Browse Items (11810 total)
Sort by:
-
A Study of In-store Factors Affecting Impulse Buying of Apparels amongst College Students and Young Professionals in Bangalore
Asian Journal of Research in Business Economics and Management, Vol. 7, Issue 3, pp. 1-15, ISSN No. 2249-7307. -
Graphene and graphene enhanced nanomaterials from biological precursors synthesis characterization and proliferant applications
Graphene family materials with non-photocatalytic biocidal properties are highly sought after in the field of biomedicine and nanobiotechnology. But the applications of graphene-based materials were often hampered by their high production cost, low yield, non-renewable precursors, harmful processing newlinetechniques, etc. In this context, this study presented the successful usage of biomass materials as sustainable feedstock for the production of graphene derivatives. Five raw materials of biological origin namely, coconut shell, wood, sugarcane bagasse, Colocasia esculenta leaves and Nelumbo nucifera leaves, were investigated. The graphitized forms of the above materials were newlineused as precursors for the graphene nanomaterial synthesis. They were chemically oxidized and functionalized with tin oxide nanoparticles to form the composite. Nano-systems obtained using an identical chemical route from a universal source of carbon nanomaterials, namely carbon black, were also newlinestudied for the purpose of validation and comparison. The synthesis protocols adopted for the preparation of graphene-based materials were devoid of hazardous reducing agents or byproducts. The products obtained after each stage of treatment were characterized with the help of various spectroscopic and microscopic techniques. newlineEven though structural properties of all the precursors appeared to be broadly the same, a variation in their morphology and defect density was discerned. Various analyses revealed the formation of graphene oxide domains with distinct dimensions after the oxidative treatment. An increase in defect newlinedensity was also observed due to the intercalation of oxygen groups to the carbon layers. Post composite formation, a distribution of ultrafine tin oxide newlinenanoparticles on the graphene surface was observed. The distribution of oxygen newlinefunctionalities on the carbon backbone were found to play a major role in governing the dispersal of tin oxide particles during the nanocomposite formation. -
Enhanced Edge Computing Model by using Data Combs for Big Data in Metaverse
The Metaverse is a huge project undertaken by Facebook in order to bring the world closer together and help people live out their dreams. Even handicapped can travel across the world. People can visit any place and would be safe in the comfort of their homes. Meta (Previously Facebook) plans to execute this by using a combination of AR and VR (Augmented Reality and Virtual Reality). Facebook aims to bring this technology to the people soon. However, a big factor in this idea that needs to be accounted for is the amount of data generation that will take place. Many Computer Science professors and scientists believe that the amount of data Meta is going to generate in one day would almost be equal to the amount of data Instagram/Facebook would have generated in their entire lifetime. This will push the entire data generation by at least 30%, if not more. Using traditional methods such as cloud computing might seem to become a shortcoming in the near future. This is because the servers might not be able to handle such large amounts of data. The solution to this problem should be a system that is designed specifically for handling data that is extremely large. A system that is not only secure, resilient and robust but also must be able to handle multiple requests and connections at once and yet not slow down when the number of requests increases gradually over time. In this model, a solution called the DHA (Data Hive Architecture) is provided. These DHAs are made up of multiple subunits called Data Combs and those are further broken down into data cells. These are small units of memory which can process big data extremely fast. When information is requested from a client (Example: A Data Warehouse) that is stored in multiple edges across the world, then these Data Combs rearrange the data cells within them on the basis of the requested criteria. This article aims to explain this concept of data combs and its usage in the Metaverse. 2023 IEEE. -
Study on factors influencing purchase of branded formal apparel in Indian apparel industry /
International Journal of Business, Management & Social Sciences, Vol-3 (5(2), pp. 51-54. ISSN-2249-7463. -
Sales Promotion Practices In Apparel Retail Sector And Challenges Ahead
International Journal of Research in Commerce & Management, Vol-5 (1), pp. 25-28. ISSN-0976-2183 -
Identification of Driver Drowsiness Detection using a Regularized Extreme Learning Machine
In the field of accident avoidance systems, figuring out how to keep drivers from getting sleepy is a major challenge. The only way to prevent dozing off behind the wheel is to have a system in place that can accurately detect when a driver's attention has drifted and then alert and revive them. This paper presents a method for detection that makes use of image processing software to examine video camera stills of the driver's face. Driver inattention is measured by how much the eyes are open or closed. This paper introduces Regularized Extreme Learning Machine, a novel approach based on the structural risk reduction principle and weighted least squares, which is applied following preprocessing, binarization, and noise removal. Generalization performance was significantly improved in most cases using the proposed algorithm without requiring additional training time. This approach outperforms both the CNN and ELM models, with an accuracy of around 99% being achieved. 2023 IEEE. -
Eagle Strategy Arithmetic Optimisation Algorithm with Optimal Deep Convolutional Forest Based FinTech Application for Hyper-automation
Hyper automation is the group of approaches and software companies utilised to automate manual procedures. Financial Technology (FinTech) was processed as a distinctive classification that highly inspects the financial technology sector from a broader group of functions for enterprises with utilise of Information Technology (IT) application. Financial crisis prediction (FCP) is the most essential FinTech technique, defining institutions financial status. This study proposes an Eagle Strategy Arithmetic Optimisation Algorithm with Optimal Deep Convolutional Forest (ESAOA-ODCF) based FinTech Application for Hyperautomation. The ESAOA-ODCF technique has achieved exceptional performance with maximum accu y of 98.61%, and F score of 98.59%. Extensive experimental research revealed that the ESAOA-ODCF model beat more modern, cutting-edge approaches in terms of overall performance. 2023 Informa UK Limited, trading as Taylor & Francis Group. -
Cu/Pd bimetallic supported on mesoporous TiO2 for suzuki coupling reaction
Generally bimetallic catalysts are more superior to monometallic catalysts and provide a better platform for the development of novel catalysts with enhanced activity, selectivity, and stability. In the current work we have prepared Cu/Pd bimetallic supported on mesoporous TiO2 by hydrothermal method. The prepared system was characterized by various physico-chemical techniques such as XRD, TG-DTG, SEM, EDAX, BJH isotherm, and XPS. Thermal stability and complete electronic structure were identified from TG and XPS measurements respectively. The bimetallic system was found to be very active in Suzuki cross-coupling reaction using different substrates. The products were separated and purified by column chromatography and the resultant products were characterized thoroughly by 1H NMR, and FT-IR analysis. Copyright 2018 BCREC Group. All rights reserved. -
Visible light responsive Gd, N co-doped mesoporous titania in the photo-oxidation of some novel 9-(N,N-Dimethylaminomethyl)anthracene systems
Oxidative semiconductor catalysis by light can be considered as an easy method for the conversion of harmful aromatics to less harmful products and at the same time move towards a sustainable chemistry. The present work reports the preparation of Gd, N co-doped TiO2 system by hydrothermal technique followed by calcination at 500C and checks its activity in photo-oxidation reactions. The prepared system was characterized by various physico-chemical techniques such as X-ray diffraction, Raman spectroscopy, IR spectroscopy, TGDTG, UV-DRS, SEM, TEM and XPS. Structural identity and mesoporous nature were identified from XRD and BET measurements respectively. On reaction, Tertiary amine appended anthracene and its phenyl substituted derivative in CH3CN yielded Anthraquinone as the major product. Substituted Anthracenemethanamine reacted slowly and a relatively stable intermediate could be isolated at shorter periods of time. The products were separated and purified by column chromatography and the resultant products were characterized thoroughly by 1H NMR, IR spectroscopy and GCMS analysis. 2014, Springer Science+Business Media New York. -
Cached-N-Proxy: An Intelligent Proxy Algorithm for Preventing Insider Email Threats to Mail Servers
Insider threats are serious security risks that come from people who work for or are contracted by an organization, such as partners, employees, or contractors. These people use their authorized access to commit hostile acts against the infrastructure, data, or assets of the company. Serious ramifications could result from these dangers, such as financial losses, reputational harm, data breaches, and possible threats to national security. Enterprises must strengthen their defenses with strong intrusion detection and prevention systems because of the growing attack surface for insider threats caused by the increasing adoption of digital technology and remote work habits. Organizations must use a combination of preventive strategies and detection mechanisms, such as privileged access management (PAM), role-based access control, data loss prevention (DLP) techniques, two-factor authentication, and thorough insider threat awareness training, to effectively combat insider threats. 2024 IEEE. -
Influence of Short Glass Fibre Reinforcement on Mechanical Properties of 3D Printed ABS-Based Polymer Composites
One of the most promising and widely used additive manufacturing technologies, fused deposition modelling (FDM), is based on material extrusion and is most commonly used for producing thermoplastic parts for functional applications with the objectives of low cost, minimal waste and ease of material conversion. Considering that pure thermoplastic materials have a significantly poor mechanical performance, it is necessary to enhance the mechanical properties of thermoplastic parts generated using FDM technology. One of the conceivable techniques is to incorporate reinforcing materials such as short glass fibre (SGF) into the thermoplastic matrix in order to produce a polymer composite that can be used in engineering applications, such as structural applications. The morphological and mechanical properties of SGF (short glass fibre) reinforced ABS- (Acrylonitrile Butadiene Styrene) based polymer composites created via the method of FDM (fused deposition modelling) were investigated in this work. Properties were evaluated at three different weight percentages (0, 15 and 30 wt%). The composite filaments were developed using the process of twin screw extrusion. The comparison was made between ABS + SGF (short glass fibre) composites and pure ABS of mechanical properties that include surface roughness, tensile strength and low-velocity impact. The tests were carried out to analyze the properties as per ASTM standards. It has been found that the impact strength and tensile strength show an improvement in glass fibre inclusion; moreover, alongside the direction of build, the surface roughness had been reduced. The studies also focused on studying the dispersion characters of SGF in ABS matrix and its impact on the properties. Strength and modulus of SGF reinforced ABS composite has been significantly improved along with reduction of ductility. A 57% increase in tensile strength has been noted for 30 wt% addition of SGF to ABS in comparison to pure ABS. It was also interesting to note the reduction in surface roughness with every incremental addition of SGF to ABS. A 40% reduction in surface roughness has been observed with a 30 wt% addition of SGF to ABS in comparison to pure ABS. 2022 by the authors.Licensee MDPI, Basel, Switzerland. -
Unveiling Cutting Edge Innovations in the Catalytic Valorization of Biodiesel Byproduct Glycerol into Value Added Products
The increasing production of biodiesel has led to a glut in the production of glycerol, which is a byproduct. This has resulted in the quest for alternative applications using glycerol as a cheap and readily available starting material. One promising approach is the catalytic valorization of glycerol, which converts glycerol into valuable chemicals such as 1,2-propanediol, lactic acid, and acrolein. The glycerol formed affects the efficiency of the biodiesel, and hence it must be removed. Different processes can convert glycerol to various useful products like glycerol carbonate, glycidol, solketal, lactic acid, and glyceric acid. These different products, the processes used for synthesis, and the various catalysts used have been discussed. The most effective methods for the syntheses, the numerous catalyst systems, mechanisms of the reactions, and applications of these products in different fields are discussed in this review. The paper also discusses the challenges and opportunities of glycerol valorization, including the need for improved catalyst selectivity and activity and the potential for integrating glycerol valorization with other biorefinery processes. Overall, the catalytic valorization of glycerol offers a promising pathway for utilizing this abundantly available resource, and this review provides valuable insights for researchers and practitioners working in this area. 2023 Wiley-VCH GmbH. -
Secure visual cryptography scheme with meaningful shares
Visual cryptography is an outstanding design, which is also known as visual secret sharing. It used to encode a secret portrait into various pointless share images. Normally, item bossed on transparencies and decrypts as loading one or two or the entire share images by means of the human visual system. Suppose, if we encompass great sets of secret shares then the pointless shares are complicated to handle. In this paper, a meaningful secret sharing algorithm and a modified Signcryption algorithm is used to enhance the security of the Visual Cryptography encryption schemes. The foremost intend of the anticipated format is to extend consequential shares and similarly make sure the isolation on conveying the secret data. The anticipated process is executed in the functioning platform of MATLAB and the presentation results are investigated. 2020, Engg Journals Publications. All rights reserved. -
ENHANCING home security through visual CRYPTOGRAPHY
Home security systems in the recent times have gained greater importance due to increasing threat in the society. Biometrics deals with automated approaches of recognizing a user or verifying the user identity based on behavioral or physiological features. Visual cryptography is a scheme of secret sharing where a secret image is encrypted into shares which disclose no data independently about the original secret image. As the template of biometric are stored in centralized database due to the threats of security the template of biometric may be changed by attacker. If the template of biometric is changed then the authorized user will not be permitted to access the resource. To manage this problem the schemes of visual cryptography can be used to secure the face recognition. Visual cryptography offers huge ways for supporting such needs of security as well as additional authentication layer. To manage this problem the visual cryptography schemes can be used to secure digital biometric information privacy. In this approach the face or private image is dithered in two varied host images that is sheets and are stored in separate servers of data so as to assure that the original image can get extracted only by accessing both sheets together at a time and a single sheet will not be capable to show any data of private image. The main aim of the study is to propose an algorithm which is a combination of CVC and Siamese network. This research implements visual cryptography for face images in a biometric application. The Siamese network is essential to solve one shot learning by representation of learning feature that are compared to verification tasks. In this research face authentication helps in accomplishing robustness by locating face image from an n input image. This research explores the availability of using visual cryptography for securing the privacy to biometric data. The results of the proposed approach provide an accuracy of 93% which is found to be superior when compared with that of the approaches that are already in practice. 2020 -
A Way Towards Next-Gen Networking System for the Development of 6G Communication System
In this talk, the advancements announced by sixth-generation mobile communication (6G) as compared to the earlier fifth-generation (5G) system are carefully examined. The analysis, based in existing academic works, underscores the goal of improving diverse communication aims across various services. This study finds five crucial 6G core services designed to meet distinct goal requirements. To explain these services thoroughly, the framework presents two central features and delineates eight significant performance indices (KPIs). Furthermore, a thorough study of supporting technologies is performed to meet the stated KPIs. A unified 6G design is suggested, imagined as a combination of these supporting technologies. This design plan is then explained by the lens of five prototype application situations. Subsequently, possible challenges contained in the developing track of the 6G network technology are carefully discussed, followed by suggested solutions. The debate ends in an exhaustive examination of possibilities within the 6G world, seeking to provide a strategy plan for future research efforts. 2024 IEEE. -
Disaster resilience of flood in Kerala, India
Kerala, the southern state in the Indian peninsula, has been affected by floods for the last three consecutive years. Changing weather patterns leading to heavy monsoon and development without considering the ecological vulnerabilities of the region has been pointed out as the reasons for flooding. Displaced communities, the destruction of agricultural and industrial enterprises, and health concerns have made disaster management a challenge for communities and governments alike. Even though there were lots of difficulties, the way Keralites came out of all these miseries and their adaptation was really inexplicable and always provided scope for research in that area. This paper focuses on examining the flooding pattern and impact of floods in Kerala, India and assessing the resilience capacity of the affected community. Self-developed questionnaires were used to gather data from the flood-affected population in the most flood-affected districts in Kerala. To gauge the respondents' opinions, the questionnaire used a five-point variable Likert scale. When all was said and done, 260 valid questionnaires were successfully retrieved. The study found that communities show resilience to flood with partnership and decentralised management of disasters. The study could help recognise the strategies for building resilient communities through policy intervention and civil society participation. Published under licence by IOP Publishing Ltd. -
A Structured Design of 5G Based Assisted MTC System using Mission-Critical System
Critical machine-type relationships (mc MTC) has become known as a crucial element within the Business Internet of Things (IoT) ecosystem, showcasing lucrative opportunities in disciplines like autonomous vehicles, intelligent energy/smart grid control, security services, while advanced wearable applications. As the fifth generation of cell phones unfolds, the changing environment of mc MTC puts diverse demands on the underlying technology. These demands embrace standards for low power usage, heightened dependability, and minimal delay connection. In answer to these challenges, recent versions and current advances in Long-Term Evolution (LTE networks) systems have added features that promote cost-effective solutions, increase coverage, reduce delay, and improve reliability for devices with different movement levels. This study focuses on assessing the impacts on mc MTC effectiveness in a connectivity network for 5G with varying user and equipment accessibility, influenced by a variety of movements. According to the study, integrating other modes of contact, such as quadcopter assistance and device-to-device linkages a voice, contributes a crucial role in achieving the strict demands of mc MTC programs across diverse situations that tell which includes industrial automation, vehicular connection, and urban messages. Significantly, our results confirm gains of as much as forty per cent in link availability and dependability when applying nearby connections as opposed. 2024 IEEE. -
A review of reinforcement learning approaches for autonomous systems in industry 4.0
[No abstract available] -
Exploration of carbon nano dots in hydro carbon soot and carbon black
Hydrocarbon soot, a prime component of particulate matter pollution, poses a great threat to the environment. In this study, we put forth a novel way of harnessing carbon nanodots from the soot particulates thereby converting an environmentally perilous component to an innocuous entity suitable for many applications such as biomedical tracers, gas detectors etc. Large scale production of pure carbon nanodots (PCN) was achieved via direct catalyst free thermal decomposition of kerosene and diesel. Nanostructure of carbon black and graphite is also investigated for comparative studies. In UV-Vis spectra, absorptions at 233, 232 and 229 nm are attributed to ?-?? transition of the C=C bonding. XRD of the samples shows a highly intense peak at ?24 and a slightly broadened peak around 42 due to (002) and (010) reflections of graphitic planes respectively. In IR spectra, peaks at 3431 and 1047 cm-1 were assigned to O-H and C-O stretching vibrations respectively. The band observed at 1619 cm-1 manifests the skeletal vibrations from graphitic domains and hence indicates the presence of crystalline graphitic carbon. The absorption bands at 2920 and 2850 cm-1 arise because of the existence of aliphatic groups in the soot sample. 2017, International Congress of Chemistry and Environment. All rights reserved.