Browse Items (11855 total)
Sort by:
-
Rotor Dynamics of TurbineGenerator Shaft with Dampers During Subsynchronous Resonance Generated by Series Capacitors
Purpose In this paper, an electromechanical approach to study the turbinegenerator shaft stability with and without dampers is made. The shaft is subjected to electrical disturbances created by series capacitors. The high power capacitors help the electric power system to improve the reactive power in high voltage transmission lines. Methods Finite element method is used to study the stability of the shaft under subsynchronous resonance when compared to the traditional methods like eigenvalue analysis, frequency scanning method and digital time simulation techniques. At the same time, it leads to subsynchronous resonance. Results Electromechanical stress in the rotating shaft arises when the resonance is created in the system. Maximum stress and strain of the shaft are calculated with other necessary parameters to prove the system instability. In order to maintain stability, dampers are installed at an optimum location. Conclusion Best location of installing damper is found using ANSYS 16.0 by modal analysis, harmonic and phase response analysis. The damper installed at the point reduces the stress caused by subsynchronous resonance and maintains the stability of the system. 2021, Springer Nature Singapore Pte Ltd. -
Experimental Investigations on Turbine-Generator Shaft Under Subsynchronous Resonance
Energy exchange takes place between turbine and generator in the power system during subsynchronous resonance (SSR) which leads to torsional interaction between the shafts. Resonance in the power system is caused by the series capacitors connected to the transmission line. This paper aims to present an electromechanical approach to analyse and interpret subsynchronous resonance using the Finite element method. Subsynchronous resonance is introduced in two test rigs consisting of turbine, generator, shaft, and coupler with capacitors. Experiments and simulations (torque analysis and frequency response analysis) are conducted in test rigs and ANSYS workbench 16.0. Moreover, a spring damper is modelled to improve the stability of the shaft. From the results, it is clear that mechanical stress is increased when capacitors are connected to the test rig. A spring damper is installed at the point where the deformation is high. The damper reduced the stress and the vibration. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Impact on cardioprotective effect of Psidium guajava leaves extract in streptozotocin-induced Wistar mice with molecular in silico analysis
Cardiovascular disease (CVD) and its complications have been regarded as the leading cause of morbidity and mortality. The drugs available in the market are effective to treat CVD, but with many adverse reactions. Nowadays, herbal products are the attention of researchers because of their less adverse effects. In this study, the cardioprotective effects of ethanolic leaves extract of Psidium guajava Linn. (Guava) (P. guajava) were evaluated in streptozotocin (STZ)-treated animal models. Mice acquired for the study were divided into five groups, each consisting of six mice. The toxin-induced mice were treated with the ethanolic leaves extract of P. guajava (300 mg/ kg body weight [b.w.]). The results were compared to the standard drug (glibenclamide)-treated mice (3 mg/kg b.w.). The following parameters were considered for further investigations: creatine kinase-muscle brain (CK-MB), creatine kinase (CK), troponin, lysosomal, and mitochondrial enzymes. Then the docking study was accomplished. The levels of cardiac marker enzymes and lysosomal enzymes increased significantly in the toxin-induced mice, while the level of mitochondrial enzyme decreased significantly. During treatment with the ethanolic leaves extract of P. guajava, the levels of all parameters were notably reversed to normal range (P < 0.05). Further, in docking analysis, the interaction of compounds, such as alpha-terpineol, cyclopentanecarboxamide, guaiol (a sesquiterpenoid alcohol), 1H-cyclopropanaphthalene, tetracyclotridecan-9-ol, dormin/abscisic acid, and epiglobulol, with the respective protein molecules, evidenced the cardioprotective effect of P. guajava leaves. Hence, it was concluded that the ethanolic leaves extract of P. guajava leaves have a cardioprotective effect. 2023 Codon Publications. -
Leveraging Deep Learning in Hate Speech Analysis on Social Platform
The scope and usage of the Internet have surpassed the expected growth and have proven beyond the basic purpose of being used for networking and telecommunications. It serves as the backbone of the web, and one of the predominant domains that uses the Internet is social media. The concept was conceived in the early 1990s and went on to grow as a powerful medium of people networking along with the Internet. Social networking sites (SNS) acquired a predominant element of the Internet owing to their use and services they offer through the Internet. A few of the most used social networking sites include Twitter and Facebook, which are used synonymous to expressions of text. These SNS allow the users to post photos, videos, and other multimedia content along with text and voice messages that are shared among other users. As with any technology or application, these also have the risk of users posting offensive material and textual content. Hate is being spread through messages, which are in the form of text and also through other materials posted. There is no control to check for the message for the hate content as and when it is posted, and by the time it is deleted by admins, it could have already reached millions of users. This chapter proposes a technique for detecting hate texts in reviews from registered users in the Twitter dataset. The proposed work makes use of improved principle component analysis (IPCA) and modified convolution neural network (MCNN) for detecting hate texts. The advantage of natural language processing is used for building an automated system for the analysis of syntax and semantics of the words. The proposed methodology consists of phases like pre-processing, feature extraction, and process to classify the text. The white spaces in the text are removed through normalization in the pre-processing phase, and also remove special characters such as question marks, punctuations, and exclamatory symbols to remove stop words. The features that are pre-processed are then subjected to feature extraction using IPCA. A set of correlated features are made used for identifying more important features in the data set under consideration. Next, the classification is done for identifying the hate text or for any language abuse. MCNN is applied for the classification of the text into HATE and NON-HATE from the text with better accuracy. The experiments prove that the proposed method has a high level of accuracy even for a large dataset. The results show that the proposed method has better performance in terms of precision, recall, and F-measure when compared with other state-of-the-art methods. 2024 Taylor & Francis Group, LLC. -
AI Based Variable Step Size Block Least Mean Square Filter for Noise Cancellation System
Most of the Active Noise Cancellation (ANC) systems working properly in low-frequency noises only. To make it suitable for isolating high-frequency noise, it needs an additional circuit which consumes more energy. This problem is mitigated in this study by designing a Variable Step size Block Least Mean Square (VSBLMS) filter which is suitable for an effective noise cancellation system. VSBLMS filter is designed with RCA to make a design area efficient and it is designed with a novel adder to achieve high speed as well as less energy consumption. The proposed filter is designed and simulated using Xilinx ISE 13.2. The simulation results shows that the proposed VSBLMS filter design mitigates the unwanted noises in various frequency bands. The proposed VSBLMS reduces the energy consumption by 9.32%, 27.63%, 13.53%, 11.80%, 10.71 %, 13.14% and 9.26% when compared with state of the art methods. 2023 IEEE. -
Area and Energy Efficient Method Using AI for Noise Cancellation in Ear Phones
Adaptive filters are suitable for most of the Digital Signal Processing (DSP) applications such as channel equalization, noise cancellation, echo cancellation, channel estimation and system identification. Nowadays due to the advancement in semiconductor technology, the need for Active Noise Cancellation (ANC) headphones in compact devices is increased. The major idea behind this proposed work is to design an area and energy efficient novel adaptive filter suitable for in-ear headphones by combining Normalized Least Mean Square (NLMS) and Block LMS (BLMS). The proposed filter is designed and simulated using Xilinx ISE 13.2. The simulation results shows that the proposed design mitigates the unwanted noises in various frequency bands. 2023 IEEE. -
Current scenario of Gastric cancer (GC): A systematic review
Gastric cancer (GC) is amongst the most difficult cancers to treat and, hence, has to be studied from the roots to be properly analysed. The disease starts as precancerous lesions which have to be observed. This includes dysplasia, atrophic gastritis and intestinal metaplasia. This is effective for detecting the prognosis of GC so that it can be resolved in early stages. This is dependent on a variety of risk factors which include blood type, gender, age, geography, gene polymorphisms, acid secretion, pernicious anemia, oxidative damage, previous gastric surgery, etc. Probably the most important, however, is infection by H. Pylori. With respect to virulence factors and host factors, both are significant players in the development of several cases of malignancies. Other genetic factors and lifestyle choices including alcohol use, tobacco usage and obesity, will also be analysed. There are also several genetic conditions that cause high risk of development into a malignancy including Menetrier s disease, hereditary diffuse GC, Lynch syndrome, Peutz-Jeghers syndrome, Li Fraumani syndrome etc. Several diagnostic procedures such as lab tests, physical examinations and biopsy are used. The current review analysed the factors which are involved in the prognosis and causative agents in the development of GC. This is to better understand how GC can be diagnosed and confirmed. This may include molecular testing, including genes, which can be of high risk followed by modern treatment methods discussing surgery, chemotherapy, immunotherapy and radiotherapy. Chemotherapy includes discussion of several drugs and how they target the malignancy in question. By understanding the disease in detail, through causes, prognosis, detection and treatment, we can go one step closer to find the cure for GC. 2022 World Research Association. All rights reserved. -
Analysis of chromosomal aberrations and micronuclei in type 2 diabetes mellitus patients
Introduction: Type 2 diabetes mellitus is a metabolic disorder characterized by insulin resistance and disrupted insulin secretion. It is often linked to injuries, malfunction and failure of several organs in the long term. The elevated chromosomal disruptions and genetic complications in diabetic patients are due to the increased production of reactive oxygen species. Materials and Methods: The current study used chromosomal aberration assay and micronucleus assay to analyze the extent of abnormalities in the subjects. Results: The results showed increase in frequency of chromosomal aberrations in diabetic patients when compared to the control group (2.761.65 and 0.470.75 respectively). They also showed higher levels of micronuclei formation than the control participants (13.288.63 and 4.128.89 respectively). The correlation analysis indicated positive relationship between total aberrations and duration of diabetes. Conclusion: These results indicate that diabetes is associated with genomic instability and studies at a genetic level can be employed for early detection. 2020, West Asia Organization for Cancer Prevention. -
Antecedents of consumer attitude and purchase intention towards counterfeit products
This paper aims to investigate the effect of information reliability, risk, and value consciousness on hedonic behaviour, attitude towards counterfeit products, and genuine store trustworthiness. Using a structured survey instrument, this paper gathered data from 449 respondents from three cities major cities (Kochi, Bangalore, and Chennai) in southern part of India. The hierarchical regression render support that: 1) information reliability is positively related to hedonic behaviour and attitude towards counterfeit products; 2) risk is negatively related to hedonic behaviour and attitude towards counterfeit products; 3) value consciousness is positively related to hedonic behaviour and genuine store trustworthiness; 4) hedonic behaviour and attitude towards products are related to purchase intention. In addition, the results also support the moderation hypotheses of materialism, value consciousness and social status. The study suggests that marketers need to understand the importance of non-deceptive counterfeiting is useful and consumers have tendency to prefer to use these products once they are satisfied with their utility. The conceptual model developed and tested in this research enables the marketing managers to understand the antecedents of consumers purchase intention of counterfeit products. Copyright 2024 Inderscience Enterprises Ltd. -
Emerging Issues and Trends in Indian Business and Management: Volume 2: Business and Society: Issues and Cases in the Indian Context
There are many theories on why managers do not (as a behavior) or should not (as a value) supplement profit orientation with people-centrism and planet sensitivity. In practice, managers do not supplement profit orientation with considerations for people and the planet unless they have the tools and know how to make that possible. This book seeks to address that by focusing on the normative dimension of organizational development. There are two competing norms for developing an organization: first, as a profit-oriented business enterprise; and second, as a people-centric, planet-sensitive, profit-oriented business or social enterprise. The performance of a business is a concern for all stakeholders. With the growing realization of the importance of indirect stakeholders like the society and the planet, it is increasingly important to raise awareness about the social and environmental responsibilities of businesses and organizations. This book is a must-read for academics, researchers, practitioners and policymakers who are concerned about the triple bottom-line (Planet-People-Profit) performance of businesses, which is critical for their long-term sustainability. It covers topics pertaining to the relationship between business and society, including social entrepreneurship and corporate social responsibility, among others, and draws from real-life case studies on social initiatives. 2024 by World Scientific Publishing Co. Pte. Ltd. -
Entrepreneurship Education: Experiments with Curriculum, Pedagogy and Target Groups
The book provides an overview of developments in the field of entrepreneurship education, with special reference to global perspectives on innovations and best practices, as well as research in the emerging economy context. It focuses on various experiments in curriculum design, review and reform in addition to the innovative processes adopted for developing new content for entrepreneurship courses, in many cases with an assessment of their impact on students' entrepreneurial performance. Further, it discusses the pedagogical methods introduced by teachers and trainers to enhance the effectiveness of students' learning and their development as future entrepreneurs. It explains the various initiatives generally undertaken to broaden the scope of entrepreneurship education by extending it beyond regular students and offering it to other groups such as professionals, technicians, artisans, war veterans, and the unemployed. The book is a valuable resource for researchers and academics working in the field of entrepreneurship education as well as for trainers, consultants, mentors and policy makers. Springer Nature Singapore Pte Ltd. 2017. All rights are reserved. -
Entrepreneurship education: Innovations and best practices
Entrepreneurship education has become a priority for policy-makers especially in developing countries. Such interventions in the education system are expected to create a culture of entrepreneurship in the society and thereby bring economic benefits through the enterprising behaviour of individuals resulting in better performance of existing organizations as well as creation of new ventures. While the process appears to be simple and straightforward, the experiences have often belied the expectations. The fact that it is rather difficult to assess the long-term impact of entrepreneurship education adds to the confusion and ambiguities. Educators therefore have been tinkering with various aspects of entrepreneurship education and training in the hope of arriving at the best design. Obviously, this has led to many innovations in the curriculum, pedagogy, target groups and institutions involved in entrepreneurship education. The present paper attempts to document these innovations and best practices under a 'WHAT-HOW-WHO-WHERE' framework to capture the four domains of activities involved. Based on a comprehensive review of the literature, we have developed a fairly comprehensive picture of what is happening in the field and proposed a theoretical model highlighting the dual role of entrepreneurship education, namely developing enterprising individuals in the society and providing knowledge and skills required for enterprise creation. Springer Nature Singapore Pte Ltd. 2017. All rights are reserved. -
Business and Society: A Symbiotic Relationship
Business can be a for-profit, not-for-profit or hybrid organization. But all these businesses focus on the satisfaction of their stakeholders. Although many businesses adopt a limited perspective of their stakeholders, focusing primarily on the interests of their investors, customers and, in some cases, their employees, it is a fact that the long-term sustainability of any business will depend on its contributions to the society. The long-term objective of all businesses is to serve and support the society and contribute to the socioeconomic development of their people. Therefore, this chapter presents a comprehensive review of the relationship between business and society, with special reference to the three main types of businesses: commercial businesses, social enterprises and non-governmental organizations. As in the case of biological systems, the relationship between business and society may be characterized predominantly by one of the three types of symbiotic relationships: mutualism, commensalism and parasitism. However, the successful co-existence of business and society, in the long run, would depend on the degree of mutualism in their relationship. 2024 by World Scientific Publishing Co. Pte. Ltd. -
Preface: Motivation for this Book
[No abstract available] -
Perception of Entrepreneurial Ecosystem: Testing the ActorObserver Bias
Entrepreneurial ecosystem is the interacting socio-economic environment that facilitates entrepreneurs to start and develop their enterprises. A vibrant and supportive entrepreneurial ecosystem is necessary for the start-up and growth of an enterprise. The entrepreneurial action would largely depend on the perception of entrepreneurs about the ecosystem. In this context, a study was designed to understand the perceptions of actors (entrepreneurs) and observers (non-entrepreneurs) on various components of the entrepreneurial ecosystem. Data for this study were collected from 296 entrepreneurs and 315 non-entrepreneurs from India, who responded to a 77-item questionnaire by giving their ratings of various aspects of the ecosystem on a 5-point scale. Findings of the study showed that perceptions of the entrepreneurial ecosystem were significantly different for most of the subgroups. Most notable among these differences was those between entrepreneurs and non-entrepreneurs, where the mean scores on all dimensions were found to be significantly higher for non-entrepreneurs than for entrepreneurs except for entrepreneurial capability which was found to be higher for entrepreneurs. Hence, the hypothesis of actorobserver bias in the perceptions of entrepreneurs and non-entrepreneurs is supported. 2019 SAGE Publications. -
A comprehensive novel model for network speech anomaly detection system using deep learning approach
Network Intrusion Detection System (NIDS) is the key technology for information security, and it plays significant role for classifying various attacks in the networks accurately. An NIDS gains an understanding of normal and anomalous behavior by examining the network traffic and can identify unknown and new attacks. Analyzing and Identifying unfamiliar attacks are one of the big challenges in Network IDS research. A huge response has been given to deep learning over the past several years and novelty in deep learning techniques are also improved regularly. Deep learning based Network Intrusion Detection approach is highly essential for improved performance. Nowadays, Machine learning algorithms made a revolution in the area of human computer interaction and achieved significant advancement in imitating human brain exactly. Convolutional Neural Network (CNN) is a powerful learning algorithm in deep learning model for improving the machine learning ability in order to achieve high attack classification accuracy and low false alarm rate. In this article, an overview of deep learning methodologies for commonly used NIDS such as Auto Encoder (AE), Deep Belief Network (DBN), Deep Neural Network (DNN), Restricted Boltzmann Machine (RBN). Moreover, the article introduces the most recent work on network anomaly detection using deep learning techniques for better understanding to choose appropriate method while implementing NIDS through widespread literature analysis. The experimental results designate that the accuracy, false alarm rate, and timeliness of the proposed CNN-NIDS model are superior than the traditional algorithms. 2020, Springer Science+Business Media, LLC, part of Springer Nature. -
Application Areas, Benefits, and Research Challenges of Converging Blockchain and Machine Learning Techniques
In recent years, machine learning (ML) has become a hot topic of research and application. ML model and huge amount of data growth difficulties still follow ML development. With the lack of new data and constant training, published ML models may soon become obsolete; unscrupulous data contributors may upload incorrectly labelled data, leading to poor training results; and data leakage and abuse are all possible outcomes. These issues can be effectively addressed by using blockchain, a new and rapidly evolving technology. With the advancement of various smart devices and the field of artificial intelligence and machine learning, interdisciplinary collaboration with blockchain technology may be incredibly valuable for future investigations. Collaborative ML and blockchain convergence can be studied here, with emphasis on how these two technologies can be combined and their application areas. On the other hand, look at the existing researchs shortcomings and future enhancements. The Author(s), under exclusive license to Springer Nature Switzerland AG. 2024. -
Cryptographic Protocols for Securing Internet of Things (IoT)
Cryptographic protocols are used to relax the ever-developing quantity of linked gadgets that make up the net of things (IoT). Those cryptographic protocols have been designed to make certain that IoT tool traffic stays cozy and personal, even while nevertheless allowing tool-to-device and cloud-to-tool communications. Examples of these protocols consist of TLS/SSL, PGP/GPG, IPsec, SSL VPN, and AES encryption. Every one of these protocols enables authentication, message integrity, and confidentiality via encryption and key trade. Moreover, a lot of these protocols are carried out in the form of diverse hardware and software answers, such as smart playing cards and gateways, to make certain that IoT traffic is secured. With the appropriate implementation of those cryptographic protocols, establishments can ensure that their IoT facts are blanketed and securely transmitted. 2024 IEEE. -
Congestion Avoidance in Vehicular Ad Hoc Network MAC Layer Using Harmony SearchModified Laying Chicken Algorithm (HS-MLCA)
To address congestion in the MAC layer and enhance overall performance, the HS-MLCA is proposed. This algorithm incorporates the principles of both Harmony Search and Laying Chicken Algorithm to optimize resource allocation and congestion control. At the MAC layer, HS-MLCA offers several advantages over traditional congestion control schemes. Firstly, it leverages the Harmony Search algorithm, which is known for its ability to exploit the best outcomes in search processes. By exploring the solution space and exploiting promising regions, HS-MLCA optimizes resource allocation in the MAC layer. The integration of the Laying Chicken Algorithm (LCA) further enhances performance by improving convergence speed and solution accuracy. This hybrid approach leverages the strengths of both Harmony Search (HS) and LCA, resulting in more efficient and effective resource management. The Laying Chicken Algorithm simulates the behavior of laying hens in terms of resource allocation and competition. This approach contributes to provide the solution in quality and convergence speed, as the algorithm adapts to the dynamic nature of the MAC layer and the varying traffic conditions in VANETs. By combining the strengths of Harmony Search and Laying Chicken Algorithm, HS-MLCA offers improved performance in terms of congestion control in the MAC layer. It optimizes resource allocation, minimizes collisions and packet loss, reduces delay, and enhances overall network efficiency. These improvements ultimately lead to better quality of service, increased network capacity, and enhanced user experience in VANETs. It is worth noting that the specific performance improvements and benefits of HS-MLCA may vary depending on the implementation details, network conditions, and the specific VANET scenario. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.