Browse Items (11855 total)
Sort by:
-
Secured Electronic Transactions Using Visual Encryption: An E-Commerce Instance
The developments in the information technology has led the modern world to rely on the internet for digital information. People around the world depend on the internet for every information from general information to sharing confidential data over the network. Technology has grown so wide that even all the transactions are happening through online platforms. Along with this, there has been a rise in the security threats of the user's confidential data which are shared by the users while buying goods online. To maintain the security there are many authentication techniques available today like OTP, CAPTCHA etc. These security measures taken till now have been adequate till the present day but over time the hackers would find out ways to attack. Data breaches and hacking of user data would increase day by day if preventive measures are not taken time to time. This project focuses on providing security to the user's confidential data with a two way authentication technique. The aim of the project is to include one more security level to the existing online transaction system. The visual cryptographic method is used along with the OTP generating system. 2018 IEEE. -
Secure approach to sharing digitized medical data in a cloud environment
Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment, including laboratories, pharmacies, and daily medical status reports. The electronic format of medical reports ensures that all information is available in a single place. However, it is difficult to store and manage large amounts of data. Dedicated servers and a data center are needed to store and manage patient data. However, self-managed data centers are expensive for hospitals. Storing data in a cloud is a cheaper alternative. The advantage of storing data in a cloud is that it can be retrieved anywhere and anytime using any device connected to the Internet. Therefore, doctors can easily access the medical history of a patient and diagnose diseases according to the context. It also helps prescribe the correct medicine to a patient in an appropriate way. The systematic storage of medical records could help reduce medical errors in hospitals. The challenge is to store medical records on a third-party cloud server while addressing privacy and security concerns. These servers are often semi-trusted. Thus, sensitive medical information must be protected. Open access to records and modifications performed on the information in those records may even cause patient fatalities. Patient-centric health-record security is a major concern. End-to-end file encryption before outsourcing data to a third-party cloud server ensures security. This paper presents a method that is a combination of the advanced encryption standard and the elliptical curve Diffie-Hellman method designed to increase the efficiency of medical record security for users. Comparisons of existing and proposed techniques are presented at the end of the article, with a focus on the analyzing the security approaches between the elliptic curve and secret-sharing methods. This study aims to provide a high level of security for patient health records. 2023 Xi'an Jiaotong University -
Bougainvillea glabra-mediated synthesis of Zr?O and chitosan-coated zirconium oxide nanoparticles: Multifunctional antibacterial and anticancer agents with enhanced biocompatibility
The effectiveness and safety of nanomaterials (NMs) are essential for their use in healthcare. This study focuses on creating NPs with multifunctional antibacterial and anticancer properties to combat bacterial infections and cancer disease more effectively than traditional antibiotics. This study investigates the synthesis of Zr3O and chitosan (ch) coated zirconium oxide nanoparticles (chZrO NPs) using Bougainvillea glabra (B. glabra) plant extract through a green, one-pot precipitation method. The synthesized NPs were analyzed using various techniques. Their antibacterial properties are attributed to the production of reactive oxygen species (ROS), influenced by their size, large surface area, oxygen vacancies, ion release, and diffusion capabilities. The chZrO NPs showed superior antibacterial activity compared to Zr3O and chitosan alone, with effective inhibition against both Gram-positive bacteria (S. aureus and B. subtilis) and Gram-negative bacteria (E. coli and P. aeruginosa). Additionally, anticancer studies of chZrO NPs demonstrated significant activity against colon cancer HCT116 cells with C50 values of 4.98 ?g/mL compared to chitosan and Zr3O with 9.62, 6.69 ?g/mL, while biocompatibility tests on L929 cells confirmed their safety showing 93 % cell viability compared to ch and Zr3O. These findings suggest that chZrO NPs are promising candidates for future use in clinical and healthcare applications. 2025 Elsevier B.V. -
Human rights and religion : Perspectives and retrospectives /
Asian Journal Of Research In Social Science & Humanities, Vol.6, Issue 1, pp.80-89, ISSN: 2249-7315. -
Examining how ERP-Enabled Supply Chain Integration Works within the Quadrants of the Four-Wheeler Industry
Enterprise Resource Planning (ERP) systems have become indispensable tools for managing complex supply chains in the automotive industry. This paper provides an in-depth examination of ERP-based supply chain integration within the four-wheeler automobile sector, focusing on its impact, challenges, and best practices. Through a comprehensive review of existing literature and case studies, we analyze the key components of ERP systems, their integration with supply chain processes, and the benefits they offer to automotive manufacturers. Additionally, we explore the role of ERP in enhancing operational efficiency, inventory management, demand forecasting, and customer satisfaction. Furthermore, we discuss the challenges associated with ERP implementation and provide recommendations for successful integration and optimization of ERP systems in the four-wheeler automobile industry. 2024 IEEE. -
Bed shear stress distribution across a meander path
Laboratory experimentation for bed shear stress distribution has been carried out in two sets of meandering channels. The channels have crossover angles of 110 and 60 constructed by sine-generated curves over a flume of 4 m width. Variations in bed roughness were studied for the meandering main channel. Bed shear stress distribution across a meandering length for the 110 and 60 channels was examined for different sinuosities and roughnesses. The boundary shear stress study illustrated the position of maximum shear along the apex section and across the meandering path. These variations were observed for different flow depths. A comparison of the bed shear among the three experimental channels was conducted, and the results were analyzed. 2024, IWA Publishing. All rights reserved. -
Mapping of built-up area and change detection in bengaluru using semi-automatic classification
Built-up areas are ever-increasing in nature to cater to the growing population's needs due to the migration of people to urban areas. Indian cities are under stress due to unplanned developmental activities. Land use and the land cover pattern are critical to maintaining the balance of various resources. In this study, Spatio-temporal changes have been mapped from 1989 to 2022 for the Bengaluru urban region. Geospatial techniques have been adopted to map land use, land cover changes and urban growth. Passive remote sensing data sets, which are freely available, were used in this study. QGIS and ESRI's ArcGIS software packages analysed the satellite images. Vegetation indices such as the Normalised vegetation index (NDVI), Normalised Difference Water index (NDWI), and Normalised difference Built-up index (NDBI) have been used along with supervised and unsupervised classification techniques. Images were classified into water bodies, vegetation, built-up area and others. It has been observed that there is an increase in the built-up area decrease in vegetation and water bodies. As per this study, policymakers and society need to consider the conservation of natural resources and developmental activities for sustainable development. 2023 Author(s). -
Nonlocal analysis of Rayleigh-type wave propagating in a gradient layered structure
The present article aims to study the propagation behavior of Rayleigh-type waves using the nonlocal theory of elasticity in a layered structure constituted of a gradient transversely isotropic stratum perfectly bonded with a gradient monoclinic substrate. At first a constitutive relation is established for the assumed layered structure. Thereafter in view of suitable boundary conditions dispersion relation for the propagation of Rayleigh-type wave is obtained by considering a complex quantity wavenumber. The obtained result well agrees with the classical result and therefore validates the present study. The phase velocities and the attenuation coefficient for the Rayleigh-type wave propagation are numerically computed for the materials CdSe and LiNbO3; and the same are illustrated graphically. A significant effect of the affecting parameters on the propagation and the attenuation curves are depicted against the wavenumber. Comparative analysis of the influence of these parameters on the propagation and attenuation of Rayleigh-type waves is marked distinctly which serves as a salient feature of the present study. The techniques utilised the present problem and the obtained results may find potential application in various aspects. 2023, The Author(s), under exclusive licence to SocietItaliana di Fisica and Springer-Verlag GmbH Germany, part of Springer Nature. -
Role of women in food and agricultural development: Breaking barriers for sustainable growth
The role of women in food and agricultural development in India is vital as it has an essential impact on the country's agricultural development. Despite all the contributions, they often face major obstacles, such as limited access to resources such as land, credit, innovation, and technology, and addressing these barriers is important. In this chapter, the authors have examined areas and levels of farm women's participation, such as the crops they grow, post- harvest activities, the workload they carry, and, despite all the struggles, how the women are underestimated. Their contribution is not limited to crop cultivation but also includes dairy, poultry, fishing, aquaculture, and forestry such as the wood processing sector. Due to men moving towards urban areas for better jobs and quality of life, women in rural areas are pressured to work in the fields; due to this, agriculture is feminized, and women shoulder a heavier workload than men. The underrepresentation of women is also seen in the employment rate and the pay they receive during seasonal, non- seasonal, and part- time employment. 2024, IGI Global. All rights reserved. -
Synthesis and characterization of Chitosan-CuO-MgO polymer nanocomposites
In the present work, we have synthesized Chitosan-CuO-MgO nanocomposites by incorporating CuO and MgO nanoparticles in chitosan matrix. Copper oxide and magnesium oxide nanoparticles synthesized by precipitation method were characterized by X-ray diffraction and the diffraction patterns confirmed the monoclinic and cubic crystalline structures of CuO and MgO nanoparticles respectively. Chitosan-CuO-MgO composite films were prepared using solution- cast method with different concentrations of CuO and MgO nanoparticles (15 - 50 wt % with respect to chitosan) and characterized by XRD, FTIR and UV-Vis spectroscopy. The X-ray diffraction pattern shows that the crystallinity of the chitosan composite increases with increase in nanoparticle concentration. FTIR spectra confirm the chemical interaction between chitosan and metal oxide nanoparticles (CuO and MgO). UV absorbance of chitosan nanocomposites were up to 17% better than pure chitosan, thus confirming its UV shielding properties. The mechanical and electrical properties of the prepared composites are in progress. 2018 Author(s). -
Arabica Coffee Bean Grading into Specialty and Commodity Type Based on Quality Using Visual Inspection
Expanding potential of coffee consumers to seek out the freshest and best flavors is a cause for the rise of specialty coffee inthe market. Specialty coffee is grown and harvestedmaintaining an emphasis on quality and clarity of flavor, whereas commodity coffee is harvested for caffeine content. Within those inclusive categories, arabica and robusta are the two types of main branches of coffee that weencounter in the coffee market. Specialty coffees differ significantly from conventional coffees in that they are cultivated at higher altitudes, can be traced, and are professionally processed after being harvested. The quality is constantly examined and understood at every stage, from growth to brewing. Green arabica quality is assessed by counting the defective beans present in the sample. These defects can be primary (Category I) or secondary (Category II). If the primary defects are null and less than five secondary defects, coffee is said to be a specialty.Prior research has been done on classifying the coffee species and differentiating good beans from bad beans. Our research involves the combination of machine learning like K-NN and deep learning convolutional neural networks for classifying specialty coffee from commodity type using computer vision. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Review On Image based Coffee Bean Quality Classification: Machine Learning Approach
Specialty coffee's demand is growing worldwide as coffee drinkers continue to look for the freshest and highest-quality flavors. Depending upon the quality, there are two categories in the coffee industry, that is specialty coffee and commodity/commercial coffee. Coffee beans are graded via visual inspection and cupping. A 300g sample of green coffee beans is used for visual assessment, and faulty beans are counted. As per the 'Specialty Coffee Association of America' (SCAA), defect can be either primary or secondary. For a coffee to be a specialty, it should have less than 5 secondary defects and zero primary defects. In this survey we have presented the coffee bean quality-related research which includes various machine learning approaches in classifying the coffee beans. The study has achieved quite promising prediction accuracies and was evaluated with test data. We have done a study on coffee bean quality classification and are willing to contribute an arabica coffee bean dataset and detection of coffee bean quality using transfer learning with higher accuracy. 2022 IEEE. -
Implementation and Investigation of an Optimal Full Adder Design for Low Power and Reduced Delay Conditions
Full adder is one of the important components in electronics, used for various fundamental processing algorithms such as addition and multiplication. The application of these full adders is included in but not limited to Very Large-Scale Integration (VLSI) and Digital Signal Processing (DSP). To provide scalability and reliability to the advanced algorithms for high-end applications, the designing system of full adder should be enhanced. So, in this paper, we intended to improve the efficiency of a full adder circuit to work under low power and delay conditions. The software we used in this project is MENTOR GRAPHICS using 180nm technology. The efficiency of the proposed transistor design is evaluated by analysing the power consumption, delay, PDP, capacitor load, delay w.r.t capacitance and PDP w.r.t capacitance. The parameters are compared between our proposed design and the literature schemes such as OLPFAD, DFEFA, DTLPCFA, and DPEHFA, respectively. It is evident that our proposed design outperforms the other. 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. -
Dynamic Behaviour Analysis of Multi-Cell Battery Packs: A Simulation Study
In the era of IoT understanding the dynamic behavior of a Lithium-ion Battery Management System (BMS) has become gradually more important. This research investigates the dynamic behaviour of a six-cell Lithium-ion Battery Management System (BMS) through simulation. The study employs a comprehensive model encompassing key battery parameters, including cell capacity, voltage limits, temperature thresholds, and charge/discharge characteristics. Additionally, state variables such as State of Charge (SOC), State of Health, and State of Function are integrated to capture the battery's internal dynamics. The simulation incorporates a sinusoidal current profile to emulate realistic operating conditions. Notably, Coulomb counting is employed for SOC estimation, and protective measures against overvoltage, undervoltage, and overcurrent are implemented. The study also addresses balancing strategies and communication interfaces within the BMS. The results reveal nuanced interactions between voltage, temperature, SOC, and current, offering insights into the intricate behaviour of the battery system under dynamic conditions. This research not only advances our understanding of BMS functionality but also lays a crucial foundation for the evolution of battery technology and energy management systems in the IoT landscape. The Institution of Engineering & Technology 2023. -
Financial Big Data Analysis Using Anti-tampering Blockchain-Based Deep Learning
This study recommends using blockchains to track and verify data in financial service chains. The financial industry may increase its core competitiveness and value by using a deep learning-based blockchain network to improve financial transaction security and capital flow stability. Future trading processes will benefit from blockchain knowledge. In this paper, we develop a blockchain model with a deep learning framework to prevent tampering with distributed databases by considering the limitations of current supply-chain finance research methodologies. The proposed model had 90.2% accuracy, 89.6% precision, 91.8% recall, 90.5% F1 Score, and 29% MAPE. Choosing distributed data properties and minimizing the process can improve accuracy. Using code merging and monitoring encryption, critical blockchain data can be obtained. 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Value-based teaching English language and literature
Aim. The ultimate aim became the realisation of the political ideas of democracy, equality, and social justice (Orlenius, 2001; Svingby, 1994, p. 57). The current study aimed to explore the concept of value education at Poornaprajna institutions that have adopted value education in their curriculum. Methods. The study was designed in a qualitative exploratory research approach. The researcher had adopted the interviews for a case study as a microscopic social study through observation and also studied the archival records in Poornaprajna institutions. The informal group interviews were administered as part of a qualitative research approach, which aimed to collect data from twenty eight English teachers and students of Poornaprajna institutions. Result. The validity and trustworthiness of the study were established by adopting Miles and Hubemans formula, which amounted to 0.91. The exploration and findings revealed the need and implication of value education in the present scenario. Further-more, the data analysis revealed that value education is a process that begins at home and continues in society, and further, it continues in formal educational institutions. Conclusion. The study envisions that the educational institutions must integrate the curriculum with value education so that students cultural worlds, meanings they attribute to behaviour, events which essentially lead to the developmental process of the society. The National Education Policy 2020, aims to universalise education in India by 2025; it also aims at inter-and multidisciplinary approaches in Indian education. The pre-sent study juxtaposes an interdisciplinary approach to English and value education. 2021, Pro Scientia Publica Foundation. All rights reserved. -
Effect of Phonological and Phonetic Interventions on Proficiency in English Pronunciation and Oral Reading
The current research aimed to know the effect of phonological and phonetic interventions in enhancing proficiency in English pronunciation and oral reading among teacher trainees. This study was of single-group pretest and posttest intervention designs. The sample size was selected through a stratified random sampling technique from teacher training colleges in Bengaluru. Two hundred and seven teacher trainees with L1 proficiency were chosen proportionately from Bangalore strata and orientated. Participants (N = 32) enrolled voluntarily in the intervention program for 20 hr. Intervention modules on phonology and phonetics were developed by the researcher and a segmental approach was adopted to teach modules in 20 sessions. After every session, the participants were allowed to record the modules in Audacity, a multiaudio recorder application. The recorded modules were interpreted, and scores were determined on number of intelligible words pronounced by the participants. Further, it was validated by the experts to authenticate the determined scores. The researcher applied oscillographic and observation methods to analyze the participants' progress in pronunciation and oral reading proficiency levels during the experiment. The Wilcoxon signed-rank test was used to test the impact of intervention between the pretest and posttest (before and after intervention). The hypotheses testing revealed the difference between preintervention and postintervention scores in phonological and phonetic awareness and oral reading among teacher trainees, and the sig. value is less than 0.05 across all the attributes. This study insists that English phonology and phonetics must be a crucial part of the English language teaching (ELT) curriculum and highlights that teachers must be able to spot the most appropriate pronunciation teaching and train the students of English as a foreign language (EFL) with intricates of intelligible pronunciation. This study navigates the need for language proficiency among teacher trainees, especially in English pronunciation and oral reading, and substantiates the evidence that effective intervention and teachers' knowledge of pronunciation enhance proficiency levels in pronunciation and oral reading among teacher trainees. Finally, it hopes that B.Ed colleges and teacher educators will be beckoned to use technology-integrated intervention to teach phonology and phonetics. 2024 Diwakar Prahaladaiah and Kennedy Andrew Thomas. -
Pad Vending Machine with Cashless Payment
A vending machine aims to provide required product or the service to the customer with certain ease, wherein not much effort is required. This research work aims to design a pad vending machine with an option of payment using QR code which is implemented using blockchain to make the system much more efficient and reliable than the existing systems present in the Indian market. The system is divided into two parts, first being the working of the machine and second being the mode of payment which is implemented using a blockchain. It is noticed many times that due to unpredictable menstrual flow women tend to face a lot problems. To overcome this problem, a pad vending machine is proposed with certain advancements through which women can help themselves in the stated circumstances. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Online Voting System Using Blockchain
One of the major areas in technical development is blockchain and bitcoin. These technologies have enabled many simulations in in-hostile applications that have major issues with security and integrity of data. To provide more relevance to the available cyberphysical systems in the dimension of security, the blockchain technology offers a major help. If the present scenario is considered, we have multiple day-to-day applications that have been simulated and require more security enhancement. For example, the E-voting systems are a trend and their security features have to be upgraded to authenticate both systems and processes. The present research paper focuses on the same application and aims to provide security upgradation by proposing a working model of e-voting systems. 2020, Springer Nature Singapore Pte Ltd.