Browse Items (5293 total)
Sort by:
-
Cognitive marketing and purchase decision with reference to pop up and banner advertisements
The aim of this research paper is to employ a mixed research approach and to check how the past data differs from the present and hence it uses an argument mapping to find the reality using focus group. Since genders have different opinion on pop-up and banner advertisements, two focus groups, one group consisting the female gender and the other focus group consisting the male respondents have been taken for the data collection. Small sample has been used for the argument mapping (N=45/Male) and (N=47/Female). A series of steps has been conducted in the argument mapping and relevant maps have been developed for drawing inference. It is found that, male have no patience to deal with the pop-up and banner advertisements but women are keener and patient enough to make the best use of these advertisements. On the other hand a questionnaire was framed from the variables found from the literature review and the same was distributed to both the genders and it was found collectively that though pop-up advertisements and banner advertisements are useful in some way, it is always considered to be a negative aspect. Misleading advertisements, data security scam are a few negative aspects of such advertisements and hence, there are a lot of ugly truth behind pop up and banner advertisements. The mixed research approach (triangulation) between the quantitative and qualitative is a new initiative taken by the researchers in this research and holds originality of the study. 2018 Academic Research Publishing Group. -
Heat and mass transfer effects on non-newtonian fluid flow over an unsteady stretching surface with viscous dissipation and thermal radiation
This paper analyzes the flow, heat and mass transfer characteristics of non-Newtonian Casson fluid towards an unsteady permeable stretching surface. An external transverse magnetic field is applied normal to the sheet. The effects of viscous dissipation and thermal radiation are considered in energy equation. Rosseland approximation is used to model the radiative heat transfer. With the aid of similarity transformations, the unsteady boundary layer equations are transformed into a set of non-linear ordinary differential equations. Numerical solutions of resulting non-linear differential equations are solved by using efficient fourth-fifth order Runge-Kutta Feldberg method. The obtained numerical results are compared and found to be in good agreement with previously published results. Behavior of emerging parameters on velocity, temperature and concentration profiles are discussed and presented graphically. Further, variation of the reduced skin friction coefficient, Nusselt and Sherwood number against physical parameters in graphical and tabular form are presented and discussed in detail. It is found that the effects of thermal radiation and viscous dissipation are favorable for thickening the thermal boundary layer. 2018 Pushpa Publishing House, Allahabad, India. -
Fishing in the Troubled Waters: Fishermen Issue in IndiaSri Lanka Relations
Indias relations with its neighbours in the maritime domain have received less scholarly attention. Those studies that deal with Indias relations with its South Asian neighbours generally touch on political security, socio-cultural and economic issues. The maritime aspect is either ignored or tucked in as a part of other dimensions. The present study attempts to fill the gap in the literature by taking up the case of Sri Lanka. Sri Lanka is chosen as a case, not only because the island state is Indias closest maritime neighbour but also due to the existence of deep interactions between the two countries in diverse fields both at governmental and non-governmental levels. In the maritime domain, in the present context, technically speaking, there is no problem between the two countries. However, the fishermen issue remains one of the issues principally because of the Tamil Nadu factor. Analysing the issue in five phases, the study argues for a comprehensive approach for its settlement.1. 2018, 2018 Indian Council of World Affairs. -
A study of consumers' attitude towards online private label brands using the Tri - Component model
Online private label products seem to be a promising and profitable deal for the Indian online retailers. The purpose of this paper was to understand the consumers' attitude and buying behaviour towards online private label brands. For this purpose, we empirically tested a model comprising of variables such as cognitive, affective, behavioural, purchase intention, and actual buying behaviour. Data were gathered by using a schedule. A sample of 400 respondents was gathered, and the hypotheses were tested by performing structural equation modelling. The findings highlighted that the cognitive, affective, and behavioural factors of attitude influenced each other strongly as well as the purchase intention. In addition, the results obtained revealed that purchase intention led to the buying of online private label brands. It is expected that the findings of this study will enable the marketers of online private label brands to be more informed about the consumers' attitude formation process. Furthermore, it will help them to understand the areas related to private label brands, which need their attention. 1964-2018 Associated Management Consultants. -
Hall effects on dusty nanofluid two-phase transient flow past a stretching sheet using KVL model
The influence of Hall current on the time-dependent flow of nanofluid in the presence of dust particles is investigated. The water-based copper nanoliquid containing fine dust particles occupies a stretching surface. The effective thermal conductivity and the viscosity of the nanoliquid are estimated by KVL (Khanafer-Vafai-Lightstone) model. The notion of boundary layer approximation is employed to model the governing equations for both nanofluid and dust phases. Similarity transformations are employed to obtain ordinary differential equations from the governed partial differential equations. The numeric solutions are developed via Runge-Kutta-Fehlberg integration scheme. The graphical illustrations are to explain the impacts of the governing parameters on flow fields. It is established that the nanofluid's Nusselt number increases due to the suspension of dust particles. An enhancement of heat transfer rate has a direct relationship with Hall current and unsteadiness. 2018 Elsevier B.V. -
Exploration of Chemical Reaction Effects on Entropy Generation in Heat and Mass Transfer of Magneto-Jeffery Liquid
In many chemical engineering processes, a chemical reaction between a foreign mass and the fluid does occur. These processes find relevance in polymer production, oxidation of solid materials, ceramics or glassware manufacturing, tubular reactors, food processing, and synthesis of ceramic materials. Therefore, an exploration of homogeneous first-order chemical reaction effects on heat and mass transfer along with entropy analysis of Jeffrey liquid flow towards a stretched isothermal porous sheet is performed. Fluid is conducting electrically in the company of transverse magnetic field. Variations in heat and mass transfer mechanisms are accounted in the presence of viscous dissipation, heat source/sink and cross-diffusion aspects. The partial differential equations system governing the heat transfer of Jeffery liquid is reformed to the ordinary differential system through relevant transformations. Numerical solutions based on Runge-Kutta shooting method are obtained for the subsequent nonlinear problem. A parametric exploration is conducted to reveal the tendency of the solutions. The present study reveals that the Lorentz force due to magnetism can be used as a key parameter to control the flow fields. Entropy number is larger for higher values of Deborah and Brinkman numbers. It is also established that the concentration species field and its layer thickness of the Jeffery liquid decreases for a stronger chemical reaction aspect. To comprehend the legitimacy of numerical results a comparison with the existing results is made in this exploration and alleged an admirable agreement. 2018 Walter de Gruyter GmbH, Berlin/Boston 2018. -
Calculator using brain computer interface
This paper is undertaken with an aspiration to provide a new way to calculate that can be availed by exploiting BCI. Often it's said things moved at the blink of eye, now the time has come to make it true. This project is developed to ease the efforts in two different ways. First a mind controlled image viewer is build which can be used to change images at the blink of an eye. Second is a simple single digit calculator which lets the user choose the number and the operators just by focusing.Brain-Computer Interface aims to improve the detection and decoding of brain signals acquired by electroencephalogram (EEG). IAEME Publication. -
Parallel queue scheduling in Dynamic Cloud environment using Backfilling algorithm
Cloud Computing reshapes the entire computing paradigm. In general, cloud computing means outsourcing available services and data storage in centralized scenario. In cloud computing task allocation is a major problem because multiple numbers of tasks are allocated to multiple numbers of processors for simultaneous processing. From the given list, tasks are queued according to the ascending order based on their duration. This paper is designed to solve the Task Scheduling problem, by using our proposed effective new approach of Backfilling algorithm. Depending upon the task duration, tasks are split into multiple threads for processing. Multiple thread tasks are processed in the basic concept of "gang scheduling" technique. Here we implement new backfilling algorithm concept to minimize the idle processing time of the processors. The existing Simple Backfilling Algorithm (SBA) is used to minimize the ideal time processing. Whereas comparatively Dynamic Cloud Scheduling using Backfilling Algorithm (DCBA) is designed to reduce the ideal time processing than SBA to carry out the process of both LQueue and SQueue simultaneously. At the outset, DCBA reduces the average waiting time. As mentioned the algorithm which is specified in the previous line that contains three level which represent the working speed of the algorithm. The first and second level of DCBA algorithm is comparatively similar to the performance of SBA algorithm. The maximum better performance was given in a queue size (q=1.5) by DCBA algorithm as compare to SBA algorithm. The existing type (Gang Scheduling) consist of two approaches namely Adaptive First Come First Serve (AFCFS) and Largest Job First Served (LJFS) that focus on non-parallel jobs with deadline. When compare to existing gang scheduling algorithm and SBA algorithm the average waiting time of DCBA has slight improvement in the loader level of the key. As the separation of the queue like LQ and SQ the waiting time and average waiting time is reduced comparatively. 2018, Intelligent Network and Systems Society. -
Performance evaluation of diesel engine using genetic algorithm
?Abstract: Engine analysis and optimization is not a new approach to the field of automobiles. It has always been a keen focus in the research of experts domestically as well as internationally, the control of Air-Fuel Ratio (AFR) in transient operating conditions of engine. For the last few decades, the industry and economic expansion of developed countries has showed a clean increase in the vehicle production as well as transport volume. Global warming, acid rain, greenhouse effect and air pollution problems related to emission of CO2, NOx, PM, CO and unburned HC, together with the consumption of fossil fuels, unite to create serious problems at a global level. Therefore it is a research study considering all these current issues and taking it to a new level of optimization for the output of a better efficiency, better economy and less pollution. Performance of Diesel Engine is evaluated by parameters like Power, Torque and Specific Fuel Consumption. 2018, Blue Eyes Intelligence Engineering and Sciences Publication. All rights reserved. -
Facebook post analysis for a celebrity page
Social Media is a subject that is large and extremely talked about in the present day. The expanding accessibility of the web and the development of social media brought in a necessity for the analysis of data based on a Facebook page. The number of information generated by social media platforms are expanding exponentially. The best approach to understand data of this magnitude lies in mining and analysis of such big data. The present focus is on the analysis of a Facebook Fan Page. This research work concentrates on the examination of the number of likes, post shares and correlation of posts and comments on various topics, fields or areas of a Facebook page. 'Like' is not the only way of rating a post nowadays. There are also recently added features like emoticons which display emotions such as 'love', 'wow', 'angry', 'sad', etc., to rate a post. The objective of this paper is to extract the data available and to perform analysis on a cricket fan page. Python is used to extract and analyse the information. IAEME Publication. -
Significance of key distribution using quantum cryptography
The main challenge to the cryptosystems is providing secrecy in distributing key. This challenge is explained through key distribution problem. The key distribution in classical cryptosystems is based on classical information or bits. As bits can be replicable, there will be scope for an eavesdropper to make copies of information. The classical key distribution methods rely on computational assumptions which are not potential to offer anticipated results. Consequently, it is solved using laws of quantum mechanics, and the solution is Quantum Key Distribution (QKD). In QKD, the bits are encoded into quantum states or qubits using photon polarization. The qubits cannot be replicated as per the laws of quantum mechanics. An attempt to replication will introduce errors. Thus an eavesdropping will inevitably lead to detectable traces and then the legitimate entities will decide upon discarding a particular qubit. BB84 protocol is the first QKD protocol evolved in 1984. This paper notifies the significance of QKD over key distribution performed using classical methods. It is evidently shown that the time taken to distribute a secret key through BB84 QKD protocol is comparatively less than the classical methods of key distribution. 2018 ICIC International. -
Thermal Marangoni convection in two-phase flow of dusty Casson fluid
This paper deals with the thermal Marangoni convection effects in magneto-Casson liquid flow through suspension of dust particles. The transpiration cooling aspect is accounted. The surface tension is assumed to be fluctuating linearly with temperature. The fluid and dust particle's temperature of the interface is chosen as a quadratic function of interface arc length. The governing problem is modelled by conservation laws of mass, momentum and energy for fluid and dust particle phase. Stretching transformation technique is utilized to form ordinary differential equations from the partial differential equations. Later, the numerical solutions based on Runge-Kutta-Fehlberg method are established. The momentum and heat transport distributions are focused on the outcome of distinct governing parameters. The results of Nusselt number is also presented and discussed. It is established that the heat transfer rate is higher in the case of dusty non-Newtonian fluid than dusty Newtonian fluid. The rate of heat transfer can be enhanced by suspending dust particles in a base liquid. 2017 -
Experimenting with ONOS scalability on software defined network
In traditional network, a developer cannot change the configuration of a router with software programs to control the behavior of the network switches due to closed vendor specific configuration scripts. In order to make the routers/switches programmable, a new architecture of network has to be developed and this gave rise to Software defined networks. It is the new architecture for Computer Networks in which, the old traditional architecture is slowly depreciated. It is very difficult to adapt new technology especially to decide upon which controller has to be considered and what may be its scalability to compete the dynamic circumstances of networks. Many researches are working on possible solutions and look upon SDN to overcome the traditional network limitations. There are many SDN controllers existing amongst them, some are OpenDaylight, Floodlight, Onos, Ryu, Beacon etc. From the existing multiple controllers serving the SDN services to the network, Onos is one of the Controller. ONOS can be deployed on Docker container and it is accessed using its IP as a host. In this paper, authors are contributing for the evaluation of the Performance to check the Scalability of ONOS controller by taking many scenarios which are experimented on the simulation tool of Mininet, Onos Controller, Docker and iPerf. ONOS Controller?s simulated environments are observed for its throughput evaluated in dynamic conditions of a network over Mesh topology by gradually increasing the number of hosts until its supported by the system with optimum resource utilization. 2018, Institute of Advanced Scientific Research, Inc.. All rights reserved. -
Understanding user behavior through web utilization mining
This paper is focused on the efficiency of applications in Web Mining Algorithm for web log analysis which can be applied to identify user behavior and the context related to the pattern of an e-commerce website. The main objective is to find user behavior over the internet which can be done through the branch of web mining i.e., web utilization mining. So, it is mainly focused on learning the behavior of web user with their interaction with websites and application of web to extract hidden knowledge and information from World Wide Web. This motive can be accessed from the huge web log data and this data will be available in a log file of the server. Thus, the web server log file includes hidden knowledge and information of a visited user on web. This article provides a survey and analysis of current web mining system and technologies. Therefore, we implement how web mining techniques can apply to the web personalization by providing an efficient algorithm. 2018 IAEME Publication. All rights reserved. -
A comparison of algorithms for controller replacement in software defined networking
Software Defined Network (SDN) partitions the control plane and the information plane to decrease the cost and for increasing the capacity for upgrading, and this will be helpful for the network administrators to manage the network services. It's the location where the controller exists. One of the main issue in Software Defined Networking is the location of the controllers as this could affect network execution and cost. In this paper, we have done an analysis on some algorithms that have been used for minimizing the number of controllers to reduce the latency, delay, etc. while placing a controller with the consideration of communication among the controller and the nodes. 2018 Authors. -
Assessment of SERVQUAL Model in Hospitals Located in Tier II Cities of India
Service quality, being an assessment of services offered to a customer or the extent to which the services offered meets customers expectations, plays a significant role in healthcare industry. Patients pay hefty prices for the services they avail from specialty hospitals and they demand quality services. Hospitals have a larger challenge in delivering these services effectively to the patients. The current study helps us understand the role of information systems in service delivery process. Most of the hospitals have adopted healthcare information systems due to the benefit it provides. The study attempts to analyze the impact of information systems on service quality in the hospitals which are located in Tier II cities. The popular SERVQUAL model is adopted for this purpose. Patients who visit the hospitals were part of the respondent group. Gap score is found in order to observe the expected and actual experience of the patients based on five dimensions. 2018, 2018 Indian Institute of Health Management Research. -
Lung cancer detection using image processing techniques
Lung cancer is one of the hazardous disease which leads to high death rates in the world. A cancer is an irregular growth of cells that can be characteristically derived from a single irregular cell and that may spread to whole part of the lung. So, it is necessary to find it at the earlier stages and take basic steps to cure.CT scan is one of the sensitive method used in the medical field for treating the patients. The quality of the image is very important for detection of lung cancer. Pre-processing of an image is a necessary process, as there is a difficulty in detecting cancer cells in an image due to the presence of noise and low-quality of images. To reduce the volume of these problems, diagnosis of lung cancer steps like image enhancement, image segmentation, feature extraction methods can be used. For processing and implementation of these methods Matlab tool has been used. This paper focuses on improving the quality of image and to optimise the work. Implementation is done using image processing toolbox that is available in Matlab tool.The whole idea of this research is to show the improved work in the existing system and to get more agreeable results. RJPT All right reserved. -
Platt number of total graphs
The degree of an edge uv is defined as the number of edges incident on vertices u and v other than itself. The Platt number of a graph is the sum of degrees of all its edges. In this paper, the concept of degree of an edge is analysed in social networks. The Platt number is investigated in certain classes of graphs and their total graphs. Also related bounds are proposed on connected graphs. An algorithm developed to determine the Platt number of any connected graph is presented. 2018 Academic Publications. -
Security analysis in multi-tenant cloud computing healthcare system
Cloud Computing is an innovation in the field of Information Technology and in healthcare system because of the deployment models which services as profitability for the tenants. Cloud Computing is cost-effective, flexible and a delivery platform which provides business and services over internet. Multi-tenancy with its hardware sharing and high degree of configurability is utilized in cloud computing health care system even though many health care organizations are unwilling to adapt due to infrastructure and security shortcoming. In order to store the sensitive health care data cloud service providers should include promising security features where both the trusted and untrusted parties should be addressed in it. This paper addresses the security requirements and security issues in multi-tenant healthcare system, a frame is proposed for analyzing the security issues based on the available requirements and possible counter measures been suggested. The security concerns are analyzed by trust, confidentiality, integrity, audit and compliances and furthermore insight for the security is provided in multi cloud with possible security recommended for healthcare system. IAEME Publication. -
Numerical investigation of two-phase mixed convection flow of particulate oldroyd-B fluid with non-linear thermal radiation and convective boundary condition
The present investigation addresses the mixed convection two-phase flow of dusty Oldroyd-B fluid towards a vertical stretching surface in the presence of convective boundary condition and nonlinear thermal radiation. The fluid and dust particles motion is coupled only in the course of drag and heat transfer between them. The Stokes linear drag theory is employed to model the drag force. The numerical solutions based on the Runge-Kutta-Fehlberg scheme with shooting method are presented for both fluid and particle phase velocity and temperature fields. Further, numerical results are obtained for skin friction factor and local Nusselt number of prescribed values of pertinent parameters. The results are presented graphically and the physical aspects of the problem are analyzed. The obtained results are validated with existing results and found to be in good agreement. It is established that the mass concentration of the dust particle parameter plays a key role in controlling flow and thermal behaviour of non-Newtonian fluids. An asymptotic state occurs in the rate of heat transfer for larger values of the Biot number. It is also proved that the significance of radiation effect in nonlinear form is outstanding in comparison with the traditional linear radiation effect. The momentum boundary layer thickness for both fluid and dust phase become loftier due to the consequence of buoyancy force. 2018 Trans Tech Publications, Switzerland.