoretical frameworks and giving rise to various therapeutic modalities like behavioral and emotionally focused family and couples therapy. However, due to cultural disparities, these concepts and models cannot holistically capture the essence of family therapy in India. They do not compute the central role of the intergenerational subsystem or understand hierarchical dynamics. What is deemed okay in the Western context does not hold true in the Indian context. Postmodern approaches show a marked improvement in dealing with these problems in cultural adaptations of family and couples therapy by integrating diverse therapeutic practices, technological advances, and cultural and diversity-sensitive practices. However, despite these advancements, the adapted modalities have a scope for improvement, posing a pressing need for research that bridges this gap. Moving forward research should focus on family change mechanisms, symptom improvement factors, and prioritizing culturally sensitive approaches to meet the unique needs of Indian families. The Author(s) 2024. -
Process of Emotion Regulation in Relation to Attachment and Mindfulness Traits During Gottman's Dreams-WIthin-Conflict Intervention
Gottman Couple Therapy (GCT) promotes process research to comprehend how interventions function. A GCT intervention called Dreams-within-Conflict (DWC) encourages healthy emotional regulation techniques including expression and experiencing to diffuse impasses. The purpose of this study is to examine emotion regulation and experiencing changes during a single DWC session using convergent mixed methods on N=30 individuals (15 couples). The techniques for controlling emotions (Extrinsic/Intrinsic affect Worsening/Improving strategies EW, IW, EI, II) and experiencing mode/peak scores (ESM & ESP) were measured using self- assessments, observation rating and coding of video recordings, interviews, and feedback reports in relation to individual traits of emotion regulation (cognitive reappraisal & suppression), beliefs, attachment (avoidance & anxiety), and mindfulness. Paired-samples t-test revealed that DWC significantly reduced partners' EW and boosted partners' EI and II. Both ESM and ESP significantly improved. Results from hierarchical linear modelling showed that before-DWC EI, gender, cognitive reappraisal, and suppression predicted EI and before-DWC II and avoidance predicted II. None of the variables predicted EW or IW. Gender predicted ESM. The emotional regulation strategies, experiencing and preferences for expression (over suppression) shared by Indian couples were examined using thematic analysis. Avoidance, conflict behaviours, and prioritising parents' emotions over partners' (in men) were most used strategies. Experiencing levels 1-3 used before-DWC changed to 3-4 during-DWC. Expression was unanimously preferred by Indian couples. -
Review on microbially synthesized nanoparticles: a potent biocontrol agent against Aedes species of mosquito
Aedes aegypti is a principal vector of dengue, chikungunya and Zika illnesses worldwide. Because effective vaccinations or medications for the prevention and/or treatment for these illnesses are not available, vector management has been embraced as the primary method of reducing their transmission. The strategy that is often used for controlling Aedes populations is chemical insecticides; however, despite their efficiency, extensive usage of these pesticides has resulted in high operating costs, the establishment of resistant populations and undesirable non-target impacts. Therefore, the use of nanoparticles derived from multiple synthesis processes as new insecticides has recently attracted the interest of researchers. This study provides an overview of the current understanding concerning the method of action of nanoparticles against mosquitoes. Metal nanoparticles strongly influence antioxidant and detoxifying enzymes in insects, causing oxidative stress and cell death. These nanoparticles similarly inhibited acetylcholinesterase activity. Metal-based nanoparticles can potentially bind to S and P units in proteins and nucleic acids respectively resulting in decreased membrane permeability, organelle and enzyme denaturation which leads to cell death. Furthermore, they upregulate and downregulate critical insect genes, lower protein synthesis and gonadotrophin release, resulting in developmental and reproductive failure. This review critically examines insect nanotoxicology research trends and highlights the ecotoxicological effects of practical usage of nanoparticles as insecticides. 2022 World Research Association. All rights reserved. -
POST-LISTING PRICING PERFORMANCE OF INITIAL PUBLIC OFFERS: INSIGHTS FROM INDIA
The objective of this study is to investigate short-run performance and whether the IPOs are over-priced or under-priced in various window periods. This study applies one-sample t-tests, capital asset pricing models, and market-adjusted excess return to quantify the short-term pricing performance as well as the risk and return of initial public offerings and market indices. The study investigates the claim that post-listing initial public offerings (IPOs) guarantee short-term gains. The twelve months following the listing, in particular, have seen the biggest gains. According to reports, investors who buy shares in IPOs get strong returns in this period. The market-adjusted initial returns for the IPOs registered on the National Stock Exchange between January 2019 and December 2020 have been found to be roughly 44%, per this analysis. 2024 Published by Faculty of Engineering. -
Exploring the use of mobile phones by children with intellectual disabilities: experiences from Haryana, India
Purpose: Covid-induced lockdowns have increased the importance of technology in education. Though access to technology as well as availability of the internet remain a major concern for a lot of children in the global south, children with intellectual disabilities are disadvantaged even more as most of the e-content is developed keeping in mind the average learner. Materials and methods: Unstructured interviews were conducted with children with intellectual disabilities studying in government schools in Haryana as well as their teachers and parents. Thematic analysis of the interviews was conducted to understand the use-patterns of mobile phones by children with intellectual disabilities. Results: Findings suggest that these children are learning to use mobile phones on their own or with some support and are able to navigate the complexities of these smartphones quite well. They use these devices mostly for their entertainment. This paper then reflects on the need and strategies to develop these technologies in ways that they can be used as effective tools for teaching children with intellectual disabilities, especially in the inclusive education system in developing countries. Conclusion: The paper reflects on the need to develop technology and tools using flexible and exploratory designs to enhance the learning processes for children with intellectual disabilities from the lower income strata.IMPLICATIONS FOR REHABILITATION This study highlights the importance of being able to use mobile phones by children with intellectual disabilities belonging to low income families. Following this, the article argues for designing of mobile phones suitable for use by children with intellectual disabilities using playfulness and explorations, and Building e-content keeping the elements of playfulness and exploration which can enhance the learnings of this group of students which is often ignored. 2022 Informa UK Limited, trading as Taylor & Francis Group. -
Investors rationality for IPOS using meta-analysis and forest plots in neyeloff et al. (2012) framework: An investigation /
Patent Number: 202211046639, Applicant: Dr. Mani Jindal.
This research article focuses on the contours of investors’ rationality as regard to the initial public offering (IPO). For last 20 years, financial world has been very volatile. Now the investors have actively started to participate in the investment activities. The investment markets are becoming more risky; time makes investors to behave differently. It is crucial to perceive the responses of the inves- tors and to identify the factors of the investment decisions. -
Design of Grovers Algorithm over 2, 3 and 4-Qubit Systems in Quantum Programming Studio
In this paper, we design and analyse the Circuit for Grovers Quantum Search Algorithm on 2, 3 and 4-qubit systems, in terms of number of gates, representation of state vectors and measurement probability for the state vectors. We designed, examined and simulated the quantum circuit on IBM Q platform using Quantum Programming Studio. We present the theoretical implementation of the search algorithm on different qubit systems. We observe that our circuit design for 2 and 4-qubit systems are precise and do not introduce any error while experiencing a small error to our design of 3-qubit quantum system. 2022 Polish Academy of Sciences. All rights reserved. -
A collaborative defense protocol against collaborative attacks in wireless mesh networks
Wireless mesh network is an evolving next generation multi-hop broadband wireless technology. Collaborative attacks are more severe at the transport layer of such networks where the transmission control protocol's three-way handshake process is affected with the intention to bring the network down by denying its services. In this paper, we propose a novel collaborative defense protocol (CDP) which uses a handshake-based verification process and a collaborative flood detection and reaction process to effectively carry out the defense. This protocol presents a group of monitors that collaboratively entail in defending the attack; thus reduces the burden on a single monitor. Moreover, this paper proposes a novel transport layer post-connection flooding attack that occurs after establishing a TCP connection and we show that CDP can detect and mitigate this attack. The CDP protocol has been implemented in Java and its performance has been evaluated using essential metrics. We show that CDP is efficient and reliable and it can identify the attack before any major damage has occurred. Copyright 2021 Inderscience Enterprises Ltd. -
Iodine promoted synthesis of pyrido[2?,1?:2,3]imidazo[4,5-c]quinoline derivatives via oxidative decarboxylation of phenylacetic acid
An unprecedented and efficient molecular iodine promoted domino protocol for the synthesis of N polycyclic pyrido[2?,1?:2,3]imidazo[4,5-c]quinolines were reported from phenylacetic acid and 2-(imidazoheteroaryl)anilines. This methodology was also extended for the preparation of benzo[4?,5?]thiazolo [2?,3?:2,3]imidazo[4,5-c]isoquinolines in good yields. However, this protocol proceeds via a sequential decarboxylation of phenylacetic acid with I2/DMSO system followed by Pictet-Spengler cyclization in good yields. 2022 Taylor & Francis Group, LLC. -
Iodine Mediated Oxidative Cross-Coupling of Benzo[d]Imidazo[2,1-b]Thiazoles with Ethylbenzene: An Unprecedented Approach of C3-Dicarbonylation
A versatile approach of iodine mediated C3-dicarbonylation of benzo[d]imidazo[2,1-b]thiazoles (IBTs) with ethylbenzene has been reported. The reaction conditions were optimized by screening in various solvents, catalysts, and oxidants. The reaction is compatible with various substrates and was successfully demonstrated to offer moderate to good yields. 2022 Taylor & Francis Group, LLC. -
Hybrid Intrusion Detection Technique for Internet of Things
The rapid expansion and integration of Internet of Things (IoT) applications in newlinevarious aspects of daily life has significantly surprised and impacted contemporary society. The most crucial keyword concerning these applications is security, specifically, in the enormous amount of data generated every second, and how it is used. These applications are vulnerable to various attacks, which could result in an unthinkable catastrophe if not managed and controlled with sufficient foresight. Growing concerns about data security in the expanding IoT landscape are driven by factors such as increased vulnerability of devices to viruses, susceptibility to denial-of-service attacks, and heightened risk of intrusion attempts. To prevent such occurrences, stronger precautions should be taken, enabling system developers and manufacturers of IoT devices to enhance their approaches to better security mitigation. It is essential to identify all potential threats and vulnerabilities that are created explicitly for IoT infrastructures. It is believed that to lessen potential dangers, there is a need for more significant research on security attacks. Security difficulties have been found and must be dealt with, so they may be avoided. Further research must address security challenges in IoT-based environments, particularly for suppliers and consumers, to gradually raise the reliability of IoT applications. Although many conventional methods are still used, there might be superior options for devices with limited resources. Artificial intelligence plays a significant role in this issue. newlineThis research first tries to comprehend how machine learning methods relate to attack newlinedetection. The effects of different machine learning techniques are evaluated using the newlineUNSW-NB 15 dataset. Additionally, it has been found that each model performs worse overall, mainly when security issues are present. As a result, real-time datasets and Deep Learning (DL) algorithms for intrusion detection in the IoT need to be prioritized. -
Engineering CoMn2O? nanofibers: Enhancing one-dimensional electrode materials for high-performance supercapacitors
One-dimensional CoMn2O4 nanofibers were developed via the electrospinning method, offers a novel approach for designing electrode materials for energy storage device -supercapacitors. Field emission scanning electron microscopy (FESEM) with EDX confirmed the highly porous CoMn2O4 phase with desired composition. Elemental mapping studies confirmed uniform distribution of Co, Mn, and O elements throughout the nanofibers.Electrochemical studies underscored the crucial role of structural voids and spacing in enhancing energy storage capacity, establishing CoMn2O4 as a promising electrode material. Specific energy and power studies yielded remarkable results of 93.84 Whr/kg and 55.20 kW/kg, respectively. Additionally, specific capacitance determination returned 937.42 F/g, indicating exceptional charging and discharging performance over 1000 cycles with 93.3 % capacitance retention. Moreover, the flexible symmetric supercapacitor is expected to demonstrate exceptional flexibility and electrochemical stability, achieving a specific energy of 232 Wh/kg and a specific power of 84 kW/kg at a current density of 1 mA/cm. These findings advance our understanding of CoMn2O4 nanofibers and offer insights into developing efficient and stable energy storage systems for diverse applications. 2025 Elsevier B.V. -
Study of Transport Characteristics using Impedance Spectroscopy and Memristor Property Analysis of Protonated Polyaniline-WO3 Nanocomposite
Polyaniline-WO3 nanocomposite was synthesized through in-situ chemical polymerization. The structural properties are studied by using XRD and FESEM characterization. The XRD results confirmed the presence of crystalline WO3 nanoparticles in the polymer nanocomposite structure. FESEM images confirmed the sheet-like structure with heterojunction of WO3 nanoparticles and polyaniline matrix. The transport properties of the synthesized nanocomposites are studied using impedance spectroscopy analysis. The complex impedance analysis conducted using the Nyquist plot and equivalent circuit model of the nanocomposites are simulated using ZSimpWin software. The major conduction mechanism in the material is found to be grain boundary effect and the grain boundary conduction parameters are calculated. The polyaniline-WO3 nanocomposite with WO3 doping concentration of 15% has exhibited better sensing characteristics towards the target VOC (Volatile Organic Compound) 3-Carene, a breath-based biomarker for malaria. The memristor sensor model of the polyaniline nanocomposite with 15% of WO3 is simulated using MATLAB-Simulink. The pinched hysteresis loop obtained confirmed the memristor properties of the material. 2022, Universiti Malaysia Perlis. All rights reserved.