Browse Items (11855 total)
Sort by:
-
Education as a Determinant of E - Governance Adoption: A Cse Study of Tele Centres of Karnataka
Imperial Journal of Interdisciplinary Research, Vol. 2, Issue 13, pp. 32-38. -
EDUCATION AND SKILL REQUIREMENTS: A STUDY OF INFORMATION TECHNOLOGY INDUSTRY IN BANGALORE
India is passing through the crucial phase of demographic transition wherein a majority of its population is in the working age, giving India a never before opportunity to cash in on a huge demographic dividend. This brings spotlight on the human capital benefits that can accrue as a result of this phase with 54% of Indias 1.2 billion population under the age of 25. It is highly imperative for India to cash in on this critical phase through the creation and capitalization of knowledge, competency and the skill base of its people or the Human Capital and pave the way for faster economic growth and development of its economy. The study takes in to consideration the Information Technology industry, wherein Indias prowess has been widely celebrated with Indian software engineers doing exceedingly well and there has been an apparent unstoppable outflow of jobs to India from U.S and Europe. India has become the undisputed global hub for outsourcing and technology mediated work. This has been possible primarily because of the rich pool of technically proficient English speaking workforce with superior logical and reasoning skills. One of the prime reasons for this has been the vast network of academic infrastructure in India churning out more than 500,000 technical graduates annually (NASSCOM, 2012). But multiple surveys by NASSCOM and CII have shown severe gap between employment and employability of technical graduates with only 25% of technical graduates suitable for employment, the rest lacking in skills which the industry wants. In order to solve this paradox, the study was initiated to examine the skill requirements of new recruits in the IT sector. It aims at bringing about the differences, if any between the perception of academia and the industry on the importance of specific skill sets for new IT recruits. The study also explores if there is any disconnect between what the industry perceives to be the available skill sets among the new IT recruits and what the academia perceives to have imparted in terms of those skill sets to their students. In order to capture the perception of the academia and the industry, the study takes in to account their responses on a five-point likert scale on the desired level and actual level of proficiency of new IT recruits on technical, business, interpersonal and management skills. The study found that there were significant differences in the perception of IT Managers and Academicians on the desired level of proficiency of new IT recruits in 4 out of 7 skill sets analyzed, which were Interpersonal and Management Skills, Emerging Technologies Skills, IT Infrastructure Skills and Critical Thinking and Problem Solving Skills. IT Managers and Academicians differed in their views on the actual level of proficiency of new IT recruits too, as significant differences were found in their responses to 5 out of the 7 skill sets which were Interpersonal and Management Skills, Emerging Technologies Skills, Technical Management Skills, IT Infrastructure Skills and Critical Thinking and Problem Solving Skills. It surely does call for an active and productive partnership between the industry and the academia through meaningful communication, coordination and rigorous steps to bridge the gap and eventually to sustain and strengthen the inherent advantage that India has in the field of Information Technology. -
Educate, enable and empower future leaders: A model for community development through the child sponsorship program
The Child Sponsorship Program is an attempt by development organizations to reinstate the rights of a child to education, focusing on the overall well-being of a child and the community. The Sustainable Development Goals view Child Sponsorship Program as a tool for contributing towards development goals and targets. While the conventional models of the Child Sponsorship Program focused on the scholastic performance of children up to the elementary level, several progressive sponsorship programs aim at the whole personal development of the children and their community by ensuring community participation and a development-based approach targeting education, livelihood, empowerment, etc. This program channelized by the Centre for Social Action (CSA), CHRIST (Deemed to be) University), Bengaluru, is a child development program that engages with the goals of holistic development of the child and community development through the Child Sponsorship Program in two urban slum communities in Bengaluru. The research aims to study the change brought in the indicators, such as education, behaviour and attitude change, leadership and their holistic development, by the program. It also intends to assess the impact of the program on the development of the family, community and participation of the community members in the academic development of children. The study follows a qualitative study employing in-depth interviewing and Focused Group Discussions with parents and child participants of the communities where the Child Sponsorship Program is implemented. The data is analyzed through qualitative and quantitative software. 2024 Nova Science Publishers, Inc. -
EdTech tools for sustainable practices: A green revolution in education
The rapid advancement of Education Technology (EdTech) offers promising opportunities for educational institutions to integrate sustainable business practices into their operations and curriculum. The integration of EdTech into sustainability education has emerged as a powerful tool to promote environmental awareness, foster sustainable behavior, and address the pressing challenges of climate change and resource depletion. This chapter explores the growing significance of EdTech in sustainability education, analyzing its potential to cultivate a generation of environmentally conscious and responsible global citizens. It also aims at identifying and examining the most prominent emerging EdTech tools specifically designed to promote sustainability in educational settings. Furthermore, it aims to comprehend the institutional elements that have successfully incorporated and expanded the utilization of EdTech tools to promote enduring business practices. Additionally, the chapter addresses the challenges and obstacles faced by educational institutions in adopting and implementing these technologies and propose strategies to overcome these barriers. 2024 Allam Hamdan. All rights reserved. -
EDSSR: a secure and power-aware opportunistic routing scheme for WSNs
Motivated by the pivotal role of routing in Wireless Sensor Networks (WSNs) and the prevalent security vulnerabilities arising from existing protocols, this research tackles the inherent challenges of securing WSNs. Many current WSN routing protocols prioritize computational efficiency but lack robust security measures, making them susceptible to exploitation by malicious actors. The prevalence of reactive protocols, chosen for their lower bandwidth consumption, exacerbates security concerns, as proactive alternatives require more resources for maintaining network routes. Additionally, the ad hoc nature and energy constraints of WSNs render conventional security models designed for wired and wireless networks unsuitable. In response to these limitations, this paper introduces the Secured Energy-Efficient Opportunistic Routing Scheme for Sustainable WSNs (EDSSR). EDSSR is designed to enhance security in WSNs by continuously updating neighbor information and validating the legitimacy of standard routing parameters. Critically, the protocol is power-aware, recognizing the vital importance of energy considerations in the constrained environment of WSNs. To assess the efficacy of EDSSR in mitigating WSN vulnerabilities, simulation experiments were conducted, evaluating the protocols performance on key metrics such as throughput, average End-to-End delay (delay), energy consumption (EC), network lifetime (alive nodes), and malware detection rate. The results demonstrate that the EDSSR protocol significantly improves performance. It shows substantial gains in sum goodput relative to throughput, average delay, EC, and alive nodes. Specifically, the EDSSR protocol is 23% faster than DLAMD and 1013% faster than EEFCR. Additionally, the malware detection rate increases by 23%. The Author(s) 2024. -
Editorial: Methods and applications in cognitive science
[No abstract available] -
Edge/Fog Computing: An Overview and Insight into Research Directions
The rapid proliferation of data from applications including IoT, and on-demand access to data have increased dependency on cloud computing, which helps to minimize the overhead related to data storage and maintenance. Applications such as IoT, industrial control, etc. generate data which are highly time-critical in most scenarios. The cloud platform offers permanent storage of this massive amount of data but with comparatively less focus on time-sensitivity. Edge/fog computing are extensions of the cloud computing paradigm and require less response time for time-sensitive data. The edge/fog brings processing and storage closer to the edge of the network, thereby reducing network traffic, delay, and latency. It acts as an intermediate layer between the end devices and the cloud platform, for data collection, offloading, processing, and data management. This chapter addresses the need for fog computing, presents the design model for edge/fog computing, and discusses applications and open issues of implementation. The three-layered network model, the services provided by the edge/fog computing, and a few research challenges of implementation will also be discussed. 2024 Taylor & Francis Group, LLC. -
Edge, IIoT with AI: Transforming industrial engineering and minimising security threat
[No abstract available] -
Edge intelligence to smart management and control of epidemic
The effects of COVID-19 vary from person to person. A pandemic is devastating economically and socially. Thousands of enterprises face the possibility of collapse. More than half of the world's 3.3 billion workers may lose their livelihoods if the current crisis continues. The world's healthcare services are facing an unprecedented situation due to the recent outbreak of a novel coronavirus (COVID-19). Community and government health are adversely affected by the COVID-19 pandemic. COVID-19 has continued to spread, and mortalities have risen steadily. The spread of this disease can therefore be controlled utilizing nonpharmacological methods, such as quarantine, isolation, and public health education. Recent breakthroughs in deep learning (DL) have led to an explosion in applications and services relating to artificial intelligence (AI). The rapid advancements in mobile computing and AI have enabled zillions of Bytes of data to be generated at the network edge from thousands of mobile devices and internet of things (IoT) devices connected to the Internet. As a result of the success of IoT and AI technologies, it is of utmost importance that we expand the AI frontiers to the network edge in order for big data to be fully tapped. Edge computing (EC) can help overcome this trend because it allows computation-intensive AI applications to run on edge hardware. The topic of discussion in this chapter is edge intelligence (EI) technology's application in limiting virus spread during pandemics. 2024 Apple Academic Press, Inc. All rights reserved. -
EDGE INCIDENT 2-EDGE COLORING SUM OF GRAPHS
The edge incident 2-edge coloring number, ?ein2(G), of a graph G is the highest coloring number used in an edge coloring of a graph G such that the edges incident to an edge e = uv in G is colored with at most two distinct colors. The edge incident 2-edge coloring sum of a graph G, denoted as (Formula presented.), is the greatest sum among all the edge incident 2-edge coloring of graph G which receives maximum ?ein2(G) colors. The main objective of this paper is to study the edge incident 2-edge coloring sum of graphs and find the exact values of this parameter for some known graphs. I??k University, Department of Mathematics, 2025; all rights reserved. -
Edge incident 2-edge coloring of graphs
The edge incident 2-edge coloring of a graph G is an edge coloring of the graph G such that not more than two colors are assigned to the edges incident to an edge e = uv in G. In other words, for every edge e in G, the edge e and all the edges that are incident to the edge e is in at most two different color classes. The edge incident 2-edge coloring number ?n2(G) is the maximum number of colors in any edge incident 2-edge coloring of G. The main objective of this paper is to study the edge incident 2-edge coloring concept and apply the same to some graph classes. Besides finding the exact values of these parameters, we also obtain some bounds. World Scientific Publishing Company. -
Edge Computing in Aerial Imaging A Research Perspective
Internet of Drones (IoD) is a field that has a vast scope for improvement due to its high adaptability and complex problem statements. Aerial vehicles have been employed in various applications such as rescue operations, agriculture, crop productivity analysis, disaster management, etc. As computing and storage power have increased, satellite imaging and drone imaging have become possible, with vast datasets available for study and experiments. The recent work lies in the edge computing sector, where the captured aerial images are processed at the edge. Our paper focuses on the algorithms and technologies that easily facilitate aerial image processing. The applications and their architectures are focused on which can efficiently function using aerial processing. The various research perspectives in aerial imaging are concentrated on paving the way for further research. 2024 Scrivener Publishing LLC. All rights reserved. -
Edge computing for smart disease prediction treatment therapy
Healthcare systems are increasingly seeking to match patients' pace of life and be personalized, as they are demanding more advanced products and services. The only solution for collecting and analyzing health data in realtime is an edge computing (EC) environment, coupled with 5G speeds and modern computing techniques. The technology in healthcare is currently being used to develop smart systems that can expedite the diagnosis of disease and provide precise and timely treatment. The automated hospital monitoring system and medical diagnosis system enable doctors to monitor and diagnose patients from a variety of locations, including hospitals, workplaces, and homes and provide transportation options. As a result, overall doctor visits are reduced as well as patient care is improved. More than 162 billion healthcare IoT devices are expected to be used worldwide by 2021 thanks to the internet of things (IoT) sensors and applications for general healthcare. With edge intelligence (EI), wearable devices with sensors, like smartwatches or smartphones, and gateway devices, such as microcontrollers, can form edge nodes: smart devices with sensors, as well as gateway devices with sensors, can act as edge nodes. Smart sensor devices are typically installed at a greater distance from personal computers (PCs) and servers, which can be utilized in fog computing (FC). In healthcare, EC and FC are used to deliver reliable, low-latency, and location-aware healthcare services by utilizing sensors located within users' reach. Recently, many researchers have proposed using hierarchical computing for the distribution and allocation of inference-based tasks among edge devices and fog nodes, which could lead to an increase in computing power and compute capability of edge devices. For disease prediction, this chapter discusses a variety of EC techniques. 2024 Apple Academic Press, Inc. All rights reserved. -
Ecotourism a Sustainable Development Approach: A Case Study of Bandipur Forest
Bandipur Tiger Reserve is geographically speaking, it is an ecological confluence since the Western and Eastern Ghats intersect here, making this region unique and exceptional in terms of its flora and fauna. The community land areas of all the border settlements as well as the nearby notified and unnotified forests have been included in the buffer of this tiger reserve. The scrub jungle along the park's eastern boundaries is made up of stunted trees, scattered bushes, and open grassland patches. The Eco-tourism activity is run in the two Ranges of Bandipur (54 km2) and GS Betta (28 km2), covering a total area of 82.00 km2, or around 9.40% of the Reserve's total size. From the above analysis, it could be concluded that the government should provide that there are administrative facilities, halting facilities, etc. just next to National Highway 67, which cuts through the eco-tourism region. Additionally, the village community people agree that the regions where some Private Tourist Resorts have situated border the Kundu Range's Eco-tourism area. The Reserve benefits from having almost year-round operations. The usual methods of stopping poaching, such as arresting and prosecuting offenders, have obviously failed; conservation education aiming at altering local attitudes will greatly reduce the ongoing threats to the integrity of biological systems in the Bandipur forest. Operationalizing sustainable ecotourism within protected areas ultimately relies on management and operations that maximize the industry's potential positive advantages while minimizing its negative ones. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Econophysical bourse volatility-Global Evidence
Financial Reynolds number (Re) has been proven to have the capacity to predict volatility, herd behaviour and nascent bubble in any stock market (bourse) across the geographical boundaries. This study examines forty two bourses (representing same number of countries) for the evidence of the same. This study finds specific clusters of stock markets based on embedded volatility, herd behaviour and nascent bubble. Overall the volatility distribution has been found to be Gaussian in nature. Information asymmetry hinted towards a well-discussed parameter of 'financial literacy' as well. More than eighty percent of indices under consideration showed traces of mild herd as well as bubble. The same indices were all found to be predictable, despite being stochastic time series. In the end, financial Reynolds number (Re) has been proved to be universal in nature, as far as volatility, herd behaviour and nascent bubble are concerned. 2020 Bikramaditya Ghosh et al., published by Sciendo 2020. -
Economic Sustainability, Mindfulness, and Diversity in the Age of Artificial Intelligence and Machine Learning
The sustainability of artificial intelligence (Al) and machine learning (ML) requires human diversity and mindfulness. This chapter discusses the various ways in which AI and ML can interact with humans to improve society, e.g., in filing copyrights or design patents or increasing mindfulness. AI and ML could educate weavers and farmers about their legal rights, cultivation methods, banking processes, and the harmful effects of tobacco consumption and other health-related issues. AI and ML could help teach mindfulness. ML can measure additional biofeedback. Music, mathematics, and art may benefit from AI and machine learning. Human-technology relations and the blue-green deployment model can be used to maintain two independent infrastructures or duplicate feature stores. It is possible to cultivate mindfulness and an awareness of diversity and communal harmony through AI and machine learning, as AI and machine learning can infer the emotional and cognitive states of the people with whom they interact. By leveraging the entire process of visualization, reading, and listening with AI, machine learning, and beyond, the digital future has the potential to incorporate real-time emotions and feelings. This would entail emotional responses on both ends and a variety of other technologies and users. 2024 Taylor & Francis Group, LLC.