Browse Items (11810 total)
Sort by:
-
Well-being and Career Decision-making Difficulties Among Masters Students: A Simultaneous Multi-Equation Modeling
There is a stellar upsurge in the number of persons pursuing a masters level of education as well as the institutions offering it in the current generation. Nevertheless, an explicit theoretical and empirical implication of how the tutelages, at this level, shape the well-being of learnerssuch that it could help individuals overcome career decision-making difficulties remains to be elucidated. The present study addressed two major objectives. Firstly, we investigated the well-being of masters degree students along with career decision-making difficulties in India. Secondly, apart from exploring the possible influence of nationality of the respondents on career decision difficulty, the study expanded the literature on career decision-making difficulties to under-researched populations in developing countries. Through a cross-sectional research design, we recruited a sample of 136 masters degree respondents. The result reveals that while the composite well-being resources significantly influenced Career Decision Difficulties, the nationality of respondents appeared not as a germane factor in this context. Following the evaluation of the direct effect of individual well-being resources; Self-acceptance and Personal growth proved to have a statistically significant effect on career decision-making difficulties. Also, among the constituents of career decision-making difficulties studied, lack of readiness appears to be the major concern among the respondents. The findings expand the literature on cognitive, vocational, and organization science vis-a-vis career decision-making difficulties and provide useful insights for educational institutions and practitioners. 2021 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. -
A study on the weak form efficiency of metals & mining sector in bse
This study has been conducted to observe whether the weak form of efficiency holds true when the Metals & Mining sector is examined for the same. Data is collected for a 5 year period which ranges from 1st April 2014 to 31st March 2019. A total of 1232 observations have been taken from the three selected companies of the Metals & Mining sector of the BSE, namely, Coal India Ltd, Hindustan Zinc Ltd and JSW Steel Ltd. Jarque-Bera test is used to check whether the data is normally distributed or not. Augmented Dickey Fuller test has been used to establish whether the data series possesses stationarity or not. Finally Runs test and Autocorrelation tests are used to check whether the Metals & Mining sector of BSE is weak form efficient or not through the three representative companies. Upon analyzing the data through Runs Test, except for JSW Steel Ltd, the other two companies are identified to contain randomness in their data series. Autocorrelation test also suggests that the future stock prices can be predicted only to a minimal extent for the three representative companies. Based on the derived results, it is concluded that the Metals & Mining sector of BSE does not contain any statistical dependencies between its past and future stock prices and it is found to be weak form efficient. 2021, Badebio Biotechnololgy Ltd. All rights reserved. -
Cost-enabled QoS aware task scheduling in the cloud management system
Maintaining the quality of service (QoS) related parameters is an important issue in cloud management systems. The lack of such QoS parameters discourages cloud users from using the services of cloud service providers. The proposed task scheduling algorithms consider QoS parameters such as the latency, make-span, and load balancing to satisfy the user requirements. These parameters cannot sufficiently guarantee the desired user experience or that a task will be completed within a predetermined time. Therefore, this study considered the cost-enabled QoS-aware task (job) scheduling algorithm to enhance user satisfaction and maximize the profit of commercial cloud providers. The proposed scheduling algorithm estimates the cost-enabled QoS metrics of the virtual resources available from the unified resource layer in real-time. Moreover, the virtual machine (VM) manager frequently updates the current state-of-the art information about resources in the proposed scheduler to make appropriate decisions. Hence, the proposed approach guarantees profit for cloud providers in addition to providing QoS parameters such as make-span, cloud utilization, and cloud utility, as demonstrated through a comparison with existing time-and cost-based task scheduling algorithms. 2021 - IOS Press. All rights reserved. -
Secure key exchange scheme: A DNA computing-based approach to resist MITM in DHKE
Diffie-Hellman key exchange (DHKE) protocol was a pioneering work and considered as a new direction in the field of cryptography though it is not an encryption protocol. DHKE is a method to exchange the keys securely, based on the discrete logarithm problem. It has applications in internet security protocols including SSL, IP Sec and SSH. The major issue with DHKE is its vulnerability to man in the middle attack (MITM). Various techniques have been proposed to resist the MITM including digital signatures. This paper proposes DNA computing-based encryption techniques to resist MITM in DHKE. DNA cryptography builds on the concepts of biomolecular computations which are considered as one of the emerging directions in the cryptography. The proposed methodology also includes an encryption technique based on DNA-based codebook, secret sharing and DNA cryptography to exchange parameters securely. The security analysis of the proposed scheme is evaluated by theoretical analysis. Formal analysis of the proposed protocol is done using Scyther and all the modelled claims are validated and positive results are obtained. Copyright 2021 Inderscience Enterprises Ltd. -
An improved web caching system with locally normalized user intervals
Caching is one of the most promising areas in the field of future internet architecture like Information-centric Networking, Software Defined Networking, and IoT. In Web caching, most of the web content is readily available across the network, even if the webserver is not reachable. Several existing traditional caching methods and cache replacement strategies are evaluated based on the metrics like hit ratio and byte hit Ratio. However, these metrics have not been improved over the period because of the traditional caching policies. So, in this paper, we have used an intelligent function like locally normalized intervals of page visit, website duration, users' interest between user groups is proposed. These intervals are combined with multiple distance metrics like Manhattan, squared Euclidean, and 3-,4-,5-norm Minkowski. In order to obtain significant common user navigation patterns, the clustering relation between the users using different intervals and distances is thoroughly analyzed. These patterns are successfully coupled with greedy web cache replacement strategies to improve the efficiency of the proposed web cache system. Particularly for improving the caching metrics more, we used an AI-based intelligent approach like Random Forest classifier to boost the prefetch buffer performance and achieves the maximum hit rate of 0.89, 0.90, and byte hit rate of 0.87, 0.89 for Greedy Dual Size Frequency and Weighted Greedy Dual Size Frequency algorithms, respectively. Our experiments show good hit/byte hit rates than the frequently used algorithms like least recently used and least frequently used. 2013 IEEE. -
Parity labeling in Signed Graphs
Let S = (G; ?) be a signed graph where G = (V;E) is a graph called the underlying graph of S and ?: E(G) ? {+; -}. Let f: V(G) ? {1, 2, ..., |V(G)|} such that ?(uv) = + if f(u) and f(v) are of same parity and ?(uv) = - if f(u) and f(v) are of opposite parity. The bijection f induces a signed graph Gf denoted as S, which is a parity signed graph. In this paper, we initiate the study of parity labeling in signed graphs. We define and find `rna' number denoted as ?-(S) for some classes of signed graphs. We also characterize some signed graphs which are parity signed graphs. Some directions for further research are also suggested. 2021, Journal of Prime Research in Mathematics. All rights reserved. -
Marital Stress and Domestic Violence during the COVID- 19 Pandemic
Marital stress and domestic violence is prevalent in every society around the world. It has become a major concern during the Covid-19 pandemic. Governments have resorted to lockdown measures in order to contain the pandemic. The pandemic has made the weaker and more vulnerable people in a household more exposed to abusive partners. Social isolation and home confinement have detrimental effects on ones mental and physical well-being. Women have been shown to be at a very high risk from violence during The Covid19 pandemic. The research paper aims to understand the factors which compel women to stay in abusive and stressful marriages and the ways in which they can be empowered to lead their life with dignity and self-respect. The cultural contexts of most societies force women to stay in abusive marriages as the woman is often portrayed as the symbol of unity in families. Understanding the cultural bindings of women trapped in abusive households during the COVID-19 pandemic is a very crucial aspect as this can help in understanding the fear and apprehensions of women trapped in destructive marriages. This can be a key factor which can make it easier for support groups while providing counselling and other kinds of support to women trapped in abusive marriages. The paper also discusses the impact of abusive relationships on children and how it negatively shapes their personality and their emotional well- being. 2021 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. -
Image and signal processing in the underwater environment
To handle submerged action recognition, researchers must first understand the fundamental principles of photonic crystals mostly in the liquid phase. Deterioration effects are produced by the mediums physical attributes, which are not present in typical pictures captured in the air because light is increasingly reduced as it passes through water, submarine pictures are characterized by low readability. As a consequence, the sceneries are poorly contrasting and murky. Its vision capability is limited to approximately twenty meters in clear blue water and five meters or less in muddy water due to light dispersion. Absorbing (the removal of incident light) and dispersion are the two factors that produce light degradation. So the actual quality of submersible digital imaging is influenced by the destructive interference processes of light in water. Longitudinal scattered (haphazardly diverted light traveling from objects to the cameras) causes picture details to be blurred. 2021, SciTechnol, All Rights Reserved. -
Intelligent machine learning approach for cidscloud intrusion detection system
In this new era of information technology world, security in cloud computing has gained more importance because of the flexible nature of the cloud. In order to maintain security in cloud computing, the importance of developing an eminent intrusion detection system also increased. Researchers have already proposed intrusion detection schemes, but most of the traditional IDS are ineffective in detecting attacks. This can be attained by developing a new ML based algorithm for intrusion detection system for cloud. In the proposed methodology, a CIDS is incorporated that uses only selected features for the identification of the attack. The complex dataset will always make the observations difficult. Feature reduction plays a vital role in CIDS through time consumption. The current literature proposes a novel faster intelligent agent for data selection and feature reduction. The data selection agent selects only the data that promotes the attack. The selected data is passed through a feature reduction technique which reduces the features by deploying SVM and LR algorithms. The reduced features which in turn are subjected to the CIDS system. Thus, the overall time will be reduced to train the model. The performance of the system was evaluated with respect to accuracy and detection rate. Then, some existing IDS is analyzed based on these performance metrics, which in turn helps to predict the expected output. For analysis, UNSW-NB15 dataset is used which contains normal and abnormal data. The present work mainly ensures confidentiality and prevents unauthorized access. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021. -
Secure biometric authentication with de-duplication on distributed cloud storage
Cloud computing is one of the evolving fields of technology, which allows storage, access of data, programs, and their execution over the internet with offering a variety of information related services. With cloud information services, it is essential for information to be saved securely and to be distributed safely across numerous users. Cloud information storage has suffered from issues related to information integrity, data security, and information access by unauthenticated users. The distribution and storage of data among several users are highly scalable and cost-efficient but results in data redundancy and security issues. In this article, a biometric authentication scheme is proposed for the requested users to give access permission in a cloud-distributed environment and, at the same time, alleviate data redundancy. To achieve this, a cryptographic technique is used by service providers to generate the bio-key for authentication, which will be accessible only to authenticated users. A Gabor filter with distributed security and encryption using XOR operations is used to generate the proposed bio-key (biometric generated key) and avoid data deduplication in the cloud, ensuring avoidance of data redundancy and security. The proposed method is compared with existing algorithms, such as convergent encryption (CE), leakage resilient (LR), randomized convergent encryption (RCE), secure de-duplication scheme (SDS), to evaluate the de-duplication performance. Our comparative analysis shows that our proposed scheme results in smaller computation and communication costs than existing schemes. 2021 M et al. All Rights Reserved. -
Mine Waste-Based Next Generation Bricks: A Case Study of Iron Ore Tailings, Red Mudand GGBS Utilization in Bricks
Utilization of mine wastes as a building material in the construction industry surmises to environmental and sustainable concepts in civil engineering.The potential environmental threat posed by mining wastes, as well as a growing societal awareness of the need to effectively treat mining wastes, has elevated the subject importance.The present research proposes a method of producing bricks that is both cost effective and environmentally benign. The research is based on the geopolymerization, known to save energy by obviating high-temperature kiln firing and lowering greenhouse gas emissions. The methodology encompasses the mixing of red mud and iron ore tailings in the range of 90% to 50% with a decrement of 10% with GGBS in the range of 10% to 50% with an increment of 10%. The raw materials and the developed composites have been tested as per Indian and ASTM standards.In addition to tests pertaining to the physical and mechanical properties, XRF, XRD, and SEM tests have been performed for examining various related issues. Based on the result analysis, the compressive strength values showed noticeable differences in case of IOT and red mud bricks with IOT-based bricks showing better compressive strengths. 2021 M. Beulah et al. -
Research & development premium in the Indian equity market: An empirical study
This article aims to investigate the research and development (R&D) premium and explore the three most prominent asset pricing models: capital asset pricing and the three-and five-factor models (Fama & French, 1993; 2015). The results show that India's annualized average R&D premium is significantly higher than the existing value, market, profitability, size and investment premiums, implying that the R&D premium is a more significant concern for Indian investors, particularly for high R&D firms. It was also observed that by applying the GRS test and the Fama and MacBeth (1973) two-pass procedure, the R&D risk factor augmented the CAPM, FF3F and FF5F models outperforming the existing CAPM, FF3F and FF5F models, respectively. We can also report that R&D is, unquestionably, a priced ingredient and a critical factor in developing pricing models for developing markets such as India. The paper's conclusions add to the current literature in R&D and asset pricing and assist investment professionals in developing better investment and trading strategies. 2021 AESS Publications. All Rights Reserved. -
Transformation of India as investor of outward fdi: A systematic investigation of literature
Besides the economic transformation and industrial up-gradation, Indian enterprises have steadily intensified their overseas investment venture during recent years. A systematic literature review performed to inspect the strategic motives and Outward FDI (OFDI) impact on emerging economies like India. This paper explores relevant theories, strategic rationale, and economic policies that propel the present OFDI trend from India. The effort taken by the Indian government to promote innovations were Cross border commercial and industrial collaboration. These efforts flagged the way for more Outward FDI possibilities in the future (Welch, 1988). This study comprises the literature works till the year 2019, which includes research journals and reports. The analysis observes that knowledge-based industries drive India's Outward FDI and examine whether knowledge-based industries contribute to sustaining long-term domestic and international growth (Pradhan J.P., 2005; Narayanan, 2016). Indian Institute of Finance. -
Social Media and Steganography: Use, Risks and Current Status
Steganography or data hiding is used to protect the privacy of information in the transit; it has been observed that the information that flows through Online Social Networks (OSN) is very much unsafe. Therefore, people hesitate to communicate their sensitive data on social media.. Most of the information on the online social network is not useful to users and appears to disregard such details. People's actions provided a possibility for digital Steganography through the Internet.. TCPIP covert channels were used for steganography until the last decade. People began to utilize social media as a covert conduit to communicate hidden messages to targeted users as social media grew in popularity. There are numerous Online Social Networks accessible nowadays, ranging from Facebook to the more contemporary Twitter and Instagram. All of them may be utilized as covert channels without the general public noticing. The primary characteristic of steganography is the protection of information privacy; nonetheless, it has been utilized more for illicit message transmission, which is a source of concern. To make matters worse, adversaries are using steganalysis techniques to mess with the concealed data. In this article, we examine the different social media steganography techniques, such as those used on Facebook, WhatsApp, and Twitter, as well as the difficulties that these approaches raise. The positive and negative consequences of social media, as well as its current state, are discussed in this study. This paper discusses how the performances of Steganography methods may be assessed using the Entropy value of the Stego object. A look of the three features of steganography. It has been given with undetectability, robustness, and payload capacity. Finally, the paper's concept's future scope is explored. 2013 IEEE. -
Laguerre polynomial-based operational matrix of integration for solving fractional differential equations with non-singular kernel
The Atangana-Baleanu derivative and the Laguerre polynomial are used in this analysis to define a new computational technique for solving fractional differential equations. To serve this purpose, we have derived the operational matrices of fractional integration and fractional integro-differentiation via Laguerre polynomials. Using the derived operational matrices and collocation points, we reduce the fractional differential equations to a system of linear or nonlinear algebraic equations. For the error of the operational matrix of the fractional integration, an error bound is derived. To illustrate the accuracy and the reliability of the projected algorithm, numerical simulation is presented, and the nature of attained results is captured in diverse order. Finally, the achieved consequences enlighten that the solutions obtained by the proposed scheme give better convergence to the actual solution than the results available in the literature. 2021 The Author(s). -
Post listing IPO returns and performance in India: An empirical investigation
Objectives: (a) To analyse the performance of Indian IPOs in the short term. (b) To determine the significance of abnormal return of the IPOs. (c) To study the impact of over-subscription, profit after tax, promoters' holdings, issue price and market returns on IPO performance. Design/ Methodology/Approach: This research paper is based on empirical analysis. All the 52 IPO's listed in the NSE (National Stock Exchange, India) during the year 2018 to 2020 were considered for the study. The study is based on secondary data. The daily share price and Nifty-50 index value were taken from NSE website (www.nseindia.com) and other relevant data from red-herring prospectus of the respective company. The research / statistical tools used are: Market adjusted short run performance model, Wealth relative model, 't' test and regression analysis. Scope of the study: The scope of the study is limited to the IPO's listed only in the National Stock Exchange (NSE), India. Period of study: The study covers a period from January 2018 to December, 2020. Limitation of the study: The study considers only the influence of the external factors on the performance of IPOs. Findings: The average IPO return on the first trading day is 13.52%, ranging from -23.15% to 82.16% with standard deviation of 26.72%. The average IPO return on the third trading day was the highest and is found to be14.52%, ranging from -19.22% to 117.55% with standard deviation of 18.57%. The analysis reveals that the over subscription impacts the IPO performance and the other factors namely, issue price, Profit after Tax, market returns and promoters holdings do not influence IPO returns. Originality / Value: This is an original work that analyses the listing gain or loss and the post listing performance of IPO's in India and other factors that might influence the listing gain or loss. Copyright 2021. T. Ramesh Chandra Babu and Aaron Ethan Charles Dsouza. Distributed under Creative Commons Attribution 4.0 International CC-BY 4.0 -
Exchange rate, stock price and trade volume in US-China trade war during COVID-19: An empirical study
This article aims to examine the influence of international trade wars on the majority of stock market operations, both directly and indirectly affected. The impact of the trade war on the exchange rates of the participating countries was similarly negative. This article seeks to trace the conversion standards' footprints in the United States, China, and India using several indexes such as the Shanghai Composite Index, Dow Jones index, and Nifty 50. The cost of closing down various indices on a daily basis, as well as the conversion standard upsides of the participating currencies, are all examined in this study. Furthermore, utilizing the OLS and GARCH models, this work provides insights into measuring the uncertainties about the impact of exchanging scale on financial exchange. According to the findings of OLS, changes in the swapping scale have had a minor impact on the daily closing costs of stock records in the individual countries. The conversion standard, on the other hand, has a major impact on trade volumes in all three stock markets. When compared to the SSE and DJI equities, the GARCH model predicts that the contingent shift will be less shocking, resulting in a smaller impact on Nifty trade volume. To replicate the impact of trade wars during the Covid-19 crisis, the final results imply that data from domestic and international financial transactions must include securities market transactions. Author This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0). -
Physical Co-location: an intersection of problem-solving and vicarious learning
Scholars have examined Revans' problem-solving praxeology in many contexts but have not fully explored the concept in the case of physical co-location. Hence, we focussed on investigating Revans' conceptualisation in a co-located context by paying particular attention to the different forms of learning' that emerged from it. The research setting for this study involved two coworking spaces in Bangalore, India, whose constituents were co-located start-ups and established enterprises. Held from January to March 2020, the study involved conducting exploratory, semi-structured interviews with twelve firms. The findings suggested that in a co-located environment, a) firms learnt vicariously' from a rich, external knowledge base during the enquiry-led Alpha phase b) firms learnt experientially', through learning by doing and reflecting in the implementation-focussed Beta phase c) firms learnt through the process of emergence that resulted from personal reflection and team interaction, in the revelatory Gamma phase. This study lends a novel direction in acknowledging that vicarious learning, that is, learning through the experience of others, serves as a starting point for problem-solving in a co-located context. We demonstrate that firms gain familiarity with the problem through vicarious sources, that is, from those experienced co-located firms who had journeyed on a similar path. 2021 Informa UK Limited, trading as Taylor & Francis Group. -
Optimising QoS with load balancing in cloud computing applying dual fuzzy technique
Cloud computing has become a necessity when the internet usage has increased drastically. This research paper objective is to optimise quality of service in cloud computing using dual fuzzy technique. With the competition to provide the best quality service at cloud data centre, we are analysing the parameters of average response time, average completion time, average CPU utilisation and job success. Cloud-sim simulator along with the mathematical model is used to provide reliable and valid result. To achieve the best result, the load in data centre needs to be efficiently distributed, so that it is managed to process maximum service requests with the best service response time and very few failures. In this paper, we applied dual fuzzy technique for the load balancing in the cloud data centre and the findings were extensive and support the proposed technique. With this technique, cloud computing service provider can provide better quality service. Copyright 2021 Inderscience Enterprises Ltd. -
Addiction treatment in India: Legal, ethical and professional concerns reported in the media
As per the Magnitude of Substance Use in India 2019 survey report, over 57 million of the Indian population is in need of professional help for alcohol use disorders and around 7.7 million for opioid use disorders. The increasing demand for addiction treatment services in India calls for professionalising every aspect of the field. Frequent human rights violations and various unethical practices in Indian addiction treatment facilities have been reported in the mass media. This study is a content analysis of newspaper reports from January 1, 2016 to December 31, 2019 looking into legal, ethical and professional concerns regarding the treatment of substance use disorders in India. The content analysis revealed various human rights violations, the use of improper treatment modalities, the lack of basic facilities at treatment settings, and the presence of unqualified professionals in practice. Indian Journal of Medical Ethics 2021.