Browse Items (5543 total)
Sort by:
-
Geo-spatial crime analysis using newsfeed data in indian context
Social media is the platforms where users communicate, interact, share ideas, career interest, pictures, video, etc. Social media gives an opportunity to analyze the human behavior. Crime analysis using data from social media such as Newsfeeds, Facebook, Twitter, etc., is becoming one of the emerging areas of research for law enforcement organizations across the world. The intelligence gathered through data is used for identifying future attacks and plan for reinforcements. This article focuses on the implementation of textual data analytics by collecting the data from different newsfeeds and provides an optimized visualization. This article establishes a framework for better prediction of 16 types of crime in India and the Bangalore area by providing the coordinates of the crime area, along with the crime which might happen there. 2019, IGI Global. -
Effectiveness of Hall current and exponential heat source on unsteady heat transport of dusty TiO2-EO nanoliquid with nonlinear radiative heat
The problem of exponential heat source across a flowing nanofluid (TiO2-EO; titanium oxide-Engine oil) containing tiny dust particles on a deformable planar plate has been an open question in meteorology. In this paper, the boundary layer transient two-phase flow of dusty nanoliquid on an isothermal plate which is deforming with time-dependent velocity in the presence of exponential heat source is studied. The impacts of Hall current, nonlinear radiative heat and an irregular heat source (temperature based heat source and exponential space-based heat source) are also accounted. Dusty nanofluid is the composition of dust particles and nanoliquid (TiO2-EO). Using relevant transformations, the system of PDEs is rehabilitated to the system of ODEs and then treated numerically. Exploration of the impacts of pertinent parameters on velocity and temperature fields is performed via graphical illustrations. Numeric data for skin friction factor and the Nusselt number is presented and their characteristics are analyzed/quantified through the slope of linear regression via data points. 2019 Society for Computational Design and Engineering -
Antecedents of online impulsive buying behaviour: A meta-analysis
The advancement of technology has created curiosity among researchers and marketers in identify the possible antecedents to online impulsive buying. The concept of impulse buying is often defined as ?unplanned? purchase behaviour. Researchers have identified few factors based on a systematic review of literature. The factors have then been combined using Meta-Analysis to arrive at variables that act as antecedents to Impulse Buying behaviour. The variables identified include promotion, web atmospherics, online behaviour, shopping context, buyers emotions and buyers personality which all contribute significantly proving to be an important antecedent of impulsive online buying. The above identification of antecedents will help the marketing practitioners to understand and improve the characteristics of each antecedent. Further investigation can be done by further research scholars on finding if any variable could be added in enhancing the sales by creating a better impulse on the online platform. IJSTR 2019. -
Digital lending: Is it alternative lending revolution?
Digital lending is new and emerging area in the field of lending or credit. Lending through digital platform, right from receipt of loan application to disbursement of loans, is known as digital lending. Digital lending gains momentum as a result of employing new technologies, new credit scoring algorithms and inclusive approach. This article focuses on framework, working mechanism and growth of digital lending in India. 2019 IJSTR. -
Research asset creation (RAC) model for PhD awarding universities in India
Importance of higher education and research is becoming more prominent and admission for PhD is increasing year by year in India. Most of the time Research done as part of PhD ends with the submission and acceptance of thesis in Universities. This research future work or extension work might be picked by other PhD candidate in the same or from the different Universities but not sure when it will happen. Also not sure the research completed has achieved its end objective and University is fine to stop that research after spending so much of time and resources of University. This paper insists on continuous research with PhD candidates every year in Universities until the completion of research and scope for reducing the waste of resources and time. This paper considers the importance and effectiveness of Indexing parameters, Indexing agencies, review methods, Journals and relevant concepts. Considering the usefulness and facts of the same to research community building a standard process with procedures to control quality, performance and original research in place, I have built a Research Asset Creation (RAC) model for universities offering PhDs in India by making use of University level Indexing, Indexing parameters, Inter and Intra University peer review methods and University Journal as magazine and as well as Indexing agency. Research cannot be considered just for the award of degree. There is a need for making use of research, resources of University and time spent on research till the objective of the research is accomplished. This can be accomplished by adopting Research Asset Creation model. Complete details of the model, components of the model, implementation, its benefits and usage is discussed in this paper. This is a generalized Model and fit for all Countries which are looking for effective use of research and resources in a progressive manner. BEIESP. -
Investigation of the fractal footprint in selected EURIBOR panel banks
EURIBOR emerged as a conventional proxy for a risk-free rate for a reasonably long period of time after the creation of the Eurozone. However, the joy was short-lived, as the global credit crisis shook the markets in mid-2008. Significant counterparty risk embedded in a derivative transaction cannot be left out. EURIBOR reflects the credit spread on borrowing. Hence, risk and uncertainty are inextricably linked here. This study investigates five banks out of 19 panel banks that manage EURIBOR in various Eurozone countries. These banks, HSBC, ING, Deutsche Bank, the National Bank of Greece and Barclays, are tested from January 2009 to December 2017 on a daily basis. Bank specific EURIBOR can be predicted in all five cases with different degrees. The trace of a profound herd is observed in the case of the National Bank of Greece, others were relatively mild in nature. The customer base and their risk grade were recognized as the main factor. Their information asymmetry and derived information entropy suggest embedded chaos and uncertainty. Bikramaditya Ghosh, Corlise Le Roux, Anjali Verma, 2020. -
A note on perfect lucky k-colourable graphs
This paper presents the notion of perfect Lucky k-colouring. Basic conditions for a perfect Lucky k-colourable graph are presented. Application thereof is then presented by obtaining the Lucky 4-polynomials for all connected graphs G on six vertices with ten edges. The chromatic number of these connected graphs is ?(G) = 3 or 4. For k = max{?(G): 3 or 4g = 4, it is possible to find Lucky 4-polynomials for all graphs on six vertices and ten edges. The methodology improves substantially on the fundamental methodology such that, vertex partitions begin with Lucky partition forms immediately. Finally, further problems for research related to this study are presented. 2020, International Scientific Research Publications. All rights reserved. -
Border Collie Optimization
In recent times, several metaheuristic algorithms have been proposed for solving real world optimization problems. In this paper, a new metaheuristic algorithm, called the Border Collie Optimization is introduced. The algorithm is developed by mimicking the sheep herding styles of Border Collie dogs. The Border Collie's unique herding style from the front as well as from the sides is adopted successfully in this paper. In this algorithm, the entire population is divided into two parts viz., dogs and sheep. This is done to equally focus on both exploration and exploitation of the search space. The Border Collie utilizes a predatory move called eyeing. This technique of the dogs is utilized to prevent the algorithm from getting stuck into local optima. A sensitivity analysis of the proposed algorithm has been carried out using the Sobol's sensitivity indices with the Sobol g-function for tuning of parameters. The proposed algorithm is applied on thirty-five benchmark functions. The proposed algorithm provides very competitive results, when compared with seven state-of-the-art algorithms like Ant Colony optimization, Differential algorithm, Genetic algorithm, Grey-wolf optimizer, Harris Hawk optimization, Particle Swarm optimization and Whale optimization algorithm. The performance of the proposed algorithm is analytically and visually tested by different methods to judge its supremacy. Finally, the statistical significance of the proposed algorithm is established by comparing it with other algorithms by employing Kruskal-Wallis test and Friedman test. 2013 IEEE. -
Enhancing performance of WSN by utilising secure QoS-based explicit routing
Wireless sensor networks (WSN) are infrastructure less and self-configured a wireless network that allows monitoring the physical conditions of an environment. Many researchers focus on enhancing the performance of WSN in order to provide effective delivery of data on the network, but still results in lower quality of services like energy consumption, delay and routing. We tackle this problem by introducing a new routing algorithm, QoS-based explicit routing algorithm which helps in transmitting the data from source node to destination node on WSN. We also involve clustering process in WSN based on genetic algorithm and particle swarm optimisation (GA and PSO) algorithm. We proposed identity-based digital signature (IBDS) and enhanced identity-based digital signature (EIBDS) that involves reduction of computation overhead and also increasing resilience on the WSN. We also use advanced encryption standard (AES), for ensuring the security between nodes and avoid hacking of data by other intruders. Copyright 2020 Inderscience Enterprises Ltd. -
Development and validation of superstitious beliefs scale
Superstitions though considered as irrational beliefs are widely prevalent in all cultures. Most of the existing work on superstitions are predominantly based on traditional western beliefs. The relevance of established superstition scales which are developed in western societies in collective societies need to explored. Interdependent nature of self which is a characteristic of collectivistic culture also has a role in belief formation. The present study aims at developing a new self-report measure of superstitious beliefs scale. Study 1, focused on exploring the factor structure and establishing reliability over a sample of 338 undergraduate students. The 17-item Superstitious Belief Scale (SBS) developed distinguishes a six-factor structure namely, Popular Beliefs, Belief in Good Luck, Belief in Bad Luck, Personal Superstitions and Social Superstitions. The six-factor structure was evaluated on a new sample (N = 483) using confirmatory factor analysis in Study 2. The internal consistency values of the new SBS over Studies 1 and 2 indicated high reliability. The findings have important implications for existing theory on superstitions. The new framework proposes and demonstrates the need to base the understanding of measurement of superstitious beliefs relevant in India. AesthetixMS 2020. -
Planned fashion obsolescence in the light of supply chain uncertainty
Fast fashion has popularised the phenomenon of perceived obsolescence whereby customers try to stay in line with the current fashion trends in the market even though the apparel they own are in perfect condition. This has ultimately led the fashion industry to become the second largest polluter in the world. The primary objective of this research paper is to comprehend how the media manoeuvres customers to indulge in fast fashion and how that in turn leads to uncertainty in the supply chain. To understand this, a maximum variation sampling method was adopted which consisted of customers, supply chain partners and marketers. In order to draw a parallel between the variables researched in the past and the present day scenario, an interview schedule was employed. Through the variables selected with the help of Dedoose, a model was created to identify the hurdles faced by suppliers as well as the customer in the fast fashion cycle. The results found that the power to break the fast fashion phenomenon lay in the hands of the media as it is through them that customers' perception can be altered. The importance of artificial intelligence in SCM and the modern tools used in industry 4.0 have also been discussed. 2020 Allied Business Academies. -
Pricing of liquidity risk in the indian stock market
Empirical literature from developed stock markets identifies liquidity risk to have impacts on the price of a stock. Given this, using one-minute trade and quote data of fifty stocks constituting the NIFTY 50 Index, this study examines the pricing of liquidity risk in the Indian stock market. The study uses thirteen liquidity measures identified from literature that cover the cost, quantity, time and multidimensional aspects of liquidity. The innovations in the liquidity measures are considered as the proxy for liquidity risk. Employing Generalized Methods of Moments estimation, the study proves that Indian investors expect to have a premium for holding securities that are illiquid when the whole market is illiquid. It proves liquidity risk as a priced factor and thus validates the liquidity-adjusted capital asset pricing model in the Indian stock market. It cautions the investors that the liquidity shocks can have significant inferences on portfolio diversification strategies to be adopted. 2020 GEA College – Faculty of Entrepreneurship. All rights reserved. -
Financial access indicators of financial inclusion: A comparative analysis of SAARC countries
Financial inclusion provides access to formal financial services at reasonable cost to the financially excluded people. Financial inclusion has been one of the most sought after topics in recent times for policy makers, researchers and academicians. Definition of financial inclusion varies from region to region. Financial inclusion is measured using different indicator. The important indicators of financial inclusion measurement include access indicators, usage indicators, quality indicators and financial education indicators. Most of the researchers use access indicators and usage indicators to measure financial inclusion. Access indicators comprise of demographic and geographic branch penetration, demographic and geographic ATM penetration and population per branch. This study focuses on comparative analysis of access indicators of financial inclusion in SAARC countries. The study is based on secondary data available in the central banks of SAARC nations, International Monetary Fund, World Bank and Asian Development Bank. The study has found and analysed about the countries which has performed well in each indicator of financial access. Copyright 2020 Inderscience Enterprises Ltd. -
Performance evaluation of Map-reduce jar pig hive and spark with machine learning using big data
Big data is the biggest challenges as we need huge processing power system and good algorithms to make a decision. We need Hadoop environment with pig hive, machine learning and hadoopecosystem components. The data comes from industries. Many devices around us and sensor, and from social media sites. According to McKinsey There will be a shortage of 15000000 big data professionals by the end of 2020. There are lots of technologies to solve the problem of big data Storage and processing. Such technologies are Apache Hadoop, Apache Spark, Apache Kafka, and many more. Here we analyse the processing speed for the 4GB data on cloudx lab with Hadoop mapreduce with varing mappers and reducers and with pig script and Hive querries and spark environment along with machine learning technology and from the results we can say that machine learning with Hadoop will enhance the processing performance along with with spark, and also we can say that spark is better than Hadoop mapreduce pig and hive, spark with hive and machine learning will be the best performance enhanced compared with pig and hive, Hadoop mapreduce jar. Copyright 2020 Institute of Advanced Engineering and Science. All rights reserved. -
Analysis on techniques used to recognize and identifying the Human emotions
Facial expression is a major area for non-verbal language in day to day life communication. As the statistical analysis shows only 7 percent of the message in communication was covered in verbal communication while 55 percent transmitted by facial expression. Emotional expression has been a research subject of physiology since Darwins work on emotional expression in the 19th century. According to Psychological theory the classification of human emotion is classified majorly into six emotions: happiness, fear, anger, surprise, disgust, and sadness. Facial expressions which involve the emotions and the nature of speech play a foremost role in expressing these emotions. Thereafter, researchers developed a system based on Anatomic of face named Facial Action Coding System (FACS) in 1970. Ever since the development of FACS there is a rapid progress in the domain of emotion recognition. This work is intended to give a thorough comparative analysis of the various techniques and methods that were applied to recognize and identify human emotions. This analysis results will help to identify proper and suitable techniques, algorithms and the methodologies for future research directions. In this paper extensive analysis on various recognition techniques used to identify the complexity in recognizing the facial expression is presented. Copyright 2020 Institute of Advanced Engineering and Science. All rights reserved. -
Effect of treated and untreated domestic sewage water irrigation on tomato plants
Background and Objectives: Agricultural cultivations in the world are suffering from water shortages. Water scarcity poses challenges in the economy and health of people all over the world. The present study aimed the cultivation of tomato plants using groundwater, treated and untreated domestic sewage water and tried to make a comparative study on the heavy metals present in the leaves and fruits of the tomato plants. Materials and Methods: The water samples were analyzed for various physicochemical parameters such as; pH, total hardness, chloride, total alkalinity, dissolved oxygen and heavy metal. Stomatal conductance was measured using porometer. The heavy metal analysis was conducted using Atomic Absorption Spectrometer. Results: All physicochemical parameters were found to be below the permissible level of standard values in the groundwater and treated domestic sewage water, but above the permissible level in untreated domestic sewage water. Stomatal conductance was found to be very low in the plants treated with untreated domestic waste water (296.33/428 in the ventral surface during the morning and noon, respectively) when compared to the leaves of the plants treated with other water samples. Untreated domestic sewage water showed a very high level of lead, i.e., 7.5354 ppm, whereas the treated sewage water contained 0.5650 ppm slightly above the permissible level. Conclusion: The present study has revealed that the treated domestic sewage water would be used for the irrigation of agricultural cultivation. 2020 Jobi Xavier and Akhil K. Varghese. -
Should we judge phcs by only iphs guidelines or probe further?
Background: Indian Public Health Standards (IPHS) evaluates supply side compliance of Primary Health Centers (PHCs). Patient Satisfaction (PS) on the other hand, assesses the demand side. Objective: Examining the supply side compliance and relating it to PS in the domain of Reproductive Health (RH). Methods: Using multistage stratified sampling, six rural and three urban PHCs in sub-districts, Ramanagara and Channapatna, in District Ramanagara, state of Karnataka, India, were chosen. Information collected using IPHS proforma for PHCs was compared with PS questionnaire (PSQ 18) data, collected from 398 patients visiting these facilities. Results: Using descriptive and inferential analysis, sub-optimal compliance levels in ease of access, physical & human infrastructure, patient data and usage of untied funds was found. Existing behavioral compliance was found to be optimal. These findings were in alignment with PS findings. Conclusion: Results call for PHC capacity building, incentivization and a crucial need to look into PS side, before passing judgement about performance standard. 2020, Indian Association of Preventive and Social Medicine. All rights reserved. -
Energy-based features for Kannada handwritten digit recognition
In this paper, Kannada handwritten digit recognition system is proposed based on energy features. Ground truth datasets are not available to test the performance of proposed features. Hence, own dataset of Kannada handwritten digits are collected from schools, colleges, business persons and professionals. The digital images are pre-processed using morphological opening operation for removing the noise and bilinear operation is used for normalisation. The normalised image is divided into 16 blocks, and then wavelet filters were applied for each of the 16 blocks and computed the standard deviation for each of them. In this process, a total of 64 standard deviation of the wavelet coefficients are generated of which 48 coefficients are selected as potential features. The average recognition accuracy of 94.80% is achieved using nearest neighbour classifier. The proposed algorithm is free from skew and thinning and it is novelty of the paper. Copyright 2020 Inderscience Enterprises Ltd. -
Scalar multiplication based matrix public key cryptography
In this work, a matrix key is used as Global Parameter. The work is considered for a large prime number which constitutes the field. A random integer is considered as private key and the Global matrix is exponentiated by the private key to generate public key. The process supports for Security features like authentication and confidentiality which are the necessary services for encryption process. Since the process supports Discrete Lagorithm problem, which is a hard problem it supports sufficient security against crypto analysis. In this work, instead of doing direct exponentiation of matrix key to the power of integer (Private Key), the study focuses on different scalar multiplication techniques that can be performed on matrix key during its exponentiation process to reduce the amount of computing resources for the completion of the process. 2020, Institute of Advanced Scientific Research, Inc.. All rights reserved. -
Effects of supply chain integration on firms performance: a study on micro, small and medium enterprises in India
The cooperation in the supply chain assumes an adequate job for enhancing an organisation's performance and increasing competitive advantage. Supply Chain Integration (SCI) affects organisational performance. This paper studies the impact of the integration of supply chain procedures and practices on organisational performance and explores the effect of SCI on organisational performance at Micro, Small and Medium Enterprises (MSMEs) in Madurai District, Tamilnadu, India. A questionnaire is developed with validated measurement scales from previous studies and empirical data are collected through a survey questionnaire from 250 randomly selected MSMEs. This research provides sound recommendations to MSMEs in Madurai District, Tamilnadu, India, and maybe used for different industries and decision making policies. Finally, the study will contribute to the scientific field by providing some future studies. 2020 by the authors; licensee Growing Science, Canada.