Browse Items (5543 total)
Sort by:
-
Water dispute in Central Asia: Conflict potential
The Central Asian republics (CARs), which emerged as independent states in the post-Soviet phase, faced several challenges. During the Soviet era, the CARs were agriculturally oriented towards the Soviet economy and, accordingly, river water management was also centralized under the command economic model. However, with the collapse of the Soviet Union, the CARs had to review the existing water management arrangements. This is where the absence of a Moscow-centric central authority has proven detrimental to the region endowed with two major rivers and their several subsidiaries. In this context, the paper suggests an emphasis on multilateralism, rather than bilateralism, as a more feasible approach to river water management. Clearly, multilateralism would promote a more equitable solution compared to bilateralism, which does not adopt a holistic approach to the region. Considering the fact that the region is characterized by a water crisis in addition to the fragility of the environment makes a multilateral arrangement significantly more appropriate for the region in the long term. 2019, CA and C Press AB. All rights reserved. -
Secure provenance-based communication using visual encryption
Explicit specification of the historical record of an instance or a data item is called data provenance. It has many applications in various fields with regards to its importance on capturing data flow mechanisms. However, on the other hand, there are good number of security mechanisms in place to withstand the cyber-attacks. Almost all of these algorithms uses complex mathematical calculations in providing security for the systems. Visual cryptography is a peculiar approach which uses concept of secret sharing by dividing the message into transparencies as encryption process. Upon superimposing transparencies one obtains the original message. In this paper, we propose secret sharing as a notion of security onto data provenance. Main inference of this writing is to throw a model combining above two mentioned aspects which gives away an indigenous solution in the area of information security. This proposed model is implemented with specific use case scenarios for substantiation and related analysis. Simulated results and discussion of the same is presented in the paper. 2019 Inderscience Enterprises Ltd. -
Happiness and resilience among young physically disadvantaged employees in India: A pilot study
Purpose: The study aimed to examine and compare the happiness and resilience of disadvantaged employees and non-disadvantaged employees. Method: The study sample included 37 young employees, between 20 and 30 years of age. Among them, 17 were with physical disadvantages of one type or the other, and 20 had no physical disadvantages. Results: Mann-Whitney U test showed that there is no difference in resilience and happiness between disadvantaged and non-disadvantaged employees. Among the non-disadvantaged employees, there is a relationship between happiness and resilience. However, among the disadvantaged employees, this relationship is not there. Conclusions: Disadvantaged employees in the present sample do not differ from the non-disadvantaged in their happiness and resilience. However, it cannot be assumed that happiness is a contributing factor to the resilience of the disadvantaged employees. Also, it is not possible to generalize the results of the study due to the small sample size. 2019, Action for Disability Regional Rehabilitation Centre. All rights reserved. -
Koppa Archaeological Research Project (KARP): Exclusive Iron Age landscapes in the Western Ghats, India
Koppa Archaeological Research Project (KARP) conducted systematic transect surveys and excavations in the Coorg plateau at the upper reaches of river Kaveri in the Western Ghats, Karnataka. The archaeological record of the study area is exclusively an Iron Age landscape, as we did not find any other prehistoric or early historic sites. We focused on studying thirty-nine Iron Age (1200 BCE300 BCE) sites of two categories, habitation and megaliths, and we present here our preliminary observations addressing to site findings, their landscapes and settlement patterns. We then consider the geographical and climatic implications for understanding the formation of their economy and politics. We argue that sites in the Western Ghats did not differ significantly from the temporal and cultural material typologies of contemporary Iron Age sites in the semi-arid or savannah conditions of Deccan plateau. Yet the adaption of Iron Age communities to Western Ghats climate which is characterized by high rainfall, lush tropical forests, fallow lands and diverse faunal ecology should have had distinct implications for the development of their economy and politics. 2019 Elsevier Ltd -
An outlook in blockchain technology- Architecture, applications and challenges
Blockchain is mechanism which stores and exchange data in a peer-peer network serving as an immutable ledger allowing transactions to take place in decentralized method which neglects the role of intermediaries. The technology reduces greater complexity by combining three key features; security, decentralization and transparency. This paper is an attempt explaining the concepts, structure, applications and challenges the technology has. The paper introduces blockchain taxonomy, reviews applications and discussed technical challenges and way of handling these challenges. Blockchain technology is springing up with promising applications in various fields and the authors have explored about three emerging field of blockchain say; Education, Government and Healthcare. Finally the paper concludes by stating other emerging fields of applications where further research can be explored. International Research Publication House. -
EShield: An effective detection and mitigation of flooding in DDoS attacks over large scale networks
Distributed Denial-of-Service attacks are very hard to be mitigated in wireless network environment. Here in this manuscript, an effective method of flood detection and mitigation architecture is proposed named eShield, which detects and prevent flooding attacks through spoof detection technique. The proposed method uses an architecture and an algorithm. eShield deals with Intrusion Protection and Detection Systems (IPDS) which collaboratively defend flooding attacks at different points in the network. Here eShield detects the supply node with its port variety which were below assault. Inorder to reduce the burden on international IPDS eShield makes use of distinct nearby IPDS for the assaults in flooding which have been carried out collaboratively. The assessment is done through the widespread simulation of eShield and it is proved to be an actual values based on time delay, false positive rates, computation and communication overhead. BEIESP. -
Effectiveness of blended classroom among varied streams of undergraduate language learners An Experimental Study
Technology has become an integral part of learners today and keeping with the time, researchers have developed learning methods that address this issue. There have been several methods developed to address this issue. One of the most successful techniques that has in the recent past contributed largely to active learning is flipped classroom. Communication skills is the need of the hour, to ensure an employable community this study endeavours to develop a learning technique that will nurture active learners and improve their communication skill in a technology oriented community. Hence the paper aims at finding and deliberating the efficacy of implementing flipped classroom to improve communication skills among undergraduate learners from science and humanities majors. BEIESP. -
A novel SIW based dual-band power divider using double-circular complementary split ring resonators
This article presents a novel design of substrate integrated waveguide (SIW) dual-band power divider loaded with double-circular complementary split-ring resonators (CSRRs). The double-circular CSRRs are etched on the top layer of the proposed structure to obtain the dual-band characteristic. The proposed geometry provides a passband frequency below the cut-off frequency of the SIW due to the electric dipole nature of the CSRRs. By changing the dimensions of the CSRRs, various passband characteristics are studied. To validate the design idea, a compact dual band power divider with equal power division operating at 8.4 and 11.7 GHz is designed, fabricated, and tested. A good steadiness is found between simulated and tested results. The proposed idea provides features of compact size, dual-band operation, and good isolation. The size of the fabricated prototype excluding microstrip transition is 0.473?g 0.284?g, where ?g is the guided wave length at the center frequency of first band. 2019 Wiley Periodicals, Inc. -
Temporal correlation between the optical and ? -ray flux variations in the blazar 3C 454.3
Blazars show optical and ? -ray flux variations that are generally correlated, although there are exceptions. Here we present anomalous behaviour seen in the blazar 3C 454.3 based on an analysis of quasi-simultaneous data at optical, ultraviolet, X-ray, and ? -ray energies, spanning about 9 yr from 2008 August to 2017 February.We have identified four time intervals (epochs), A, B, D, and E, when the source showed large-amplitude optical flares. In epochs A and B the optical and ? -ray flares are correlated, while in D and E corresponding flares in ? -rays are weak or absent. In epoch B the degree of optical polarization strongly correlates with changes in optical flux during a short-duration optical flare superimposed on one of long duration. In epoch E the optical flux and degree of polarization are anticorrelated during both the rising and declining phases of the optical flare. We carried out broad-band spectral energy distribution (SED) modelling of the source for the flaring epochs A,B, D, and E, and a quiescent epoch, C. Our SED modelling indicates that optical flares with absent or weak corresponding ? -ray flares in epochs D and E could arise from changes in a combination of parameters, such as the bulk Lorentz factor, magnetic field, and electron energy density, or be due to changes in the location of the ? -ray-emitting regions. 2019 The Author(s) Published by Oxford University Press on behalf of the Royal Astronomical Society. -
Detection of strangers based on dogs sound
Nowadays, people having a pet at home are increasing. Usually, dog is the favorite pet animal for most of the people in the world. Dogs are more capable of identifying strangers in the surroundings than humans. The proposed work identifies the strangers based on the barking sound of the dog. In this anticipated work, multiple features are extracted from the dogs barking sound using Fast Fourier Transform and Statistical based methods. The classification is done using Nae Bayes classifier. The dataset contains 770 barking audio files of 8 dogs. Whenever known and unknown person comes home, the sounds of the dogs are recorded. The classification result for identifying the stranger is 79.1094%. BEIESP. -
QSPR analysis of certain degree and eccentricity based topological indices and butane derivatives
Butane derivatives are chemical compounds formally derived from Butane C4H10 by replacement of one or more hydrogen atoms with other atoms or functional groups. In this paper, we do the QSPR analysis of few Butane derivatives with respect to some selected degree based topological indices and one eccentricity based topological index. In QSPR studies, topological indices are extensively used in determining specific bioactivity of chemical compounds. Our study showcases some important results on the correlation between Heavy atomic count, Complexity, Density, Surface tension and Index of refraction of Butane derivatives with the selected topological indices which further helps in characterizing the predicting power of these topological indices. RAS?YAN. All rights reserved. -
A USB- bluetooth two factor mutual authentication security protocol for wireless sensor networks
Wireless sensor networks are easy to deploy, effective, and can monitor unattended environments. As the data transmitted through these networks is highly sensitive, the security of the networks is important and strong authentication measures must be in place. Authentication is done by means of a security protocol, wherein a user is authenticated through certain factors such as a smartcard or a password, and several mathematical calculations such as hashing, and XOR operations. Several previously proposed authentication protocols and their flaws are discussed in this paper. We propose a new two factor mutual authentication protocol using a USB-Bluetooth token as the second factor, to overcome the security flaws seen in previous schemes. We also provide security analysis as well as Scyther results in support of the proposed protocol. The proposed protocol can be used across various fields such as healthcare, agriculture, traffic monitoring etc. BEIESP. -
An algorithm to detect an object in a confined space by using improved fingerprinting approach
The rapid evolution of location-based services has made tremendous changes in the society. In this paper, Trilateration method is implemented in fingerprinting methodology to obtain very precise and low error position details of the client portable device. Trilateration is a method in which the portable device is determined by the received signal strength intersecting at one position from the three reference points. Fingerprinting method involves several steps like training stage and positioning stage in which the training stage consists of the creation of the database of the signal strengths along with its associated location measurements. In the positioning step where effective and efficient received signal strength collected from the portable device is matched with the data saved into the database to get the position information of the client. The position of the user is estimated by collecting the received signal strengths from three reference points by using the concepts of trilateration approach in fingerprinting methodology to obtain more precise and accurate information. 2005 - ongoing JATIT & LLS. -
Blockchain based emanative unassailable system: Use cases and repercussions
Block chain is one of the developing technologies which has advanced possibility for forthcoming claims. Block chain process is formulated based on blockchain thinking and formulating thinking. In block chain provides the flexibility to non-trusting members interacting in a genuine manner in a distributed network. Different use cases such as academic credentials, professional profile verification, KYC and record management are explained. The feature of block chain with respect to unassailable system is concluded with some of the major advantages and disadvantages of block chain. BEIESP. -
Impact of corporate governance attributes on cost of equity: Evidence from an emerging economy
Purpose: The purpose of this study is to construct a comprehensive Indian corporate governance index in light of the recently introduced Companies Act, 2013, which is further validated by analyzing its impact on the cost of equity of a firm. Design/methodology/approach: Based on the hand-collected data from firms listed on S&P BSE 500 from 2001 to 2016, this index comprises seven equally weighted sub-indices, comprising a total of 43 corporate governance attributes. This index and the sub-indices have further been regressed with the cost of equity of a firm. Findings: The results suggest a negative significant relationship between the overall corporate governance and the cost of equity. The study also suggests that among all the sub-indices, board composition predicts the cost of equity to a greater extent. Other than this, the audit committee sub-index has a negative significant association with the cost of equity. The findings imply that a well-governed firm enjoys ease of access to equity finance from the market. Originality/value: The corporate governance index is based on the recent regulatory reforms introduced in India. The index, with certain changes suitable to the local context, can be applied to similar emerging economies as well. The causal relationship tested using this method is the first one done in India. This study adds to the domain of corporate governance literature with special focus on the construction of an index for an emerging economy. 2019, Emerald Publishing Limited. -
Enhancement of mechanical properties of epoxy/halloysite nanotube (HNT) nanocomposites
The particulate filled epoxy composites show lower mechanical properties than neat composites due to lack strength of uniform dispersion of particles leading to poor in interfacial strength between matrix and fillers. In this study, ultrasonification dispersion technique is employed to achieve a homogenous dispersion of halloysite nanotubes (HNTs) in epoxy resin. The nanocomposites are fabricated by solution casting method and specimens are prepared as per ASTM standards. The various test has been conducted as per ASTM procedure to evaluate the mechanical properties viz. density, hardness, tensile, flexural, ILSS and impact strength of the nanocomposites consisting of different weight (wt)% of HNTs varying in the range of 04 with the interval of 1. As per the experimental investigation, the selected dispersion techniques enhances the mechanical properties of the nanocomposite by the loading of HNT. Further, the study revealed that the 3wt% of HNT with ultrasonic homogenized nanocomposite shows superior mechanical strength as compared to other nanocomposites. Hence it is evident that the properties of the nanocomposite depends on the quantity of filler present and dispersion condition. The dispersion condition and fractured surfaces are analyzed through the SEM micrographs. 2019, Springer Nature Switzerland AG. -
Investigation on the phase transformation and lattice parameters of Sn 2+ , Cu 2+ , La 3+ and Ce 4+ ions doped titania: characterization and solar light activity study
Nanocrystalline titania and metal ion doped titania systems were prepared by combustion method. Titania exhibited bicrystalline phase consisting of both anatase and rutile. The bicrystalline framework in TiO 2 powders can be conveniently altered by the incorporation of various bivalent/trivalent/tetravalent metal ions like Sn 2+ , Cu 2+ , La 3+ and Ce 4+ . The microstructure development and the influence of small amount of dopants on the resulting structural change have been investigated. p-XRD results confirms the stabilization of anatase phase in the case of Cu 2+ and Sn 2+ doped titania, while the polymorphic interfaces were retained in La 3+ and Ce 4+ doped titania samples. The efficacy of the modified titania was studied on the degradation of Congo Red dye by harvesting solar light. Sn 2+ /TiO 2 shows almost same photodegradation ability as that of pristine TiO 2. Subsistence of catalytic hot spots at the interface of anatase-rutile and the synergistic effect of polymorphic phases explains the enhanced activity of La 3+ /TiO 2 and Ce 4+ /TiO 2 . But the activity of Cu 2+ /TiO 2 was found to be less due to high electron-hole recombination rate. 2019 Elsevier GmbH -
Smartphones in churches: An affective negotiation around digital disruptions and opportunities in Delhi Christian Churches
Interpersonal relations in a world of digital ubiquity have brought religious institutions into personal digital networks. The development of personal-religious networks has affected individual faith practices and altered religious responses. This article explores patterns of behaviour emerging from a collective sense of belonging and affective responses in online church networks where smartphones acts as an extension of self. It analyses the relationship between faith and visual practices/aesthetics impacting today's religious experience. It also explains affective loops that are consciously constructed by church authorities to shape collective action. The function of these loops is to create a deeper sense of connectedness between practitioners and the church through harnessing technology and its affective power. 2019 Journal of Content, Community & Communication. -
Phytogenic CeO2-Sm2O3 nanocomposites with enhanced catalytic activity for reduction of 4-nitrophenol
The phytogenic synthesized CeO2-Sm2O3 is a green, efficient and cost-effective catalyst. The CeO2-Sm2O3 composite was characterized using XRD, FTIR, Raman, TGA, UV-DRS, TEM, FE-SEM and EDAX. The synthesized CeO2-Sm2O3 shows a high catalytic activity for the reduction of 4-nitrophenol in the presence of the sodium borohydride under ambient conditions. This CeO2-Sm2O3 nanocomposite catalyst shows good stability and reusability without much loss in conversion efficiency. CeO2-Sm2O3 possess great prospects in the reduction of nitro organic pollutants in water. 2019 IOP Publishing Ltd. -
Heat transfer enhancement in the boundary layer flow of hybrid nanofluids due to variable viscosity and natural convection
The aim of the current work is to explore how heat transfer can be enhanced by variations in the basic properties of fluids in the presence of free convection with the aid of suspended hybrid nanofluids. Also, the influence of the Laurentz force on the flow is considered. The mathematical equations are converted into a pair of self-similarity equations by applying appropriate transformations. The reduced similarity equivalences are then solved numerically by Runge-Kutta-Fehlberg 45 th -order method. To gain better perception of the problem, the flow and energy transfer characteristics are explored for distinct values of significant factors such as variable viscosity, convection, magnetic field, and volume fraction. The results acquired are in good agreement with previously published results. The noteworthy finding is that the thermal conductivity is greater in hybrid nanofluid than that of a regular nanofluid in the presence of specified factors. The boundary layer thickness of both hybrid nanofluid and normal nanofluid diminishes due to decrease in variable viscosity. The fluid flow and temperature of the hybrid nanofluid and normal nanofluid increases as there is a rise in volume fraction. 2019