Browse Items (11810 total)
Sort by:
-
Neuro-Systemic applications in learning
Neuroscience research deals with the physiology, biochemistry, anatomy and molecular biology of neurons and neural circuits and especially their association with behavior and learning. Of late, neuroscience research is playing a pivotal role in industry, science writing, government program management, science advocacy, and education. In the process of learning as experiencing knowledge, the human brain plays a vital role as the central governing system to map the images of learning in the human brain which may be called educational neuroscience. It provides means to develop a common language and bridge the gulf between educators, psychologists and neuroscientists. The emerging field of educational neuroscience presents opportunities as well as challenges for education, especially when it comes to assess the learning disorders and learning intentions of the students. The most effective learning involves recruiting multiple regions of the brain for the learning task. These regions are associated with such functions as memory, the various senses, volitional control, and higher levels of cognitive functioning. By considering biological factors, research has advanced the understanding of specific learning difficulties, such as dyslexia and dyscalculia. Likewise, neuroscience is uncovering why certain types of learning are more rewarding than others. Of late, a lot of research has gone in the field of neural networks and deep learning. It is worthwhile to consider these research areas in investigating the interplay between the human brain and human formal/natural learning. This book is intended to bring together the recent advances in neuroscience research and their influence on the evolving learning systems with special emphasis on the evolution of a learner-centric framework in outcome based education by taking into cognizance the learning abilities and intentions of the learners. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021. All rights reserved. -
Neuro-Leadership: A New Paradigm in Leadership Thought
Leadership is not a static occurrence. It is a dynamic one that constantly evolves. Leadership is seen as a means to enhance ones personal, professional, and social lives. Organizations believe that leaders bring in unique assets to the organization; which contribute to the bottom line of the company. The conclusions drawn from research findings on leadership portray an image of a process that is far more sophisticated and complex than the condensed view, popularly accepted. This chapter will provide a comprehensive evaluation of different approaches to leadership and highlight the importance of a new paradigm. Ground breaking insights have started to surface regarding neurosciences and brain functioning that has significantly influenced leadership thought. The traditional approaches of leadership could not adapt to the world of unlimited information which needed continuous evolution; however, our brain can adapt and change leading to the emergence of neuro-leadership. The chapter will trace the journey of neuroleadership and its increasing relevance in the current scenario, especially in terms of employee and organization performance. 2024 by Nova Science Publishers, Inc. -
Neural Network based Student Grade Prediction Model
Student final grade GPA is the collective efforts of their previous and ongoing efforts of each semester examination may predict accurately using the neural network which receives the input weight of each matrix element of variables to next neuron. The GPA prediction based on regular class performance and previous grades with background variables were found much significant. This research tries to explore the model comparison and evaluate student grade prediction using various neural network models. The single-layer half i.e., successful student model predicts 90 total accuracies than the single layer with five hidden layer neurons (88.5 percent). The multi-layer with two hidden layers (7,3) is 84 percent accuracy is less than one percent accuracy than multilayer with three hidden layers. Similarly, the multilayered with four hidden layered 25,12,7,3 model predicts the least accuracy (77 percent accuracy) for student grade. Similarly, the passed student prediction model has less accuracy than both students' 86 percent. 2022 IEEE. -
Networks Simulation: Research Based Implementation using Tools and Approaches
The advancements in computer networks and communication technology keep network-related research in high demand. Protocols are designed to improve the environment and it is mandatory to test their effectiveness before deploying them. Deploying an untested protocol in a full-fledged real environment is not desirable as there exists uncertainty about its success. Simulation software is one of the essential tools in network research areas. It gives a platform for testing and observing newly developed protocol's behavior with less cost and risk. Different kinds of network simulators are available., some are exclusive for wired or wireless., and some are for both. There are many simulators available hence selecting the most appropriate simulation tool among them is a difficult task. This paper focuses on giving a detailed review of popular simulation tools. 2022 IEEE. -
Network selection system and method for wimax integrated network and wlan integrated network /
Patent Number: 201941032402, Applicant: Mr. Kathiresan J.
Disclosed is a network selection system and method for a Worldwide Interoperability for Microwave Access (WiMAX) network and a wireless LAN (WLAN) network. The method includes the step of tracking a Mobile or fixed devices (MoFD) for identifying a plurality of Quality of Service (QoS) requirements through a Handoff Decision Manager (HDM) module coupled with a plurality of Media Access Control (MAC) layers of the WiMAX network and the WLAN network. -
Network Security Tools and Applications in Research Perspective
The modern world technology is civilized, globalized and modernized. The technological development of social networks and e-commerce applications produce larger data. This data communication is major task, because device to device communication need network terminal. This data transmission is not safe because of different types of tools and software available to destroy the existing network. In the field of network security during data transfer from one particular node to other node some security vulnerability is happened this is the one of the critical issue in this sector. The reason for this network security is different types of data attacks are happen in day to day life. It is easy to establish a new network but protecting the entire network is a big issue. This network security is generally two parameter first one is communication and second one is data automation. The network security field is directly or indirectly linked with the concept of data encryption. The development in this network security has taken us to a level that from signature again we came back to thumb print. For example maintain the data secure we use the lock system which is a finger print type. This technology helps us to protect the physical data theft, but logical data theft is still problem for data transmission. This article will brief about the network security it also presents the various network security types. Those types are wired and wireless network security. Apart from the network security the following topics is also discussed in this article. Those are network security protocols and simulation tools in network security. The research problems in network security are privacy and vulnerability of data. 2019 IEEE. -
Network pharmacological evaluation for identifying novel drug-like molecules from ginger (Zingiber officinale Rosc.) against multiple disease targets, a computational biotechnology approach
Ginger (Zingiber officinale Rosc.) is a popular spice used globally in ethnic cuisines and witnessed its extensive use in traditional medicine. In this study, we identified 12 phytochemicals from the ginger rhizome extract (hexane) through GC/MS analysis. After evaluating drug-likeliness, these phytochemicals were docked with 16 target proteins in silico, and docking scores were compared with their respective control drugs. Furthermore, multivariate statistical analysis (principal component analysis-PCA) was performed, and three different chemical clusters were identified. Pharmacophore analysis further identified common functional descriptors in the compounds under study. Finally, we developed a unique three-level network taking phytochemicals, target proteins and associated diseases based on the optimum docking scores. Overall, Oleic acid, Palmitic acid and Shogaol showed the highest coverage to the target proteins (12, 10 and 9 targets, respectively) and Oleic Acid scored the highest (5956) in PatchDock when docked against Peroxisome proliferator-activated receptor gamma (PDB id 1KNU, UniProt id P37231). This work provided significant insight into developing the protocol for rapid identification of potential drug likeliness of the identified phytochemicals. Graphic abstract: [Figure not available: see fulltext.]. 2021, The Author(s), under exclusive licence to Springer-Verlag GmbH Austria, part of Springer Nature. -
Network Lifetime Enhancement by Elimination of Spatially and Temporally Correlated RFID Surveillance Data in WSNs
In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role due to its data characteristics which are data simplicity, low cost, simple deployment, and less energy consumption. It consists of a series of tags and readers which collect a huge number of redundant data. It increases system overhead and decreases overall network lifetime. Existing solutions like Time-Distance Bloom Filter (TDBF) algorithm are inapplicable to the large-scale environment. Received Signal Strength (RSS) used in this algorithm is highly dependent on quality of tag and application environment. In this paper, we propose an approach for data redundancy minimization for RFID surveillance data which is a modified version of TDBF. The proposed algorithm is formulated by using the observed time and calculated distance of RFID tags. To overcome these problems, we design our approach to relevantly reduce the spatiotemporal data redundancy in the source level by adding the Received Signal Strength Indicator (RSSI) concept for energy-efficient RFID data communication in wireless sensor network scenario. We introduce in this paper the new improved idea of an existing algorithm which efficiently reduces the rate of data redundancy spatially and temporally. The implemented results overcome the limitations of existing algorithm for data redundancy reduction. Nevertheless, the performance evaluation shows the efficiency of proposed algorithm in terms of time and data accuracy. Furthermore, this algorithm supports multidimensional and large-scale environment suitable for sensor network nowadays. 2022 Lucy Dash et al. -
Network Based Detection of IoT Attack Using AIS-IDS Model
In recent days Internet of Things attained more familiarity. Although it is a promising technology, it tends to lead to a variety of security issues. Conventional methods such as IoT ecosystem based solutions were not suitable to give dilemmas to the system. A new system model called adaptive and intelligent Artificial Immune System (AIS) imitates the process of human being an immune system that consists of eligible properties of this varying environment. Therefore, it enhanced IoT security. Conventionally classifiers such as Random Forest Classifier, Recurrent Neural Network and K-nearest neighbours are used to classify the signals as normal or abnormal and predict malicious attacks. But unfortunately, these classifiers generated a high false alarm rate. Thus, a framework with maximum accuracy and minimum false alarm rate was required. In this work, the AIS model adopts the benefits of the Hopfield Neural Network (HNN) for classification. HNN classifier has a fixed weight, as it cannot be changed for its backpropagation property. This work optimally selects the fixed weight using Fast- Particle Swarm Optimization (F-PSO) and helps to enhance the accuracy of the HNN classifier. This classifier model then differentiates IoT attacks with a high detection rate and normal signal. Three datasets are taken to execute the proposed model and define its accuracy. The proposed Artificial Immune system using HNN for Intrusion Detection System (AIS-IDS) model exhibits 99.8% accuracy for the first dataset and minimum error value. The false alarm rate was minimized using danger theory and its high activation function; thus, the false alarm rate was minimized by up to 8% more than previous classifiers. 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. -
Neo-X: Portable advanced audio technology /
Patent Number: 202241051890, Applicant: Moloy Biswas.
As time changed audio technology rapidly developed at a fast pace. Even with the advancing technology, all portable earphones seem to offer a specified feature. Customers have to invest in different types of earphones and headphones based on the device setting and features they require. Our product Neo-X headphones bring different features for different occasions or contexts. Whether in a gymnasium, hiking, bicycling or listening to music on a flight, these earphones provide a premium sound quality. Currently, there are a wide variety of earphones and headphones available in the market. -
Negotiating Inclusion: Minority Institutions and Constitutional-Legal Dimensions in India
The chapter Negotiating Inclusion: Minority Institutions and Constitutional and Legal Dimensions in India is based on the premise that special provisions for inclusion of minority groups were one of the contested topics that have been negotiated in India since independence. The present chapter critically explores the two main sites of negotiation: Constituent Assembly Debates and the cases involving the question of minority rights to culture and education as adjudicated by the Indian courts. In doing so, the paper undertakes an examination of the logic of state recognition and reservations, voiced by nationalist leaders and members of the Constituent Assembly, who were apprehensive that the provisions on minority accommodation may not be compatible with Indias secular credentials. Constitutional provisions, specifically the fundamental rights embodied in Articles 29 and 30 were further debated and re-interpreted by the High Courts and Supreme Court. Further on, the issue of minority accommodation led to the establishment of institutional mechanisms in India, one such institution being the National Commission for Minority Educational Institutions (NCMEI)-a recent addition in the series of negotiating spaces of the religious and minority communities in India. A thorough examination of the functioning of the NCMEI, an institution which remains understudied, may inform new avenues into thinking about the sites of minority rights negotiations in India, given the shifting ideological positions at the national level. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022. -
Negative Domination inNetworks
We introduce s-domination in signed graphs which is based on the number of negative edges between the dominating set and its complement. The s-domination in both the positive and negative homogeneous signed graph will be studied for each value of s. As a special case, the properties of s-domination in sum signed graphs will be analyzed. The maximum value of s for a graph for which the s-domination exists is identified. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Negative consumer engagement via food delivery applications: A real concern for generation Z?
The traits of Generation Z are notable for how they define and reshape themselves in the 21st century. The current study investigates the factors that Generation Z users consider when deciding on a food application. The respondents in the current study were divided into working and nonworking groups, and the results imply that since college students are still supported financially by their parents or guardians, their main concerns are higher discounts, prices, and quantities. An in-depth and semistructured questionnaire was addressed to both groups of 15 respondents belonging to Generation Z. The stakeholders who would benefit from this research would primarily be online delivery restaurants, food application developers, academic researchers, and Generation Z cohorts. 2024, IGI Global. All rights reserved. -
Need of integrated care model for positive childbirth experience in Indian maternity care services
BACKGROUND: Integrated care (IC) models are an emerging trend in healthcare reforms worldwide, especially in the maternal healthcare system. This research focuses on the scope of an integrated model for intrapartum care of women and explores the experience of birth under two intrapartum care modelsbiomedical and midwifery models, respectively. The term positive childbirth experience (PCE) is a concept defined by the World Health Organization (WHO) in the recommendations on intrapartum care for a PCE. MATERIALS AND METHOD: This study is convinced to employ a qualitative approach to explore how birth is experienced by women under maternity healthcare services in Kerala. A semi?structured interview was conducted to tap into the lived reality of birthing of sixteen first?time mothers (primipara) aged between 20 and 30 years under these two models. Furthermore, five participants have been specifically interviewed after their vaginal birth after a C?section (VBAC) experience. To achieve a systematic cross?case thematic analysis, systematic text condensation (STC) has been employed as a data analysis method. RESULTS: Four main categories were identified through the analysis as follows: (1) information and knowledge, (2) confidence, (3) quality of care, and (4) health?promoting perspective. These central themes evolved from 11 subthemes. CONCLUSION: The data analysis reveals both negative and positive experiences under two care models. It emphasizes the urgent need to reframe the biomedical?focused care model and adopt an integrated approach that aligns with the global intrapartum care model proposed by the World Health Organization (WHO) in 2018 and the definition of IC mentioned in the paper. 2024 Journal of Education and Health Promotion. -
Need for an Innovative Method for Second Language English Learners with Special Reference to Syntax and Grammar
Educational Quest Vol. 3, No. 2 pp. 183-192, ISSN No. 0976-7258 -
Need for an Evolved Groundwater Justice in Rural Areas of Uttar Pradesh, India
As groundwater is the primary element of life, countries all over the world are experimenting with legal reforms. The degree to which law reforms combine justice and sustainability is a crucial question. In response to this question, the present article focuses on a case study of Uttar Pradesh, India. Our response is based on a content analysis of the Uttar Pradesh Groundwater (Management and Regulation) Act, 2019, and the Uttar Pradesh Groundwater (Management and Regulation) Rules, 2020. Three conclusions emerged from our investigation. First, the 2019 Groundwater Act and the 2020 Draft Groundwater Rules are primarily motivated by concerns about resource sustainability, particularly in areas where the water table is steadily declining. Still, neither the 2019 Groundwater Act nor the 2020 Draft Groundwater Rules propose any proactive groundwater justice measures. Second, we suggest that some locally defined basic elements are critical in supporting sustainability and to a lesser extent groundwater justice. These characteristics include a communitys ability to (1) recognize a crisis and show a willingness to address it; (2) establish a rule-bound community groundwater resource; (3) demonstrate leadership and a sense of community; and (4) make use of awareness, information, and knowledge. Our third conclusion is that there is a need for community practices and state-led groundwater law to co-evolve; this co-evolution has the potential to create groundwater arrangements that support both groundwater justice and sustainability. 2024 Technoscience Publications. All rights reserved. -
NDC Pebbling Number for Some Class of Graphs
Let G be a connected graph. A pebbling move is defined as taking two pebbles from one vertex and the placing one pebble to an adjacent vertex and throwing away the another pebble. A dominating set D of a graph G = (V, E) is a non-split dominating set if the induced graph < V ? D > is connected. The Non-split Domination Cover(NDC) pebbling number, ?ns(G), of a graph G is the minimum of pebbles that must be placed on V(G) such that after a sequence of pebbling moves, the set of vertices with a pebble forms a non-split dominating set of G, regardless of the initial configuration of pebbles. We discuss some basic results and determine ?ns for some families of standard graphs. 2024 the Author(s), licensee Combinatorial Press. -
Naxalism in India: The Challenge of Child Soldiers and its Remedy
This article focuses on Naxalism, a form of communism, in India, investigating the impact on children of growing up in Naxal-affected areas and the often-overlooked issue of child soldiers in India. It also highlights the various laws, treaties and constitutional provisions in India concerning children and makes suggestions for ways of tackling the problems of child soldiering and Naxalism that can ensure more inclusive and harmonious growth and development in these regions. 2020 Melbourne University Law Review. All rights reserved. -
Navigating the need for accessible labelling through the narratives of consumers with visual impairment in India
This study aims to understand the strategies consumers with visual impairment (CWV) use in acquiring product information and explores preferences for accessible labelling and its benefits. This study employed the qualitative approach of thematic analysis. A snowball sampling technique was used to recruit participants. Data were collected from CWV through semi-structured interviews. The sample size of this study was 12. The data were analysed using NVivo software. The study revealed three strategies used by CWV to obtain product information, namely reliance on caregivers, staff, and technology. However, all the strategies employed have multiple drawbacks. The study reported a high preference for accessible labelling in braille and quick response (QR) codes. Implementing a combination of braille labels and QR codes on product packages was the most beneficial strategy for CWV. The Implementation of accessible labels ensures inclusion in the marketplace. The Author(s) 2024.