Browse Items (5589 total)
Sort by:
-
Service request scheduling based on quantification principle using conjoint analysis and Z-score in cloud
Service request scheduling has a major impact on the performance of the service processing design in a large-scale distributed computing environment like cloud systems. It is desirable to have a service request scheduling principle that evenly distributes the workload among the servers, according to their capacities. The capacities of the servers are termed high or low relative to one another. Therefore, there is a need to quantify the server capacity to overcome this subjective assessment. Subsequently, a method to split and distribute the service requests based on this quantified server capacity is also needed. The novelty of this research paper is to address these requirements by devising a service request scheduling principle for a heterogeneous distributed system using appropriate statistical methods, namely Conjoint analysis and Z-score. Suitable experiments were conducted and the experimental results show considerable improvement in the performance of the designed service request scheduling principle compared to a few other existing principles. Areas of further improvement have also been identified and presented. Copyright 2018 Institute of Advanced Engineering and Science. All rights reserved. -
Data encryption and decryption using graph plotting
Cryptography plays a vital role in today's network. Security of data is one of the biggest concern while exchanging data over the network. The data need to be highly confidential. Cryptography is the art of hiding data or manipulating data in such a way that where no third party can understand the original data while transmission from source to destination. In this paper, a modified affine cipher algorithm has been used to encrypt the data. The encrypted data will be plot onto a graph. Later, graph will be converted into image. This system allows sender to select his/her own keys to encrypt the original data before plotting graph. Then, Receiver will use the same key to decrypt the data. This system will provide the better security while storing the data in cloud in the form of secret message embedding in graphical image file in network environment. IAEME Publication. -
Securing iot networks using an onion routing based approach
Internet of Things (IoT) comprises of small, connected, power-efficient devices with minimal to average computing power. The devices are autonomous, cyber-physical objects capable of sensing, processing, storing and networking. Due to their connected nature, they are exposed to a huge number of threats and vulnerabilities. A new gateway to ensure anonymity in IoT networks using The Onion Router (TOR) hidden services in a Single-Board Computer (SBC) is proposed in this paper. IAEME Publication. -
House of sustainable waste management: An implementation framework
Manufacturing industries consume large amounts of natural resources as inputs to production in order to generate much lower amounts of useful products, leaving a major part of the inputs as by-products which are wastes. Waste disposal, in the present form, has significant adverse impacts on the environment as it can result in pollution of many forms. The present research critically examines the various revolutionary concepts of 'cradle to cradle (C2C)', 'design for green (DfG)', 'triple top line' and 'waste is food' as applied to industrial waste management. The exploratory study examines the prevailing practices and suggests approaches for sustainable industrial waste management. The paper proposes the 'house of sustainable waste management' which is a reference framework for industrial waste management which comprises three parts, 'the hierarchy', 'the pillars' and 'the foundations'. The proposed framework is conceptual in nature and provides a direction for implementation of sustainable industrial waste management. Copyright 2018 Inderscience Enterprises Ltd. -
The behaviour of macro and micro economic variables and the impact on systematic risk of non-banking finance companies
The reforms initiated by the Government of India during 1990s have brought fundamental changes in the structure and functioning of Banking and Non-Banking Institutions, their business models and the products and services offered by them. Global economic developments have altered the macro economic conditions of the respective nations and make the nations and their economies vulnerable to economic shocks in the form of systematic risk associated with their business activities. Macro-economic factors and micro economic factors have had effect on the risk level, assessing risk, measuring and managing risk has become paramount for Non-Banking financial Institutions. Individual influence of factors on the systematic risk as there is weak relationship with Beta but combined effect of factors is very positive on the systematic risk of the companies. Indian Institute of Finance. -
Identification of negative comments from positive sentences through data analysis
Social media has become a part, where people say what they think. It has made remarkable condition for individuals to impart their thoughts to the world. More consumers are writing their reviews which help people to make decisions about the quality and whether they should purchase the product. With respect to distinguishing perspectives out of this immense pool of conclusions, it turns into a laborious task and doing it physically is in every practical sense impossible. When we want to purchase things the best way to choose the finest product is to rely upon the opinions of others who already purchased those items. Sentiment analysis is utilized to choose whether the author's view is positive, negative, or neutral towards a specific item. This paper provides a review of apple mobile phone where we find polarity of a product based on scoring. We also worked on identifying negative comments in a positive sentence. We found the count of different polarity of words from overall positive feedbacks and stored the negative words so that we can identify which feature of the product is not acceptable and should be work with. We are representing our final result using wordcloud where we can detect which features has flaws. IAEME Publication. -
Shell script to clone AODV routing protocol in network Simulator-2
Background and Objective: Most of the research that are carried in ad hoc routing protocol is through simulation. While working with a simulator, the codes are enclosed in a component that is accessible to all the developers. The difficulty arises as there is no enough documentation and users find it difficult to modify different C++ and TCL files. Even if one component is modified then the entire Network Simulator-2 (NS-2) suite must be reconfigured. Cloning the protocol manually takes a lot of time and prone to error. Our objective is to ease the work of developers and researchers by showing the procedure to clone the AODV protocol automatically using a script. Methodology: In this study, a shell script is developed that will clone the AODV protocol by modifying 18 C++ and TCL files of the protocol and NS-2 suite by automatically inserting the code in exact files at exact position. It also configures the NS-2 and installs the entire NS-2 suite along with setting the path in .bash files. Results: In this research work, a comparison of cloned protocol with AODV protocol is done based on throughput time and packet loss metrics and the results generated are exactly same for both the protocols. The results of the study reveal that the proposed script clones the AODV protocol successfully. Conclusion: This work proves that the proposed script can clone the AODV protocol faster with just one execution of shell script. This methodology will save the time and help the developers or research to focus more on their study on the protocol. 2018 Authors. -
Facile synthesis of preformed mixed nano-carbon structure from low rank coal
Coal is a natural energy resource which is mainly used for energy production via combustion. Coal has nanocrystals embedded in it, formed during the coalification process, and is an ideal precursor for nano-carbon dots and diamonds. Herein, we report a facile top-down method to synthesise nanodots and diamonds of the size of 5 nm to 10 nm from three different types of coal by simple chemical leaching. TEM analysis revealed the formation of a mixture of carbon dots, graphene layers, and quantum dots in bituminous coal and sub-bituminous coal. Raman analysis confirmed the existence of synthesized nano-diamond and nano-carbon mixed phase with defects associated with it. It is concluded that graphene quantum dots, nano-diamonds, graphene sheets and carbon dots present in coal can be extracted by simple chemical treatment. These structures can be tuned to photoluminescent material for various optoelectronic applications or energy harvesting devices like super capacitors. 2018. This is an open access article distributed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. -
Nonlinear Gravitational and Radiation Aspects in Nanoliquid with Exponential Space Dependent Heat Source and Variable Viscosity
The nonlinear convective flow of kerosene-Alumina nanoliquid subjected to an exponential space dependent heat source and temperature dependent viscosity is investigated here. This study is focuses on augmentation of heat transport rate in liquid propellant rocket engine. The kerosene-Alumina nanoliquid is considered as the regenerative coolant. Aspects of radiation and viscous dissipation are also covered. Relevant nonlinear system is solved numerically via RK based shooting scheme. Diverse flow fields are computed and examined for distinct governing variables. We figured out that the nanoliquids temperature increased due to space dependent heat source and radiation aspects. The heat transfer rate is higher in case of changeable viscosity than constant viscosity. 2018, Springer Science+Business Media B.V., part of Springer Nature. -
Analysis of supervised and unsupervised technique for authentication dataset
Traditional methods of data storage vary from the present. These days data has become more unstructured and requires to be read contextually. Data Science provides a platform for the community to perform artificial intelligence and deep learning methodologies on large volumes of structured and unstructured data. In the era of artificial intelligence, AI is showing it's true potential by addressing social causes and automation in various industries such as automobile, medicine and smart buildings, healthcare, retail, banking, and finance service are some of the deliverables. From a variety of sources and flooding data, AI and machine learning are finding real-world adoption and applications. The nature of the data models is trial and error and is prone to change with their discoveries for the specific problem and this is the case with the different algorithms used. In this paper, we apply machine learning algorithms such as unsupervised learning k-means, bat k-means and supervised learning decision tree, k-NN, support vector machine, regression, discriminant analysis, ensemble classification for data set taken from UCI repository, phishing website, website phishing, Z- Alizadeh Sani and authentication datasets. Authentication dataset is generated for testing Single Sign-on which learns from data by training to make predictions. 2018Rahul K. Dubey, P. K. Nizar Banu. -
On the rainbow neighbourhood number of Mycielski type graphs
A rainbow neighbourhood of a graph G is the closed neighbourhood N[v] of a vertex v ? V (G) which contains at least one colored vertex of each color in the chromatic coloring C of G. Let G be a graph with a chromatic coloring C defined on it. The number of vertices in G yielding rainbow neighbourhoods is called the rainbow neighbourhood number of the graph G, denoted by rX(G). In this paper, we discuss the rainbow neighbourhood number of the Mycielski type graphs of graphs. 2018 Academic Publications. -
Determination of the size of the dust torus in H0507+164 through optical and infrared monitoring
The time delay between flux variations in different wavelength bands can be used to probe the inner regions of active galactic nuclei (AGNs). Here, we present the first measurements of the time delay between optical and near-infrared (NIR) flux variations in H0507+164, a nearby Seyfert 1.5 galaxy at z = 0.018. The observations in the optical V-band and NIR J, H, and Ks bands carried over 35 epochs during the period 2016 October to 2017 April were used to estimate the inner radius of the dusty torus. From a careful reduction and analysis of the data using cross-correlation techniques, we found delayed responses of the J, H, and Ks light curves to the V-band light curve. In the rest frame of the source, the lags between optical and NIR bands are found to be 27.1-12.0 +13.5 d (V versus J), 30.4-12.0 +13.9 d (V versus H) and 34.6-9.6 +12.1 d (V versus Ks). The lags between the optical and different NIR bands are thus consistent with each other. The measured lags indicate that the inner edge of dust torus is located at a distance of 0.029 pc from the central ultraviolet/optical AGN continuum. This is larger than the radius of the broad line region of this object determined from spectroscopic monitoring observations thereby supporting the unification model of AGN. The location of H0507+164 in the ?-MV plane indicates that our results are in excellent agreement with the now known lag-luminosity scaling relationship for dust in AGN. 2018 The Author(s). -
Facial pain expression recognition in real-time videos
Recognition of pain in patients who are incapable of expressing themselves allows for several possibilities of improved diagnosis and treatment. Despite the advancements that have already been made in this field, research is still lacking with respect to the detection of pain in live videos, especially under unfavourable conditions. To address this gap in existing research, the current study proposed a hybrid model that allowed for efficient pain recognition. The hybrid, which consisted of a combination of the Constrained Local Model (CLM), Active Appearance Model (AAM), and Patch-Based Model, was applied in conjunction with image algebra. This contributed to a system that enabled the successful detection of pain from a live stream, even with poor lighting and a low-resolution recording device. The final process and output allowed for memory for storage that was reduced up to 40%-55% and an improved processing time of 20%-25%. The experimental system met with success and was able to detect pain for the 22 analysed videos with an accuracy of 55.75%-100.00%. To increase the fidelity of the proposed technique, the hybrid model was tested on UNBC-McMaster Shoulder Pain Database as well. 2018 Pranti Dutta and Nachamai M. -
Prevalence and predictors of diabetes among adults in rural Dharwad, India: A cross-sectional study
Objective: Diabetes is a long life chronic non-communicable disease and emerging fast as one of the most serious health problems in developed and developing countries, also influences the risk of developing macrovascular complication including heart disease and stroke which are the leading causes of global death. This study aims to find the potential risk factors associated to diabetes among different community (Government, Private employees, and Businessmen) of adults 20 years and above. Methods: A cross-sectional study followed and conducted door-to-door survey using World Health Organization STEP Surveillance (WHO STEPS) questionnaire to collect the information of sociodemographic, anthropometric and behavioral characteristics. Multiple logistic regression is used to determine the risk factors of diabetes among study population. Data was pre-processed and used Chi-square test and t-test to find the comparison between the attributes. Results: Overall prevalence of diabetes is found to be 49.1% in which prevalence more in females with 51.7% than in males with 46.8%, the education, health examination, and waist circumference were found to be the potential risk factors. The total study subjects include 1083 in which male is 611 and female is 472. Conclusion: The current study reflects the importance of Diabetes disease among the study population in rural Dharwad and this study can be utilized to control and prevent diabetes. Its an early call for the females of the study population to take care and practice healthy food in day today life and the outcome of the study says that the education should be given prime importance in everyones life. 2018 The Authors. -
Segmentation and identification of MRI Brain segment in digital image
Brain image segmentation is important in the area of clinical diagnosis. MRI Brain image segmentation is time consuming and there is always a chance of occurrence of error when the segmentation is done manually. It is always possible to detect the infected tissues easily in the current medical field. However, the accuracy and the characteristics of abnormalities of the tissues are not precise. In the past, many researchers have identified the drawbacks of manual segmentation and hence proposed the semiautomatic and fully automatic segmentation methods in the field of medical imaging. The amount of precision about the detection of defective tissues leads to acceptance of a particular image segmentation method. In this article three segmentation methods are hybridized to get the optimum extraction of the region of interest (ROI) in brain MRI image. Further, the region properties of segment is extracted and stored as knowledgebase. The proposed algorithm integrates multiple segmentation methods and identifies the Brain Outer layer in MRI image. This identification AIDS medical experts for optimum diagnosis of defective tissues in the brain. IAEME Publication. -
Non-linear convection in chemically reacting fluid with an induced magnetic field across a vertical porous plate in the presence of heat source/sink
An investigation is carried out to observe the impacts of non-linear convection and induced magnetic field in the flow of viscous fluid over a porous plate under the influence of chemical reaction and heat source/sink. The plate is subjected to a regular free stream velocity as well as a suction velocity. The subjected non-linear problem is non-dimensionalized and analytic solutions are presented via perturbation method. The graphs are plotted to analyze the effect of relevant parameters on velocity, induced magnetic field, heat and mass transfer fields as well as friction factor, current density, Nusselt and Sherwood numbers. It is established that nonlinear convection aspect is destructive for thermal field and its layer thickness. The magnetic field effect enhances the thermal field while it reduces the velocity field. Also, the nonlinear effect subsides heat transfer rate significantly. 2018 Trans Tech Publications, Switzerland. -
Excitation Mechanism of Oi Lines in Herbig Ae/Be Stars
We have investigated the role of a few prominent excitation mechanisms viz. collisional excitation, recombination, continuum fluorescence, and Lyman beta fluorescence on the O i line spectra in Herbig Ae/Be stars. The aim is to understand which of them is the central mechanism that explains the observed O i line strengths. The study is based on an analysis of the observed optical spectra of 62 Herbig Ae/Be stars and near-infrared spectra of 17 Herbig Ae/Be stars. The strong correlation observed between the line fluxes of O i ?8446 and O i ?11287, as well as a high positive correlation between the line strengths of O i ?8446 and H? suggest that Lyman beta fluorescence is the dominant excitation mechanism for the formation of O i emission lines in Herbig Ae/Be stars. Furthermore, from an analysis of the emission line fluxes of O i ??7774, 8446, and comparing the line ratios with those predicted by theoretical models, we assessed the contribution of collisional excitation in the formation of O i emission lines. 2018 The American Astronomical Society. All rights reserved.. -
The facile and efficient organocatalytic platform for accessing 1,2,4-selenadiazoles and thiadiazoles under aerobic conditions
The first organocatalytic approach towards synthesis of rarely explored 1,2,4-selenadiazole and thiadiazole scaffolds have been devised using corresponding carboxamides as substrates. The transformations were realized using two distinct conditions in the presence of catalytic vitamin B3 or thiourea under aerobic conditions. Developed methods overcome the associated limitations of previous reported approaches and the desired products were obtained in high yields and selectivity without the formation of toxic side-products. 2018 Elsevier Ltd -
Semantic image annotation using convolutional neural network and WordNet ontology
Images are a major source of content on the web. The increase in mobile phones and digital cameras have led to huge amount of non-textual data being generated which is mostly images. Accurate annotation is critical for efficient image search and retrieval. Semantic image annotation refers to adding meaningful meta-data to an image which can be used to infer additional knowledge from an image. It enables users to perform complex queries and retrieve accurate image results. This paper proposes an image annotation technique that uses deep learning and semantic labeling. A convolutional neural network is used to classify images and the predicted class labels are mapped to semantic concepts. The results shows that combining semantic class labeling with image classification can help in polishing the results and finding common concepts and themes. 2018 Jaison Saji Chacko, Tulasi B. -
De novo synthesis of 2,2-bis(dimethylamino)-3-alkyl or benzyl 2,3-dihydroquinazolin-4(1H)-one compounds
A new versatile and efficient strategy for the synthesis of 2,2-bis(dimethylamino)-3-alkyl or benzyl 2,3-dihydroquinazoline-4(1H)-one compounds has been developed by one-pot multicomponent reaction with isatoic anhydride, amines followed by in situ-generated Vilsmeier reagent. The reaction has also been studied with different amines and solvents. 2017 Taylor & Francis.