Browse Items (11855 total)
Sort by:
-
An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment
Nowadays there are numerous intruders trying to get the privacy information from cloud resources and consequently need a high security to secure our data. Moreover, research concerns have various security standards to secure the data using data hiding. In order to maintain the privacy and security in the cloud and big data processing, the recent crypto policy domain combines key policy encryption with reversible data hiding (RDH) techniques. However in this approach, the data is directly embedded resulting in errors during data extraction and image recovery due to reserve leakage of data. Hence, a novel shuffle block key encryption with RDH technique is proposed to hide the data competently. RDH is applied to encrypted images by which the data and the protection image can be appropriately recovered with histogram bit shifting algorithm. The hidden data can be embedded with shuffle key in the form of text with the image. The proposed method generates the room space to hide data with random shuffle after encrypting image using the definite encryption key. The data hider reversibly hides the data, whether text or image using data hiding key with histogram shifted values. If the requestor has both the embedding and encryption keys, can excerpt the secret data and effortlessly extract the original image using the spread source decoding. The proposed technique overcomes the data loss errors competently with two seed keys and also the projected shuffle state RDH procedure used in histogram shifting enhances security hidden policy. The results show that the proposed method outperforms the existing approaches by effectively recovering the hidden data and cover image without any errors, also scales well for large amount of data. 2018, Springer Science+Business Media, LLC, part of Springer Nature. -
Multiple slip effects on MHD non-Newtonian nanofluid flow over a nonlinear permeable elongated sheet: Numerical and statistical analysis
Purpose: The purpose of this paper is to examine the interaction effects of a transverse magnetic field and slip effects of Casson fluid with suspended nanoparticles over a nonlinear stretching surface. Mathematical modeling for the law of conservation of mass, momentum, heat and concentration of nanoparticles is executed. Design/methodology/approach: Governing nonlinear partial differential equations are reduced into nonlinear ordinary differential equations and then shooting method is employed for its solution. The slope of the linear regression line of the data points is calculated to measure the rate of increase/decrease in the reduced Nusselt number. Findings: The effects of magnetic parameter (0=M=4), Casson parameter (0.1=?<8), nonlinear stretching parameter (0=n=3) and porosity parameter (0=P=6) on axial velocity are shown graphically. Numerical results were compared with another numerical approach and an excellent agreement was observed. This study reveals the fact that the Brownian motion parameter and boundary layer thickness have a direct relationship with temperature. Also, Brownian motion and thermophoresis contribute to an increase in the thermal boundary layer thickness. Originality/value: Despite the immense significance and repeated employment of non-Newtonian fluids in industry and science, no attempt has been made up till now to inspect the Casson nanofluid flow with a permeable nonlinear stretching surface. 2019, Emerald Publishing Limited. -
GASP XVIII: Star formation quenching due to AGN feedback in the central region of a jellyfish galaxy
We report evidence for star formation quenching in the central 8.6 kpc region of the jellyfish galaxy JO201 that hosts an active galactic nucleus (AGN), while undergoing strong ram-pressure stripping. The ultraviolet imaging data of the galaxy disc reveal a region with reduced flux around the centre of the galaxy and a horse-shoe-shaped region with enhanced flux in the outer disc. The characterization of the ionization regions based on emission line diagnostic diagrams shows that the region of reduced flux seen in the ultraviolet is within the AGN-dominated area. The CO J2-1 map of the galaxy disc reveals a cavity in the central region. The image of the galaxy disc at redder wavelengths (9050-9250 reveals the presence of a stellar bar. The star formation rate map of the galaxy disc shows that the star formation suppression in the cavity occurred in the last few 108 yr. We present several lines of evidence supporting the scenario that suppression of star formation in the central region of the disc is most likely due to the feedback from the AGN. The observations reported here make JO201 a unique case of AGN feedback and environmental effects suppressing star formation in a spiral galaxy. 2019 The Author(s) Published by Oxford University Press on behalf of the Royal Astronomical Society. -
Light weight authentication protocol for WSN using ECC and hexagonal numbers
Wireless Sensor Network (WSN) is a spatially distributed network. It contains many numbers of distributed, self-directed, small, battery powered devices called sensor nodes or motes. In recent years the deployment of WSN in various application domains are growing in a rapid pace as with the upcoming boom of Internet of Things (IoT) and Internet of Everything (IoE). However, the effectiveness of the WSN deployment is restricted due to the constrained computation and power source. Hence, many researchers have been proposing new approaches and models to improve the efficiency of the domain specific WSN deployment procedures. Though, many research communities addressing various issues in WSN deployment, still the privacy and security of such networks are susceptible to various network attacks. Thus, it is necessary to practice different models for authentication and privacy preservation in a highly dynamic resource constrained WSN environment to realize the effectiveness and efficiency of the deployment. Hence, this paper addressing an authentication scheme that can reduce energy consumption without compromising on security and privacy. In order to provide a light weight authentication mechanism, this paper proposing an authentication mechanism for WSN deployment by combining the features of Elliptic Curve Cryptography (ECC) and Hexagonal numbers. The feature of ECC is used to reduce the key size and the effectiveness of generating hexagonal numbers is used for minimizing the energy consumption in a resource constrained WSN environment. The results of the proposed approach are evaluated with the different authentication models and the results were indicating that the proposed approach can perform better than the other approaches. 2019 Institute of Advanced Engineering and Science. -
Platinum decorated polythiophene modified stainless steel for electrocatalytic oxidation of benzyl alcohol
Abstract: Platinum nanoparticles were electrochemically deposited on conducting polymer polythiophene (PTh)-coated stainless steel (SS) substrate. A thin layer of PTh on the steel substrate facilitates uniform deposition of Pt nanoparticles on the substrate, thereby improving the surface area to a great extent. The electrochemical properties of the modified electrodes were analyzed by cyclic voltammetry (CV) and electrochemical impedance spectroscopy (EIS). The physicochemical properties of the modified electrodes were investigated by Scanning electron microscopy (SEM), Transmission electron microscopy (TEM), X-ray diffraction spectroscopy (XRD), Raman spectroscopy, and Fourier transform infrared spectroscopy (FTIR). The proposed method has been applied for the electrocatalytic oxidation of benzyl alcohol in the presence of a mediator, 2,2,6,6-tetramethylpiperidine 1-oxyl (TEMPO). Cyclic voltammetric studies reveal that the electrocatalytic activity of PtPTh/SS electrode is higher than that of PTh/SS electrode toward the conversion of benzyl alcohol to benzaldehyde. Graphic abstract: [Figure not available: see fulltext.]. 2019, Springer Nature B.V. -
Understanding blame attributions in rape among legal professionals
Rape in the Indian context, is a prominent issue, greatly influenced by socio-cultural values and beliefs. Victim blaming and the concept of an ideal victim is a social evil that makes life difficult for rape survivors. What would happen if officials responsible for providing justice possess this tendency? The study aimed at understanding this question through a qualitative study on eight legal professionals including two magistrates and six advocates. The data obtained was analysed using thematic network analysis as well as content analysis. It was observed that victim blaming was present in the responses given, but blame was directed onto other factors as well. Victim blaming varied with victim characteristics and blame was greater in case of acquaintance rape rather than stranger rape. Culture based stereotypes, sex roles and rape myths were observed and seemed to affect the way they made decisions. A more extensive study in future including a broader sample and professionals from different administrative realms can help understand the issue better. 2019 International Journal of Criminal Justice Sciences (IJCJS). -
An exploration of attitudes toward dogs among college students in Bangalore, India
Conversations in the field of anthrozoology include treatment and distinction of food animals, animals as workers versus pests, and most recently, emerging pet trends including the practice of pet parenting. This paper explores attitudes toward pet dogs in the shared social space of urban India. The data include 375 pen-and-paper surveys from students at CHRIST (Deemed to be University) in Bangalore, India. Reflecting upon Serpells biaxial concept of dogs as a relationship of affect and utility, the paper considers the growing trend of pet dog keeping in urban spaces and the increased use of affiliative words to describe these relationships. The paper also explores potential sex differences in attitudes towards pet and stray dogs. Ultimately, these findings suggest that the presence of and affiliation with pet dogs, with reduced utility and increased affect, is symptomatic of cultural changes typical of societies encountering the second demographic transition. Despite this, sex differences as expected based upon evolutionary principles, remain present, with women more likely to emphasize health and welfare and men more likely to emphasize bravery and risk taking. 2019 by the authors. Licensee MDPI, Basel, Switzerland. -
Speech to text conversion and summarization for effective understanding and documentation
Speech, is the most powerful way of communication with which human beings express their thoughts and feelings through different languages. The features of speech differs with each language. However, even while communicating in the same language, the pace and the dialect varies with each person. This creates difficulty in understanding the conveyed message for some people. Sometimes lengthy speeches are also quite difficult to follow due to reasons such as different pronunciation, pace and so on. Speech recognition which is an inter disciplinary field of computational linguistics aids in developing technologies that empowers the recognition and translation of speech into text. Text summarization extracts the utmost important information from a source which is a text and provides the adequate summary of the same. The research work presented in this paper describes an easy and effective method for speech recognition. The speech is converted to the corresponding text and produces summarized text. This has various applications like lecture notes creation, summarizing catalogues for lengthy documents and so on. Extensive experimentation is performed to validate the efficiency of the proposed method. Copyright 2019 Institute of Advanced Engineering and Science. All rights reserved. -
Stereotype threat and psychological wellbeing in children of prisoners
Stereotypes are ideas that one holds regarding individuals because of their membership to a specific group. The current research was undertaken to study stereotype perception and stereotype threat on the psychological wellbeing of children of prisoners. Eight children of prisoners in the age range of 17 to 25 (females = 4), whose fathers were in prison for more than a year, participated in the study. Semi-structured interview method was used to collect data from the participants and data were analyzed using thematic network analysis method. Results revealed that children of prisoners strongly perceive stereotypes against them and they conform to stereotypes. Further to this, it was found that stereotype threat had positive effects in terms of increased goal-directed behavior and negative effects in terms of reduced happiness and increased feelings of anger and sadness. These Undings are discussed in light of previous literature on the effects of stereotypes on behavior. 2019 International Journal of Criminal Justice Sciences (IJCJS). -
New insights into surface functionalization and preparation methods of MWCNT based semiconductor photocatalysts
The manuscript primarily describes the influence of various synthesis strategies on the photocatalytic properties of MWCNT/TiO2 binary nanohybrids. The multiwalled carbon nanotube modified titania hybrids synthesized via two-step reaction involving the covalent functionalization with green and mild oxidizing agent like H2O2, followed by simple surfactant/template free hydrothermal synthesis exhibited the maximum photocatalytic efficiency. The Total Organic Carbon (TOC)analysis showed complete mineralization of the persistent Rhodamine B dye in about 8 h. These synthesized nanohybrids in varying MWCNT content were tested for their photocatalytic efficiency in the degradation of explosive effluents like 4-nitrophenol and picric acid. The UVVis diffuse reflectance spectroscopy (UVVis DRS), X-ray photoelectron spectroscopy (XPS), BrunauerEmmettTeller Surface area analysis (BET), Fourier transform infrared spectroscopy (FT-IR), Transmission electron microscopy (TEM)and Raman spectra analysis evidently revealed the effective synergistic interaction between the MWCNT and titania at the interface that has contributed to the significant enhancement of photocatalytic performance. 2019 Elsevier Ltd and Techna Group S.r.l. -
Balanced constrained partitioning of distinct objects
Partition is the process of dividing ? elements of a set into ? non-empty subsets where every element is included in exactly one subset. Set partitioning problems play an important role in real-world scenarios such as scheduling, management and grouping. In this paper, n distinct objects are arranged into different groups and the problem of partition is evaluated concerning a people assignment problem of a multi-site company. New constraints such as minimum and the maximum number of people in a single-site company (respectively m and M) that are fixed for all sites are introduced and the solutions for the partition problem for the constraints are also established. BEIESP. -
Recommender system for personalised travel itinerary
A recommender system is an approach to give an appropriate solution to a particular problem. This helps in recognising the pattern or behaviour of a user to suggest future possible likes of the user. Nowadays people like to travel during their spare time, it has become a rigid task to decide where to go. This paper represents a customised recommender system to help users in destining their itinerary. A model is designed to suggest the best places to visit in Rome. A questionnaire was prepared to get information about user's interest during their travel. The model generates the best five places to visit with respect to the choice picked by the user. The top five places for each category will be displayed to the user and the user was asked to pick a starting point for the itinerary. Then the model generates another set off a filtered list of places to enhance their travel experience. It includes displaying the top 5 restaurants to visit during their travel. Copyright 2019 Institute of Advanced Engineering and Science. All rights reserved. -
Effective fraud detection in healthcare domain using popular classification modeling techniques
Fraud is any activity with malicious intentions resulting in personal gain. In the Present Day scenario, every sector is polluted by such fraudulent activities to fetch unauthorized benefits. In HealthCare, an increase in fraudulent insurance claims has been observed over the years which may constitute around 3-5% of the total cost. Increasing healthcare costs along with the hike in fraud cases have made it difficult for people to approach these services when required. To avoid such situations, we must understand and identify such illegal acts and prepare our systems to combat such cases. Thus, there is a need to have a powerful mechanism to detect and avoid fraudulent activities. Many Data mining approaches are applied to identify, analyze and categorized fraud claims from the genuine ones. In this paper, various frauds existing in the Health Care sector have been discussed along with analyzing the effect of frauds in the health care domain with existing data mining models. Furthermost, a comparative analysis is performed on two existing approaches to extract relevant patterns related to fraudulent claims. BEIESP. -
Benzimidazole and benzothiazole conjugated Schiff base as fluorescent sensors for Al3+ and Zn2+
Two benzimidazole/benzothiazole based azomethines, (E)-2-(1H-benzo[d]imidazol-2-yl)-4-(4-(diethylamino)-2-hydroxybenzylideneamino)phenol (HBZA) and (E)2-(benzo[d]thiazol2-yl)4-(4-(diethylamino)2-hydroxybenzylideneamino)phenol (HBTA) were designed and synthesised. Investigations of solvatochromic behaviour of these fluorophores in solvents of varying polarities showed large Stokes shift of 134210 nm. Time resolved Laser induced fluorescence measurements revealed the excited state dynamics of the fluorophores. Molecules were also found to be emissive in aggregated state as seen from the aggregation induced emission studies. Appreciable absorption and emission spectral changes upon co-ordination of HBZA with Al3+/Zn2+ and HBTA with Al3+, as well as good sensitivity and selectivity, indicated their capability of detecting the two analytes. The binding stoichiometry was determined using electrospray ionization mass spectrometry (ESI-MS) and the binding mechanism was studied using density functional theory. 2019 Elsevier B.V. -
Significance of induced magnetic field and exponential space dependent heat source on quadratic convective flow of Casson fluid in a micro-channel via HPM
The effects of the exponential space based heat source on quadratic convective flow of Casson fluid in a microchannel with an induced magnetic field is studied through a statistical approach. The flow is considered in vertical microchannel formed by two vertical plates. The solution for the governing equations has been obtained for the velocity, induced magnetic field and temperature field using Homotopy Perturbation Method (HPM). The current density, skin friction co-efficient and Nusselt number expressions are also estimated. The impact of various physical parameters on the velocity, temperature, induced magnetic field, current density, skin friction co-efficient and Nusselt number distributions have been discussed with the help of graphs. The results obtained by using HPM, are compared to those obtained by using the Runge-Kutta-Fehlberg 4-5th order method and an excellent agreement is found. The impact of Casson fluid parameter and the exponential heat source is qualitatively agreed for all flow fields. 2019 IIETA. -
An algorithm for IoT based vehicle verification system using RFID
The verification of vehicle documents is an important role of transport department which is rising day by day due to the mass registration of the vehicles. An automated vehicle verification system can improve the efficiency of this process. In this paper, we propose an IOT based vehicle verification system using RFID technology. As a result, the vehicle checking which is done now manually can be replaced by automation. There is a loss of a significant amount of time when the normal vehicle checking is done manually. The proposed system will make this process automated. The present verification process is using inductive loops that are placed in a roadbed for detecting vehicles as they pass through the loop of the magnetic field. Similarly, the sensing devices spread along the road can detect passing vehicles through the Bluetooth mechanism. The fixed audio detection devices that can be used to identify the type of vehicles on the road. Other measurements are fixed cameras installed in specific points of roads for categorising the vehicles. But all these mechanisms cannot verify the documents and certificates of the vehicles. In our work, we have suggested an algorithm using RFID technology to automate the documentation verification process of the vehicles like Pollution, Insurance, Rc book etc with the help of RFID reader placed at road checking areas. This documents will be updated by the motor vehicle department at specific periods. Copyright 2019 Institute of Advanced Engineering and Science. All rights reserved. -
Effectiveness of exponential heat source, nanoparticle shape factor and Hall current on mixed convective flow of nanoliquids subject to rotating frame
Purpose: The study of novel exponential heat source (EHS) phenomena across a flowing fluid with the suspension of nanoparticles over a rotating plate in the presence of Hall current and chemical reaction has been an open question. Therefore, the purpose of this paper is to investigate the impact of EHS in the transport of nanofluid under the influence of strong magnetic dipole (Hall effect), chemical reaction and temperature-dependent heat source (THS) effects. The Khanafer-Vafai-Lightstone model is used for nanofluid and the thermophysical properties of nanofluid are calculated from mixture theory and phenomenological laws. The simulation of the flow is also carried out using the appropriate values of the empirical shape factor for five different particle shapes (i.e. sphere, hexahedron, tetrahedron, column and lamina). Design/methodology/approach: Using Laplace transform technique, exact solutions are presented for the governing nonlinear equations. Graphical illustrations are pointed out to represent the impact of involved parameters in a comprehensive way. The numeric data of the density, thermal conductivity, dynamic viscosity, specific heat, Prandtl number and Nusselt number for 20 different nanofluids are presented. Findings: It is established that the nanofluid enhances the heat transfer rate of the working fluids; the nanoparticles also cause an increase of viscous. The impact of EHS advances the heat transfer characteristics significantly than usual thermal-based heat source (THS). Originality/value: The effectiveness of EHS phenomena in the dynamics of nanofluid over a rotating plate with Hall current, chemical reaction and THS effects is first time investigated. 2019, Emerald Publishing Limited. -
Thermal analysis of nanofluid flow containing gyrotactic microorganisms in bioconvection and second-order slip with convective condition
Bioconvection in magneto-nanoliquid embedded with gyrotactic microorganisms across an elongated sheet with velocity slip of second order is addressed. Nonlinear thermal radiation and chemical reaction aspects are retained in energy and concentration equations. Numerical simulations for the modeled problem are proposed via RungeKuttaFehlberg-based shooting technique. Special attention is given to the impact of involved parameters on the profiles of motile microorganisms, nanoparticle volume fraction, temperature and velocity. Our simulations figured out that assisting flow generates more heat transfer than the opposing flow situation. The motile microorganisms boundary layer decayed for higher bioconvection Peclet and bioconvection Lewis numbers. 2018, Akadiai Kiad Budapest, Hungary. -
Tracing the outer disk of NGC300: An ultraviolet view
We present an ultra-violet (UV) study of the galaxy NGC300 using GALEX far-UV (FUV) and near-UV (NUV) observations. We studied the nature of UV emission in the galaxy and correlated it with optical, HI and mid-infrared (3.6 ?m) wavelengths. Our study identified extended features in the outer disk, with the UV disk extending up to a radius of 12 kpc (> 2 R25). We estimated the FUV and NUV disk scale-length as 3.05 0.27 kpc and 2.66 0.20 kpc respectively. The scale-length in FUV is 2.3 times larger than that at 3.6 ?m, and we also find the disk to gradually become flatter from longer to shorter wavelengths. We performed a statistical source subtraction to eliminate the background contaminants and identified 261 unresolved UV sources between the radii 5.3 kpc and 10 kpc (1 ? 2 R25). The identified UV sources show an age range between 1300 Myr with a peak at 25 Myr and a mass range between 10 3M? to 10 6M?, estimated using Starburst99 models. The north-eastern spiral arm is found to be populated by young low mass sources suggesting that the star formation in this spiral arm is a recent phenomenon. The UV emission beyond the R25 radius has contribution from these low mass sources and is extended up to ? 2 R25 radius. We conclude that NGC300 has an extended UV disk, mainly populated by young low mass sources. The star formation rate is measured to be ?0.46M?/yr which is comparable to its near optical twin M33. 2019, Indian Academy of Sciences. -
Enhancing Greedy Web Proxy caching using Weighted Random Indexing based Data Mining Classifier
Web Proxy caching system is an intermediary between the Web users and servers that try to alleviate the loads on the origin servers by caching particular Web objects and behaves as the proxy for the server and services the requests that are made to the servers. In this paper, the performance of a Proxy system is measured by the number of hits at the Proxy. Higher number of hits at the Proxy server reflects the effectiveness of the Proxy system. The number of hits is determined by the replacement policies chosen by the Proxy systems. Traditional replacement policies that are based on time and size are reactive and do not consider the events that will possibly happen in the future. The performance of the web proxy caching system is improved by adapting Data Mining Classifier model based on Web User clustering and Weighted Random Indexing Methods. The outcome of the paper are proactive strategies that augment the traditional replacement policies such as GDS, GDSF, GD? which uses the Data Mining techniques. 2019