Browse Items (11855 total)
Sort by:
-
Need for an Innovative Method for Second Language English Learners with Special Reference to Syntax and Grammar
Educational Quest Vol. 3, No. 2 pp. 183-192, ISSN No. 0976-7258 -
Need of integrated care model for positive childbirth experience in Indian maternity care services
BACKGROUND: Integrated care (IC) models are an emerging trend in healthcare reforms worldwide, especially in the maternal healthcare system. This research focuses on the scope of an integrated model for intrapartum care of women and explores the experience of birth under two intrapartum care modelsbiomedical and midwifery models, respectively. The term positive childbirth experience (PCE) is a concept defined by the World Health Organization (WHO) in the recommendations on intrapartum care for a PCE. MATERIALS AND METHOD: This study is convinced to employ a qualitative approach to explore how birth is experienced by women under maternity healthcare services in Kerala. A semi?structured interview was conducted to tap into the lived reality of birthing of sixteen first?time mothers (primipara) aged between 20 and 30 years under these two models. Furthermore, five participants have been specifically interviewed after their vaginal birth after a C?section (VBAC) experience. To achieve a systematic cross?case thematic analysis, systematic text condensation (STC) has been employed as a data analysis method. RESULTS: Four main categories were identified through the analysis as follows: (1) information and knowledge, (2) confidence, (3) quality of care, and (4) health?promoting perspective. These central themes evolved from 11 subthemes. CONCLUSION: The data analysis reveals both negative and positive experiences under two care models. It emphasizes the urgent need to reframe the biomedical?focused care model and adopt an integrated approach that aligns with the global intrapartum care model proposed by the World Health Organization (WHO) in 2018 and the definition of IC mentioned in the paper. 2024 Journal of Education and Health Promotion. -
Negative consumer engagement via food delivery applications: A real concern for generation Z?
The traits of Generation Z are notable for how they define and reshape themselves in the 21st century. The current study investigates the factors that Generation Z users consider when deciding on a food application. The respondents in the current study were divided into working and nonworking groups, and the results imply that since college students are still supported financially by their parents or guardians, their main concerns are higher discounts, prices, and quantities. An in-depth and semistructured questionnaire was addressed to both groups of 15 respondents belonging to Generation Z. The stakeholders who would benefit from this research would primarily be online delivery restaurants, food application developers, academic researchers, and Generation Z cohorts. 2024, IGI Global. All rights reserved. -
Negative Domination inNetworks
We introduce s-domination in signed graphs which is based on the number of negative edges between the dominating set and its complement. The s-domination in both the positive and negative homogeneous signed graph will be studied for each value of s. As a special case, the properties of s-domination in sum signed graphs will be analyzed. The maximum value of s for a graph for which the s-domination exists is identified. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Negotiating Inclusion: Minority Institutions and Constitutional-Legal Dimensions in India
The chapter Negotiating Inclusion: Minority Institutions and Constitutional and Legal Dimensions in India is based on the premise that special provisions for inclusion of minority groups were one of the contested topics that have been negotiated in India since independence. The present chapter critically explores the two main sites of negotiation: Constituent Assembly Debates and the cases involving the question of minority rights to culture and education as adjudicated by the Indian courts. In doing so, the paper undertakes an examination of the logic of state recognition and reservations, voiced by nationalist leaders and members of the Constituent Assembly, who were apprehensive that the provisions on minority accommodation may not be compatible with Indias secular credentials. Constitutional provisions, specifically the fundamental rights embodied in Articles 29 and 30 were further debated and re-interpreted by the High Courts and Supreme Court. Further on, the issue of minority accommodation led to the establishment of institutional mechanisms in India, one such institution being the National Commission for Minority Educational Institutions (NCMEI)-a recent addition in the series of negotiating spaces of the religious and minority communities in India. A thorough examination of the functioning of the NCMEI, an institution which remains understudied, may inform new avenues into thinking about the sites of minority rights negotiations in India, given the shifting ideological positions at the national level. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022. -
Neo-X: Portable advanced audio technology /
Patent Number: 202241051890, Applicant: Moloy Biswas.
As time changed audio technology rapidly developed at a fast pace. Even with the advancing technology, all portable earphones seem to offer a specified feature. Customers have to invest in different types of earphones and headphones based on the device setting and features they require. Our product Neo-X headphones bring different features for different occasions or contexts. Whether in a gymnasium, hiking, bicycling or listening to music on a flight, these earphones provide a premium sound quality. Currently, there are a wide variety of earphones and headphones available in the market. -
Network Based Detection of IoT Attack Using AIS-IDS Model
In recent days Internet of Things attained more familiarity. Although it is a promising technology, it tends to lead to a variety of security issues. Conventional methods such as IoT ecosystem based solutions were not suitable to give dilemmas to the system. A new system model called adaptive and intelligent Artificial Immune System (AIS) imitates the process of human being an immune system that consists of eligible properties of this varying environment. Therefore, it enhanced IoT security. Conventionally classifiers such as Random Forest Classifier, Recurrent Neural Network and K-nearest neighbours are used to classify the signals as normal or abnormal and predict malicious attacks. But unfortunately, these classifiers generated a high false alarm rate. Thus, a framework with maximum accuracy and minimum false alarm rate was required. In this work, the AIS model adopts the benefits of the Hopfield Neural Network (HNN) for classification. HNN classifier has a fixed weight, as it cannot be changed for its backpropagation property. This work optimally selects the fixed weight using Fast- Particle Swarm Optimization (F-PSO) and helps to enhance the accuracy of the HNN classifier. This classifier model then differentiates IoT attacks with a high detection rate and normal signal. Three datasets are taken to execute the proposed model and define its accuracy. The proposed Artificial Immune system using HNN for Intrusion Detection System (AIS-IDS) model exhibits 99.8% accuracy for the first dataset and minimum error value. The false alarm rate was minimized using danger theory and its high activation function; thus, the false alarm rate was minimized by up to 8% more than previous classifiers. 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. -
Network Lifetime Enhancement by Elimination of Spatially and Temporally Correlated RFID Surveillance Data in WSNs
In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role due to its data characteristics which are data simplicity, low cost, simple deployment, and less energy consumption. It consists of a series of tags and readers which collect a huge number of redundant data. It increases system overhead and decreases overall network lifetime. Existing solutions like Time-Distance Bloom Filter (TDBF) algorithm are inapplicable to the large-scale environment. Received Signal Strength (RSS) used in this algorithm is highly dependent on quality of tag and application environment. In this paper, we propose an approach for data redundancy minimization for RFID surveillance data which is a modified version of TDBF. The proposed algorithm is formulated by using the observed time and calculated distance of RFID tags. To overcome these problems, we design our approach to relevantly reduce the spatiotemporal data redundancy in the source level by adding the Received Signal Strength Indicator (RSSI) concept for energy-efficient RFID data communication in wireless sensor network scenario. We introduce in this paper the new improved idea of an existing algorithm which efficiently reduces the rate of data redundancy spatially and temporally. The implemented results overcome the limitations of existing algorithm for data redundancy reduction. Nevertheless, the performance evaluation shows the efficiency of proposed algorithm in terms of time and data accuracy. Furthermore, this algorithm supports multidimensional and large-scale environment suitable for sensor network nowadays. 2022 Lucy Dash et al. -
Network pharmacological evaluation for identifying novel drug-like molecules from ginger (Zingiber officinale Rosc.) against multiple disease targets, a computational biotechnology approach
Ginger (Zingiber officinale Rosc.) is a popular spice used globally in ethnic cuisines and witnessed its extensive use in traditional medicine. In this study, we identified 12 phytochemicals from the ginger rhizome extract (hexane) through GC/MS analysis. After evaluating drug-likeliness, these phytochemicals were docked with 16 target proteins in silico, and docking scores were compared with their respective control drugs. Furthermore, multivariate statistical analysis (principal component analysis-PCA) was performed, and three different chemical clusters were identified. Pharmacophore analysis further identified common functional descriptors in the compounds under study. Finally, we developed a unique three-level network taking phytochemicals, target proteins and associated diseases based on the optimum docking scores. Overall, Oleic acid, Palmitic acid and Shogaol showed the highest coverage to the target proteins (12, 10 and 9 targets, respectively) and Oleic Acid scored the highest (5956) in PatchDock when docked against Peroxisome proliferator-activated receptor gamma (PDB id 1KNU, UniProt id P37231). This work provided significant insight into developing the protocol for rapid identification of potential drug likeliness of the identified phytochemicals. Graphic abstract: [Figure not available: see fulltext.]. 2021, The Author(s), under exclusive licence to Springer-Verlag GmbH Austria, part of Springer Nature. -
Network Security Tools and Applications in Research Perspective
The modern world technology is civilized, globalized and modernized. The technological development of social networks and e-commerce applications produce larger data. This data communication is major task, because device to device communication need network terminal. This data transmission is not safe because of different types of tools and software available to destroy the existing network. In the field of network security during data transfer from one particular node to other node some security vulnerability is happened this is the one of the critical issue in this sector. The reason for this network security is different types of data attacks are happen in day to day life. It is easy to establish a new network but protecting the entire network is a big issue. This network security is generally two parameter first one is communication and second one is data automation. The network security field is directly or indirectly linked with the concept of data encryption. The development in this network security has taken us to a level that from signature again we came back to thumb print. For example maintain the data secure we use the lock system which is a finger print type. This technology helps us to protect the physical data theft, but logical data theft is still problem for data transmission. This article will brief about the network security it also presents the various network security types. Those types are wired and wireless network security. Apart from the network security the following topics is also discussed in this article. Those are network security protocols and simulation tools in network security. The research problems in network security are privacy and vulnerability of data. 2019 IEEE. -
Network selection system and method for wimax integrated network and wlan integrated network /
Patent Number: 201941032402, Applicant: Mr. Kathiresan J.
Disclosed is a network selection system and method for a Worldwide Interoperability for Microwave Access (WiMAX) network and a wireless LAN (WLAN) network. The method includes the step of tracking a Mobile or fixed devices (MoFD) for identifying a plurality of Quality of Service (QoS) requirements through a Handoff Decision Manager (HDM) module coupled with a plurality of Media Access Control (MAC) layers of the WiMAX network and the WLAN network. -
Networks Simulation: Research Based Implementation using Tools and Approaches
The advancements in computer networks and communication technology keep network-related research in high demand. Protocols are designed to improve the environment and it is mandatory to test their effectiveness before deploying them. Deploying an untested protocol in a full-fledged real environment is not desirable as there exists uncertainty about its success. Simulation software is one of the essential tools in network research areas. It gives a platform for testing and observing newly developed protocol's behavior with less cost and risk. Different kinds of network simulators are available., some are exclusive for wired or wireless., and some are for both. There are many simulators available hence selecting the most appropriate simulation tool among them is a difficult task. This paper focuses on giving a detailed review of popular simulation tools. 2022 IEEE. -
Neural Network based Student Grade Prediction Model
Student final grade GPA is the collective efforts of their previous and ongoing efforts of each semester examination may predict accurately using the neural network which receives the input weight of each matrix element of variables to next neuron. The GPA prediction based on regular class performance and previous grades with background variables were found much significant. This research tries to explore the model comparison and evaluate student grade prediction using various neural network models. The single-layer half i.e., successful student model predicts 90 total accuracies than the single layer with five hidden layer neurons (88.5 percent). The multi-layer with two hidden layers (7,3) is 84 percent accuracy is less than one percent accuracy than multilayer with three hidden layers. Similarly, the multilayered with four hidden layered 25,12,7,3 model predicts the least accuracy (77 percent accuracy) for student grade. Similarly, the passed student prediction model has less accuracy than both students' 86 percent. 2022 IEEE. -
Neuro-Leadership: A New Paradigm in Leadership Thought
Leadership is not a static occurrence. It is a dynamic one that constantly evolves. Leadership is seen as a means to enhance ones personal, professional, and social lives. Organizations believe that leaders bring in unique assets to the organization; which contribute to the bottom line of the company. The conclusions drawn from research findings on leadership portray an image of a process that is far more sophisticated and complex than the condensed view, popularly accepted. This chapter will provide a comprehensive evaluation of different approaches to leadership and highlight the importance of a new paradigm. Ground breaking insights have started to surface regarding neurosciences and brain functioning that has significantly influenced leadership thought. The traditional approaches of leadership could not adapt to the world of unlimited information which needed continuous evolution; however, our brain can adapt and change leading to the emergence of neuro-leadership. The chapter will trace the journey of neuroleadership and its increasing relevance in the current scenario, especially in terms of employee and organization performance. 2024 by Nova Science Publishers, Inc. -
Neuro-Systemic applications in learning
Neuroscience research deals with the physiology, biochemistry, anatomy and molecular biology of neurons and neural circuits and especially their association with behavior and learning. Of late, neuroscience research is playing a pivotal role in industry, science writing, government program management, science advocacy, and education. In the process of learning as experiencing knowledge, the human brain plays a vital role as the central governing system to map the images of learning in the human brain which may be called educational neuroscience. It provides means to develop a common language and bridge the gulf between educators, psychologists and neuroscientists. The emerging field of educational neuroscience presents opportunities as well as challenges for education, especially when it comes to assess the learning disorders and learning intentions of the students. The most effective learning involves recruiting multiple regions of the brain for the learning task. These regions are associated with such functions as memory, the various senses, volitional control, and higher levels of cognitive functioning. By considering biological factors, research has advanced the understanding of specific learning difficulties, such as dyslexia and dyscalculia. Likewise, neuroscience is uncovering why certain types of learning are more rewarding than others. Of late, a lot of research has gone in the field of neural networks and deep learning. It is worthwhile to consider these research areas in investigating the interplay between the human brain and human formal/natural learning. This book is intended to bring together the recent advances in neuroscience research and their influence on the evolving learning systems with special emphasis on the evolution of a learner-centric framework in outcome based education by taking into cognizance the learning abilities and intentions of the learners. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021. All rights reserved. -
Neuro-technology and counselling
[No abstract available] -
Neurobiological aspects of violent and criminal behaviour: Deficits in frontal lobe function and neurotransmitters
Many neurobiological abnormalities have been reported in patients with violent and criminal behaviour. Strong associations exist between aggressive/violent behaviour and brain dysfunction. Also, many studies support an association between frontal lobe dysfunction and increased aggressive or antisocial behaviour. The focal orbitofrontal brain injury is specifically associated with increased aggression. Deficits in frontal lobe executive functions may increase the likelihood of future aggression, but as of now, studies have reliably demonstrated a characteristic pattern of frontal network dysfunction predictive of violent crime. The evidence is strongest for an association between focal prefrontal damage and an impulsive subtype of aggressive behaviour. This paper covers dysfunctions in these regions contributing to severe aggressive and violent behaviour, as well as neurotransmitters implicated in the same. 2018 International Journal of Criminal Justice Sciences (IJCJS). -
Neurocognitive aspects of mathematical achievement in children
Neurocognitive factors, including information integration and executive functioning, contribute significantly to a child's early success in math achievement, even though the significance of home and school environments cannot be ignored. There are only a few studies that have systematically examined how information integration and executive function skills impact different aspects of learning math and math achievement. Using a comprehensive tool such as the brain-Based Intelligence Test (BBIT), a brain-based comprehensive approach to the understanding of cognition, for the assessment of information integration and executive function skills can have significant implications for mathematical education and remediation (brain plasticity). The Author(s), under exclusive license to Springer Nature Switzerland AG 2021. All rights reserved. -
Neurodiversity at the Workplace: The new paradigm of talent acquisition and retention
The importance of neurodiversity in the workplace has gained popularity in recent years. Companies can access a pool of distinctive skills and viewpoints that can stimulate innovation, creativity, and productivity by embracing neurodiversity in the workplace. This chapter examines the idea of neurodiversity in relation to hiring and retaining talent, emphasizing the advantages for both companies and workers. It covers methods for establishing welcoming environments at work that support neurodiverse workers and help them reach their full potential. It also looks at how corporate culture, HR regulations, and leadership all contribute to creating a welcoming workplace for individuals who are neurodiverse. Companies can promote diversity, equity, and inclusion at the workplace in addition to attracting and retaining neurodiverse employees (NDEs). A conceptual framework has been proposed to demonstrate the influence of various factors like awareness, perceived benefits, accommodation, organizational policy, stigma, and unconscious bias on retention of NDEs. 2024, IGI Global.