Browse Items (11810 total)
Sort by:
-
Clan Culture in Organizational Leadership and Strategic Emphases: Expectations Among School Teachers in India
Understanding the current and preferred organizational culture among school teachers in India is a primary requirement, particularly when the National Educational Policy (NEP) is being implemented. Measuring the competing values using the Organizational Culture Assessment Instrument (OCAI) provides information about the dominant characteristics of the organizational culture and the school teachers' preferences. We surveyed school teachers and received 273 responses. Research revealed that clan culture is the overall current and preferred organizational culture type. Many of the results are not a surprise. However, we found that organizational leadership is currently in the hierarchy culture and strategic emphasis is on adhocracy, whereas teachers prefer a clan culture on these dimensions. Teachers expect school leaders to be the ones who facilitate the path to achieve, provide mentoring, and are instrumental in team building. They prefer a culture that provides for the development of human capital, promotes high trust and transparency among teachers, and offers an opportunity to participate in decision-making. This study is unique as it measures schools' organizational culture that has not been done earlier in the Indian context. The results suggest implications on the leadership practices and the strategic emphasis that need to change, in order to facilitate the implementation of the National Education Policy (NEP). 2022. All Rights Reserved. -
Modeling of the LiouvilleGreen method to approximate the mechanical waves in functionally graded and piezo material with a comparative study
The present research article studies and compares the surface waves transmission through the functionally graded piezoelectric material (FGPM) club between the piezomagnetic (PM) layer -and half-space, and for a comparative study, lower half-space is assumed to be piezoelectric material. The transmission of mechanical waves in a smart structure is analyzed by following the elastic wave theory of magneto-electro-elasticity. The Liouville-Green (LG) approximation technique is used to solve the differential equation in the FGPM stratum, where exponential variation is assumed in material gradients. It is noticed that the material gradients depend considerably on the angular frequency, which should be a crucial factor in regulating the dispersion characteristics of functionally graded materials (FGM) waveguides. In closed determinant form, the dispersion relation has been obtained for FGPM plate for electrically open and short cases. The profound effect of parameters, such as material gradient, a width of the layer on phase velocity, coupled electromechanical factor, and angular velocity, is observed and delineated graphically. Different parametric plots are sub-plotted into a single figure to increase the readability of the graphs. 2022 Informa UK Limited, trading as Taylor & Francis Group. -
Exclusion of Chromium(VI) Ion in Grueling Activated Carbon Fabricated from Manilkara zapota Tree Wood by Adsorption: Optimization by Response Surface Methodology
The current paper makes obvious the elimination of chromium(VI) ion, from wastewater via adsorption technique with activated carbon generated from Manilkara zapota tree (MZTWAC). Preliminarily MZTWAC has undergone characterization studies which uncovered the suitability of MZTWAC to expel chromium(VI) from aqueous solution. Batch adsorption experimentation was premeditated with the competence of central composite design (CCD) and it was executed. Response surface methodology (RSM) was the key optimization software to appraise the adsorptive chattels of MZTWAC engaged in removing chromium(VI) ion in aqueous solution which explored the interactions flanked between four expounding variables explicitly initial concentration of chromium(VI) ion, pH of the solution, MZTWAC dose and time of exposure, and contact time. The response variable that was concentrated in the study was adsorption capacity. It was deduced a polynomial in quadratic equation was documented amid the adsorption capacity and variables influencing the adsorption with R2=0.9792 which was projected as the best suit for the adsorption process. ANOVA that is expanded as analysis of variance judged the connotation of adsorption process variables. 0.2 g of MZTWAC dosage has removed 87.629% chromium(VI) from aqueous solution. The enhancement of adsorption process reclined on the attainment of maximum adsorption capacity which further depends on the optimization of variables under consideration. This criterion was accomplished by the desirability function optimizing the process variables. 2022 S. Sujatha et al. -
Virtual Community Mentoring Models for Middle School Underachievers Psychosocial Development and Well-Being During COVID-19
Recent studies highlight the outcomes of COVID-19 on the psychosocial skills of early adolescents. It shows the unavailability of virtual community mentoring models for teenagers' individual and interpersonal growth in the virtual scenario. Hence, there emerges a need to explore and apply the available virtual communication resources by facilitators, families, and other community professionals for teenagers self-development. This article reports the application of virtual resources like WhatsApp, graphic design platforms (CANVA and Adobe), graphic interchange formats (GIPHY App), all-in-one visual content editing forums (InShot App), and memes (Meme Generator App) in engaging and supporting community mentoring capacities leading to psychosocial development and well-being for teenagers during COVID-19. Through this article, contemporary virtual models are explored and executed with community guidance to integrate the personal developmental skills of middle school underachievers. There is also a need to work with community interventions by using virtual mentoring skillsets for positive youth development. 2022, Commonwealth of Learning. All rights reserved. -
Linear and non-linear stability analyses of Rayleigh-Bard convection in watercopper and wateralloy nanoliquids
In this paper, we perform linear and non-linear stability analyses of Rayleigh-Bard convection in a horizontal layer of watercopper and wateralloy nanoliquids. The corresponding eigen values for the problems involving the two nanoliquids are obtained and compared. The thermophysical properties of nanoliquids have been modelled as a function of the properties of water as base liquid, copper and alloy as nanoparticles. A non-linear analysis is performed using the energy method. The subcritical instability does not exist. As a limiting case the results of water are discussed with results of previous investigations, and a good agreement is found. The effect of nanoparticles is to destabilise the system. The results are depicted graphically. 2022 Informa UK Limited, trading as Taylor & Francis Group. -
Anti-inflammatory activity of Sabicea brevipes Wernharm (Rubiaceae)
Over the years, medicinal plants have been employed in the treatment of inflammation and related ailments. This study evaluated the anti-inflammatory potential of the aerial parts of S. brevipes. The extracts and fractions were further evaluated for anti-inflammatory activity in carrageenan-induced rat model at varying doses (200 and 400 mg/kg doses, orally) for 5 h of treatment. The result of the phytochemical screening showed the presence of alkaloids, terpenoids, glycosides, flavonoids and tannins in the aerial parts of the plant. The in vivo anti-inflammatory study exhibited inhibition of 42% and 44%, 47% and 36%, 33% and 31%, and 43% and 42% for methanol extract n-hexane fraction, ethyl acetate fraction, and methanol fraction, at 200 and 400 mg/kg doses, respectively. The positive control (diclofenac sodium) showed an inhibition value of 51% at 5 mg/kg dose. Finally, it is concluded that S. brevipes possesses anti-inflammatory potential which validates the enthnomedicinal claim of the plant. 2022. Attah EI et al. All Rights Reserved. -
Analysis of SH-waves Propagating in Multiferroic Structure with Interfacial Imperfection
This article presents the study of wave mechanics in a multiferroic structure having imperfection in the structures interface. This article reflects the study of shear horizontal (SH) wave propagation in a layered cylindrical structure consisting of thin layers of different materials (reinforced material and piezomagnetic material) with an imperfect interface. The interface considered between both materials is mechanically imperfect. Dispersion relations are achieved analytically. Distinct graphs are drawn (numerically) to exhibit the influence of parameters like rotation, initial stress, and mechanically imperfect parameters on phase velocity. Numerical results are drawn analytically and explained for each affecting distinct parameters for materials and interface. Parametric results on the phase velocities yield a significant conclusion of which some are: (a) Performance of Piezo with reinforcement material have an influential impact on wave velocity. (b) The mechanical imperfection affects the significantly on wave velocity (c) The Reinforcement/PM stiffening can monotonically up the velocity of phase velocity. 2022 Published by Semnan University Press. -
On building up a closer psychic distance as a fundamental ground of relationship between India and Korea: Focusing on Jeonlanam-Do in Korea
The Uppsala model (Johanson and Wiedersheim-Paul, 1975) identifies cultural differences, market attractiveness, and core competence of nations or firms as the key factors affecting international market selection. Among these three factors, psychic distance caused by cultural differences is regarded as the most important factor. However, the psychic distance between India and Korea is not very close. The main objective of this paper is to examine the ways to boost economic relationships between India and Korea by building up a closer relationship of psychic distance. We suggest Jeonlanam-Do including Gwangju Metropolitan City (JDGC) in Korea as a stepping stone to make both countries' psychic distance closer as JD has several common grounds of intangible assets with India which includes its adherence to democracy, human rights and peace; the diverse food culture; and the religious zeal to Buddhism. We propose these common interests as a way to enhance the awareness of national brand 'India' in Korea which will attribute to a strategically developed economic relationship between Korea and India. 2022 Inderscience Enterprises Ltd.. All rights reserved. -
Energy-Efficient Cluster in Wireless Sensor Network Using Life Time Delay Clustering Algorithms
Through Wireless Sensor Networks (WSN) formation, industrial and academic communities have seen remarkable development in recent decades. One of the most common techniques to derive the best out of wireless sensor networks is to upgrade the operating group. The most important problem is the arrangement of optimal number of sensor nodes as clusters to discuss clustering method. In this method, new client nodes and dynamic methods are used to determine the optimal number of clusters and cluster heads which are to be better organized and proposed to classify each round. Parameters of effective energy use and the ability to decide the best method of attachments are included. The Problem coverage find change ability network route due to which traffic and delays keep the performance to be very high. A newer version of Gravity Analysis Algorithm (GAA) is used to solve this problem. This proposed new approach GAA is introduced to improve network lifetime, increase system energy efficiency and end delay performance. Simulation results show that modified GAA performance is better than other networks and it has more advanced Life Time Delay Clustering Algorithms-LTDCA protocols. The proposed method provides a set of data collection and increased throughput in wireless sensor networks. 2022 CRL Publishing. All rights reserved. -
The total game chromatic number of paths, cycles and stars
The total game coloring is one of the extensions of the game coloring problem in which two players alternatively color both vertices and edges of a given graph. In this paper, the total game chromatic number is determined for the classes of paths, cycles, and stars. The incidence game chromatic number for large paths is also discussed by relating the incidence and the total graphs of paths. 2022 Forum-Editrice Universitaria Udinese SRL. All rights reserved. -
Automated segmentation and classification of nuclei in histopathological images
Various kinds of cancer are detected and diagnosed using histopathological analysis. Recent advances in whole slide scanner technology and the shift towards digitisation of whole slides have inspired the application of computational methods on histological data. Digital analysis of histopathological images has the potential to tackle issues accompanying conventional histological techniques, like the lack of objectivity and high variability. In this paper, we present a framework for the automated segmentation of nuclei from human histopathological whole slide images, and their classification using morphological and colour characteristics of the nuclei. The segmentation stage consists of two methods, thresholding and the watershed transform. The features of the segmented regions are recorded for the classification stage. Experimental results show that the knowledge from the selected features is capable of classifying a segmented object as a candidate nucleus and filtering out the incorrectly identified segments. Copyright 2022 Inderscience Enterprises Ltd. -
A new facile synthesis of (2S,5S)-5-hydroxypipecolic acid hydrochloride
A simple and efficient synthesis of (2S,5S)-5-Hydroxypipecolic acid hydrochloride is reported. The key features of the synthesis involve the asymmetric reduction of ketone using (S)-CBS oxazaborolidine and the use of commercially available methyl pyroglutamate as a starting material.. 2022 Taylor & Francis Group, LLC. -
A Novel AI-Based Stock Market Prediction Using Machine Learning Algorithm
The time series forecasting system can be used for investments in a safe environment with minimized chances of loss. The Holt-Winters algorithm followed various procedures and observed the multiple factors applied to the neural network. The final module helps filter the system to predict the various factors and provides a rating for the system. This research work uses real-time dataset of fifteen stocks as input into the system and, based on the data, predicts or forecasts future stock prices of different companies belonging to different sectors. The dataset includes approximately fifteen companies from different sectors and forecasts their results based on which the user can decide whether to invest in the particular company or not; the forecasting will give an accurate result for the customer investments. 2022 Iyyappan. M et al. -
IoT-Based Response Time Analysis of Messages for Smart Autonomous Collision Avoidance System Using Controller Area Network
Many accidents and serious problems occur on the road due to the rapid increase in traffic congestion in all sections of the country. Autonomous vehicles provide a solution to successfully and cost-effectively avoid this problem while minimizing user disruption. Currently, more engaging electromechanical elements with an analog interface are used to develop affordable automobiles for efficient and cost-effective operation for a smart driving platform with a semiautonomous automobile, strengthening the vehicle involvement of the driver while increasing safety. As a result, it takes longer for various car elements to respond, which causes more problems during message transmission. This project aims to create a Controller Area Network (CAN) for analyzing message response times by incorporating a few application nodes on the IoT platform, such as an antilock braking system, flexible cruise control, and seat belt section, for some real-time control system applications. These application nodes are car analytical parts that are linked to IoT modules to prevent collisions. An autonomous device for collision avoidance and obstacle detection in a vehicle can impact road accidents if the CAN protocol is implemented. 2022 Anil Kumar Biswal et al. -
Upper domatic number of regular graphs
A partition ? = {V1, V2, , Vk } of the vertex set V (G) of a graph G = (V, E) is an upper domatic partition if Vi dominates Vj or Vj dominates Vi or both for all Vi, Vj ? ?. The maximum order of an upper domatic partition of G is called the upper domatic number D(G) of G. In this article, we determine the upper domatic number of 4-regular graphs. We also find the upper domatic number of 5-regular graphs with girth at least five and determine the upper domatic number of the complements of cycles. 2021 the authors. -
Deep learning based modeling of groundwater storage change
The understanding of water resource changes and a proper projection of their future availability are necessary elements of sustainable water planning. Monitoring GWS change and future water resource availability are crucial, especially under changing climatic conditions. Traditional methods for in situ groundwater well measurement are a significant challenge due to data unavailability. The present investigation utilized the Long Short Term Memory (LSTM) networks to monitor and forecast Terrestrial Water Storage Change (TWSC) and Ground Water Storage Change (GWSC) based on Gravity Recovery and Climate Experiment (GRACE) datasets from 20032025 for five basins of Saudi Arabia. An attempt has been made to assess the effects of rainfall, water used, and net budget modeling of groundwater. Analysis of GRACE-derived TWSC and GWSC estimates indicates that all five basins show depletion of water from 20032020 with a rate ranging from -5.88 1.2 mm/year to -14.12 1.2 mm/year and -3.5 1.5 to -10.7 1.5, respectively. Forecasting based on the developed LSTM model indicates that the investigated basins are likely to experience serious water depletion at rates ranging from -7.78 1.2 to -15.6 1.2 for TWSC and -4.97 1.5 to -12.21 1.5 for GWSC from 20202025. An interesting observation was a minor increase in rainfall during the study period for three basins. 2022 Tech Science Press. All rights reserved. -
Augmented Reality-Enabled Instagram Game Filters: Key to Engaging Customers
The gamification concept is rapidly grabbing attention of different sectors in the current competitive business ecosystem. Companies are amalgamating game elements to enrich customer enhancement. However, empirical studies incorporating Augmented Reality (AR) elements in the same are lacking. Therefore, main objective of this research is to inspect elements of AR, impacting the customer brand engagement in game filters of Instagram. Drawing on S-D Logic the authors aim to explore the impact of gameful experience on creating customer engagement. The capability of Customer Brand Engagement (CBE) to influence Brand Satisfaction (BS) and Brand loyalty (BL) is also explored in the study. Convenient sampling method was adopted to gather 458 responses from Gen Z in India. Responses were gathered using self-administered questionnaire. Findings of the study expand CBE literature to a new technology and refines knowledge of relationship between AR and preexisting CBE dimensions (affective, cognitive and activation), leading to BS and BL. This study has some implications for managerial decision making in creating resilient and long-term relations with customers. 2021 Taylor & Francis Group, LLC. -
Insider attack detection using deep belief neural network in cloud computing
Cloud computing is a high network infrastructure where users, owners, third users, authorized users, and customers can access and store their information quickly. The use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing efficiently. This cloud is nowadays highly affected by internal threats of the user. Sensitive applications such as banking, hospital, and business are more likely affected by real user threats. An intruder is presented as a user and set as a member of the network. After becoming an insider in the network, they will try to attack or steal sensitive data during information sharing or conversation. The major issue in today's technological development is identifying the insider threat in the cloud network. When data are lost, compromising cloud users is difficult. Privacy and security are not ensured, and then, the usage of the cloud is not trusted. Several solutions are available for the external security of the cloud network. However, insider or internal threats need to be addressed. In this research work, we focus on a solution for identifying an insider attack using the artificial intelligence technique. An insider attack is possible by using nodes of weak users systems. They will log in using a weak user id, connect to a network, and pretend to be a trusted node. Then, they can easily attack and hack information as an insider, and identifying them is very difficult. These types of attacks need intelligent solutions. A machine learning approach is widely used for security issues. To date, the existing lags can classify the attackers accurately. This information hijacking process is very absurd, which motivates young researchers to provide a solution for internal threats. In our proposed work, we track the attackers using a user interaction behavior pattern and deep learning technique. The usage of mouse movements and clicks and keystrokes of the real user is stored in a database. The deep belief neural network is designed using a restricted Boltzmann machine (RBM) so that the layer of RBM communicates with the previous and subsequent layers. The result is evaluated using a Cooja simulator based on the cloud environment. The accuracy and F-measure are highly improved compared with when using the existing long short-term memory and support vector machine. 2022 CRL Publishing. All rights reserved. -
Weakly nonlinear stability analysis of salt-finger convection in a longitudinally infinite cavity
This paper is a two-dimensional linear and weakly nonlinear stability analyses of the three-dimensional problem of Chang et al. ["Three-dimensional stability analysis for a salt-finger convecting layer,"J. Fluid Mech. 841, 636-653 (2018)] concerning salt-finger convection, which is seen when there is sideways heating and salting along the vertical walls along with a linear variation of temperature and concentration on the horizontal walls. A two-dimensional linear stability analysis is first carried out in the problem with the knowledge that the result could be different from those of a three-dimensional study. A two-dimensional weakly nonlinear stability analysis, that is, then performed points to the possibility of the occurrence of sub-critical motions. Stability curves are drawn to depict various instability regions. With the help of a detailed stability analysis, the stationary mode is shown to be the preferred one compared to oscillatory. Local nonlinear stability analysis of the system is done in a neighborhood of the critical Rayleigh number to predict a sub-critical instability region. The existence of a stable solution at the onset of a weakly nonlinear convective regime is indicated, allowing one to perform a bifurcation study in the problem. Heat and mass transports are discussed by analyzing the Nusselt number, Nu, and Sherwood number, Sh, respectively. A simple relationship is obtained between the Nusselt number and the Sherwood number exclusively in terms of the Lewis number, Le. 2022 Author(s). -
Juice Jacking: Security Issues and Improvements in USB Technology
For a reliable and convenient system, it is essential to build a secure system that will be protected from outer attacks and also serve the purpose of keeping the inner data safe from intruders. A juice jacking is a popular and spreading cyber-attack that allows intruders to get inside the system through the web and theive potential data from the system. For peripheral communications, Universal Serial Bus (USB) is the most commonly used standard in 5G generation computer systems. USB is not only used for communication, but also to charge gadgets. However, the transferal of data between devices using USB is prone to various security threats. It is necessary to maintain the confidentiality and sensitivity of data on the bus line to maintain integrity. Therefore, in this paper, a juice jacking attack is analyzed, using the maximum possible means through which a system can be affected using USB. Ten different malware attacks are used for experimental purposes. Various machine learning and deep learning models are used to predict malware attacks. An extensive experimental analysis reveals that the deep learning model can efficiently recognize the juice jacking attack. Finally, various techniques are discussed that can either prevent or avoid juice jacking attacks. 2022 by the authors. Licensee MDPI, Basel, Switzerland.