Browse Items (11807 total)
Sort by:
-
RayleighBard magnetoconvection with asymmetric boundary condition and comparison of results with those of symmetric boundary condition
The paper concerns two RayleighBard magnetoconvection problems, one in a mono-nanofluid (H2OCu) and the other in a hybrid nanofluid (H2OCuAl2O3) bounded by asymmetric boundaries. A minimal FourierGalerkin expansion is used to obtain the generalized Lorenz model (GLM) which is then reduced to an analytically solvable GinzburgLandau equation using the multiscale method. The results of asymmetric boundaries are extracted by using the Chandrasekhar function with appropriate scaling of the Rayleigh number and the wave number. The solution of the steady-state version of the GLM is used to estimate the Nusselt number analytically, and the unsteady version is solved numerically to estimate the time-dependent Nusselt number and also to study regular, chaotic, and periodic convection. Streamlines are plotted and analyzed in both steady and unsteady states. The analytical expression for the HopfRayleigh number, rH , coincides with the value predicted using the bifurcation diagram. This number determines the onset of chaos. For r?> rH , one observes chaotic motion with spells of periodic motion in between. For r?< rH , one sees non-chaotic motion (regular motion). It is found that by increasing the strength of the magnetic field, we can prolong the existence of regular motion by suppressing the manifestation of chaos. The Lorenz attractor is a signature of chaos since it is found that the attractor appears only for r?> rH . The magnitude of the influence of the asymmetric boundary on rH is between those of the two symmetric boundary conditions with the freefree isothermal boundary being the one that most favors chaotic motion: A result also seen in the context of regular convection. 2023, Akadiai Kiad Budapest, Hungary. -
Trigonometric Cosine, Square, Sawtooth and Triangular Waveforms of Internal Heating Modulations for Three-Component Convection in a Couple Stress Liquid: A Detailed Analysis
In this paper, the main focus is to study the effect of internal heating modulations of sinusoidal and non-sinusoidal waveforms on a three-component convection in a couple stress liquid. This three-component layer is heated from below and salted with two solutes at the bottom. In order to facilitate a solution to the problem, linear case is formulated using the Venezian approach for modulations while the non-linear case is modeled using 7-mode generalized Lorenz equations. With the aim of quantifying the heat and mass transfer, average Nusselt and average Sherwood numbers are computed. The investigation reveals that, internal heating modulations show a stabilizing or destabilizing trend that precisely depends on the modulated frequency and appropriate waveforms. The effect of heat source and sink is recorded on different convection processes. The effect of the pertinent parameters and waveforms on the stability of the system and on heat and mass transfer have been captured via graphs. The results confirm that the heat and mass transfer escalates to its maximum due to the square waveform. In this research paper, six problems involving three types of convection in two different liquids are solved as limiting cases of the problem. 2022, The Author(s), under exclusive licence to Springer Nature India Private Limited. -
Digital transactional tools and their optimum use in language learning: An interdisciplinary approach /
IOSR Journal of Humanities and Social Science, Vol.19, Issue 11, pp.230-233, ISSN No: 2279-0845. -
MOOCs: A disruptive teaching-learning process in interdisciplinary boundaries /
International Journal of Language & linguistics, Vol.1, Issue 2, pp.54-61, ISSN No: 2374-8869. -
Challenges and Solutions of Using Social Internet of Things (SIoT) in Healthcare and Medical Domains
The revolutionary idea that combines social networks with the Internet of Things (IoT) is called the Social Internet of Things (SIoT). SIoT is a term that refers to the modelling of social networks formed by connecting people and things. SIoT was designed to assist organizations in achieving specific goals, such as boosting usability, scalability, and productivity and satisfying business service requirements. The application layer of the SIoT model performs several tasks like managing the relationship, discovering the services, configuring services, and managing reliability among the devices. The information collected about SIoT is categorized by identifying the relationships between devices. SIoT creates an event identity based on data from IoT applications. This identity may then be transferred with the SIoT network and made available to other IoT apps. Thus, the SIoT network offers guidance services for reusing data from IoT applications across many IoT applications and customizing IoT solutions to meet the unique needs of individual users, hence boosting overall communication. SIoT technology entails the more efficient use of recent data to create favorable patient outcomes in healthcare and medicine. The enormous volume of data generated by SIoT-connected devices has allowed various developments and applications in the healthcare domain. SIoT leverages sensors and other connected devices in these domains to boost social solutions efficiency. Without question, sensors used for creating this kind of network model that can collect vast amounts of data are on the verge of becoming a pervasive part of our lives. If the processing and management are not carried out optimally in SIoT, there is a significant risk that the data will lose its efficacy. This chapter examines SIoT challenges and approaches in the healthcare and medical domain. SIoT approaches may assist users in detecting a patients aberrant behaviour. These approaches are capable of detecting and forecasting patients health states. The SIoTs relational models, such as community sharing, equality matching, and equality matching, also provide IoT services to users. The sensing layers functionalities are compared to those of the network layer and application when assessing SIoT services. The proposed hierarchical network model uses gateways, switches, and IoT devices to establish social relationships. CISCO packet tracer is used to construct and operate this mainly built social network for healthcare. This specially designed social network for the healthcare domain can easily be implemented and controlled by any hospital management. 2023 selection and editorial matter, Gururaj H L, Pramod H B, and Gowtham M; individual chapters, the contributors. -
CPAODV: Classifying and Assigning 3 Level Preference to the Nodes in VANET Using AODV Based CBAODV Algorithm
Vehicles communicate with nearby vehicles to share high routing and traffic information in Vehicular Ad hoc Networks (VANETs) environment. Congestion and Delay in the transmission may occur due to the density of the nodes in the network. Traffic condition depends on the vehicles in Rural and Urban environment. Increase or Decrease in vehicles speed makes significant network changes when compared to the MANET environment. Road Side Terminals (RSTs) plays a major role in bridging the connection between the sender and the receiver nodes. The traditional AODV algorithm performs better when there are shortest path and link lifetime between the nodes in VANET. Giving 3 Level Preference to the nodes as High Preference (HP), Average Preference (AP) and Less Preference (LP) gives chances to nodes that have High Preference when compared to Less Preference. CPAODV model is proposed by implementing Classifying and giving preference to the RREQ to mitigate latency to the nodes. RST sends RREQ wisely based on the early model of Route Discovery stage itself. NS2 Simulator is used to analyze the strength of the proposed algorithm using QoS metrics like Throughput, Packet Delivery Ratio and End to End delay. This proposed CPAODV method performs better when compared to traditional AODV and CBAODV algorithm. 2020, Springer Nature Switzerland AG. -
Internet of Things and Blockchain in Healthcare: Challenges and Solutions
The Internet of Things (IoT) enables Internet-connected devices to transmit data to private blockchain networks, allowing for the creation of tamper-resistant documents with shareable exchanges. IoT blockchain technology enables you to communicate and connect IoT data with key stakeholders, while avoiding the need for extensive management and control. Each transfer can be checked to ensure there are no disagreements and to build trust in the network. Blockchain technology protects data from being changed, restricts access to Internet-connected devices, and allows vulnerable IoT devices to be shut down. Blockchain encryption eliminates the possibility of someone overwriting existing data records. In addition, storing IoT data on the blockchain adds an extra layer of security, preventing malicious attackers from accessing the system. The many blockchain IoT firms provide significant value in revolutionizing company operations and daily routines. IoT blockchain firms demonstrate the possibility of blockchain and IoT integration. For instance, Helium is a successful blockchain IoT company specializing in securing Internet connections. This chapter presents the vital role of the Internet of Things and blockchain in the healthcare domain. The integration of blockchain technology in the healthcare industry has given us a chance to solve some problems with IoT networks. In recent years, the need for blockchain-enabled IoT transactions has become an essential technology that will change how users share data. A scenario has been developed to enhance this study to analyse the integration, need, and obstacles associated with blockchain-enabled IoT transactions in the healthcare area. As a result, there is also an IoT model designed using devices for hospitals that take into account all of these people and their needs and the office space where they work. The Author(s), under exclusive license to Springer Nature Switzerland AG. 2024. -
Exploring social networking data sets
A network is a collection of objects/devices that are linked to one another through wired and wireless communication. Networks are everywhere, and they are formed to share resources among users. Nodes and edges form a network structure. Nodes describe the objects, whereas edges represent the connections between them. Network analysis is advantageous in a wide variety of live application activities. It enables us to get a thorough knowledge of the structure of a connection in social networks, the structure or process of development in environmental events, and even the study of organisms' biological systems. Additionally, network analysis allows the estimation of complex network patterns, and the network structure may be examined to disclose the network's basic features. If anyone examines a social connection among Facebook users, for example, the nodes indicate the target people and the edges reflect the connections between users, such as friendships or group memberships. The objective of this chapter is to describe and visualize social network analysis (SNA) using Python and NetworkX, a Python framework for analyzing the structure, dynamics, and functions of complex networks. 2022 Scrivener Publishing LLC. All rights reserved. -
Signature based key exchange for securing data and user from web data stealing attacks
Due to the immense technological growth, web and its related applications are becoming a major part of everyday life. The growth of the internet and technology not only increases the positive benefits but also increases negative activities such as data theft. As web applications are used frequently for many online services, it is the most common and valuable target for the adversary to host any web vulnerabilities. Data theft or data stealing attacks are quite common in the web and the internet with severe consequences. The private data are generally stored on the system which gives an opportunity for the attacker to steal the data from the storage or during transit. However, apart from stealing the critical data from the user, the attacker also steals the sensitive data from the web applications. This type of attack takes several forms for stealing perilous information from the user and web application. Unfortunately, these attacks are easy to execute as the attacker needs only the internet connection, a web server and technical knowledge which are readily available. Several prevention strategies exist to thwart the user and the application from the web attacks, however, they do not provide the complete solution. This paper presents the signature based key exchange to prevent the user as well as the web application from several variations of data stealing attacks through mutual attestation. The experimental results show that the proposed method prevents the user and application from data theft than any other existing methods. BEIESP. -
Cognitive technology in human capital management: a decision analysis model in the banking sector during COVID-19 scenario
Cognitive technologies are products of the artificial intelligence (AI) domain which execute tasks that only humans used to perform. The impact of cognitive technologies on the management of human capital (HC) has a massive effect in the banking sector. This paper studies the transformation of cognitive technology to human capital management (HCM) in the banking sector during the COVID-19 pandemic. The study draws data from 201 bank employees working in private, public, and foreign banks using a multi-stage sampling method in India. A number of hypotheses were framed and tested using multivariate and regression analyses. The results from the study indicate a significant change in the performances of bank employees statistically during the transformation of cognitive technologies. Cognitive technologies such as payment, product customisation, self-services, workload alleviation, automated back-office function, and a personalised experience significantly contribute to the HCM. 2024 Inderscience Enterprises Ltd. -
Cryptocurrencies: An Epitome of Technological Populism
From a global perspective, which holds significant cryptocurrencies, this study discusses the volatility and spillover effect between the whales cryptocurrencies. Volatility in cryptocurrency markets has always been a time-varying concept that changes over time. As opposed to the stock market, which has historically and recently, the cryptocurrency market is much more volatile. The markets have evidenced many fluctuations in the prices of cryptos. As a result, countries are transforming their policies to suit financial technologies in their economic practices. Blockchain technology allows people to obtain more benefits in a financial transaction and breaks hurdles in the financial system. The study has found no ARCH effect in BinanceCoin, BT Cash, Bitcoin, Vechain, and Zcash. It is discovered that there is an ARCH effect in the case of Ethereum, Tether, Tezos, and XRP. Whale cryptocurrencies have an ARCH effect. Daily closing prices of ten cryptocurrencies, including bitcoin, from January 1, 2019, to December 31, 2020, to determine the price volatility where the bitcoin whales hold significant cryptocurrency values. It has given significant results in case of volatility since we also found that Bitcoin's largest cryptocurrencies among the sample taken for the study have less volatility than other currencies. 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Determinants of Loan Repayment Behaviour of Bank Borrowers - A Relative Study with evidence from Bengaluru
The present study aimed to review the various factorsthat influence the credit score and find the effect of credit score and other financial aspects of an individuals loan repayment and whether they had ever defaulted. Primary data was collected through a questionnaire from 516 customers of twelve different banks in Bengaluru city during July-August 2019 using a stratified sampling method. The results revealed that credit score, loan amount, and loan repayment amount did not affect the loan repayment behaviour of individuals. However, the type of loan obtained and the kind of bank the loan is received significantly influence individuals loan repayment behaviour. Home loans, education loans, other loans and the loan obtained from a foreign bank were particularly significant in affecting the loan repayment of individuals. The high beta value for other loans indicates that most individuals who have no other loans have defaulted in repaying their dues. Indian Institute of Finance. -
Big data, artificial intelligence, and machine learning support for e-learning frameworks
Today's e-rendering frameworks are essential in various fields such as computer graphics, virtual reality, and augmented reality to provide an effective and impressive education to modern society. The integration of big data, artificial intelligence (AI), and machine learning (ML) techniques into e-rendering frameworks hold significant potential for enhancing rendering efficiency, optimizing resource allocation, and improving the quality of rendered outputs. With the advent of big data, massive amounts of rendering-related data can be collected and analyzed. This data includes rendering parameters, scene descriptions, user preferences, and performance metrics. By applying data analytics, important information can be derived, allowing for more informed decision-making in rendering processes. Additionally, AI techniques, such as neural networks and deep learning, can be employed to learn from the collected data and generate more accurate rendering models and algorithms. 2024, IGI Global. All rights reserved. -
Future research directions for effective e-learning
In recent years, with the rapid advancement of technology and the global shift towards digital education, e-learning has gained significant momentum from education sectors. However, there are still several challenges and areas for improvement in the field of e-learning. This work discusses several future research directions that contribute to the effective implementation and enhancement of e-learning in solving real world problems. Also, various components like pedagogical strategies, technology integration, learner support and engagement, assessment and evaluation, accessibility and inclusivity, professional development for educators, quality assurance and accreditation, and ethical and legal issues are explained towards implementation of e-learning. Hence, this chapter explains the effectiveness, accessibility, and inclusivity of e-learning as providing effective educational opportunities for learners globally. 2024, IGI Global. All rights reserved. -
Effective HR practices in family business in technology disruption era
Today's world of 21st-century business is said to be a VUCA (Volatility-Uncertainty-Complexity-Ambiguity) world. VUCA describes the fast pace of change in the business environment. It has largely been led by the disruption brought about by technology-led human resources departments within organisations to revise strategy approaches and methods to face these emerging challenges. Research studies show that more than two-thirds of the companies in the world belong to family businesses. In the family business, the owners and HR should see what is going on in the business environment and update the situation. As most family businesses have family members in key positions, the tricky issues faced by family businesses are mostly about handling family and non-family members and creating effective HR policies. The COVID-19 pandemic in 2019 and 2020 has disrupted their business in unexpected ways. This chapter explores different HR practices adopted by the family business and suggests effective HR practices and procedures to meet the multiple challenges in the family business. The chapter also analyses the strategies of HR practices followed by some top family business firms worldwide. The chapter is formed as a meta-synthesis. It provides more qualitative inputs related to recent challenges and effective HR practices adopted in the technologically competitive era and during the COVID-19 pandemic period. 2022 World Scientific Publishing Co. Pte. Ltd. -
Blockchain: Opportunities in the healthcare sector and its uses in COVID-19
As the world grapples with the COVID-19 pandemic and major populations are getting vaccinated, increasing realization processes healthcare industry needs to be augmented. It includes managing supply chains, healthcare records, and patient care. With a scarcity of time and resources, adaptation of blockchain technology will help mitigate the pressures on existing infrastructure. A blockchain distributed ledger helps to exchange health information securely without complex intermediation of trust with secure access. The organizations and persons in the blockchain network can verify and authorize the data, thus protecting patient identity, privacy, medical information system, and reducing transaction costs. The chapter examines managing and protecting electronic medical records and personal health records data using blockchain. It also analyses issues in healthcare, blockchain implementation, and its uses in the COVID-19 pandemic. The authors put forward the idea that even after the world is free of the Coronavirus, there will be pressures on the healthcare industry and Blockchain technology is the way to alleviate this pressure. 2022 Elsevier Inc. All rights reserved. -
Role of Blockchain in the Healthcare Sector: Challenges, Opportunities and Its Uses in Covid-19 Pandemic
As the world grapples with the Covid-19 pandemic and major populations are getting vaccinated, increasing realisation processes healthcare industry needs to be augmented. It includes managing supply chains, healthcare records, and patient care. With a scarcity of time and resources, adaptation of blockchain technology will help mitigate the pressures on existing infrastructure. A blockchain distributed ledger helps to exchange health information securely without complex intermediation of trust with secure access. The organisations and persons in the blockchain network can verify and authorise the data, thus protecting patient identity, privacy, medical information system, and reducing transaction costs. The paper examines managing and protecting electronic medical records and personal health records data using blockchain. It also analyses issues in healthcare, blockchain implementation, and its uses in the Covid-19 pandemic. 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Gamification for industry 5.0 at the core of society 5.0
Gamification has become a popular approach to engage employees, customers, and other stakeholders in various industries. With the advent of Industry 5.0 and Society 5.0, the use of gamification is expected to increase, as companies and organizations look for innovative ways to enhance productivity, creativity, and collaboration. Industry 5.0 is the next phase of industrial development, characterized by the integration of advanced technologies, such as AI, IoT, and robotics, with human skills and creativity. Society 5.0, on the other hand, refers to a human-centered society that leverages technology to create solutions for social problems. This chapter explores the potential of gamification in the context of Industry 5.0 and Society 5.0. It discusses the various applications of gamification, including training, education, marketing, and sustainability. It also examines the benefits of gamification, such as increased engagement, motivation, and collaboration. 2023 by IGI Global. All rights reserved. -
Role of emerging technologies in smart marketing and smart business for modern society
In the digital age, the fusion of emerging technologies with marketing and business strategies has become imperative for staying competitive and meeting evolving consumer demands. This chapter explores the pivotal role of emerging technologies in facilitating smart marketing and business practices in modern society. Through a comprehensive review of literature and case studies, this chapter examines the impact of technologies such as artificial intelligence (AI), machine learning (ML), big data analytics, internet of things (IoT), augmented reality (AR), and blockchain on reshaping marketing and business landscapes. The integration of AI and ML algorithms enables predictive analytics, personalized marketing, and enhanced customer experience through precise targeting and recommendation systems. Big data analytics empowers businesses to derive actionable insights from vast datasets, enabling data-driven decision-making and dynamic market segmentation. 2024, IGI Global. All rights reserved. -
COVID-19 and the world with co-morbidities of heart disease, hypertension and diabetes
Newly emerging severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) causing coronavirus disease 2019 (COVID-19) pandemic has now spread across the globe in past few months while affecting 26 million people and leading to more than 0.85 million deaths as on 2nd September, 2020. Severity of SARS-CoV-2 infection increases in COVID-19 patients due to pre-existing health co-morbidities. This mini-review has focused on the three significant co-morbidities viz., heart disease, hypertension, and diabetes, which are posing high health concerns and increased mortality during this ongoing pandemic. The observed co-morbidities have been found to be associated with the increasing risk factors for SARS-CoV-2 infection and COVID-19 critical illness as well as to be associated positively with the worsening of the health condition of COVID-19 suffering individuals resulting in the high risk for mortality. SARS-CoV-2 enters host cell via angiotensin-converting enzyme 2 receptors. Regulation of crucial cardiovascular functions and metabolisms like blood pressure and sugar levels are being carried out by ACE2. This might be one of the reasons that contribute to the higher mortality in COVID-19 patients having co-morbidities. Clinical investigations have identified higher levels of creatinine, cardiac troponin I, alanine aminotransferase, NT-proBNP, creatine kinase, D-dimer, aspartate aminotransferase and lactate dehydrogenase in patients who have succumbed to death from COVID-19 as compared to recovered individuals. More investigations are required to identify the modes behind increased mortality in COVID-19 patients having co-morbidities of heart disease, hypertension, and diabetes. This will enable us to design and develop suitable therapeutic strategies for reducing the mortality. More attention and critical care need to be paid to such high risk patients suffering from co-morbidities during COVID-19 pandemic. 2020 Journal of Pure and Applied Microbiology. All rights reserved.