Browse Items (11855 total)
Sort by:
-
Design and analysis of single stage Step-up converter for Photovoltaic applications
Main novelty of the proposed work is dual leg single stage DC-AC converter for DC\AC grid and solar based applications. Operating principles, components design and modulation techniques are presented. Initially proposed concept is simulated in MATLAB Simulink platform and after validated in a real time prototype model is the future work. Proposed idea has some advantages like few passive components, less leakage current due to few switching frequency components, wide range voltage with absence of DC link capacitor. High efficiency due to single stage operation so this circuit is highly suitable for high\low voltage photo-voltaic energy conversion. Electromagnetic interference also less with continuous current. 2023 IEEE. -
Raman spectroscopy investigation of camphor Soot: Spectral analysis and structural information
Raman spectra of camphor soot has been investigated and optimised with a Raman microscope system operated at laser excitation wavelength of 514.5 nm. Several band combinations for spectral analysis have been tested, and a combination of three Lorentian bands ( G,D1,D2) at about 1580, 1350 and 1620 cm-1, respectively, with Gaussian-shaped band (D3) at 1500 cm-1and 1200 cm-1 (D4) was best suited for the first order spectra. The second-order spectra were best fitted with Lorentian shaped bands at about 2450, 2700, 2900 and 3250 cm-1. The results are discussed and compared with X-ray diifraction measurements and SEM analysis. The camphor soot shows ? and P{cyrillic} bands which reveals the presence of crystalline graphitic carbon. The SEM micrographs of camphor show the presence of carbon nanostructures. 2013 by ESG. -
Transformation of hydrocarbon soot to graphenic carbon nanostructures
Graphenic carbon nanostructures were synthesized from different precursors of petroleum and agricultural origin by oxidative scissoring. In the present study soot, an environmental pollutant is converted to a value-added product by facile synthesis techniques. The physicochemical changes of the nanostructures are investigated by means of XRD, AFM, FTIR, Raman spectroscopy, XPS analyses SEM-EDS and TEM analysis. XRD analysis confirms the formation of few layer oxidized carbon nanostructures with smaller lateral dimensions. Raman spectra reveal the existence of graphenic layer with a fewer defect. AFM and SEM analyses reveal the formation of stacked tiny fragments of graphenic carbon lamellae. XPS and IR analyses confirm the incorporation of oxygen functionalities into the carbon backbone. 2018 by the authors. -
Highly secured authentication and fast handover scheme for mobility management in 5G vehicular networks
The Fifth Generation (5 G) networks exhibit high flexibility and diversity in their design and deployment strategies. Transitions between base stations (BSs), heterogeneous networks (HetNets) and other cellular networks provide significant vulnerabilities and expose users to substantial risks associated with cybersecurity attacks. This article evaluates current handover authentication methods in the context of 5 G networks while proposing a set of security criteria for handover authentication. This study presents a novel authentication technique called SHK (Secure Handover Key) that utilizes SDNs (Software Defined networks). The proposed scheme integrates recycled lightweight dynamic key cryptography and combines security features such as perfect forward secrecy and robustness to leakages. The significance of the proposed approach is assessed in terms of computations, communications, signals, and energy costs on 5 G mobility applications and Vehicular Communication Networks (VCNs). The scheme employed in this study demonstrates enhanced security measures and improved changeover performance compared to conventional schemes. 2024 Elsevier Ltd -
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure
Network Intrusion Detection Systems (NIDS) and firewalls are the de facto solutions in the modern cloud to detect cyberattacks and minimize potential hazards for tenant networks. Most of the existing firewalls, perimeter security, and middlebox solutions are built on static rules/signatures or simple rule matching, making them inflexible, susceptible to bugs, and difficult to introduce new services. This paper aims to improve network management in OpenStack Clouds by taking advantage of the combination of software-defined networking (SDN), Network Function Virtualization (NFV), and machine learning/artificial intelligence (ML/AI) and for making networks more predictable, reliable, and secure. Artificial intelligence is being used to monitor the behavior of the virtual machines and applications running in the OpenStack SDN cloud so that when any issues or degradations are noticed, the decision can be quickly made on how to handle that issue, being able to analyze data in motion, starting at the edge. The OpenStackDP framework comprises lightweight monitoring, anomaly-detecting intelligent sensors embedded in the data plane, a threat analytics engine based on ML/AI algorithms running inside switch hardware/network co-processor, and defensive actions deployed as virtual network functions (VNFs). This network data plane-based architecture makes high-speed threat detection and rapid response possible and enables a much higher degree of security. We have built the framework with advanced streaming analytics technologies, algorithms, and machine learning to draw knowledge from this data that is in motion before the malicious traffic goes to the tenant compute nodes or long-term data store. Cloud providers and users will benefit from improved Quality-of-Services (QoS) and faster recovery from cyber-attacks and compromised switches. The multi-phase collaborative anomaly detection scheme demonstrates an accuracy of 99.81%, average latencies of 0.27 ms, and response speed within 9 s. The simulations and analysis show that the OpenStackDP network analytics framework substantially secures and outperforms prior SDN-based OpenStack solutions for Cloud architectures. 2023, The Author(s). -
Sexual Narcissism among Men with Sexual Dysfunctions: An Exploratory Study
Objective: Previous studies have associated sexual narcissism with aggressive behaviours prevalent among most Cluster B populations. Recent evidence shows that certain characteristics of sexual narcissism could be beneficial for sexual and marital satisfaction. The present study is an exploration of the role of narcissism in Sexual dysfunctions. Method: A cross-sectional design involving a sample of 62 men aged 2260 years was used for the study. The sample consisted of 31 men having sexual dysfunctions and a matched control group of 31 men free from sexual dysfunctions. Tools used were the International Index for Erectile Functioning, Modified MINI, Sexual Dysfunctional Beliefs Questionnaire, Sexual Narcissism Scale, and Questionnaire for Cognitive Schema Activation in Sexual Context. Scores were subjected to discriminant analysis, and relevant variables were correlated to assess the strength of the association. Results: Results indicated that beliefs about Female Sexual Power (FSP), Helplessness Schema, and Exploitative behaviours of Sexual Narcissism were the best predictors that differentiated the two groups. The higher the scores on these variables, the lower the erectile functioning. FSP shared a positive correlation with both Exploitation and Helplessness, while the latter two variables were unrelated. Conclusions: A higher need to stick to traditional gender roles and fear of being overpowered could be contributing to sexually exploitative behaviours and relationship distress, which in turn, could affect self-efficacy and contribute to Sexual dysfunction. (2023), (Online Journal of Health and Allied Sciences). All Rights Reserved. -
Non-invasive glucometer /
Patent Number: 201941025125, Applicant: CHRIST (Deemed To Be University) -
Self-Discrepancy as a Moderator Between Romantic Attachment and Body Image Satisfaction
Body image satisfaction is about appreciating our body the way it is. One's romantic attachment style with their partner may impact their body image which this study wants to assess. The present study looks at romantic attachment and its effect on body image satisfaction, with self-discrepancy playing the moderator's role. Romantic attachment was measured through avoidance and anxiety dimensions along with trust, commitment, intimacy, physical proximity, support, and partner's suggestions on dressing and looks. Individuals in the age group of 18-25 in a romantic relationship (N=170) were sent an online questionnaire. The questionnaire included scales on body image satisfaction, self-discrepancy and romantic attachment. Correlations results revealed that attachment styles and specifiers of romantic relationships correlate highly with body satisfaction. Regression results indicated a high impact with attachment-related emerging as the single most impactful predictor for the model. The findings from the study can be used by individual and couple therapists dealing with romantic and body image concerns. In a period where romantic relationships are becoming very important in young adults' lives, this study probes into the possibility of romantic relationships affecting body image issues. Studies in the past have given more importance to body image dissatisfaction and parental attachment but this study looks at body satisfaction along with romantic attachment. In a collectivistic Indian culture where the concept of dating is gradually gaining popularity, the findings of this study are unique. 2021 RESTORATIVE JUSTICE FOR ALL. -
Understanding document semantics from summaries: A case study on Hindi texts /
ACM Transactions on Asian Low-Resource Language Information Processing, Vol.16, Issue 1, pp.1-20, ISSN: 2375-4699. -
Including category information as supplements in latent semantic analysis of Hindi documents
Latent semantic analysis (LSA) is a mathematical model that is used to capture the semantic structure of documents by using the correlations between the textual elements in them. LSA captures the semantic structure very well being independent of external sources of semantics. However, the model's performance increases when it is supplemented with extra information. The work presented in this paper is to modify the model to analyse word correlations in documents by considering the document category information as supplements in the process. This enhancement is called supplemented latent semantic analysis (SLSA). SLSA's performance is empirically evaluated in a document classification application by comparing the accuracies of classification against plain LSA for various term weighting schemes. An increment of 1.14%, 1.30% and 1.63% is observed in the classification accuracies when SLSA is compared with plain LSA for tf, idf and tfidf respectively in the initial term-bydocument matrix. Copyright 2017 Inderscience Enterprises Ltd. -
Understanding document semantics from summaries: A case study on Hindi texts
Summary of a document contains words that actually contribute to the semantics of the document. Latent Semantic Analysis (LSA) is a mathematical model that is used to understand document semantics by deriving a semantic structure based on patterns of word correlations in the document. When using LSA to capture semantics from summaries, it is observed that LSA performs quite well despite being completely independent of any external sources of semantics. However, LSA can be remodeled to enhance its capability to analyze correlations within texts. By taking advantage of the model being language independent, this article presents two stages of LSA remodeling to understand document semantics in the Indian context, specifically from Hindi text summaries. One stage of remodeling is done by providing supplementary information, such as document category and domain information. The second stage of remodeling is done by using a supervised term weighting measure in the process. The remodeled LSA's performance is empirically evaluated in a document classification application by comparing the accuracies of classification to plain LSA. An improvement in the performance of LSA in the range of 4.7% to 6.2% is achieved from the remodel when compared to the plain model. The results suggest that summaries of documents efficiently capture the semantic structure of documents and is an alternative to full-length documents for understanding document semantics. 2016 ACM. -
Ebcqi: Enhanced bcqi downlink scheduling algorithm for voip in mobile networks
Long Term Evolution (LTE) is a currently growing technology. It gives high speed data with several useful applications. Voice over Internet Protocol (VoIP) is one of the top most applications in that LTE. Scheduling is the main issue in LTE. This paper proposing an updating version of Best Channel Quality Indicator (BCQI) downlink scheduling algorithm. The proposed algorithm assigns the highest priority to VoIP users followed by video traffic and then other remaining traffics in next priority order. The simulation reports give the better results of increased average throughput in all users, as well as the spectral efficiency development is also increased. Here, in the proposed algorithm, the percentage of packet loss is also consistent with the existing BCQI algorithm. And, it totally emits positive results in both rural and urban area environments with different mobility. Number of user access is also high when compared with BCQI algorithm. IJSTR 2019. -
A Quality of Service Study for Downlink Scheduling Algorithms in Mobile Networks
Internet usage and the number of applications/users growth is going in an unprecedented manner. In these days, lot of users are changed themselves to use internet-based applications rather than traditional voice service. The fundamental of voice-based communication is shifted to packet data access for satisfying the human needs through internet based mobile applications. 4G network is an IP supported rising technology for the past decade and at present also because of un availability service of 5G in all the places. Still, 4G is ruling the globe and the number of subscribers kept growing only. In these days, this remains on the list of latest research topics. Under 4G technology lot of research problems are exist like QoS, Uplink and Downlink Scheduling, Security, Mobility etc., Inspite of discussing that several issues, this paper mainly focusing the QoS in Downlink scheduling algorithms. Also, it presents the issues of various existing QoS downlink scheduling algorithms, names, QoS aware/unaware, parameters used/simulated, drawbacks of those algorithms and result verifications etc. Packet scheduling plays a crucial role for providing Quality of Service (QoS) to the mobile users. Ultimately, it gives some suggestions to explore more further about QoS based research work in Mobile Networks. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Mapping extinction using GALEX and SDSS photometric observations
The primary objective of this work is to create an all sky extinction map of the Milky Way galaxy. We have cross-matched the Sloan Digital Sky Survey (SDSS data release 8) photometric observations with that of Galaxy Evolution Explorer (GALEX data release 6). This provides a wide range of wavelength coverage from Far Ultra-Violet through the optical spectrum and gives one unique SDSS source for every GALEX source. We discuss a sample of ?32000 objects in the north galactic pole (?75 latitude) from this combined database. The Castelli and Kurucz Atlas was fit to the photometric observations of each star, best fit being determined using a chi-square test. Best fit parameters provide the spectral type and extinction towards each of the objects. The shift in magnitude obtained during the best-fit can be used to determine the distance to each of the stars. With this data, a comprehensive extinction map can be made for the high-latitude objects and later extended to all-sky. 2013 AIP Publishing LLC. -
Novel task assignment policies using enhanced hyper-heuristic approach in cloud
Cloud computing plays a vital role in all fields of todays business. The processor sharing server farm is one of the most used server farms in the cloud environment. The key challenge for the mentioned server farms is to provide an optimal scheduling policy to process the computational jobs in the cloud. Many scheduling policies were introduced and deployed by the existing approaches to build an optimal cloud environment. The existing approaches of the heuristic algorithms such as meta-heuristic and hyper-heuristic approaches were the most frequently used scheduling algorithms for the past years. These approaches work well only in the limited types of tasks and resources in a processor sharing server farms in the cloud environment. In the proposed system, novel task assignment policies have been proposed by enhancing the hyper-heuristic approach for the type low task and high resource in the cloud environment. The results of the proposed approach are compared with the existing approaches and the performance evaluation of the proposed approach is also done. As a result, the proposed enhanced hyper-heuristic approach performs well for processor sharing server farms in the cloud environment. Copyright 2023 Inderscience Enterprises Ltd. -
A study on the weak form efficiency of metals & mining sector in bse
This study has been conducted to observe whether the weak form of efficiency holds true when the Metals & Mining sector is examined for the same. Data is collected for a 5 year period which ranges from 1st April 2014 to 31st March 2019. A total of 1232 observations have been taken from the three selected companies of the Metals & Mining sector of the BSE, namely, Coal India Ltd, Hindustan Zinc Ltd and JSW Steel Ltd. Jarque-Bera test is used to check whether the data is normally distributed or not. Augmented Dickey Fuller test has been used to establish whether the data series possesses stationarity or not. Finally Runs test and Autocorrelation tests are used to check whether the Metals & Mining sector of BSE is weak form efficient or not through the three representative companies. Upon analyzing the data through Runs Test, except for JSW Steel Ltd, the other two companies are identified to contain randomness in their data series. Autocorrelation test also suggests that the future stock prices can be predicted only to a minimal extent for the three representative companies. Based on the derived results, it is concluded that the Metals & Mining sector of BSE does not contain any statistical dependencies between its past and future stock prices and it is found to be weak form efficient. 2021, Badebio Biotechnololgy Ltd. All rights reserved. -
Subliminal Cueing in Visual Attention: Top-down and Bottom-up Processing
Exogenous subliminal cues have been shown to have both top-down and bottom-up effects. There are many research studies have confirmed that the effect of top-down variables dependent on cue characteristics. In response, other studies have attempted to exhibit purely stimulus-driven attention capture. The superiority of attention capture effects and the level of superiority in top-down cues have not been evidenced previously. The present study attempted to observe differential effects of cues with different levels of task relevancy, in both valid and invalid cues. As an addendum, conditions with valid cues and incorrect feature match allowed for the exploration of same-location costs in subliminal cues. The results indicated attentional capture effects of all valid cues irrespective of the level of task relevance in subliminal conditions. The cues with the highest task relevancy led to the most attention capture. There were no inhibitory effects of invalid cues on attention capture in subliminal cues. The study reiterates the possibility of attentional mechanisms in same-location costs implicating processing outside of memory. Further, facilitation and inhibition of attention capture in subliminal cues may have two independent mechanisms. The inhibitory mechanism may be contingent to conscious awareness of cues. The result of the study shows how attention can be exogenously oriented without conscious awareness and what kinds of cues might be most effective. These findings can be useful in educational and training settings and other settings where sustained attention is crucial. 2024, Iquz Galaxy Publisher. All rights reserved. -
An improvised grid resource allocation and classfication through regression
The resource allocation is one of the important mechanisms of grid computing, which helps to assign the available resources very efficiently. The one of the issue of grid computing is fixing the target nodes during the grid job execution. In existing method, resource monitored data are collected from grid then jobs are allocated to the resources based on available data, through regression algorithm. In this method total execution time of an application and run time of jobs should be high. The proposed method mitigate running time by classify the resources in the data collected from grid based on dwell time using novel classification algorithm. It reduces the jobs run time and fit the best available resources to the jobs in the computational grid. 2017 IEEE. -
Scalar multiplication based matrix public key cryptography
In this work, a matrix key is used as Global Parameter. The work is considered for a large prime number which constitutes the field. A random integer is considered as private key and the Global matrix is exponentiated by the private key to generate public key. The process supports for Security features like authentication and confidentiality which are the necessary services for encryption process. Since the process supports Discrete Lagorithm problem, which is a hard problem it supports sufficient security against crypto analysis. In this work, instead of doing direct exponentiation of matrix key to the power of integer (Private Key), the study focuses on different scalar multiplication techniques that can be performed on matrix key during its exponentiation process to reduce the amount of computing resources for the completion of the process. 2020, Institute of Advanced Scientific Research, Inc.. All rights reserved. -
Simple and Efficient Amberlite 15-catalyzed Synthesis of Dihydroquinazolinones
Abstract: The Amberlite 15 catalyzed synthesis of substituted 2,3-dihydroquinazolin-4(1H)-ones was reported. The reaction conditions were optimized by screening in different solvents and catalysts. The substrate scope of the reaction was also studied, and a plausible mechanism for the reaction was proposed. 2020, Pleiades Publishing, Ltd.