Browse Items (11810 total)
Sort by:
-
Database aware memory reconstruction for object oriented programming paradigm
Data storage is a big challenge in front of industries and researchers when its growing enormously. Traditional data storage strategy was fulfilling the business needs till the data was in structured format. But now due to Internet of Things (IoT) compatible devices unstructured data is more than structured one. In such cases traditional data storage strategy won't work efficiently. Initially data storage devices used to store the data irrespective of its logical storage. It means the record was stored either in array format or block format. Such type of storage was not matching physical and logical structure. Logically, structured data is generated as an attribute of particular entity, but physically it gets stored in a sequential memory storage either as file or as memory block. Object Based Storage pattern(OBS) stores the data in the way object gets generated by the programmer and accordingly memory is allocated for that object. Object contains all the data related to that particular entity which makes it easy to retrieve it back. Current study includes comparative advantages, operations and study of different service providers of object-based storage. We also focused on the current need of object-based storage structure for big data analysis and cloud computing. International Journal of Scientific and Technology Research. All rights reserved. -
E-leadership, psychological contract and real-time performance management: Remotely working professionals
Using the model of E- Leadership in Virtual teams (Avolio et al.), this paper examines impact of Psychological Contract, mediated by E-leadership, on Real-time Performance Management of Remotely working professionals. Following a quantitative research method, data was collected from 57 remotely working professional across the world. Significant positive relationships were found among Leadership Effectiveness of E-leaders, Relational Psychological Contract and Efficiency of RPM. The results confirm the interaction of the given variables in Avolio's Model of E-leadership, highlighting technological aspects of human interactions and ways to optimise them. The results underline several important managerial implications for effective leadership, fulfilling psychological contract and effective performance management, of a type of workforce that is only virtually available. 2019 SCMS Group of Educational Institutions. All rights reserved. -
Smart pollution monitoring system
The world has travelled a long way through the industrial revolution. One of the consequences that the industries and its different forms gave to humanity is pollution. The environment that we live is being polluted in different ways. Different parts of the world are already experiencing air pollution as a matter of concern. The increasing amount of industries and the emission of gas by the vehicles cause much damage to the air. We are in a situation where we need to monitor the amount of pollution in our areas of living and working. In order to monitor pollution, the paper proposes an efficient and low-cost method with the help of the internet of things (IoT). The system is designed to monitor the levels of CO, CO2, smoke, alcohol, NH3, temperature and humidity. The various alarms and notification are arranged in such a way that the information is given when there is any sign of threat. The remote monitoring is made possible with dedicated website and mobile app. BEIESP. -
Quality assurance in big data analytics: An IoT perspective
Emergence of IoT as one of the key data contributors in a big data application has presented new data quality challenges and has necessitated for an IoT inclusive data validation ecosystem. Standardized data quality approaches and frameworks are available for data obtained for a variety of sources like data warehouses, webblogs, social media, etc. in a big data application. Since IoT data differs significantly from other data, challenges in ensuring the quality of this data are also different and thus a specially designed IoT data testing layer paves its way in. In this paper, we present a detailed review of existing data quality assurance practices used in big data applications. We highlight the requirement for IoT data quality assurance in the existing framework and propose an additional data testing layer for IoT. The data quality aspects and possible implementation models for quality assurance contained in the proposed layer can be used to construct a concrete set of guidelines for IoT data quality assurance. 2019 Telecommunications Society and Academic Mind. -
Impact of ohmic heating on MHD mixed convection flow of Casson fluid by considering Cross diffusion effect
Present communication aims to discuss the impact of viscous dissipation on MHD flow, heat and mass transfer of Casson fluid over a plate by considering mixed convection. Nonlinear partial differential systems are reduced to the ordinary ones through transformation procedure. The modelled nonlinear systems are computed implementing RKF-45 scheme. Convergent solutions for velocity and temperature and concentration fields are given diagrammatically. The obtained results are compared with published literatures and reasonable agreement is found. It is found that, temperature profile increases by increasing values of Dufour parameter, whereas on opposite trend is observed in concentration profile for increasing values Soret parameter. 2019 B.J. Gireesha et al. -
Posttraumatic relationship experiences in women in South India
Marriage is a socially binding intimate relationship between two individuals which is expected to be stable and enduring. In many cases, there can be severe difficulties questioning the quality of ones married life such as IPV or other kinds of abuse or exploitation which could lead to a divorce. Although divorce legally dissolves the relationship, studies suggest that the stress caused by a traumatic relationship may not end after terminating the relationship. The resemblance of these symptoms to PTSD led to the proposed diagnosis of PTRS. In this study, seven participants who have been divorced due to domestic violence for at least a year were identified and interviewed regarding their past and present life situations. The emergent themes in the data pointed to several factors that may influence ones married life, the decision of divorce and current life situations which can affect the amount of stress an individual might face concerning their past traumatic relationship. The factors influencing stress experienced during a traumatic marriage included involvement and support from ones family and in-laws, nature, and cause of abuse, stress-related to children, social support and the very decision to get a divorce. The process of overcoming fear, mistrust, and grief, social and family support, child custody, and related legal processes were factors that affected stress related to the process of divorce. The grief related to child custody, ability to rationalize the decision, career, remarriage and childrens future were some factors that influenced the stress these individuals experienced currently in their life. 2019, 2019 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. -
Impact of monetary policy changes on the Indian stock market and monetary market
Since the stock market is perceived as the channel of transmissions of monetary policy, it is worthy to study the relationship between the Monetary Policy and the volatility of stock prices in the stock market. This study has been conducted with the aim to examine the impact of monetary policy changes on the stock market. The variance methodology is applied in order to achieve the objective of this study. The concept of event window in the methodology involved as the identification of volatility of price in the stock market for11 days (i.e. 5 days before and after event day). The result shows that there is a positive influence on stock market because of change in money policy by the government. The results identified in this work having a signification amount of managerial implication to the different segment of the policy makers in Government, and Stock Market. 2019 Islamic Azad University. -
Reconstruction of sparse-view tomography via preconditioned Radon sensing matrix
Computed Tomography (CT) is one of the significant research areas in the field of medical image analysis. As X-rays used in CT image reconstruction are harmful to the human body, it is necessary to reduce the X-ray dosage while also maintaining good quality of CT images. Since medical images have a natural sparsity, one can directly employ compressive sensing (CS) techniques to reconstruct the CT images. In CS, sensing matrices having low coherence (a measure providing correlation among columns) provide better image reconstruction. However, the sensing matrix constructed through the incomplete angular set of Radon projections typically possesses large coherence. In this paper, we attempt to reduce the coherence of the sensing matrix via a square and invertible preconditioner possessing a small condition number, which is obtained through a convex optimization technique. The stated properties of our preconditioner imply that it can be used effectively even in noisy cases. We demonstrate empirically that the preconditioned sensing matrix yields better signal recovery than the original sensing matrix. 2018, Korean Society for Computational and Applied Mathematics. -
Superior charge discharge ability of reduced graphene oxide/Li-ion embedded polymer composite films
Electroactive polymeric composites are recent generation material for energy application in lithium batteries, solar cells and supercapacitors. In present study, reduced graphene oxide is prepared from graphite powder using liquid exfoliation. The synthesized reduced graphene oxide is embedded with polystyrene sulfonic acid/lithium phosphate polymer electrolyte to obtain polymer composite films. The dielectric studies of composite reveals huge change in relaxation time with addition of rGO in polymeric lithium ion composites. This attributes to decrease in ion-dipolar interaction strength and enhanced polymer segmental motion in presence of carbon. It also implies the activation of electrochemical properties of polystyrene sulfonic acid/lithium phosphate/reduced graphene oxide (PLrGO) composites which can be effectively utilize for charge storage applications. The PLrGO composite exhibits an improved electrochemical performance with different scan rate on potential window ranged between ? 0.5 and 1.2V. The specific capacitance value of ~ 17F/g with high rate chargedischarge capability over 8000 cycles was observed. Higher electrochemical stability and steady charge/discharge behavior makes PLrGO composites a promising candidate for charge storage applications. 2018, Springer Science+Business Media, LLC, part of Springer Nature. -
Distributed denial-of-service detection and mitigation using software-defined network and internet of things
Internet of Things (IoT) is one of the promising technologies that are developing quickly in various fields such as automation, safety and health. It is a heterogeneous network that links various physical devices. It consists of a variety of vulnerabilities due to its heterogeneous nature. It makes a different level of security issues. Distributed Denial-of-service (DDoS) attack denies services to an authentic user and makes the resources of network inaccessible. DDoS attack is a significant problem for IoT. It is easy to carry out this attack on an IoT network. Main aim of the proposed methodology is to use Software-defined Network (SDN). The primary structure of proposed system is to integrate SDN and IoT technology. This combination is to provide a more secure infrastructure compare to traditional system. The secondary structure of proposed system is used to detect and mitigate the DDoS attacks. The proposed methodology is to check associativity of MAC IP address, source IP address and destination IP address. It was able to detect and mitigate the attack in short span of time. The results are compared on different parameters. That parameters are packet delay time, flow entries and average packet received per second by the controller. This hybrid method is to provide higher security and improve the Quality of Service (QoS). 2019, Institute of Advanced Scientific Research, Inc.. All rights reserved. -
Water dispute in Central Asia: Conflict potential
The Central Asian republics (CARs), which emerged as independent states in the post-Soviet phase, faced several challenges. During the Soviet era, the CARs were agriculturally oriented towards the Soviet economy and, accordingly, river water management was also centralized under the command economic model. However, with the collapse of the Soviet Union, the CARs had to review the existing water management arrangements. This is where the absence of a Moscow-centric central authority has proven detrimental to the region endowed with two major rivers and their several subsidiaries. In this context, the paper suggests an emphasis on multilateralism, rather than bilateralism, as a more feasible approach to river water management. Clearly, multilateralism would promote a more equitable solution compared to bilateralism, which does not adopt a holistic approach to the region. Considering the fact that the region is characterized by a water crisis in addition to the fragility of the environment makes a multilateral arrangement significantly more appropriate for the region in the long term. 2019, CA and C Press AB. All rights reserved. -
Secure provenance-based communication using visual encryption
Explicit specification of the historical record of an instance or a data item is called data provenance. It has many applications in various fields with regards to its importance on capturing data flow mechanisms. However, on the other hand, there are good number of security mechanisms in place to withstand the cyber-attacks. Almost all of these algorithms uses complex mathematical calculations in providing security for the systems. Visual cryptography is a peculiar approach which uses concept of secret sharing by dividing the message into transparencies as encryption process. Upon superimposing transparencies one obtains the original message. In this paper, we propose secret sharing as a notion of security onto data provenance. Main inference of this writing is to throw a model combining above two mentioned aspects which gives away an indigenous solution in the area of information security. This proposed model is implemented with specific use case scenarios for substantiation and related analysis. Simulated results and discussion of the same is presented in the paper. 2019 Inderscience Enterprises Ltd. -
Happiness and resilience among young physically disadvantaged employees in India: A pilot study
Purpose: The study aimed to examine and compare the happiness and resilience of disadvantaged employees and non-disadvantaged employees. Method: The study sample included 37 young employees, between 20 and 30 years of age. Among them, 17 were with physical disadvantages of one type or the other, and 20 had no physical disadvantages. Results: Mann-Whitney U test showed that there is no difference in resilience and happiness between disadvantaged and non-disadvantaged employees. Among the non-disadvantaged employees, there is a relationship between happiness and resilience. However, among the disadvantaged employees, this relationship is not there. Conclusions: Disadvantaged employees in the present sample do not differ from the non-disadvantaged in their happiness and resilience. However, it cannot be assumed that happiness is a contributing factor to the resilience of the disadvantaged employees. Also, it is not possible to generalize the results of the study due to the small sample size. 2019, Action for Disability Regional Rehabilitation Centre. All rights reserved. -
Koppa Archaeological Research Project (KARP): Exclusive Iron Age landscapes in the Western Ghats, India
Koppa Archaeological Research Project (KARP) conducted systematic transect surveys and excavations in the Coorg plateau at the upper reaches of river Kaveri in the Western Ghats, Karnataka. The archaeological record of the study area is exclusively an Iron Age landscape, as we did not find any other prehistoric or early historic sites. We focused on studying thirty-nine Iron Age (1200 BCE300 BCE) sites of two categories, habitation and megaliths, and we present here our preliminary observations addressing to site findings, their landscapes and settlement patterns. We then consider the geographical and climatic implications for understanding the formation of their economy and politics. We argue that sites in the Western Ghats did not differ significantly from the temporal and cultural material typologies of contemporary Iron Age sites in the semi-arid or savannah conditions of Deccan plateau. Yet the adaption of Iron Age communities to Western Ghats climate which is characterized by high rainfall, lush tropical forests, fallow lands and diverse faunal ecology should have had distinct implications for the development of their economy and politics. 2019 Elsevier Ltd -
An outlook in blockchain technology- Architecture, applications and challenges
Blockchain is mechanism which stores and exchange data in a peer-peer network serving as an immutable ledger allowing transactions to take place in decentralized method which neglects the role of intermediaries. The technology reduces greater complexity by combining three key features; security, decentralization and transparency. This paper is an attempt explaining the concepts, structure, applications and challenges the technology has. The paper introduces blockchain taxonomy, reviews applications and discussed technical challenges and way of handling these challenges. Blockchain technology is springing up with promising applications in various fields and the authors have explored about three emerging field of blockchain say; Education, Government and Healthcare. Finally the paper concludes by stating other emerging fields of applications where further research can be explored. International Research Publication House. -
EShield: An effective detection and mitigation of flooding in DDoS attacks over large scale networks
Distributed Denial-of-Service attacks are very hard to be mitigated in wireless network environment. Here in this manuscript, an effective method of flood detection and mitigation architecture is proposed named eShield, which detects and prevent flooding attacks through spoof detection technique. The proposed method uses an architecture and an algorithm. eShield deals with Intrusion Protection and Detection Systems (IPDS) which collaboratively defend flooding attacks at different points in the network. Here eShield detects the supply node with its port variety which were below assault. Inorder to reduce the burden on international IPDS eShield makes use of distinct nearby IPDS for the assaults in flooding which have been carried out collaboratively. The assessment is done through the widespread simulation of eShield and it is proved to be an actual values based on time delay, false positive rates, computation and communication overhead. BEIESP. -
Effectiveness of blended classroom among varied streams of undergraduate language learners An Experimental Study
Technology has become an integral part of learners today and keeping with the time, researchers have developed learning methods that address this issue. There have been several methods developed to address this issue. One of the most successful techniques that has in the recent past contributed largely to active learning is flipped classroom. Communication skills is the need of the hour, to ensure an employable community this study endeavours to develop a learning technique that will nurture active learners and improve their communication skill in a technology oriented community. Hence the paper aims at finding and deliberating the efficacy of implementing flipped classroom to improve communication skills among undergraduate learners from science and humanities majors. BEIESP. -
A novel SIW based dual-band power divider using double-circular complementary split ring resonators
This article presents a novel design of substrate integrated waveguide (SIW) dual-band power divider loaded with double-circular complementary split-ring resonators (CSRRs). The double-circular CSRRs are etched on the top layer of the proposed structure to obtain the dual-band characteristic. The proposed geometry provides a passband frequency below the cut-off frequency of the SIW due to the electric dipole nature of the CSRRs. By changing the dimensions of the CSRRs, various passband characteristics are studied. To validate the design idea, a compact dual band power divider with equal power division operating at 8.4 and 11.7 GHz is designed, fabricated, and tested. A good steadiness is found between simulated and tested results. The proposed idea provides features of compact size, dual-band operation, and good isolation. The size of the fabricated prototype excluding microstrip transition is 0.473?g 0.284?g, where ?g is the guided wave length at the center frequency of first band. 2019 Wiley Periodicals, Inc. -
Temporal correlation between the optical and ? -ray flux variations in the blazar 3C 454.3
Blazars show optical and ? -ray flux variations that are generally correlated, although there are exceptions. Here we present anomalous behaviour seen in the blazar 3C 454.3 based on an analysis of quasi-simultaneous data at optical, ultraviolet, X-ray, and ? -ray energies, spanning about 9 yr from 2008 August to 2017 February.We have identified four time intervals (epochs), A, B, D, and E, when the source showed large-amplitude optical flares. In epochs A and B the optical and ? -ray flares are correlated, while in D and E corresponding flares in ? -rays are weak or absent. In epoch B the degree of optical polarization strongly correlates with changes in optical flux during a short-duration optical flare superimposed on one of long duration. In epoch E the optical flux and degree of polarization are anticorrelated during both the rising and declining phases of the optical flare. We carried out broad-band spectral energy distribution (SED) modelling of the source for the flaring epochs A,B, D, and E, and a quiescent epoch, C. Our SED modelling indicates that optical flares with absent or weak corresponding ? -ray flares in epochs D and E could arise from changes in a combination of parameters, such as the bulk Lorentz factor, magnetic field, and electron energy density, or be due to changes in the location of the ? -ray-emitting regions. 2019 The Author(s) Published by Oxford University Press on behalf of the Royal Astronomical Society. -
Detection of strangers based on dogs sound
Nowadays, people having a pet at home are increasing. Usually, dog is the favorite pet animal for most of the people in the world. Dogs are more capable of identifying strangers in the surroundings than humans. The proposed work identifies the strangers based on the barking sound of the dog. In this anticipated work, multiple features are extracted from the dogs barking sound using Fast Fourier Transform and Statistical based methods. The classification is done using Nae Bayes classifier. The dataset contains 770 barking audio files of 8 dogs. Whenever known and unknown person comes home, the sounds of the dogs are recorded. The classification result for identifying the stranger is 79.1094%. BEIESP.