Browse Items (11807 total)
Sort by:
-
A Narrative Review on Experience and Expression of Anger Among Infertile Women
Infertility is stressful among women though there are several technological advancements in treating infertility. Anger is a powerful emotion resulting due to stigma and oppression due to infertility, especially among women. Studies have also proven that women have a poor quality of life in the context of infertility. Women are prone to suppressing anger rather than dealing with anger in the present. Psychosocial intervention and psychoeducation help women manage anger and maintain healthy quality of life. Springer Nature Switzerland AG 2023. -
A Narrative Synthesis on the Role of Affective Computing in Fostering Workplace Well-Being Using a Deep Learning Model
Emotional information is more valued in the modern workplaces with increased focus on the need for sensing, recognizing and responding to human emotions. Integrating human emotions as information for communication and decision-making is possible through the computer-based solution called as affective computing. Affective computing is a relatively less explored AI platform though the notion is more than two decades old. The cognitive algorithms employed in affective computing operates in three key areas, viz. context sensitivity, augmented reality, and proactiveness, with outcomes in the fields of emotion management, health, and productivity. Affective computing promises better management of organizational outcomes such as fostering workplace well-being, promoting happiness, productivity, engagement levels, and communication. Further, affective computing can play vital roles in an employees life cycle with applications in functional areas of HRM like employee selection, training and development, and performance management. Even as workplaces are increasingly adopting affective computing, an analysis of its positive effects can help practitioners take informed decisions about its implementation. This paper outlines the theoretical underpinnings of affective computing, discusses the relevance of ResNet50 in image analysis, and proposes a step-by-step methodology for implementing affective computing techniques in the workplace. The potential benefits and challenges of adopting affective computing in fostering workplace well-being are also discussed. Thus, this chapter investigates the role of affective computing in fostering well-being in the workplace usinga deep learning model. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
A Neural Network Based Customer Churn Prediction Algorithm for Telecom Sector
For telecommunication service providers, a key method for decreasing costs and making revenue is to focus on retaining existing subscribers rather than obtaining new customers. To support this strategy, it is significant to understand customer concerns as early as possible to avoid churn. When customers switch to another competitive service provider, it results in the instant loss of business. This work focuses on building a classification model for predicting customer churn. Four different deep learning models are designed by applying different activation functions on different layers for classifying the customers into two different categories. A comparison of the performance of the different models is done by using various performance measures such as accuracy, precision, recall, and area under the curve (AUC) to determine the best activation function for the model among tanh, ReLU, ELU, and SELU. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
A Neuro Fuzzy with Improved GA for Collaborative Spectrum Sensing in CRN
Cognitive Radio Networks (CRN) have recently emerged as an important solution for addressing spectrum constraint and meeting the stringent criteria of future wireless communication. Collaborative spectrum sensing is incorporated in CRNs for proper channel selection since spectrum sensing is a critical capability of CRNs. According to this viewpoint, this study introduces a new Adaptive Neuro Fuzzy logic with Improved Genetic Algorithm based Channel Selection (ANFIGA-CS) technique for collaborative spectrum sensing in CRN. The suggested methods purpose is to find the best transmission channel. To reduce spectrum sensing error, the suggested ANFIGA-CS model employs a clustering technique. The Adaptive Neuro Fuzzy Logic (ANFL) technique is then used to calculate the channel weight value and the channel with the highest weight is selected for transmission. To compute the channel weight, the proposed ANFIGA-CS model uses three fuzzy input parameters: Primary User (PU) utilization, Cognitive Radio (CR) count and channel capacity. To improve the channel selection process in CRN, the rules in the ANFL scheme are optimized using an updated genetic algorithm to increase overall efficiency. The suggested ANFIGA-CS model is simulated using the NS2 simulator and the results are investigated in terms of average interference ratio, spectrum opportunity utilization, average throughput, Packet Delivery Ratio (PDR) and End to End (ETE) delay in a network with a variable number of CRs. 2022, Tech Science Press. All rights reserved. -
A new algorithm with its randomness and effectiveness against statistical tests in data encryption
In the world where security is one of the main concern, we are still not able to make our data secure. Privacy is one of the major concerns in todays world, where all the organization are dealing with data leak problem, data theft, data intrusion. We came up with a mathematical model to encrypt and decrypt data securely. In this paper we have came up with a technique to encrypt and decrypt data using non-deterministic random numbers and generating two cipher text for each data unit (character) and verified the randomness of our cipher text using chi-square test, Gaps test. IJSTR 2020. -
A new assessment of quantum key distribution, attenuation and data loss over foggy, misty and humid environment
Quantum encryption is a method of key transfer in cryptography by using quantum entanglement of photons. The real power of quantum entanglement is instantaneous communication that is non intercept able. The advantage of quantum encryption method is, it can be incorporated with conventional encryption methods safely. The quantum cryptography can replace conventional key exchange mechanism with the polarized photons using channels like optic fiber cables. Quantum cryptographic can also provide far and secure data communication. The present day experiments clearly proved that the quantum cryptography can be implemented through medium like optic fiber cable or air. But the distance of transmission through the air is limited by rule of line of sight propagation. The quantum key distribution will have uses in different types of communication between distant parts of earth. So this paper discussing various aspects of Quantum key distribution and successfully calculated polarized photon loss during transmission of Quantum cryptography link, while using in various type of atmospheric conditions like Mist Fog Haze. Also successfully calculated probability of single polarized photon missing by successfully utilizing the Light transmission characteristics and power measurements in various Atmospheric conditions. 2018, UK Simulation Society. All rights reserved. -
A new combinational technique in image steganography
Internet is used for exchanging information. Sometimes it is needed to transmit confidential data via internet. Here the authors use image steganography to pass confidential data within a cover image. To construct the algorithm, they take the combinational help of particle swarm optimization (PSO), bi-orthogonal wavelet transform (BWT), and genetic algorithm (GA). They use PSO to take the enhanced version of cover image. They use BWT to choose the selective sub bands of cover image and we utilize GA to select a particular stego image among a set of stego images. Thus, an innovative technique of image steganography has been made to transmit confidential data via cover image generating stego image. This combinational approach of image steganography is quite safe for confidential data transmission and makes it hard for the attackers to retrieve the confidential data. 2021 IGI Global. All rights reserved. -
A new computational technique for the analytic treatment of time-fractional EmdenFowler equations
This paper presents the study of fractional EmdenFowler (FEF) equations by utilizinga new adequate procedure, specifically the q-homotopy analysis transform method (q-HATM). The EF equation has got greater significance in both physical and mathematical investigation of capillary and nonlinear dispersive gravity waves. The projected technique is tested by considering four illustrations of the time-fractional EF equations. The q-HATM furnish ?, known as an auxiliary parameter, by the support of ? we can modulate the various stages of convergence of the series solution. Additionally, to certify the resolution and accurateness of the proposed method we fitted the suitable numerical simulations. The redeem results guarantee that the proposed process is more convincing and scrutinizes the extremely nonlinear issues emerging in the field of science and engineering. 2021 International Association for Mathematics and Computers in Simulation (IMACS) -
A New Economics Awaits Us
This article attempts to look into the concept of othering in the context of urban development. The major motivation for the initiation of this article came after reading Dipankar Guptas book review titled A New Sociology Awaits Us (EPW, 26 December 2020), which mainly concentrated on urban affairs. 2022 Economic and Political Weekly. All rights reserved. -
A new extension of hesitant fuzzy set: An application to an offshore wind turbine technology selection process
Wind energy is an energy source that is naturally clean, safe and cheap. It comes from a variety of sources. The electric energy generated by a wind turbine manifests as kinetic energy throughout the earth. The energy received from the wind is clean and is permanently available and can be generated forever. Turbine characteristics also have an impact on wind energy production. The turbine properties within a wind farm are important in estimating the load on power generation and wind turbine energy. The amount of energy released is calculated according to the type of the turbine model applied. In many situations, the choices of turbine model can incur various vague and complicated hesitation situations. To manage this situation, a hesitant fuzzy set with the Multi Criteria Decision Making (MCDM) is used. In the present research, the newly proposed Normal Wiggly Hesitant Fuzzy-Criteria Importance Through Intercriteria Correlation (NWHF-CRITIC) and Normal Wiggly Hesitant Fuzzy-Multi Attribute Utility Theory (NWHF-MAUT) methods were employed to rank turbine models based on quality, power level, voltage, and capacity. As part of this process, the NWHF method was utilized to extract and gather deeper information from the decision-makers. 2021 The Authors. IET Renewable Power Generation published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. -
A New Facile Iodine-Promoted One-Pot Synthesis of Dihydroquinazolinone Compounds
A one-pot iodine catalyzed reaction has been developed for the preparation of dihydroquinazolinones from isatoic anhydride, enaminones, and amines in modest to good yields. The reaction has been screened in various catalysts and solvents and a gram scale experiment has been performed based on the optimum conditions. A possible mechanism has been proposed based on the control experiments. The reaction has been checked with broad range of substrates. 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim -
A new facile synthesis of (2S,5S)-5-hydroxypipecolic acid hydrochloride
A simple and efficient synthesis of (2S,5S)-5-Hydroxypipecolic acid hydrochloride is reported. The key features of the synthesis involve the asymmetric reduction of ketone using (S)-CBS oxazaborolidine and the use of commercially available methyl pyroglutamate as a starting material.. 2022 Taylor & Francis Group, LLC. -
A New Facile Ultrasound-Assisted Magnetic Nano-[CoFe2O4]-Catalyzed One-Pot Synthesis of Pyrano[2,3-c]pyrazoles
Pyrano[2,3-c]pyrazole derivatives have been synthesized through a one-pot multicomponent condensation of various aldehydes, dialdehydes, and ketones with malononitrile, ethyl acetoacetate, hydrazine hydrate (or phenylhydrazine) in the presence of magnetic nano-[CoFe2O4] catalyst under ultrasonic irradiation. The catalyst can be recovered using an external magnet and used repeatedly. 2019, Pleiades Publishing, Ltd. -
A new framework for contour tracing using Euclidean distance mapping
In this paper, a new fast, efficient and accurate contour extraction method, using eight sequential Euclidean distance map and connectivity criteria based on maximal disk, is proposed. The connectivity criterion is based on a set of point pairs along the image boundary pixels. The proposed algorithm generates a contour of an image with less number of iterations compared to many of the existing methods. The performance of the proposed algorithm is tested with a database of handwritten character images. In comparison to two standard contour tracing algorithms (the Moore method and the Canny edge detection method), the proposed algorithm found to give good quality contour images and require less computing time. Further, features extracted from contours of handwritten character images, generated using the proposed algorithm, resulted in better recognition accuracy. Copyright 2021 Inderscience Enterprises Ltd. -
A new lightweight data security system for data security in the cloud computing
In recent decades, data has proved indispensable to all facets of human existence. The development of several applications has resulted in the exponential expansion of data. This information can be encrypted and stored in secure areas. Cloud computing is the technology that can be used to store these massive data sets. The article suggests a Cloud-based Data Security System (C-DSS) that employs a five-tiered trust model for cloud-edge data-sharing architectures. The data owner can select an appropriate trust level and Cyber Threat Information (CTI) sanitization procedure before releasing CTI for analytic strategy. In addition, this cleansing method is conducted either by an end device or by the cloud service supplier, based on the organization's degree of confidence in latter. Research presents the trust architecture, cloud architecture, and installation methodology, all of which are intended to meet widest variety of needs for exchanging secret CTI information. The testing findings high degree of data security and an evident improvement in terms of cypher processing time and security services when compared to the encryption systems that are most often employed in cloud technology. In conclusion, research briefly outlines development and evaluation performed so far by pilot applications confirming the architecture. 2023 The Authors -
A new meta-heuristic pathfinder algorithm for solving optimal allocation of solar photovoltaic system in multi-lateral distribution system for improving resilience
A new meta-heuristic Pathfinder Algorithm (PFA) is adopted in this paper for optimal allocation and simultaneous integration of a solar photovoltaic system among multi-laterals, called interline-photovoltaic (I-PV) system. At first, the performance of PFA is evaluated by solving the optimal allocation of distribution generation problem in IEEE 33- and 69-bus systems for loss minimization. The obtained results show that the performance of proposed PFA is superior to PSO, TLBO, CSA, and GOA and other approaches cited in literature. The comparison of different performance measures of 50 independent trail runs predominantly shows the effectiveness of PFA and its efficiency for global optima. Subsequently, PFA is implemented for determining the optimal I-PV configuration considering the resilience without compromising the various operational and radiality constraints. Different case studies are simulated and the impact of the I-PV system is analyzed in terms of voltage profile and voltage stability. The proposed optimal I-PV configuration resulted in loss reduction of 77.87% and 98.33% in IEEE 33- and 69-bus systems, respectively. Further, the reduced average voltage deviation index and increased voltage stability index result in an improved voltage profile and enhanced voltage stability margin in radial distribution systems and its suitability for practical applications. 2021, The Author(s). -
A new numerical investigation of fractional order susceptible-infected-recovered epidemic model of childhood disease
The susceptible-infected-recovered (SIR) epidemic model of childhood disease is analyzed in the present framework with the help of q-homotopy analysis transform method (q-HATM). The considered model consists the system of three differential equations having fractional derivative, and the non-linear system exemplifies the evolution of childhood disease in a population and its influence on the community with susceptible, infected and recovered compartment. The projected method is a mixture of q-homotopy analysis method and Laplace transform. Two distinct explanatory cases are considered, and corresponding simulations have been demonstrated in terms of plots for different value of the order. The present investigation elucidates that the projected both derivative and technique play a vital role in the analysis and illustrate the behaviour of diverse mathematical models described with differential equations in human disease. 2021 THE AUTHORS -
A new optimal design and analysis method based on MADM for MEMS products development
Abstract This paper presents an optimum design method to support the total micro-electromechanical systems (MEMS) product/device optimization, and its evaluation at the conceptual stage itself using the multiple attribute decision making method. In the traditional MEMS product development cycle, simulation and design using software tools are very important due to the knowledge limitation and complexity in design, fabrication, and packaging processes. The available tools are time consuming and relay on trial and error to achieve an optimum solution. The proposed method simplifies the relationship between parameters of design, fabrication, materials, packaging, and the performance of the MEMS product. The methodology is explained with the help of design flow diagram and time chart. A MEMS-based radio frequency (RF) power sensor is designed and the methodology is demonstrated. The proposed sensitivity analysis method is more effective and less time consuming than traditional techniques. Sensitivity analysis is carried out by varying the thickness of the signal conductor. The results of RF power sensor with insertion loss 0.428 dB, reflection loss 25.956 and voltage standing wave ratio of 1.106 at 1.5 GHz are reported. Springer-Verlag London Limited 2012. -
A New Series Solution Applicable to a Class of Boundary Layer Equations with Exponential Decay in Solution
A new series solution for the coupled nonlinear boundary value problem (BVP) of the FalknerSkan-type, resulting from the use of the boundary layer approximation to a mixed convective flow is obtained. The solution domain is transformed from the semi-infinite interval of physical interest to the unit interval by using the transformation z= 1 - e-?. The coupled nonlinear BVP is converted into an equivalent initial value problem (IVP) by supplying appropriate initial conditions. Series solution of the equivalent IVP is obtained in powers of 1 - e-? with assistance from the NewtonRaphson method. Convergence of the series is assured by the very design of the series as confirmed by the DombSykes plots and the plots of partial sums. The results of the series solution compare well with the numerical results obtained by the shooting method based on the RungeKuttaFehlberg45 and NewtonRaphson methods. The novelty of the methodology lies in the construction of a new series solution for a class of problems with exponential decay in their solution. Such a work has not been reported before. 2020, Springer Nature India Private Limited. -
A new shape of the supply chain during the COVID-19 pandemic
Purpose: The COVID-19 pandemic has created a new normal for international business (IB) activities, leaving them pondering their next steps. The decreasing effectiveness of current vaccines to protect individuals against new variants have created uncertainty on how to respond to the new waves of the COVID-19 infection. This study aims to empirically assesses how IBs perceive the unfolding challenges in the supply chain due to the pandemic and the solutions. Design/methodology/approach: The survey data is obtained from 166 logistics professionals in Hong Kong and India. Findings: The results reveal that returns on investment, logistics, delays and imports are the most affected areas. The most often recommended solutions for supply chain management (SCM) include using local manufacturing capabilities, analytics and automation, offering better customer service, providing more effective transportation means, ensuring diligence around optimization and focusing on sustainability. Originality/value: The findings of this study help to improve supply chain operations. This study also provides recommendations for changes to SCM in response to the new normal. 2022, Emerald Publishing Limited.