Browse Items (11808 total)
Sort by:
-
Novel super stack passivation in AlGaN/GaN HEMT for power electronic applications
A super-stack passivation technique is proposed for an AlGaN/GaN HEMT in order to improve the breakdown voltage and cutoff frequency. The performance of the proposed technique is benchmarked against a conventional GaN HEMT. The analysis and investigation are carried out using Technology Computer-Aided Design (TCAD). The simulation results are validated with experimental data. It is observed that the breakdown voltage of the conventional and proposed devices is 356V and 449V, respectively. In contrast to the conventional device, the breakdown voltage of the proposed device is improved by 21%. This is the manifestation of the suppression of the electric field by the super-stack passivation technique in the proposed device. Furthermore, it is also observed that the Johnsons figure of merit in the proposed GaN-HEMT is also improved. 2024 The Author(s). Published by IOP Publishing Ltd. -
An Analytical Review on Data Privacy and Anonymity in 'Internet of Things (IoT) Enabled Services'
Nowadays, the Internet of Things (IoT) is an emerging technology, spreading all over the world so the number of devices is increasing day by day. So, the volume and data complexity has increased drastically in the past three years. The resultant system might contain a significant number of heterogeneous devices, posing integration and scalability issues that must be addressed. In such a situation, security and privacy are commonly regarded as a significant concern. On the other hand, user privacy, defined as the capacity to provide data protection and anonymity, must be protected, which is especially important when personal and/or sensitive information is involved. This paper presents the comprehensive survey, characteristics, and application of IoT and the immense number of challenges raced and faced during the implementation of IoT frameworks. 2021 IEEE. -
Cross Correlation Between Plasmaspheric Hiss Waves and Enhanced Radiation Levels at Aviation Altitudes
Enhanced radiation in the Earth's atmosphere can pose serious hazards to pilots, aircraft passengers, and commercial space travelers. Recent results have shown, statistically, that there is a strong correlation between dose rates observed by Automated Radiation Measurements for Aerospace Safety (ARMAS) instruments at aviation altitudes (>9km) and plasmaspheric hiss wave power measured by NASA's Van Allen Probes within the inner magnetosphere. Plasmaspheric hiss waves play a very important role in removing energetic electrons from the Earth's radiation belts by precipitating them into the upper atmosphere. These relativistic electrons generally drift eastwards along closed magnetic drift shells. In this study, we use magnetic conjunction events between ARMAS and the Van Allen Probes to analyze the causality between plasmaspheric hiss waves and enhanced radiation observed at aviation altitude. We specifically study how the size of the conjunction window and a shift in L and MLT of the conjunction window affect the correlation between dose rates and plasmaspheric hiss wave power. This is to determine if the observed enhanced radiation at aviation altitude is indeed caused by the plasmaspheric hiss waves in the inner magnetosphere. The results show that the enhanced radiation levels are only correlated with plasmaspheric hiss waves within conjunction windows of ?1 (Formula presented.) L (Formula presented.) 1 and 0 (Formula presented.) MLT (Formula presented.) 2. The correlation between dose rate and hiss wave power increases slightly if ARMAS is shifted approximately 1hr in MLT to the east of the Van Allen Probes, consistent with the drift trajectory of the electrons precipitating into the atmosphere. 2025. The Author(s). -
Experimenting with scalability of floodlight controller in software defined networks
Software Defined Network is the booming area of research in the domain of networking. With growing number of devices connecting to the global village of internet, it becomes inevitable to adapt to any new technology before testing its scalability in presence of dynamic circumstances. While a lot of research is going on to provide solution to overcome the limitations of the traditional network, it gives a call to research community to test the applicability and caliber to withstand the fault tolerance of the provided solution in the form of SDN Controllers. Out of existing multiple controllers providing the SDN functionalities to the network, one of the stellar controllers is Floodlight Controller. This paper is a contribution towards performance evaluation of scalability of the Floodlight Controller by implementing multiple scenarios experimented on the simulation tool of Mininet, Floodlight Controller and iPerf. Floodlight Controller is tested in the simulation environment by observing throughput and latency parameters of the controller and checked its performance in dynamic networking conditions over Mesh topology by exponentially increasing the number of nodes. 2017 IEEE. -
Scalability of software defined network on floodlight controller using OFNet
Software Defined Network is the thriving area of research in the realm of networking. With growing number of devices connecting to the global village of internet, it becomes inevitable to adapt to any new technology before testing its scalability in presence of dynamic circumstances. While a lot of research is going on to provide solution to overcome the limitations of the traditional network, it gives a call to research community to test the competence and applicability to hold up the fault tolerance of the solution offered in the form of SDN Controllers. Out of the accessible multiple controllers with enabled the SDN functionalities to the network infrastructure, one of the best choice in controllers is Floodlight Controller. This research article is a contribution towards performance evaluation of scalability of the Floodlight Controller by implementing dual scenarios implemented, experimented and analyzed on the emulation tool of OFNet. Floodlight Controller is tested in the emulation environment by observing eight different parameters of the controller and checked its performance in scalable networking conditions over linear topology by gradually increasing the number of nodes. 2017 IEEE. -
Ryu controller's scalability experiment on software defined networks
Software defined networks is the future of Computer networks which claims that traditional networks are getting replaced by SDN. Considering the number of nodes everyday connecting to the global village of internet, it becomes inevitable to adapt to any new technology before testing its scalability in presence of dynamic circumstances. While a lot of research is going on to provide solution as SDN to overcome the limitations of the traditional network, it gives a call to research community to test the applicability and caliber to withstand the fault tolerance of the provided solution in the form of SDN Controllers. Out of the existing multiple controllers providing the SDN functionalities to the network, one of the basic controllers is Ryu Controller. This paper is a contribution towards performance evaluation of scalability of the Ryu Controller by implementing multiple scenarios experimented on the simulation tool of Mininet, Ryu Controller and iPerf. Ryu Controller is tested in the simulation environment by observing throughput of the controller and checked its performance in dynamic networking conditions over Mesh topology by exponentially increasing the number of nodes until it supported tested on high end devices. 2018 IEEE. -
School alienation in online schooling scale (SAOSS): development of a measure to assess school alienation among students
This study reports on developing and validating the School Alienation in Online Schooling Scale (SAOSS). School alienation in online schooling is conceptualized as opposed to school belonging and the main reason for minimal participation, reduced educational benefits, and school dropout in school aged-children, especially during the online learning forced due to the COVID-19 Pandemic. This study includes three phases. The first study included item generation and analysis. After the initial analysis, 13 items from the tool were retained. In the second study, exploratory factor analysis was conducted. Two factors emerged from principal component analysis (PCA). In the third study, we investigated the confirmatory factor analysis of SAOSS with a sample of urban students in Iran (grades 79, n = 317). The SAOSS has important implications for researchers, school counselors and psychologists, policymakers, and stakeholders. Implication for theory, practice and future research is discussed. 2024 International School Psychology Association. -
Student Subjective Wellbeing amidst the Covid-19 Pandemic in Iran: Role of Loneliness, Resilience and Parental Involvement
The COVID-19 pandemic and lockdowns potentially severely impact adolescents mental well-being. This research aims to study students subjective well-being during the covid-19 pandemic in Iran and investigate the role of loneliness, resilience, and parental involvement. For this study, 629 students (female = 345) were recruited by purposive sampling. Students were assessed on the Students Subjective Well-Being, Loneliness Scale, Resilience Scale, and Parental Involvement. The results confirm our hypothesis that the relationship between parental involvement and students subjective well-being is mediated by loneliness. Furthermore, the results indicated a partial mediation of resilience in the relationship between parental involvement and students subjective well-being. This study theoretically contributes to a better understanding of the factors determining the impact of traumatic events such as a pandemic on adolescents mental health. The implications of this study indicate interventions that can be carried out to minimize the negative psychological consequences of the pandemic. 2022, The Author(s), under exclusive licence to Springer Nature B.V. -
A Novel Technique for Magnetic Particle Separation Using Current-Carrying Slotted Plate
In this paper, a novel method for separating and trapping different magnetic particles is presented. Changes in the current-carrying structure yield disturbing the generated magnetic field. Here, slots were innovatively crafted on the current-carrying plate positioned beneath the microchannel, resulting in a non-uniform magnetic field distribution. This breakthrough enables the separation of different particle types using a constant and low electric current for the very first time, leading to a significant advancement in the field. More importantly, this proposed technique offers several advantages, including the generation of low levels of current and heat, ease of construction, and the ability to control the magnetic field produced by the electric current. In this study, the capability to effectively separate various particle types using a constant electric current was demonstrated with a remarkable separation efficiency of about 100%. By applying a 100[mA] electric current to the plate that carries electric current, the separation of two particle types M-450 and M-280 was achieved at a velocity of 2[?m/s]. 2024 IEEE. -
One Time Password-Based Two Channel Authentication MechanismUsing Blockchain
Using Fog Nodes, also known as IOT devices are increasing everyday with more and more home automation, industry automation, automobile automation, etc. Security threats for these devices are also increasing. One of the threats is impersonating one fog node, stealing data and taking control of the network which is also known as the Sybil attack. To provide security, most fog devices use one step or two step authentication and sometimes use encryption. With static passwords, there is a chance of compromise by password sharing and leaking. Some weak encryption algorithms used are also compromised. Data about fog nodes in the network is stored in a weak database and is tampered. OTP-based Two Channel Authentication Mechanism (OTPTAM) to authenticate the fog nodes with metadata stored in Blockchain Database and communicate using channels encrypted with Elliptical Ciphers can solve the majority of these problems. Metadata of the nodes like Bluetooth MAC address, network mac address, telephone number are all stored in the blockchain and the OTP is exchanged via these channels to ensure the authenticity of the fog nodes. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Deep Learning for Early Detection of Tomato Leaf Diseases: A ResNet-18 Approach for Sustainable Agriculture
The paper explores the application of Convolutional Neural Networks (CNNs), specifically ResNet-18, in revolutionizing the identification of diseases in tomato crops. Facing threats from pathogens like Phytophthora infestans, timely disease detection is crucial for mitigating economic losses and ensuring food security. Traditionally, manual inspection and labour-intensive tests posed limitations, prompting a shift to CNNs for more efficient solutions. The study uses a well-organized dataset, employing data preprocessing techniques and ResNet-18 architecture. The model achieves remarkable results, with a 91% F1 score, indicating its proficiency in distinguishing healthy and unhealthy tomato leaves. Metrics such as accuracy, sensitivity, specificity, and a high AUC score on the ROC curve underscore the model's exceptional performance. The significance of this work lies in its practical applications for early disease detection in agriculture. The ResNet-18 model, with its high precision and specificity, presents a powerful tool for crop management, contributing to sustainable agriculture and global food security. (2024), (Science and Information Organization). All Rights Reserved. -
Exploring Caregiving Experiences and Needs of Mothers of Children with Cerebral Palsy
Parents play a major role while caring for a child with Cerebral Palsy (CP). Each child with CP and their caregivers needs constant professional support in terms of medical care, psycho-education, guidance and support in order to achieve maximum functioning. Mothers of children with cerebral palsy are vulnerable because the caregiving may affect their personal and marital life, work, finances, relationships, and other responsibilities. Therefore, it is important to understand their experiences this study explores caregiving experiences and needs of mothers of a child with cerebral palsy. This qualitative exploratory study used semi-structured open-ended interviews for data collection from 25 mothers of children with Cerebral Palsy who attended regular clinical assessments at Unit of Hope OP clinic. The data were analyzed in Atlas. ti 8 trial version using thematic analysis. Six major themes emerged from the thematic analysis which includes: pathways of care, challenges in taking care of the child, impact (subjective and objective) on mothers and their family, coping mechanism and psycho-social needs. Mothers expressed that they experience unpreparedness; unsupportive interaction; insecurity/uncomfortable on caregiving by others; challenges in decision making, finding the right care, meeting individual family member???s needs; they had inappropriate expectations of improvement, difficulties in treatment adherence and lack of knowledge, lack of respite, lack of support from family members/relatives, changes in the family system, changes in personal life. Mothers had caregiver burden and emotional challenges. The mothers adopted both maladaptive and adaptive coping strategies. In this study, mothers expressed various needs like the need for professional support, the need for respite care, and the need for family support. In conclusion, having a child with cerebral palsy negatively affect the mothers. During the caregiving process, they have some unmet needs which need to be addressed. The findings of the study emphasize that it is important to understand the caregiving experiences and needs of mothers of children with cerebral palsy to plan interventions to support these mothers in caring for their child. -
Detecting Cyberbullying in Twitter: A Multi-Model Approach
With cyberbullying surging across social media, this study investigates the effectiveness of four prominent deep learning models - CNN, Bi-LSTM, GRU, and LSTM - in identifying cyberbullying within Twitter texts. Driven by the urgent need for robust tools, this research aims to enrich the field of cyberbullying detection by thoroughly evaluating these models' capabilities. A dataset of Twitter texts served as the training ground, rigorously preprocessed to ensure optimal model compatibility. Each model, CNN, Bi-LSTM, GRU, and LSTM, underwent independent training and evaluation, revealing distinct performance levels: CNN achieved the highest accuracy at 83.10%, followed by Bi-LSTM (81.90%), GRU (81.73%), and LSTM (16.07%). These differences highlight the unique strengths of each architecture in analysing and representing text data. The findings highlight the CNN model's superior performance, indicating its potential as a highly effective tool for Twitter-based cyberbullying detection. While the deep learning models explored here offer promising avenues for detecting cyberbullying on Twitter, their performance highlights the complexities inherent in this task. The limited space of tweets can often obscure the true intent behind words, making accurate identification a nuanced challenge. Despite this, the CNN model's robust performance suggests that carefully chosen architectures hold significant potential for combating online harassment. This research paves the way for further explorations in harnessing the power of AI to create a safer and more civil online experience where respectful communication can flourish even within the constraints of concision. 2024 IEEE. -
India's Consumer Protection Bill 2015: Redefining notions of liability
The legislative validation of the concepts of product liability and unfair contractual terms through the Consumer Protection Bill (CPB) paves the way for attuning Indian consumer laws with the global wavelength. Though the Indian judiciary has dealt with issues concerning product liability and unfair contractual terms, legal certainty has remained elusive, necessitating predictability. The extension of consumer protection to the domain of e-commerce further reformulates the existing notion of liability and the prevalent impunity. This paper analyses the manner in which the CPB redefines the notions of liability and the existent lacunae that need to be remedied. The Author 2017. Published by Oxford University Press. All rights reserved.