Browse Items (11810 total)
Sort by:
-
Ricci recurrent almost kenmotsu 3-manifolds
In this paper, we obtain that a Ricci recurrent 3-dimensional almost Kenmotsu manifold with constant scalar curvature satisfying ?? h = 0, h ? 0, is locally isometric to the Riemannian product H2 (?4). 2021, University of Nis. All rights reserved. -
A Psychoanalytical Deconstruction of Surpanakha in Kavita Kane's Lanka's Princess
This paper endeavours to examine the character Surpanakha in Kavita Kane's novel Lanka's Princess. It attempts to critically follow her struggle in the androcentric space with the trapping of being a female. Breaking down her identity as a daughter, sister, wife and more specifically, as an individual, it tracks down the formulation of her own self-perception in order to reinterpret her femininity. Through the psychoanalytical lenses, this work also critically analyses her 'repression, rage and revenge' by connecting the dots in her journey that shape her personality. The giving of voice to the 'unvoiced' through revisionist myth making in the novel and the evolution of 'Surpanakha' from 'Meenakshi' due to her experiences in the oppressive and suffocating environment is the focal point of the paper. Keywords 2021 Copyright 2021 by Koninklijke Brill NV, Leiden, The Netherlands. -
Secured and Provisioned Access Authentication using Subscribed User Identity in Federated Clouds
Cloud computing has become an essential source for modern trade or market environments by abled frameworks. The exponential growth of cloud computing services in the last few years has resulted in extensive use, especially in storing and sharing the data on various cloud servers. The current trend in the cloud shows that the cloud owners use relative functions and target areas in such a way that cloud customers access or store their data either in the same servers or related servers. Simultaneously, from the security point of view, the lack of confidence about the customer's data on the cloud server is still questionable. The hour's need is to provide the cloud service in a single port way by forming the joint management policy to increase customer satisfaction and profitability. In addition to this, the authentication steps also need to be improvised. This paper discusses issues on the security authentication and access provisioning of the cloud service consumers in federated clouds using subscribed user identity. This work proposes the user identity verification module (UidVM) in the cloud service consumer's authentication process to serve as a cloud broker to minimize the work overloads on the central cloud federation management system, thus enhancing the cloud security. 2021. All Rights Reserved. -
A Systematic Review on e-Wastage Frameworks
The electronic devices that are targeted to the end users have become day to day essential parts. Traditional methodologies have changed drastically resulting in efficient mode of communication and fast information retrieval. As the demand and the production are exponentially growing, patterns of sales, storage and their destruction and then again, their collection have also been changed. This paper analyses many such behaviors of (electronic) waste management and recommends solutions like recycling management, different directives and policies required to be followed. Authors have emphasized on providing substantial information that can be useful to the regulating authorities responsible for waste management or the manufacturers of various electronic products and then the policy makers. With an extensive review of electronic wastages, authors have emphasized three variables (sales, stock and lifespan) for replacing/upgrading the older products with advanced versions. The root causes of electronic wastages are found in industrializing countries like India, China, Vietnam, Pakistan, the Philippines, Ghana and Nigeria whereas industrialized countries also play equally important role for its generation. This paper signifies the importance of e-waste management practice to reduce the emerging electronic waste hazards. Authors focus on todays demand of electronic devices, importance of e-waste management and management practices. The paper recommends key findings based on surveying data regarding the lack of regulation to manage the e-waste. The review concludes that the lack of regulation and improper awareness are the basic factors responsible for e-wastage and requires major focus to manage the e-waste. 2021. All Rights Reserved. -
Formulation and Characterization of Plant, Animal, and Probiotic Based Fish Meals and Evaluating their Efficacy on Growth and Performance in zebrafish (Danio rerio)
A comparative analysis on the effects of plant based (PD), animal based (AD) and probiotic based (PrD) diets on growth performance in Danio rerio was investigated. Different diets were administered as either single or combination diet (CD) containing PD, AD and PrD exhibited varying effects on growth and development. The probiotic bacteria isolated from Indian prawn (Penaeus indicus) was identified as Bacillus sp using 16s rRNA sequencing and phylogenetic analysis. The isolate was characterized by evaluating its ability to survive at different pH, temperature and simulated artificial gastric environment and was further subjected to varying concentrations of salt and organic solvents. Antibiofilm activity of the isolate was evaluated against fish pathogens; Vibrio harveyi (96.12.7%), Escherichia coli (96.21.5 %,), Pseudomonas aeruginosa (95.33.0%) and Staphylococcus aureus (96.72.8%). After the end of trail period, growth parameters were evaluated. Weight gain percentage was significantly higher in PrD (15.70.08 %) compared to other treatments. (p<0.05). Feed conversion ratio was least in CD (0.350.09) and feed efficiency (2.70.08) in CD was numerically high compared to other treatments. (p>0.05).The study promotes sustainable aquaculture by the use of alternative aqua feeds derived from plant or animal based sources. The study also highlights the usage of probiotics in improving growth performance, disease resistance in aquatic animals. 2021. Paari et al. -
Elementary Methods for Generating Three-Dimensional Coordinate Estimation and Image Reconstruction from Series of Two-Dimensional Images
The increase in computational power in recent years has opened a new door for image processing techniques. Three-dimensional object recognition, identification, pose estimation, and mapping are becoming popular. The need for real-world objects to be mapped into three-dimensional spatial representation is greatly increasing, especially considering the heap jump we obtained in the past decade in virtual reality and augmented reality. This paper discusses an algorithm to convert an array of captured images into estimated 3D coordinates of their external mappings. Elementary methods for generating three-dimensional models are also discussed. This framework will help the community in estimating three-dimensional coordinates of a convex-shaped object from a series of two-dimension images. The built model could be further processed for increasing the resemblance of the input object in terms of its shapes, contour, and texture. 2021 Naived George Eapen et al. -
Adaptive Fault-Tolerant System and Optimal Power Allocation for Smart Vehicles in Smart Cities Using Controller Area Network
Nowadays, the power consumption and dependable repeated data collection are causing the main issue for fault or collision in controller area network (CAN), which has a great impact for designing autonomous vehicle in smart cities. Whenever a smart vehicle is designed with several sensor nodes, Internet of Things (IoT) modules are linked through CAN for reliable transmission of a message for avoiding collision, but it is failed in communication due to delay and collision in communication of message frame from a source node to the destination. Generally, the emerging role of IoT and vehicles has undoubtedly brought a new path for tomorrow's cities. The method proposed in this paper is used to gain fault-tolerant capability through Probabilistic Automatic Repeat Request (PARQ) and also Probabilistic Automatic Repeat Request (PARQ) with Fault Impact (PARQ-FI), in addition to providing optimal power allocation in CAN sensor nodes for enhancing the performance of the process and also significantly acting a role for making future smart cities. Several message frames are needed to be retransmitted on PARQ and fault impact (PARQ-FI) calculates the message with a response probability of each node. 2021 Anil Kumar Biswal et al. -
Insinuating cocktailed components in biocompatible-nanoparticles could act as an impressive neo-adjuvant strategy to combat COVID-19
The novel Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) spread, freezes all sectors, and was declared as a life-threatening disease by the World Health Organization on Jan 30, 2020. So far, no specific drugs are identified or approved for treating SARS-CoV-2. In the past few years, nanomaterials are in the limelight for their ability to deliver the drugs effectively and selectively like siRNA to target/prime infection sites, and benefits us to visualize the particular regions, treatment reactions via non-intruding imaging techniques. As intranasal delivery interacts directly to the infection site with minimal side effects on the healthy cell, we postulate to administer a mixture of few polyherbal formulations like the golden spice curcumin, sitopaladi churna (SPC), and kaempferol in zein-chitosan nanoparticles as a life-saving measure for treating Coronavirus disease (COVID-19) cases. This viewpoint will shed light on the antiviral role of curcumin, SPC, and kaempferol zein-chitosan nanoparticle to modulate immune responses and observe its curative approach to the current pandemic COVID. 2021, Visagaa Publishing House. All rights reserved. -
Implementing a programmable drop voltage controller vlsi
This study offers a new synchronized practice area door array (FPGAs), to minimize electricity usage. Concurrent bit-serial architecture is shown in the figure to minimize energy consumption and timing synchronization of switching structures. Researchers offer a fine-grained energy control system with each Look-up database to minimize the Static energy by the channel length, which is now equivalent to the dynamical one (LUT). A 90 nm Processor is the planned field-programmable VLSI. Its electricity consumption is 42 percent lower than that of sequential design. 2021, SciTechnol, All Rights Reserved. -
Characterizations of some parity signed graphs
We describe parity labellings of signed graphs: equivalently, cuts of the underlying graph that have nearly equal sides. We characterize the bal-anced signed graphs which are parity signed graphs. We give structural characterizations of all parity signed stars, bistars, cycles, paths and com-plete bipartite graphs. The rna number of a graph is the smallest cut size that has nearly equal sides; we find this for a few classes of graphs. The author(s). -
Good-looking step in bad direction RBI Internal Working Group proposal
Learning outcomes: After discussing this case, the authors expect that the students will have the following learnings: critically analyse the latest Reserve Bank of India (RBI) banking proposal, which was proposed by the Internal Working Group (IWG) in November 2020. Understand concepts such as connected lending, crony capitalism and financial crisis. Have a basic idea about the Banking Regulations Act, 1949 and regulatory framework in the Indian banking sector. Case overview/synopsis: This case is an analysis of the recent RBI proposal on banking regulations in India. The authors have referred secondary data in terms of published papers by stalwarts and experts in the banking and economics field. This case analyses the pros and cons of the IWG proposal to RBI governing body. The case also touches upon interesting banking and macroeconomics concepts. What makes this case interesting is that RBI is open to receive comments from all the stakeholders till January 2021. Complexity academic level: Applicable to undergraduate and postgraduate students studying banking and finance specialisation in commerce and business management streams. Supplementary materials: Teaching notes are available for educators only. Subject code: CSS 1: Accounting and Finance. 2021, Emerald Publishing Limited. -
Chest Diseases Prediction from X-ray Images using CNN Models: A Study
Chest Disease creates serious health issues for human beings all over the world. Identifying these diseases in earlier stages helps people to treat them early and save their life. Conventional Neural Networks play an important role in the health sector especially in predicting diseases in the earlier stages. X-rays are one of the major parameters which help to identify Chest diseases accurately. In this paper, we study the prediction of chest diseases such as Pneumonia, COVID-19, and Tuberculosis (TB) from the X-ray images. The prediction of these diseases is analyzed with the support of three CNN Models such as VGG19, Resnet50V2, and Densenet201, and results are elaborated in the terms of Accuracy and Loss. Though all three models are highly accurate and consistent, considering the factors like architectural size, training speed, etc. Resnet50V2 is the best model for all three diseases. It trained with F1 score accuracies of 0.98,0.92,0.97 for pneumonia, tuberculosis, covid respectively. 2021 -
Consumer response towards personalised pricing strategies in online marketing
E-tailers are now capable of customising prices for an individual buyer or a group of buyers who exhibit similar behavioural traits and perceived ability to pay. Tailoring prices based on personal information may evoke unanticipated reactions as it could infringe users privacy and hurt fair price perceptions. To investigate the potential impact of positive and negative online personalised pricing situations, this study conducted a controlled experiment to observe the changes in consumer behaviour in a personalised pricing context. Seven hundred and twenty responses were collected from thriving online-active communities in India and Malaysia, both countries with high growth of e-commerce activities. Consumers reaction towards fair price, customer loyalty, privacy concern, purchase satisfaction; and the influence of these constructs on post purchase behaviours such as repurchase intentions, revenge intentions and strategic purchase intentions were analysed using PLS SEM modelling. Results indicate online consumers in both countries have high privacy concerns, and as it increased, their repurchase intentions decreased correspondingly. Strategic purchase intentions and revenge intentions increased regardless of positive and negative purchase situations, while purchase satisfaction mediates fair price perceptions and repurchase intentions. Copyright 2021 Inderscience Enterprises Ltd. -
Evaluate and design the mini-hexagon-shaped monopole antenna controller to minimize losses in the unit
Main Aim: Hexagon-shaped mono-pole transmitters are developed, computed, and evaluated in a range of applications. Their whole performance is being compared. Methods: Various hexagon-shaped mono-pole transmitters are built and modeled using the HFSS. These transmitters are built with Defective Ground Structure (DGS) but include openings in the patch antenna for High-Frequency Spread Spectrum (HFSS), also on the surface, but also. That influence including its position including its slot upon this radiation pattern is examined. Evaluate the modeling, the controller was designed for the broadcast subsystems and respective reflectivity and VSWR have been found. Findings: The specifications of the antenna is return losses, VSWR, amplification and switching frequency, among other things are assessed as are usually uncertain and VSWR for the manufactured device. The transmissions are continuously monitored. Another most unclear wavelength is around 10 dB among a large bandwidth and that they are less than 10 dB over a specific frequency range. The value of VSWR is less than 2. Applications: These transmitters may be utilized for wirelessly and interior activities via UWB technology. 2021, SciTechnol, All Rights Reserved. -
Indias role in kazakhstans multi-vector foreign policy
?fter the disintegration of the Soviet Union, Kazakhstans economy was weak since most of the industrial en-terprises were located in Russia. To attain economic growth, Kazakhstan crafted a unique foreign policy known as the multi-vec-tor foreign policy, which facilitated an easy inflow of direct foreign investments into the state economy. After economic liberalization in 1991, India took a serious interest in Cen- tral Asia, and since then the two nations have come a long way marked by complex interde-pendence in the international arena. They have demonstrated a successful and sus-tained upward trend in their bilateral relationship through soft power, trade and long-standing historical connections. Thus, the prospects of mutual cooperation between Central Asia, particularly Kazakhstan, and India are quite promising in the near future. 2021, CA and C Press AB. All rights reserved. -
EFFECTS OF SINUSOIDAL AND NON-SINUSOIDAL TEMPERATURE MODULATION IN A TRIPLE DIFFUSIVE CONVECTION
The Triple Diffusive convection with time-dependent sinusoidal (cosine) and non-sinusoidal (square and triangular) temperature modulation is studied using linear and non-linear analysis. The expression for Rayleigh number and correction Rayleigh number is obtained by using perturbation method which gives the prospect to control the convection. Effects of various parameters of the problem are individually studied for two cases of temperature modulation namely, (i) in-phase and (ii)out-of-phase. Ginzburg-Landau equation using multi-scale method is derived to study the effects of temperature modulation on heat and mass transfer. It is observed that both solutal Rayleigh numbers stabilizes or destabilizes the system depending on the values of the frequency of modulation. 2021 I??k University, Department of Mathematics. All Rights Reserved. -
Experimental evaluation of image segmentation for heart images
The cardiac death is the principal reason of the death in the world.The research work focuses on finding an efficient image segmentation technique for the computer aided detection and also to decrease the noise in the image.The segmentation is implemented with the help of fuzzy C-means clustering along with dual inverse thresholding function and Otsu thresholding.Experimental proof is evaluated with the help of morphological functions and with Gaussian function.The result of the work provides an accurate segmentation for myocardial ischemia in the human heart photo image as well as magnetic resonance imaging. Copyright 2021 Inderscience Enterprises Ltd. -
A self-cooperative trust scheme against black hole attacks in vehicular ad hoc networks
The main objective of the Vehicular Adhoc NETwork (VANET) is to provide secure communications for the vehicles in the network without fixed infrastructures. It inherits all the properties of the MANET. Achieving reliable routing to avoid various routing attacks is the major concern in the vehicular network. Routing attacks degrade the performance of the network. Black hole attack is one of the routing attacks, which drops the data packets without forwarding them to the destination vehicle. Different routing schemes are proposed to provide security against these attacks, which still have security issues. Hence a new self-cooperative trust scheme is proposed in this paper, to detect single as well as collaborative black hole attackers in the network. Two processes: self-detection and cooperative detection, are used to detect attackers in the network. Results show that the proposed scheme has better performance in terms of throughput, PDR and delay. Copyright 2021 Inderscience Enterprises Ltd. -
Acceptance of consumer-oriented health information technologies (chits): Integrating technology acceptance model with perceived risk
This paper is focused on understanding the growing demand for consumer-oriented health information technologies (CHITs) wearable and adult healthcare management apps. This study utilised the Technology Acceptance Model (TAM) and integrated the concept of perceived risk. The structural Equation Modelling (SEM) technique was applied to test the research hypotheses based on the 450 quantitative responses. This study confirms significant relationships between perceived usefulness, perceived ease of use, perceived risk, attitude, behavioural intention, and actual intention in using CHITs. The findings also showed no evidence to conclude that age and education influenced respondents perceived usefulness and perceived ease of the CHITs. This study incorporated the perceived risk to fill a gap in the literature and broaden the current TAM theoretical application in the public health setting. The study findings fill the health-related technology acceptance literature gap and broaden TAM's present application in the public health realm. 2021 Slovene Society Informatika. All rights reserved. -
A new framework for contour tracing using Euclidean distance mapping
In this paper, a new fast, efficient and accurate contour extraction method, using eight sequential Euclidean distance map and connectivity criteria based on maximal disk, is proposed. The connectivity criterion is based on a set of point pairs along the image boundary pixels. The proposed algorithm generates a contour of an image with less number of iterations compared to many of the existing methods. The performance of the proposed algorithm is tested with a database of handwritten character images. In comparison to two standard contour tracing algorithms (the Moore method and the Canny edge detection method), the proposed algorithm found to give good quality contour images and require less computing time. Further, features extracted from contours of handwritten character images, generated using the proposed algorithm, resulted in better recognition accuracy. Copyright 2021 Inderscience Enterprises Ltd.