Browse Items (11810 total)
Sort by:
-
Identification of Phishing URLs Using Machine Learning Models
In this study, we provide a machine learning-based method for identifying phishing URLs. Sixteen features, including Have IP, Have At, URL Length, URL Depth, Non-standard double slash, HTTPS domain, Shortened URL, Hyphen Count, DNS Record, Domain age, Domain active, iFrame, Mouse Over, Right click, Web Forwards, and Label, were extracted from the 600,000 URLs we gathered as a dataset of legitimate and phishing URLs. We then used this dataset to train a variety of machine learning models. These included standalone models such Naive Bayes, Logistic Regression, Decision Trees, and K-Nearest Neighbors (KNN). We also used ensemble models likeHard Voting, XGBoost, Random Forests, and AdaBoost. Finally, we used deep learning models such as Artificial Neural Networks (ANN), Long Short-Term Memory (LSTM), Gated Recurrent Units (GRU) and Convolutional Neural Networks (CNN).On evaluation of performance metrics like accuracy, precision, recall, train time and prediction time it was found that XGBoost provides the best performance across all categories. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Identification of potential ZIKV NS2B-NS3 protease inhibitors from Andrographis paniculata: An insilico approach
Andrographis paniculata is a widely used medicinal plant for treating a variety of human infections. The plant's bioactives have been shown to have a variety of biological activities in various studies, including potential antiviral, anticancer, and anti-inflammatory effects in a variety of experimental models. The present investigation identifies a potent antiviral compound from the phytochemicals of Andrographis paniculata against Zika virus using computational docking simulation. The ZIKV NS2B-NS3 protease, which is involved in viral replication, has been considered as a promising target for Zika virus drug development. The bioactives from Andrographis paniculata, along with standard drugs as control were screened for their binding energy using AutoDock 4.2 against the viral protein. Based on the higher binding affinity the phytocompounds Bisandrographolide A (-11.7), Andrographolide (-10.2) and Andrographiside (-9.7) have convenient interactions at the binding site of target protein (ZIKV NS2B-NS3 protease) in comparison with the control drug. In addition, using insilico tools, the selected high-scoring molecules were analysed for pharmacological properties such as ADME (Absorption, Distribution, Metabolism, and Excretion profile) and toxicity. Andrographolide was reported to have strong pharmacodynamics properties and target accuracy based on the Lipinski rule and lower binding energy. The selected bioactives showed lower AMES toxicity and has potent antiviral activity against zika virus targets. Further, MD simulation studies validated Bisandrographolide A & Andrographolide as a potential hit compound by exhibiting good binding with the target protein. The compounds exhibited good hydrogen bonds with ZIKV NS2B-NS3 protease. As a result, bioactives from the medicinal plant Andrographis paniculata can be studied in vitro and in vivo to develop an antiviral phytopharmaceutical for the successful treatment of zika virus. Communicated by Ramaswamy H. Sarma. 2021 Informa UK Limited, trading as Taylor & Francis Group. -
Identification of Predominant Genes that Causes Autism Using MLP
Autism or autism spectrum disorder (ASD) is a developmental disorder comprising a group of psychiatric conditions originating in childhood that involve serious impairment in different areas. This paper aims to detect the principal genes which cause autism. Those genes are identified using a multi-layer perceptron network with sigmoid as an activation function. The multi-layer perceptron model selected sixteen genes through different feature selection techniques and also identified a combination of genes that caused the disease. From the background study, it is observed that CAPS2 and ANKUB1 are the major disease-causing genes but the accuracy of the model is less. The selected 16 genes along with CAPS2 and ANKUB1 produce more accuracy than the existing model which proved 95% prediction rate. The analysis of the proposed model shows that the combination of the predicted genes along with CAPS2 and ANKUB1 will help to identify autism at an early stage. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Identification Of Quality Of Tea Leaves By Using Artificial Intelligence Techniques: A Review
This paper summarizes the outcome of the survey carried out for quality identification of a tea leaf and eventually price prediction. Quality identification can allow to categorizing leaf in different grades, which helps the buyer and seller to acquire suitable quality to their need. Price prediction is an important feature, which can bring certainty at price and farmers can be benefitted more for their good quality. Additionally, if the leaf disease is identified at the initial stage that would also allow farmers to timely resolve the concerned issues and save their corps. In the field of agriculture, this has been always a research area to identify and predict the quality of tea leaves. Various artificial intelligence techniques are hot topics in the field of recognition and their effective combination can not only solve the problem but also enhance recognition accuracy. Therefore, there is an imminent need for a detailed survey on compiling techniques used for the identification of different varieties of tea plants. In this research, we aim to propose a review of the various techniques which can be utilized for determining the quality and price prediction. The Survey is hybrid with a combination of different artificial techniques, which is a suitable approach to target effective tea leaf identification. Further for the classification of tea leaf images, various algorithms can be combined as well to obtain better results and different algorithms can be used for feature extraction based on texture extraction, color extraction, and shape extraction. The Electrochemical Society -
Identification of Student Programming Patterns through Clickstream Data
In present educational era, teaching programming to the undergraduates is challenging. For an instructor, focusing on each of the aspect of programming like coding language, logical reasoning, debugging errors, troubleshooting code and problem solving is very daunting task. So, educational researchers are identifying ways to easily identify the student's struggles during programming so that timely assistance can be provided. Using programming platforms or software, a lot of programming data is generated in the form of activity logs or clickstream data. Using machine learning along with data analytics over this programming data can reveal programming patterns of students that may help in early interventions. This study focusses on identifying programming patterns of the students through clustering and groups the students into three major categories namely low performers, strugglers, and high scorers. Further, relevant features like test case success, code compile success and failure, finish test etc. that majorly contribute towards the student programming scores are identified through regression analysis. Through this research, educators can early categorize the students based on their programming patterns and provide timely intervention when necessary, ensuring that no student gets left behind in the fast-paced world of programming education. 2024 IEEE. -
Identification of Superclusters and Their Properties in the Sloan Digital Sky Survey Using the WHL Cluster Catalog
Superclusters are the largest massive structures in the cosmic web, on tens to hundreds of megaparsec scales. They are the largest assembly of galaxy clusters in the Universe. Apart from a few detailed studies of such structures, their evolutionary mechanism is still an open question. In order to address and answer the relevant questions, a statistically significant, large catalog of superclusters covering a wide range of redshifts and sky areas is essential. Here, we present a large catalog of 662 superclusters identified using a modified friends-of-friends algorithm applied on the WHL (Wen-Han-Liu) cluster catalog within a redshift range of 0.05 ? z ? 0.42. We name the most massive supercluster at z ? 0.25 as the Einasto Supercluster. We find that the median mass of superclusters is ?5.8 1015 M ? and the median size ?65 Mpc. We find that the supercluster environment slightly affects the growth of clusters. We compare the properties of the observed superclusters with the mock superclusters extracted from the Horizon Run 4 cosmological simulation. The properties of the superclusters in the mocks and observations are in broad agreement. We find that the density contrast of a supercluster is correlated with its maximum extent with a power-law index, ? ? ?2. The phase-space distribution of mock superclusters shows that, on average, ?90% of part of a supercluster has a gravitational influence on its constituents. We also show the mock halos average number density and peculiar velocity profiles in and around the superclusters. 2023. The Author(s). Published by the American Astronomical Society. -
Identification of the Functional Limitation of Marine Loading or Unloading Arm; A Case Study
Marine loading or unloading arms are used to transfer product from tanker vessels that often carries products like petroleum or chemicals from or to the tankers. Cochin Port has dedicated Tanker jetties for handling petroleum with Marine Loading Arms installed for safe handling of cargo. However, my studies in Cochin Port Trust have shown that it has a potential threat to tackle while it is taken for the maintenance process. The case study aids in understanding of the working of marine unloading arm installed in the port and to identify the functional or safety limitations of the existing model installed. This case study also proves that a small change in the design can bring about a big change in the safety of the people working with the equipment. The identified parameters have been studied for providing the necessary alterations of the design which could be implemented on the upcoming project of constructing the marine unloading arm in Cochin Port Trust. To support faster and safety loading/unloading requirement these hydraulically operated marine loading arms are fitted with emergency release couplings and emergency release system. Marine Loading Arms are operated by using the hydraulic system. During maintenance procedure while checking the Emergency Release System (ERS) functionality, accidental release of Emergency release coupling can cause fatality. Hence a fool proof design is suggested with an extra locking arrangement. The studies conducted till now and the reviews conducted contributed in the analysis of the development and validation of the design. A design of a locking machanism for preventing the fatality is created and analysed for suggesting it to the industry so that it could be incorperated in the upcoming project of constructing the marine loading and unloading arm. 2023 American Institute of Physics Inc.. All rights reserved. -
Identifying 'Self' Through Society : A Socio-Psychological Perspective of A Song of Ice and Fire
The Socio-Psychological Character Analysis Model (SPCAM) is developed to analyse complex literary characters. It helps readers of Literature understand the characters psyche and behaviour by keeping in mind their social background and influences. To develop the literary model, SPCAM, concepts from two theories are synthesised, which are Symbolic Interactionism (SI) and Cognitive newlineBehavioural Theory (CBT). The common threads between the two theories weave them together, and the complementary threads strengthen the developed model. SPCAM studies how characters make meaning while interacting with themselves and others in the society, while also identifying and evaluating their thoughts and beliefs. Using SPCAM helps the user to systematically extract necessary data newlinefrom the text, tabulate it according to the parameters set by the model, and examine the character s internal and external factors, as provided in the text, leading to a comprehensive review of the character and a character conceptualisation. SPCAM helps the users to substantiate their claims about a newlinecomplex character by helping them be more methodical and thorough. The introductory chapter establishes the need and scope of the research. It reviews the benefits of collaborating with Social Psychology for a literary analysis. After which, it defines the theories merged to build the model. The newlinedeveloped model, SPCAM is then explained in detail. This is followed by the rationale for using fantasy fiction, a brief about the author, George R.R. -
Identifying a Range of Important Issues to Improve Crop Production
Crop yield production value update has a beneficial practical impact on directing agricultural production and informing farmers of changes in crop market prices. The main objective of the suggested method is to put the crop selection technique into practise so that it may be used to address a variety of issues facing farmers and the agricultural industry. As a result, the yield rate of crop production is maximised, which benefits our Indian economy. land conditions of several kinds. So, using a ranking system, the quality of the crops are determined. This procedure also alerts farmers to the rate of crops of low and high quality. Due to the use of multiple classifiers, using an ensemble of classifiers paves the way for better prediction decisions. The decision-making process for selecting the output of the classifiers also incorporates a rating system. The price of a crop that will produce more is predicted using this method. 2023 IEEE. -
Identifying explosive behavioral trace in the CNX nifty index: A quantum finance approach
The fnancial markets are found to be fnite Hilbert space, inside which the stocks are displaying their wave-particle duality. Te Reynolds number, an age old fluid mechanics theory, has been redefned in investment fnance domain to identify possible explosive moments in the stock exchange. CNX Nify Index, a known index on the National Stock Exchange of India Ltd., has been put to the test under this situation. Te Reynolds number (its fnancial version) has been predicted, as well as connected with plausible behavioral rationale. While predicting, both econometric and machinelearning approaches have been put into use. Te primary objective of this paper is to set up an efcient econophysics' proxy for stock exchange explosion. Te secondary objective of the paper is to predict the Reynolds number for the future. Last but not least, this paper aims to trace back the behavioral links as well. 2018 Bikramaditya Ghosh, Emira Kozarevic. -
Identifying Social-Cognitive Factors Influencing Aggression in Adolescents: A Cross-Sectional Indian Study
Adolescence is a critical period during which the likelihood of experiencing self-regulation failures like aggressive outbursts is increased. Recent Indian studies on adolescents have reported an increasing incidence of aggressive acts during this time of transition, which is a threat to the adolescent, the victim and society in general. This study focuses on the social-cognitive perspective, implying that aggression is a social behaviour that is largely affected by ones beliefs about the acceptability of aggression and the degree of cognitive and effortful control they have over their emotions. Such beliefs are likely to be influenced by emotion socialisation, wherein parents and peers act as key agents. With this perspective, the current study, through a mediational model, explains the social-cognitive factors predicting aggressive behaviour in adolescents. This is a cross-sectional, descriptive study carried out on a sample of 475 adolescent students from the Delhi-NCR region recruited through purposive sampling. The data were collected through self-report questionnaires from schools and colleges. The model was tested using SPSS AMOS and was found to be a good fit for the data. The findings of this study are crucial from a risk and intervention perspective. It emphasises the need to build socially and emotionally competent students who not only have the skills needed to succeed but also nurture healthy social relationships and maintain positive mental health through adaptive emotion regulation skills. 2024 Department of Psychology, University of Allahabad. -
Identifying the Existing Oral Proficiency Testing Patterns
The research aims to identify the different activities or patterns used for the teaching and testing of oral proficiency. Furthermore, the issues in the assessment of oral proficiency are also analyzed. The data was collected from the English teachers teaching in the selected Aided Kerala State Syllabus Schools in Trivandrum, Kottayam and Pathanamthitta districts from the grades 7th, 8th, 9th and 10th. The present study incorporated an exploratory research design based on a qualitative approach. The sample size consists of eleven teacher participants that were selected based on purposive sampling. The research study was divided into three phases. The phase 1, consists of open-ended questionnaire which were distributed to eleven teachers and the data obtained was categorized into different themes based on the responses from the teacher participants. Phase 2 consists of classroom observations of eleven teachers in which three teaching sessions per teacher and a total number of one thousand two hundred eighty-seven students were observed based on the classroom observation checklist. Moreover, phase 3 consists of interviews among the eleven teacher participants to gain further insights. The findings of the present research based on the analysis of the phase1, phase 2 and phase 3, indicates that the Communicative Language Teaching (CLT) approach is an effective approach to enhance the oral proficiency of the students. Moreover, the teaching and the testing patterns implemented by the school teachers are considered effective as it enables them to teach and to assess the oral proficiency of the students in a systematic manner. The research findings based on the triangulation prove that the use of reading, role play and storytelling are found to be consistent across the three phases and are commonly used by the teachers to enhance the oral proficiency of the students in the English language viii classrooms. Moreover, in the triangulation of assessment of oral proficiency, it has been observed that the activities such as reading and role play are found to be consistent across the three phases and are commonly used by the teachers. Furthermore, regarding the issues in the assessment of oral proficiency, lack of time is considered as one of the issues that is consistent across the three phases. The overall analysis of this research indicates that there is a positive or a parallel impact between the CLT approach and Theory of Knowledge (TOK) on the development of the oral proficiency of the students. The researcher suggests that there should be a standardized assessment tool to test the oral proficiency of the students in order to ensure grading consistency among the test assessors in the Kerala State Syllabus Schools. -
Identifying the population of T-Tauri stars in Taurus: UVoptical synergy
With the third data release of the Gaia mission, Gaia DR3 with its precise photometry and astrometry, it is now possible to study the behavior of stars at a scale never seen before. In this paper, we developed new criteria to identify T-Tauri stars (TTS) candidates using UV and optical color-magnitude diagrams (CMDs) by combining the GALEX and Gaia surveys. We found 19 TTS candidates and five of them are newly identified TTS in the Taurus molecular cloud (TMC), not cataloged before as TMC members. For some of the TTS candidates, we also obtained optical spectra from several Indian telescopes. We also present the analysis of distance and proper motion of young stars in the Taurus using data from Gaia DR3. We found that the stars in Taurus show a bimodal distribution with distance, having peaks at 130.17-1.241.31 pc and 156.25-5.001.86 pc. The reason for this bimodality, we think, is due to the fact that different clouds in the TMC region are at different distances. We further showed that the two populations have similar ages and proper motion distribution. Using the Gaia DR3 CMD, we showed that the age of Taurus is consistent with 1Myr. 2023, Indian Academy of Sciences. -
Identifying Wage Inequality in Indian Urban Informal Labour Market: A Gender Perspective
This chapter elucidates the wage differential between male and female informal workers in urban labour market by using employment and unemployment survey 61st (2004-2005) round, 68th (2011-2012), and Periodic Labour Force Survey 2019-2020 data of National Sample Survey Office (NSSO) unit level data. This study found that gender inequality not only increased during getting job but also persists after getting job during wage distribution. Based on the Oaxaca-Blinder (OB) decomposition, it is revealed that gender wage inequality is more in the labour market due to the labour market discrimination, that is, unexplained components. Hence, this study helps researcher, policy makers and government to fix the gender wage discrimination issues exist in the Indian labour market. This will enhance economic growth through the rise of the women labour force participation. 2024 A. Vinodan, S. Mahalakshmi, and S. Rameshkumar. -
IDENTITIES AT THE DINNER TABLE: COMMENSALITY, SELF-PERCEPTION, AND RELATIONSHIPS IN ANNE CHERIANS A GOOD INDIAN WIFE
Food studies is rapidly gaining ground as a multidisciplinary area of research. Within it, literary food studies brings an interdisciplinary perspective as works of literature are viewed through the lens of food that is informed by frameworks and concepts that are rooted in a variety of fields including cultural anthropology, sociology, and more. one such concept that is in focus here is that of commensality that is associated with food and food practices. Commensality, drawing from notions of conviviality, refers to the practice of sharing a table and consuming food together. Deeper meanings of communal identities come to the fore in this social practice, leading it to shape how identities are understood and projected. Commensality can be a complex site of belonging and alienation depending on the context, and this paper seeks to explore the representation of the same in Anne Cherians A Good Indian Wife (2008). Leila, the titular Indian wife in the novel, moves to the US from India after her marriage to Neel and grapples with finding her place in the foreign land. With this displacement comes the endeavor to reaffirm her new identity, which now includes the role of being a wife and the aspect of being an immigrant. Neel also deals with complicated feelings towards the projection of his identity. With food playing a crucial role in the everyday experiences of their lives, commensality becomes a point of enquiry into how they see themselves and how their relationships with each other and themselves evolve through the course of the narrative. 2024 Nayana George. -
Identity formation and construction of communities among the users of social networking sites
Study of social networking sites and formation of community within the social networking sites is a new topic. Emergence of social networking sites and its impact on the social life is therefore a recent phenomenon. The social networking sites are a common platform for users to come together on the basis of common interest, ideas and opinions. Its existence and relevance is justified by number of factors operating together, such as large user base, radical changes in the process of socialization and impact of social media on our everyday life etc. What makes social networking sites so interesting is the fact that it is user centric. The very foundation of social networking sites was laid to facilitate socialization among the users. India has one of the largest social network user bases especially for social networking sites like Facebook and Orkut. This is even truer for urban centers such as Bangalore, Delhi, Mumbai and Chennai. The use of social networking sites is so common among the youth that it almost seems as though if one is not part of social networking site one does not have any social life. Everything we have in real life gets replicated in the online communities, the good and the bad. Therefore, this study is an attempt to understand how the users are able to come together and form community in the cyberspace. The researcher also attempts to study the impact of the same in the real life and vice versa. Since the advent of social networking sites it has radically changed the way we socialize. This study also looks at how social networking sites and social network analysis emerged. Identity formation is yet another aspect of the study; online identities are very fluid as one has to type themselves into existence. Therefore, the identities people take online are varied and often may be completely different from the reality. This aspect of fluid identity has both positive and negative aspects as we will see later in the thesis. Social media technologies are woven into the very fabric of our social life. As mentioned above are the various aspects of the social networking sites that we are looking into. The dissertation is divided into five chapters, the first chapter introduces one to the topic, along with aims, objectives, need and background of the study, the second chapter consists of the reviewed literature, the third chapter deals with the methodological part of the dissertation as various tools and techniques used in the study are explained, while the fourth chapter is the analysis and interpretation of the primary data collected, it is presented using various bar diagrams and tables, and the fifth chapter brings out the important findings in the study and also in the conclusion chapter. The fifth chapter summarizes all the findings of the earlier chapters. Finally, the dissertation consists of the bibliography list and the questionnaire which was distributed to collect the data. -
Identity in Consumption: Reading Food and Intersectionality in Anita Desai's Fasting, Feasting
With the resurging interest in Food Studies, this rapidly emerging field of study has seen multiple disciplines adding in their distinct flavours that truly make this an area to savour. Literary food studies, in particular, has become a relevant field of study with the understanding that food in literature always plays a symbolic role, as food in literature is never depicted for the sustenance of the literary characters. This paper seeks to explore the novel Fasting, Feasting (1999) by Anita Desai through the lens of food and foodways to explicate how the characters interact with the culinary arena, and ultimately, interact with each other and themselves. These interactions will serve as crucial insights into their identities, particularly their intersectional gender identities considering the facets of nationality, class, and the like. A special focus will also be rendered on the notion of marginalisation seen in the text, of which gender is a crucial deciding factor. The title of the novel hints at consumption-at both its presence and absence-which will prove as the gateway to the interactions of the characters with food in the novel to examine who it is that gets to feast while who are forced to starve. 2022 Aesthetics Media Services. All rights reserved. -
Identity verification in heterogeneous alliance network using blockchain and cryptography techniques /
Patent Number: 202141035794, Applicant: Abolfazl Mehbodniya.
There is a serious issue for the wireless transmission research community when it comes to data transfer under a scalable networking architecture. Data integrity, data quality, and originality must be maintained along the transmission chain. As a result, the relationships between data inside interference are a significant obstacle. Due to insufficient infrastructure for resource allocation and mapping the target address efficiently, in P2P transmission lines, the efficiency of the system is hampered. -
Identity-based message authentication scheme using proxy vehicles for vehicular ad hoc networks
Message authentication verifies the identity of the sender vehicle, ensuring it in between vehicles and Road Side Units (RSU) is an essential part of Vehicular Adhoc Networks. Signature verification in RSUs will be troublesome if a large number of vehicles enters in its region at the same time. In such cases the efficiency of the RSUs will be affected due to high computational overhead. To address this issue, proxy vehicle based message authentication scheme (ID-MAP) is proposed by Asaar et al. (ITVT 67: 5409, 2018). It uses proxy vehicles to reduce the overheads of the RSU by verifying multiple messages at the same time. Even though it deals with the efficiency issues of RSU, the computational cost of signature generation is high. Since the ability of a vehicle to act as a proxy vehicle is based on the number of signed messages, it has a major impact. It also cannot guarantee privacy preservation and hence it is insecure against attacks based on privacy preservation. It also has other drawbacks like storage issues and high overheads. Hence, a new identity based message authentication using proxy vehicles is proposed in this paper. Elliptic Curve Cryptography based scheme is used without pairings for message authentication. Proxy vehicles will verify multiple messages from vehicles through batch verification and send the result to the RSU. The identity of multiple proxy vehicles will be verified by RSU, it can also cross check the correctness of the received result. Thereby RSUs can verify a large number of messages at the same time with the help of proxy vehicles. Security analysis shows that if each proxy vehicle verifies 300 messages of its neighbor vehicles, then with the help of proxy vehicles an RSU can verify 226,244 messages per second which is 40% less than that of ID-MAP scheme. It also shows that the computational cost to generate a signature in the proposed scheme is 50% less than that of ID-MAP scheme. 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.