Browse Items (11810 total)
Sort by:
-
An efficient scheme for water leakage detection using support vector machines (SVM)-Zig
Water is one of the most essential and valuable resources for all living beings, yet in the present day, there is a scarcity of it. Half of the water loss in large cities and industries is due to leaks and illegal lines. 10%-20% of water loss can be reduced by detecting leaks but without the presence of advanced monitoring systems, this problem is typically worsened. Monitoring the consumption and leak detection for such large areas is a challenging task. To overcome this issue a small prototype is prepared called Zig. Zig is designed for both household and industrial purposes. Its main aim is to monitor the flow and consumption of water at different levels of a building like a first-floor and so on which may represent some industrial and household situation. This work focuses on pressure/flow monitoring method to reduce the operational cost and also to detect leakage. One of the machine learning algorithms, Support Vector Machines (SVM) has been applied to detect the leakage and it is compared with Random Forest algorithm to show that proposed scheme is detecting water leakage better. BEIESP. -
Impact of social-emotional learning intervention on emotional intelligence of adolescents
Adolescents face a variety of challenges, some of which include social, emotional, cognitive, and interpersonal. In order to help them with their emotions, adolescents should be taught a variety of skills to regulate and handle emotions better. With this intent in mind, a social-emotional learning (SEL) intervention module was developed by the researchers. This module covered aspects related to self-awareness, social awareness, responsibility, empathy and decision-making. These components also form the basis for emotional intelligence (EI) which is defined as the ability to perceive, understand, and regulate emotions of oneself and others. The present study aimed to understand if there arises any difference in scores of EI post the SEL intervention. Second, the gender differences with respect to EI were also be analyzed. The EI Scale (2014) was administered to 80 students between the age group of 13-14 years, from a CBSE school in Chennai. These adolescents were selected through the convenience sampling, and the four subscales were also analyzed. The findings from the study revealed a significant difference in scores from pretest to posttest (t = -4.66, P < 0.05). With respect to gender, no significant difference was found. On the subscales, two of four subscales showed significant difference in understanding emotions (Z = -4.63, P < 0.05) and handling emotions (Z = -4.023, P < 0.05). Indian Journal of Social Psychiatry. All Rights Reserved. -
LGBTQIA+ rights, mental health systems, and curative violence in India
This commentary examines the spaceattitudeadministrative complex of mainstream mental health systems with regard to its responses to decriminalisation of nonheteronormative sexual identities. Even though the Supreme Court, in its 2018 order, instructed governments to disseminate its judgment widely, there has been no such attempt till date. None of the governmentrun mental health institutions has initiated an LGBTQIA+ rights-based awareness campaign on the judgment, considering that lack of awareness about sexualities in itself remains a critical factor for a noninclusive environment that forces queer individuals to end their lives. That the State did not come up with any awareness campaign as mandated in the landmark judgment reflects an attitude of queerphobia in the State. Drawing on the concept of biocommunicability, analysing the public interfaces of staterun mental health institutions, and the responses of mental health systems to the death by suicide of a queer student, I illustrate how mental health institutions function to further antiLGBTQIA+ sentiments of the state by churning out customerpatients out of structural violence and systemic inequalities, benefitting the mental health economy at the cost of queer citizens on whom curative violence is practised. Indian Journal of Medical Ethics 2022. -
Farmers' Protests, Death by Suicides, and Mental Health Systems in India: Critical Questions
Ongoing farmers' protests have once again brought back the spotlight on the agrarian crisis in India. Even though upstream factors that perpetuate farmers' suffering, including the role of the state in promoting agrocapitalism, have been discussed extensively by scholars and activists across the spectrum, mental health discourses almost always frame it as a mental health problem to be addressed by increasing access to psychopharmaceuticals. Drawing on developments around farmers' protests and analysis of articles published in flagship journals of largest professional bodies of clinical psychologists and psychiatrists in India, I highlight the intimate relationship between neoliberal state and farmers' distress to which the mental health system shuts its ears and eyes obscuring and downplaying socio-structural determinants of farmers' mental health. Copyright 2021 Springer Publishing Company, LLC. -
A Mental Health Epidemic?: Critical Questions on the National Mental Health Survey
Questions are raised about an approach towards psychiatric epidemiology, which directly imports models in medicine to count disorders of the mind to produce staggering evidence to the effect that 11% of Indians suffer from mental disorders. An alternative psychiatric epidemiology is needed, which relies on the principles of slow research, is value-based, and which defines mental health as an ethical and political problem. 2022 Economic and Political Weekly. All rights reserved. -
Selfipendant and Extremal Pendant Graphs
[No abstract available] -
Graph Theory and Decomposition
The book Graph Theory and Decomposition covers major areas of the decomposition of graphs. It is a three-part reference book with nine chapters that is aimed at enthusiasts as well as research scholars. It comprehends historical evolution and basic terminologies, and it deliberates on decompositions into cyclic graphs, such as cycle, digraph, and K4-e decompositions. In addition to determining the pendant number of graphs, it has a discourse on decomposing a graph into acyclic graphs like general tree, path, and star decompositions. It summarises another recently developed decomposition technique, which decomposes the given graph into multiple types of subgraphs. Major conjectures on graph decompositions are elaborately discussed. It alludes to a comprehensive bibliography that includes over 500 monographs and journal articles. It includes more than 500 theorems, around 100 definitions, 56 conjectures, 40 open problems, and an algorithm. The index section facilitates easy access to definitions, major conjectures, and named theorems. Thus, the book Graph Theory and Decomposition will be a great asset, we hope, in the field of decompositions of graphs and will serve as a reference book for all who are passionate about graph theory. 2024 Jomon Kottarathil, Sudev Naduvath and Joseph Varghese Kureethara. -
The Pendant Number ofLine Graphs andTotal Graphs
The parameter, pendant number of a graph G, is defined as the least number of end vertices of paths in a path decomposition of the given graph and is denoted as ? p(G). This paper determines the pendant number of regular graphs, complete r-partite graphs, line graphs, total graphs and line graphs of total graphs. We explore the bougainvillea graphs, e-pendant graphs and v-pendant graphs. If the pendant number is 2, then the number of paths in the path decomposition of the given graph is at most ? (G), the maximum degree of the graph. Hence, a large class of graphs give a more reasonable solution to Gallais conjecture on number of paths in the given path decomposition. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Global iPhone Local Labour: Exploring ICT Production, Labour and Cultural Production
A theory of value pertinent to the contemporary iPhone era focuses on formal and informal labour circuits. This study extends this framework by examining a labour dispute in an iPhone factory near Bangalore, delving into its dissemination through media and the broader critical political economy surrounding the recent iPhone production in India. Furthermore, it incorporates a geographical perspective into the circuit framework to illustrate the movement of capital and labour in Bangalore, rekindling discussions on coreperiphery dynamics in the context of capital and labour migration. Further, this research builds upon the typography of worker-generated content by illustrating a specific category of such content within the iPhone labour dispute. Utilising a critical political economy of media approach, this article aims to assess the broader implications of the updated framework and to open new avenues for research within the emerging field of information communication technologies, cultural production and labour. 2024 South Asian University. -
The Persistence of Untouchability: Working Conditions of Dalit Journalists in India
This article can be viewed as an extension of the Oxfam report of 2019, which revealed that Indian news media is dominated by upper castes and the near absence of Dalit and Adivasi journalists. Using critical political economy as a framework, and undertaking qualitative interviews of self-identifying Dalit journalists, their conditions of work in mainstream news media are examined. In addition to the problems faced by journalists in general, this research reveals that Dalit journalists experience considerable psychological stress and extra intensity of work. They tolerate a toxic work environment that results in mental trauma and have to navigate rigid caste networks. Supplementing in-depth interviews with secondary data, the article argues that the conditions within which Dalit journalists function contain all dimensions of untouchability: exclusion, humiliation, and exploitation. The article concludes with a call to end this untouchability, revive the Working Journalists Act to ameliorate the conditions of work of Indias fourth estate. Specific legislation is required to ensure favorable conditions of work for Dalit journalists. Further, the article calls for a theoretical revamping of critical political economy to include caste, particularly when analyzing South Asian media. The Author 2024 -
Classification of adaptive back propagation neural network along with fuzzy logic in chronic kidney disease
A steady deterioration in kidney function over months or years is known as chronic kidney disease (CKD). Through a range of techniques, such as pharmacological intervention in moderate cases and hemodialysis and renal transport in severe cases, early identification of CKD is crucial and has a substantial influence on reducing the patient's health development. The outcomes show the patient's kidneys' present state. It is suggested to develop a system for detecting chronic renal disease using machine learning. Finding the best feature sets typically involves using metaheuristic algorithms since feature selection is an NP-hard issue with amorphous polynomials. Semi-crystalline tabu search (TS) is frequently used for both local and global searches. In this study, we employ a brand-new hybrid TS with stochastic diffusion search (SDX)-based feature selection. The adaptive backpropagation neural network (ABPNN-ANFIS) is then classified using fuzzy logic. Fuzzy logic may be used to combine the ABPNN findings. Consequently, these techniques can aid experts in determining the stage of chronic renal disease. The Adaptive Neuron Clearing Inference System (ABPNN-ANFIS) was utilised to develop adaptive inverse neural networks using the MATLAB programme. The outcomes demonstrate that the suggested ABPNN-ANFIS is 98 % accurate in terms of efficiency. 2024 -
Phytochemical analysis and antioxidant activity of leaf extracts of some selected plants of the family acanthaceae
The present era of scientific research has witnessed an enumerable amount of evidences to showcase the immense potential of medicinal plants. In the present investigation, the phytochemical analysis of Phlogacanthus pubinervius T. Anderson., Adhatoda vasica (L.) Nees,Phlogacanthus thyrsiflorus Nees, Phlogacanthus curviflorus (Wall.) Nees, and Ruellia tuberosa L. was carried out for the different plants extracted with methanol. Analysis was carried out to estimate the quantity of phenols, carbohydrates, tannins, flavonoids and proteins. The antioxidant property of these plants were analysed using DPPH method. The concentration of the plant samples required to decrease the DPPH concentration by 50% was calculated by interpolation from linear regression analysis and denoted IC50 value (g/ml). The qualitative analysis showed the presence of alkaloids, tannins, saponins, proteins, carbohydrate and phenols in all the sample extracts. The highest amount of tannins and phenols was observed in P. thyrsiflorus. P. pubinervius (77.83%), A. vasica (74.81%), P. curviflorus (94.20%), and R. tuberosa (70.78%) which showed highest antioxidant activity of DPPH-scavenging at 150 g/ml of methanol extract. The high percent of scavenging activities of those plants add value to their medicinal properties. The presence of the high amount of phytochemical compounds suggests that the plants have high amount of medicinal compounds and can be extensively used to extract the natural compounds. Kripasana & Xavier (2020). This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited (https://creativecommons.org/licenses/by/4.0/). -
Rethinking human values
Just as there are many cultures within the world, so also are there many practices, beliefs, myths, values, and traditions within each culture. These unique ways of being can often present challenging frames of reference that may prevent a whole perspective from being attained. This essay examines the contextual formation of culture and the fundamentals intricate to the search for universal values. An illumination is also provided upon some of the major and extreme forms of cultural practices that may pose difficulty in achieving such a goal. -
Design of a new curve based cipher
This work aims to develop a model with curve based cryptographic scheme which supports Confidentiality and Authentication at low computing resources and equal security. T TARU PUBLICATIONS. -
Statistical tests for key strength identification in cryptography
The cryptographic study involves three algorithms, one for Encryption of Plain text to Cipher text, one for Decryption for Cipher text back to Plain text and third for the generation of the Key. Key generation algorithm works on the principle of Randomness. In this work, the randomness of Key is studied by using Statistical methods like Runs Up & Runs Down test, Runs (Above and Below the mean), Chi Square test & Auto correlation test for its usability in Cryptographic study. 2020 IJSTR. -
Predicting and improvising the performance of rocket nozzle throat using machine learning algorithms
This paper is a study of one dimensional heat conduction with thermo physical properties like K, row, Cp of a material varying with temperature. The physical problem is characterized by a cylinder of infinite length and thickness L, imposed with a net heat flux at x= 0, with the other end being insulated. The temperatures at the insulate end are measured by placing thermocouples. As the temperatures at the other end are very high, it is not possible to measure temperatures by keeping thermocouples which will burn away. So the problem is initialized with known sensor values near insulated end. By proper predicting values by ARIMA Model, the temperature distribution in Rocket Nozzle throat system (RNT) is calculated. The outcome of the work is processed with Machine Learning algorithm like Genetic algorithm in identifying the optimal location of sensor position which helps in improvising the performance of RNT. 2020, Institute of Advanced Scientific Research, Inc. All rights reserved. -
Security Analysis for a Revocable Multi-Authority ABE-Attribute-Based Mechanism
Due to the tremendous increase in data, groups or even organizations are storing data with third-party providers to solve storage problems. Ciphertext policy attribute based encryption helps to outsource data, which means encrypt the data at the data owners end and uploading it to third-party storage with some access policy. In normal Identity-based encryption, if a data owner wants to send information to a data user, it will be sent with some identity of the data user, such as mail id, so that only that particular user can read the message. The main problem is that the data owner should know each users identity. For instance, in some organizations where a data owner wants to send a message to a group of people with an identical designation, it can be sent with the help of the users attribute using attribute-based encryption. Here, the data owner does not need to know the specific details of each user; instead, with the help of attributes and the provided access policy, they can access this message. This research mainly focuses on three aspects of CP-ABE: access policy, number of attribute authorities, and revocation. When it comes to access policy, the currently existing access policies are not secure due to their linearity in nature because shares are always calculated using the same linear equation. So, for this problem, this work has developed a non-linear SS-secret-sharing model that increases the confidentiality of the model. 2024 Seventh Sense Research Group. -
Revocable and Secure Multi-Authority Attribute-Encryption Scheme
Security is an important factor as nowadays many systems generates and process huge amount of data. This also leads many of us to rely on a third-party service provider for storing sensitive and confidential data. Providing outsourcing means the data owner will encrypt and store the data in a third-party storage system. In this paper, we are proving solutions for two main problems. The first issue is what if the attribute authority itself can access the data because the attributes and secret keys are known by attribute. This issue is called the key escrow problem. For solving it we are proposing a multi-authority system with Elliptic Curve Cryptography. The second issue that we addressed in this paper is the revocation problem, which means when someone leaves the system should be prohibited from accessing subsequent data this is called forward security and as a second case when someone joins the system should be prevented from accessing previous shared date this is called backward security. In this paper, we address both forward and backward security. For solving this problem we are using the concept of the Lagrange interpolation technique for generating and verifying secret keys. Based on this technique secret key will be dynamically altered and used for encryption and due to this can achieve greater security. 2023, Ismail Saritas. All rights reserved.