Browse Items (5589 total)
Sort by:
-
Impact of ohmic heating on MHD mixed convection flow of Casson fluid by considering Cross diffusion effect
Present communication aims to discuss the impact of viscous dissipation on MHD flow, heat and mass transfer of Casson fluid over a plate by considering mixed convection. Nonlinear partial differential systems are reduced to the ordinary ones through transformation procedure. The modelled nonlinear systems are computed implementing RKF-45 scheme. Convergent solutions for velocity and temperature and concentration fields are given diagrammatically. The obtained results are compared with published literatures and reasonable agreement is found. It is found that, temperature profile increases by increasing values of Dufour parameter, whereas on opposite trend is observed in concentration profile for increasing values Soret parameter. 2019 B.J. Gireesha et al. -
Posttraumatic relationship experiences in women in South India
Marriage is a socially binding intimate relationship between two individuals which is expected to be stable and enduring. In many cases, there can be severe difficulties questioning the quality of ones married life such as IPV or other kinds of abuse or exploitation which could lead to a divorce. Although divorce legally dissolves the relationship, studies suggest that the stress caused by a traumatic relationship may not end after terminating the relationship. The resemblance of these symptoms to PTSD led to the proposed diagnosis of PTRS. In this study, seven participants who have been divorced due to domestic violence for at least a year were identified and interviewed regarding their past and present life situations. The emergent themes in the data pointed to several factors that may influence ones married life, the decision of divorce and current life situations which can affect the amount of stress an individual might face concerning their past traumatic relationship. The factors influencing stress experienced during a traumatic marriage included involvement and support from ones family and in-laws, nature, and cause of abuse, stress-related to children, social support and the very decision to get a divorce. The process of overcoming fear, mistrust, and grief, social and family support, child custody, and related legal processes were factors that affected stress related to the process of divorce. The grief related to child custody, ability to rationalize the decision, career, remarriage and childrens future were some factors that influenced the stress these individuals experienced currently in their life. 2019, 2019 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. -
Impact of monetary policy changes on the Indian stock market and monetary market
Since the stock market is perceived as the channel of transmissions of monetary policy, it is worthy to study the relationship between the Monetary Policy and the volatility of stock prices in the stock market. This study has been conducted with the aim to examine the impact of monetary policy changes on the stock market. The variance methodology is applied in order to achieve the objective of this study. The concept of event window in the methodology involved as the identification of volatility of price in the stock market for11 days (i.e. 5 days before and after event day). The result shows that there is a positive influence on stock market because of change in money policy by the government. The results identified in this work having a signification amount of managerial implication to the different segment of the policy makers in Government, and Stock Market. 2019 Islamic Azad University. -
Reconstruction of sparse-view tomography via preconditioned Radon sensing matrix
Computed Tomography (CT) is one of the significant research areas in the field of medical image analysis. As X-rays used in CT image reconstruction are harmful to the human body, it is necessary to reduce the X-ray dosage while also maintaining good quality of CT images. Since medical images have a natural sparsity, one can directly employ compressive sensing (CS) techniques to reconstruct the CT images. In CS, sensing matrices having low coherence (a measure providing correlation among columns) provide better image reconstruction. However, the sensing matrix constructed through the incomplete angular set of Radon projections typically possesses large coherence. In this paper, we attempt to reduce the coherence of the sensing matrix via a square and invertible preconditioner possessing a small condition number, which is obtained through a convex optimization technique. The stated properties of our preconditioner imply that it can be used effectively even in noisy cases. We demonstrate empirically that the preconditioned sensing matrix yields better signal recovery than the original sensing matrix. 2018, Korean Society for Computational and Applied Mathematics. -
Superior charge discharge ability of reduced graphene oxide/Li-ion embedded polymer composite films
Electroactive polymeric composites are recent generation material for energy application in lithium batteries, solar cells and supercapacitors. In present study, reduced graphene oxide is prepared from graphite powder using liquid exfoliation. The synthesized reduced graphene oxide is embedded with polystyrene sulfonic acid/lithium phosphate polymer electrolyte to obtain polymer composite films. The dielectric studies of composite reveals huge change in relaxation time with addition of rGO in polymeric lithium ion composites. This attributes to decrease in ion-dipolar interaction strength and enhanced polymer segmental motion in presence of carbon. It also implies the activation of electrochemical properties of polystyrene sulfonic acid/lithium phosphate/reduced graphene oxide (PLrGO) composites which can be effectively utilize for charge storage applications. The PLrGO composite exhibits an improved electrochemical performance with different scan rate on potential window ranged between ? 0.5 and 1.2V. The specific capacitance value of ~ 17F/g with high rate chargedischarge capability over 8000 cycles was observed. Higher electrochemical stability and steady charge/discharge behavior makes PLrGO composites a promising candidate for charge storage applications. 2018, Springer Science+Business Media, LLC, part of Springer Nature. -
Distributed denial-of-service detection and mitigation using software-defined network and internet of things
Internet of Things (IoT) is one of the promising technologies that are developing quickly in various fields such as automation, safety and health. It is a heterogeneous network that links various physical devices. It consists of a variety of vulnerabilities due to its heterogeneous nature. It makes a different level of security issues. Distributed Denial-of-service (DDoS) attack denies services to an authentic user and makes the resources of network inaccessible. DDoS attack is a significant problem for IoT. It is easy to carry out this attack on an IoT network. Main aim of the proposed methodology is to use Software-defined Network (SDN). The primary structure of proposed system is to integrate SDN and IoT technology. This combination is to provide a more secure infrastructure compare to traditional system. The secondary structure of proposed system is used to detect and mitigate the DDoS attacks. The proposed methodology is to check associativity of MAC IP address, source IP address and destination IP address. It was able to detect and mitigate the attack in short span of time. The results are compared on different parameters. That parameters are packet delay time, flow entries and average packet received per second by the controller. This hybrid method is to provide higher security and improve the Quality of Service (QoS). 2019, Institute of Advanced Scientific Research, Inc.. All rights reserved. -
Water dispute in Central Asia: Conflict potential
The Central Asian republics (CARs), which emerged as independent states in the post-Soviet phase, faced several challenges. During the Soviet era, the CARs were agriculturally oriented towards the Soviet economy and, accordingly, river water management was also centralized under the command economic model. However, with the collapse of the Soviet Union, the CARs had to review the existing water management arrangements. This is where the absence of a Moscow-centric central authority has proven detrimental to the region endowed with two major rivers and their several subsidiaries. In this context, the paper suggests an emphasis on multilateralism, rather than bilateralism, as a more feasible approach to river water management. Clearly, multilateralism would promote a more equitable solution compared to bilateralism, which does not adopt a holistic approach to the region. Considering the fact that the region is characterized by a water crisis in addition to the fragility of the environment makes a multilateral arrangement significantly more appropriate for the region in the long term. 2019, CA and C Press AB. All rights reserved. -
Secure provenance-based communication using visual encryption
Explicit specification of the historical record of an instance or a data item is called data provenance. It has many applications in various fields with regards to its importance on capturing data flow mechanisms. However, on the other hand, there are good number of security mechanisms in place to withstand the cyber-attacks. Almost all of these algorithms uses complex mathematical calculations in providing security for the systems. Visual cryptography is a peculiar approach which uses concept of secret sharing by dividing the message into transparencies as encryption process. Upon superimposing transparencies one obtains the original message. In this paper, we propose secret sharing as a notion of security onto data provenance. Main inference of this writing is to throw a model combining above two mentioned aspects which gives away an indigenous solution in the area of information security. This proposed model is implemented with specific use case scenarios for substantiation and related analysis. Simulated results and discussion of the same is presented in the paper. 2019 Inderscience Enterprises Ltd. -
Happiness and resilience among young physically disadvantaged employees in India: A pilot study
Purpose: The study aimed to examine and compare the happiness and resilience of disadvantaged employees and non-disadvantaged employees. Method: The study sample included 37 young employees, between 20 and 30 years of age. Among them, 17 were with physical disadvantages of one type or the other, and 20 had no physical disadvantages. Results: Mann-Whitney U test showed that there is no difference in resilience and happiness between disadvantaged and non-disadvantaged employees. Among the non-disadvantaged employees, there is a relationship between happiness and resilience. However, among the disadvantaged employees, this relationship is not there. Conclusions: Disadvantaged employees in the present sample do not differ from the non-disadvantaged in their happiness and resilience. However, it cannot be assumed that happiness is a contributing factor to the resilience of the disadvantaged employees. Also, it is not possible to generalize the results of the study due to the small sample size. 2019, Action for Disability Regional Rehabilitation Centre. All rights reserved. -
Koppa Archaeological Research Project (KARP): Exclusive Iron Age landscapes in the Western Ghats, India
Koppa Archaeological Research Project (KARP) conducted systematic transect surveys and excavations in the Coorg plateau at the upper reaches of river Kaveri in the Western Ghats, Karnataka. The archaeological record of the study area is exclusively an Iron Age landscape, as we did not find any other prehistoric or early historic sites. We focused on studying thirty-nine Iron Age (1200 BCE300 BCE) sites of two categories, habitation and megaliths, and we present here our preliminary observations addressing to site findings, their landscapes and settlement patterns. We then consider the geographical and climatic implications for understanding the formation of their economy and politics. We argue that sites in the Western Ghats did not differ significantly from the temporal and cultural material typologies of contemporary Iron Age sites in the semi-arid or savannah conditions of Deccan plateau. Yet the adaption of Iron Age communities to Western Ghats climate which is characterized by high rainfall, lush tropical forests, fallow lands and diverse faunal ecology should have had distinct implications for the development of their economy and politics. 2019 Elsevier Ltd -
An outlook in blockchain technology- Architecture, applications and challenges
Blockchain is mechanism which stores and exchange data in a peer-peer network serving as an immutable ledger allowing transactions to take place in decentralized method which neglects the role of intermediaries. The technology reduces greater complexity by combining three key features; security, decentralization and transparency. This paper is an attempt explaining the concepts, structure, applications and challenges the technology has. The paper introduces blockchain taxonomy, reviews applications and discussed technical challenges and way of handling these challenges. Blockchain technology is springing up with promising applications in various fields and the authors have explored about three emerging field of blockchain say; Education, Government and Healthcare. Finally the paper concludes by stating other emerging fields of applications where further research can be explored. International Research Publication House. -
EShield: An effective detection and mitigation of flooding in DDoS attacks over large scale networks
Distributed Denial-of-Service attacks are very hard to be mitigated in wireless network environment. Here in this manuscript, an effective method of flood detection and mitigation architecture is proposed named eShield, which detects and prevent flooding attacks through spoof detection technique. The proposed method uses an architecture and an algorithm. eShield deals with Intrusion Protection and Detection Systems (IPDS) which collaboratively defend flooding attacks at different points in the network. Here eShield detects the supply node with its port variety which were below assault. Inorder to reduce the burden on international IPDS eShield makes use of distinct nearby IPDS for the assaults in flooding which have been carried out collaboratively. The assessment is done through the widespread simulation of eShield and it is proved to be an actual values based on time delay, false positive rates, computation and communication overhead. BEIESP. -
Effectiveness of blended classroom among varied streams of undergraduate language learners An Experimental Study
Technology has become an integral part of learners today and keeping with the time, researchers have developed learning methods that address this issue. There have been several methods developed to address this issue. One of the most successful techniques that has in the recent past contributed largely to active learning is flipped classroom. Communication skills is the need of the hour, to ensure an employable community this study endeavours to develop a learning technique that will nurture active learners and improve their communication skill in a technology oriented community. Hence the paper aims at finding and deliberating the efficacy of implementing flipped classroom to improve communication skills among undergraduate learners from science and humanities majors. BEIESP. -
A novel SIW based dual-band power divider using double-circular complementary split ring resonators
This article presents a novel design of substrate integrated waveguide (SIW) dual-band power divider loaded with double-circular complementary split-ring resonators (CSRRs). The double-circular CSRRs are etched on the top layer of the proposed structure to obtain the dual-band characteristic. The proposed geometry provides a passband frequency below the cut-off frequency of the SIW due to the electric dipole nature of the CSRRs. By changing the dimensions of the CSRRs, various passband characteristics are studied. To validate the design idea, a compact dual band power divider with equal power division operating at 8.4 and 11.7 GHz is designed, fabricated, and tested. A good steadiness is found between simulated and tested results. The proposed idea provides features of compact size, dual-band operation, and good isolation. The size of the fabricated prototype excluding microstrip transition is 0.473?g 0.284?g, where ?g is the guided wave length at the center frequency of first band. 2019 Wiley Periodicals, Inc. -
Temporal correlation between the optical and ? -ray flux variations in the blazar 3C 454.3
Blazars show optical and ? -ray flux variations that are generally correlated, although there are exceptions. Here we present anomalous behaviour seen in the blazar 3C 454.3 based on an analysis of quasi-simultaneous data at optical, ultraviolet, X-ray, and ? -ray energies, spanning about 9 yr from 2008 August to 2017 February.We have identified four time intervals (epochs), A, B, D, and E, when the source showed large-amplitude optical flares. In epochs A and B the optical and ? -ray flares are correlated, while in D and E corresponding flares in ? -rays are weak or absent. In epoch B the degree of optical polarization strongly correlates with changes in optical flux during a short-duration optical flare superimposed on one of long duration. In epoch E the optical flux and degree of polarization are anticorrelated during both the rising and declining phases of the optical flare. We carried out broad-band spectral energy distribution (SED) modelling of the source for the flaring epochs A,B, D, and E, and a quiescent epoch, C. Our SED modelling indicates that optical flares with absent or weak corresponding ? -ray flares in epochs D and E could arise from changes in a combination of parameters, such as the bulk Lorentz factor, magnetic field, and electron energy density, or be due to changes in the location of the ? -ray-emitting regions. 2019 The Author(s) Published by Oxford University Press on behalf of the Royal Astronomical Society. -
Detection of strangers based on dogs sound
Nowadays, people having a pet at home are increasing. Usually, dog is the favorite pet animal for most of the people in the world. Dogs are more capable of identifying strangers in the surroundings than humans. The proposed work identifies the strangers based on the barking sound of the dog. In this anticipated work, multiple features are extracted from the dogs barking sound using Fast Fourier Transform and Statistical based methods. The classification is done using Nae Bayes classifier. The dataset contains 770 barking audio files of 8 dogs. Whenever known and unknown person comes home, the sounds of the dogs are recorded. The classification result for identifying the stranger is 79.1094%. BEIESP. -
QSPR analysis of certain degree and eccentricity based topological indices and butane derivatives
Butane derivatives are chemical compounds formally derived from Butane C4H10 by replacement of one or more hydrogen atoms with other atoms or functional groups. In this paper, we do the QSPR analysis of few Butane derivatives with respect to some selected degree based topological indices and one eccentricity based topological index. In QSPR studies, topological indices are extensively used in determining specific bioactivity of chemical compounds. Our study showcases some important results on the correlation between Heavy atomic count, Complexity, Density, Surface tension and Index of refraction of Butane derivatives with the selected topological indices which further helps in characterizing the predicting power of these topological indices. RAS?YAN. All rights reserved. -
A USB- bluetooth two factor mutual authentication security protocol for wireless sensor networks
Wireless sensor networks are easy to deploy, effective, and can monitor unattended environments. As the data transmitted through these networks is highly sensitive, the security of the networks is important and strong authentication measures must be in place. Authentication is done by means of a security protocol, wherein a user is authenticated through certain factors such as a smartcard or a password, and several mathematical calculations such as hashing, and XOR operations. Several previously proposed authentication protocols and their flaws are discussed in this paper. We propose a new two factor mutual authentication protocol using a USB-Bluetooth token as the second factor, to overcome the security flaws seen in previous schemes. We also provide security analysis as well as Scyther results in support of the proposed protocol. The proposed protocol can be used across various fields such as healthcare, agriculture, traffic monitoring etc. BEIESP. -
An algorithm to detect an object in a confined space by using improved fingerprinting approach
The rapid evolution of location-based services has made tremendous changes in the society. In this paper, Trilateration method is implemented in fingerprinting methodology to obtain very precise and low error position details of the client portable device. Trilateration is a method in which the portable device is determined by the received signal strength intersecting at one position from the three reference points. Fingerprinting method involves several steps like training stage and positioning stage in which the training stage consists of the creation of the database of the signal strengths along with its associated location measurements. In the positioning step where effective and efficient received signal strength collected from the portable device is matched with the data saved into the database to get the position information of the client. The position of the user is estimated by collecting the received signal strengths from three reference points by using the concepts of trilateration approach in fingerprinting methodology to obtain more precise and accurate information. 2005 - ongoing JATIT & LLS. -
Blockchain based emanative unassailable system: Use cases and repercussions
Block chain is one of the developing technologies which has advanced possibility for forthcoming claims. Block chain process is formulated based on blockchain thinking and formulating thinking. In block chain provides the flexibility to non-trusting members interacting in a genuine manner in a distributed network. Different use cases such as academic credentials, professional profile verification, KYC and record management are explained. The feature of block chain with respect to unassailable system is concluded with some of the major advantages and disadvantages of block chain. BEIESP.