Browse Items (667 total)
Sort by:
-
Risk Factor Based Stage Advancement Prediction of Cataract Using Deep Learning Techniques
In modern world, Cataract is the predominant causative of blindness. Treatment and detection at the early stage can reduce the number of cataract sufferers and prevent surgery. Two types of images are generally used for cataract related studies- Retinal Images an Slit lamp Images. The quality of Retinal images is selected by utilizing the hybrid naturalness image quality evaluator (hybrid NIQE-PIQE) approach. Here, the raw input image quality score is and Deep newlinelearning convolutional neural network (DCNN) categorizes the images based on quality newlinescore. Then the selected quality images are again pre-processed to remove the noise present in the images. The individual green channel (G-channel) is extracted for noise filtering. Moreover, hybrid modified histogram equalization and homomorphic filtering (Hybrid GMHE-HF) is utilized for enhanced noise filtering. The Slit lamp image quality selection is done using Blind/Referenceless Image Spatial Quality Evaluator (BRISQUE) model. Further a new algorithm Normalization based Contrast limited adaptive histogram equalization (NCLAHE) is used for image enhancement. Images are pre-processed utilizing the wiener filtering (WF) with Convolutional neural network (CNN) with adaptive atom search optimization (CNN-AASO) for removing the noise. Further, the denoised image is enhanced by Gaussian mixture based contrast enhancement (GMCE) for contrast enhancement. The cataract detection and classification is performed using two phases. In phase I, the cataract is detected using Deep Optimized Convolutional Recurrent Network_Improved Aquila Optimization (Deep OCRN_IAO) model. Phase II uses slit lamp images and detects the type and grade of cataracts through proposed Batch Equivalence ResNet-101 (BE_ResNet101) model.This work also proposes the risk factors for cataracts and classify the cataracts risk using deep learning models. The dataset is pre-processed by missing values and the string values are converted into numeric values. -
Classification of Alzheimer's Disease Stages Using Machine Learning Techniques
Alzheimer s disease (AD) is a type of mental disorder which deteriorates the normal functioning of human brain by reducing the memory capacity of an individual. Age is the most common factor for AD and this disease cannot be reversed or stopped. Doctors can only treat the symptoms of AD which include personality changes and brain structural changes. Analyzing neuro-degenerative disorders, neuroimaging plays an important role in diagnosing subjects with AD and other stages of AD. The proposed research identified this gap and using MRI and PET newlineimages for recognizing AD in its early occurrences by the professionals. This helps in tailoring an appropriate treatment procedure for treating AD. As per literature survey, many researchers have worked with convolutional methods like inbuilt skull stripping with two or more conversions and classified with different CNN architectures. The proposed research experimented advanced skull stripping method and classified using deep learning architectures. This research emphasizes the implementation of ResNet50 architecture with T1 weighted MRI and Amyloid PET images for detecting the abnormalities in the brain patterns based on the image attributes. For the proposed experiment, a total of 5000 T1 weighted MRI data and 3000 newlineAmyloid PET data were used. The collected images were pre-processed with noise removal newlinetechniques and skull stripping method. The ResNet50 is used to classify AD from the data newlineobtained from the ADNI dataset. Pre-processed images /data were fed to the tuned for three class classification on ADNI image data at 200 Epochs shows the accuracy of 97.3% for T1 weighted MRI data and 98% for Amyloid PET data. The experimental results of the proposed model prove that it classifies the images according to various stages with better accuracy than the other existing models by achieving excellent results. -
Understanding Nonsense Verse : A Study of Select Works of Sukumar Ray
Among all the literary genres created and cultivated over the ages, Nonsense verse newlineperhaps emerges as one of the most challenging to comprehend. Nonsense verse often employs subversion (language, syntax, logic, etc.) as its tool and usually leaves the readers in a state of confusion. A look into the limericks of Edward Lear would bear newlinetestimony to this fact. For readers and researchers, the quest for meaning has newlineunravelled many literary and philosophical pursuits. One such possibility, therefore, newlinecould be the attempt to comprehend and critically analyse the unique literary genre newlinetermed Nonsense verse. From the multiple understandings and debatable definitions newlineof verse forms, one striking and rare genre evolves into nonsense poetry. Following newlinethe cue, this thesis purports to seek sense and meaning from what is labelled newline nonsense . It depicts that the functionality of existing, creative stylistics in language newlineand understanding and the text s contextual placement bring out the sense in nonsense. As Edward Lear mastered this art form in the West, Sukumar Ray crafted this genre in India, though he was not the only one. The thesis traces the evolution of nonsense verse in India, literary and folk, to understand the possible functionality of this genre as it exists in India. As the study shows, the writer who made the most contributions to this evolution was Sukumar Ray. Therefore, understanding the evolution and function of Indian nonsense verse become the object of the study, and an in-depth, contextual study of the select poems of Sukumar Ray, the national pioneering writer of nonsense, becomes the subject. This research attempts to unearth a fresh approach to re-evaluating the function of nonsense verse and possibly confer upon it a more considerable eminence. The thesis aims to provide comprehension and newlinecredibility to the genre through the study of select works of Sukumar Ray. -
Symbols as Photographic Texts in the Travel Narratives of Paulo Coelho
Brazilian writer Paulo Coelho de Souzas The Pilgrimage, The Alchemist, Zahir, Aleph and Hippie are known for using literary symbols to describe journeys where the protagonists travel to different destinations searching for something valuable. The author resorted to multiple religions, cultures, traditions, mythologies and folklore to derive inspiration to use those symbols and frame his philosophical thoughts. As the symbols used by Coelho can be deciphered in whatever way subject to personal interpretations, one way of understanding them can be from the perspectives of their already established meanings in religions, cultures, traditions, mythologies and folklore. Such a way of understanding limits the possible meanings that can be derived from those symbols. Moreover, another sign system is known for conveying limited meanings, usually called photographs. Though absolute material accuracy is seen as the hallmark of photography, the meaning of photographs also depends upon their interpretations, and photographic truth is considered a myth. Still, photographs possess documentary properties and convey limited meanings to a large extent. This thesis studied the idea of photography, defining the same by understanding the historical developments in photography over time. Knowing the definition and properties of photographs, it looked at how photographs convey limited meanings and exhibit 'iconic' properties in general. After isolating and studying the literary symbols used by Coelho in the five travel narratives mentioned above using the Peircean model of semiotic analysis, the thesis concludes that symbols act as photographic texts to a certain limit in the five novels, as they tend to move towards becoming 'iconic' from 'symbolic' if understood from the perspectives of their existing meanings in religions, cultures, traditions,mythologies and folklore. -
A Frame Work For Continous Indian Sign Language Recognition Using Computer Vision
Sign language is a non-vocal, visually oriented natural language used by the hearing newlineimpaired and the hard-for-hearing part of society. It combines multiple modalities newlinelike hand movements, facial expressions and body poses. Static gestures involve basic finger movements such as numbers and alphabets, dynamic signs include words, and a sign sentence consists of grammatically connected and meaningful dynamic words. Sign Language Translation (SLT) models have been an actively evolving research topic under computer vision. One of the most challenging aspects in earlier iterations of SLTs was accurately capturing the intricate and constantly changing hand movements and facial expressions characteristic of sign language. newlineHowever, the advent of deep learning models has facilitated significant advancements in the field, particularly in the realm of continuous sign language translation. newlineThe research endeavours to develop a lightweight deep-learning framework newlinespecifically tailored for the translation of Indian Sign Language (ISL) into text and newlineaudio. The proposed framework introduces two collaborative deep-learning components that extract and classify features synergistically. The ISL video sequence serves as the input, which undergoes feature extraction utilizing the Inception V3 architecture, enabling the extraction of features from each frame. Classification models tend to be bulky and intricate, consuming substantial memory space and requiring extended training periods. This challenge has been addressed by introducing a lightweight LSTM model, which effectively utilizes the feature map generated by the Inception model for accurate classification. It is important to note that each sign possesses unique characteristics yet exhibits similar feature maps. The performance of the framework is assessed based on the speed and accuracy achieved in converting the input video into text and audio formats. -
Hybrid Intrusion Detection Technique for Internet of Things
The rapid expansion and integration of Internet of Things (IoT) applications in newlinevarious aspects of daily life has significantly surprised and impacted contemporary society. The most crucial keyword concerning these applications is security, specifically, in the enormous amount of data generated every second, and how it is used. These applications are vulnerable to various attacks, which could result in an unthinkable catastrophe if not managed and controlled with sufficient foresight. Growing concerns about data security in the expanding IoT landscape are driven by factors such as increased vulnerability of devices to viruses, susceptibility to denial-of-service attacks, and heightened risk of intrusion attempts. To prevent such occurrences, stronger precautions should be taken, enabling system developers and manufacturers of IoT devices to enhance their approaches to better security mitigation. It is essential to identify all potential threats and vulnerabilities that are created explicitly for IoT infrastructures. It is believed that to lessen potential dangers, there is a need for more significant research on security attacks. Security difficulties have been found and must be dealt with, so they may be avoided. Further research must address security challenges in IoT-based environments, particularly for suppliers and consumers, to gradually raise the reliability of IoT applications. Although many conventional methods are still used, there might be superior options for devices with limited resources. Artificial intelligence plays a significant role in this issue. newlineThis research first tries to comprehend how machine learning methods relate to attack newlinedetection. The effects of different machine learning techniques are evaluated using the newlineUNSW-NB 15 dataset. Additionally, it has been found that each model performs worse overall, mainly when security issues are present. As a result, real-time datasets and Deep Learning (DL) algorithms for intrusion detection in the IoT need to be prioritized. -
A Study on Domination in Signed Graphs
Signed graphs, which represent the positive and negative interactions between networks, have gained signifcant attention in various felds, particularly social network analysis. Domination, a fundamental concept in graph theory, is important in understanding the structural characteristics of graphs and determining the minimum number of vertices needed to cover the entire graph. However, research on domination in the context of signed graphs has been limited, with most studies focusing on graphs. This thesis explores a variant of domination called restrained domination in signed graphs and investigates the characteristic properties of these signed graphs in relation to the restrained domination number. Throughout the thesis, we establish exact values and bounds for the restrained domination number in diferent classes of signed graphs. Additionally, we examine the restrained domination property in various derived signed graphs, including the line signed graph, semi-total point signed graph, semi-total line signed graph, and total signed graph. Additionally, we study criticality concepts associated with the restrained domination number in signed graphs. Specifcally, we analyze the efects of removing edges or vertices from signed graphs, as well as adding edges in signed graphs, on the restrained domination number. Further, we extend the concept of restrained domination number to encompass various variants, namely connected restrained domination number, restrained double domination number, and total restrained domination number for signed graphs. We derive relevant results and newlinefindings for these parameters, contributing to a deeper understanding of domination newlinein signed graphs. -
The Culinary Space : Reading Food and Identity Intersections in Select Narratives
This study focuses on select fictional narratives with food mentions at the peripheries to enquire into the textualisation of food that exhibits the existence of an enunciative culinary newlinespace wherein the nuances of individual and collective identities are negotiated. The culinary space is conceptualised by considering the defined and built physical space wherein activities associated with the culinary realm occur and the imaginative space created through the presence and absence of food. This culinary space interacts with mobility, which serves as the newlinelinking idea that ties together Anita Nair s Ladies Coup(2001), Bharti Kirchner s newlineDarjeeling (2002), Monica Ali s Brick Lane (2003), Kunzang Choden s The Circle of Karma newline(2005), and Manjushree Thapa s Seasons of Flight (2010), and informs these specific newlinetextualisations of food and prompts the need to focus on the representations of everyday lived experiences. This study reads the chosen narratives to enable a reading that is distinct from the conventional one of culinary narratives centred on food and establishes that the textualisation of food in narratives with food at the peripheries is an important site of investigation. This close reading through an approach directed by concepts from food studies and select notions from space and mobility looks into how the culinary space serves as the site of defining and re-imagining of individual and cultural identities of the characters through memories of food and relations to and through food. These insights add to the existing discourses on identity by looking into the textualisation of food shaped by notions of newlinespace and mobility to show that the transformative quality of food is reflected in the dynamism of the culinary space that endorses the same in the negotiation of identities that are explored, perceived, and projected within. -
Exploring The Multifaceted Benefits Of Strobilanthes Jomyi P. Biju, Josekutty, Rekha & J. R. I. Wood : A Comprehensive Pharmacognostic Investigation On Its Medicinal And Insecticidal Properties
Plant-based medication, is an established practice in Indian medicine, initially newlineinvolvedin the direct use of raw plant parts for treating various health conditions. Later, valuable components are identified, isolated, and utilized to treat diseases. The newlineStrobilanthes Blume genus has a rich therapeutic history around the globe, especially in countries such as India, China, Myanmar, and Thailand. Strobilanthes jomyi, a recently identified species found in Kerala, India is still in wide use by tribal communities in the Kasaragod district for wound healing. This study aimed to evaluate the microscopic, macroscopic, organoleptic, fluorescent, physicochemical, mineral composition, phytochemical, Gas Chromatography Mass Spectrometry, antioxidant, anthelmintic, insecticidal, antimicrobial, and cytotoxicity activities of S. jomyi leaves, stem, and root. The different vegetative parts were subjected to Soxhlet extraction using methanol as a newlinesolvent and analysed using standard Protocols. Macroscopic andmicroscopic examinations revealed non-glandular trichomes and paracytic stomata in the leaves, raphides in the stem and petiole, and tannin cells in the root. Cystoliths were observed only in the petiole. Powder analysis exhibited the presence of fibres, trichomes, palisade cells, spiral xylem vessels, bordered pit vessels, and raphides. The leaves contained higher phenolics, flavonoids, carbohydrate, protein, proline, and chlorophyll content compared to the root and stem. The methanolic extract of leaves showed higher antioxidant activities than the root and stem. GC-MS analysis identified bioactive compounds such as 2,4-di-tert-butyl phenol, phytol,squalene, phenol, neophytadiene, and lupeol in the root, stem, and leaves. All vegetative partsof S. jomyi exhibited excellent anthelmintic activity, with the highest newlineobserved in the leaves, followed by the root and stem. Insecticidal activity was only newlineobserved in the leaf extract. Anti-microbial and anti-cancerous activities were remarkable newlineacross all vegetative parts. -
The Mediating Role of Perceived Stress in the Relationship Between Gratitude and Well-Being among Information Technology Professionals
The information technology (IT) industry in India is an integral part of the nation s economy. Yet, IT professionals encounter a profusion of mental health challenges and well-being issues. This study explored, how can optimal experiences of well-being be determined among IT professionals? It adopted a narrative style of literature review as the principal objective of this review was to comprehend the well-being issues among IT professionals and to develop a conceptual framework. From the perspective of positive psychology, the study addressed the research lacuna by investigating the effect of gratitude on the professionals newlineperception of stress and well-being. It comprehended the professionals self-reflected aspects of stress and coping methods. The principal objective of this study was to investigate the mediation effect of perceived stress in the relationship between gratitude and well-being. The newlineinfluence of socio-demographic factors on perceived stress and the well-being differences based on self-reflected stress severity were also examined. Data from 421 participants were included for analysis in this mixed method research study. The data collection tools included: emotion subscale in the multi-component gratitude measure, perceived stress scale, subjective newlinehappiness scale, psychological capital questionnaire, anxiety and depression subscales in the mental health inventory, and fatigue assessment scale. Findings indicated that perceived stress fully mediated the gratitude well-being relationship. Furthermore, the results showed that certain socio-demographic variables influenced perceived stress. In addition, it was found that the professionals who conveyed that they encountered high stress, experienced lower well-being. This study contributes to the human-machine system by extending research on the emotions in software professionals. -
Impact of Adoption of Account Aggregator Framework In India
Open banking is closely associated with the Account Aggregator (AA) concept, enabling customers to securely and selectively authorise third-party providers to access their financial information. The AA framework works in tandem to protect client data while facilitating secure data transmission among authorised parties, promoting competition and innovation in the banking industry, and allowing clients to access and use financial services through various channels and platforms. Open banking can increase financial inclusion by allowing third-party developers to access customer data and construct new financial products and services on top of existing bank infrastructure. It can also encourage innovation and competition in the Indian banking sector, which would benefit customers in the long term. Open banking systems face significant challenges, such as weak security, data protection violations, money laundering, and terrorist funding risks. It is crucial to couple the widespread adoption of open banking frameworks with robust data protection and privacy legislation to safeguard customer data and financial information. India is adopting the Personal Data Protection Bill 2019, which proposes establishing a specialized. Data Protection Authority tasked with securing persons' data. Operational and cyber security hazards associated with open banking include data leaks, misuse, falsification, denial of service attacks, and infrastructure failures. To ensure compliance with these laws, financial institutions must implement mechanisms to monitor and manage risks related to open banking. The Reserve Bank of India (RBI) has developed the Data Empowerment and Protection Architecture (DEPA) to provide secure and privacy-protected access to personal data. DEPA includes data sharing agreements, consent management, and authentication for third-party developers. While unique to India, DEPA shares similarities with the European Commission's efforts to promote open banking and open finance in the European Union through the Payment Services Directive 2 (PSD2). PSD2 mandates that banks across all EU member countries provide API access to third-party payment account information and services. The study highlights the importance of perceived ease of use, trust, and utility in shaping people's attitudes and intentions towards an open banking fram ework. Interestingly, risk has a minimal impact on user adoption. This finding offers valuable insights to developers and marketers, indicating the need to prioritise user-friendly, trustworthy, and effective technologies while mitigating perceived risks to maximise adoption and customer satisfaction. This study attempts to understand better the influence of implementing the Account Aggregator Framework in India, and the sample size chosen comprised clients of the account aggregator framework in India. -
Design And Development Of Artificial Intelligence Based Knowledge Management System For Managing Software Security Vulnerabilities
Software development practices play a signifcant role in building the world s future. It is the place where exciting technological evolution begins in the world. Exploration of critical challenges in the area of software development plays a signifcant role in fueling the pace of technological progression in the industry. This work focuses on exploring important areas of software development practices and problems faced by the industry. Understanding the critical parts of the software system development eco-system and the stakeholders associated with those will be important. Customers of software development teams, the software development industry and knowledge newlinesources, and the software development internal eco-system are the broad focus areas of study. Leveraging the data already spread across the eco-system and facilitating easy newlineaccess to practitioners as and when there is a need will be one of the primary focuses. newlineThe software development landscape module, customer landscape module, and industry landscape module are the key modules that will be explored in this work. The core aspiration of the work will be to integrate all the possible data across the industry newlineand process the same and make it easily accessible to the practitioners as and when they are needed. The process also makes the data smarter and more insightful over time. -
Exploring Determinants of User Generated Context : A Consumer Behaviour Perspective
The advances in digital technology and the Internet have accelerated the growth of the online ecosystem. The ease of access to the Internet by the masses has ensured phenomenal expansion among online users. The past decade newlinewitnessed tremendous growth of online applications, platforms and apps that are newlinehelping to solve complex human needs. The online ecosystem itself witnessed newlinetremendous change, while static information sources have been replaced with dynamic ones that allow online users to participate in the system. The vast information society has transformed from being just the consumer of information to the participant in the generation of the information source. Business finds the exponential growth of online users and their active participation as an opportunity. Business benefits by sensing the market trends quickly in a better newlineway and take timely remedial actions. newlineDespite immense benefits offered by the online mode of business, many challenges have surfaced in recent times on account of ever-increasing technological sophistication and exponential growth of unique and similar newlineproduct offerings and associated reviews. The presence of many similar product offerings and associated reviews creates a technology-induced hurdle, with the potential to impair the rational thought process of consumers, who often search, scan and vote for only the top few reviews of selected products. This has the potential to make aged reviews continuously accumulate votes over time and newlineretain their near top position in the helpful review list, compared to recent quality newlinereviews. The current study applies statistically and scientifically derived newlinehelpfulness scores for ranking reviews and placing them at their appropriate positions. The study derived helpfulness scores enable re-ranking reviews of consumer products. The initial review dataset is constructed from publicly available reviews in Amazon.in. -
Synthesis of Thiazines, Thiazinones and N-Cycloalkyl Azoles Via Novel Synthetic Routes
Heterocyclic building blocks have gained the utmost importance in recent past on the newlineaccount of their significance in biological and pharmaceutical fields. Among these newlinenitrogen and sulphur containing heterocyclic building blocks such as thiazines, newlinethiazinones and N-cycloalkyl heterocyclic motifs hold an important role in medicinal newlinechemistry. Thiazine cores are used for the treatment of various life threating diseases newlinelike cancer, cardiovascular and fabry diseases. Drugs containing thiazinone cores were used to treat Parkinson, Alzheimer s and various neuro degenerative diseases. Ncycloalkyl azole motifs are used to treat various life threating cancers like neck, lung, prostate, breast etc. As per the literature review, synthesis of these motifs are done using multi steps and harsh conditions, which limited the substrate scope. In this thesis we describe our studies on development of one pot, mild condition for newlinesynthesis of thiazinone cores using P(NMe2)3 (HMPT). We had developed HMPT [P(NMe2)3] mediated reactions towards synthesis of Carbon-Nitrogen/Carbon-Sulphur bond. The developed methodology was extended for thiazine cores as well. This new synthetic methodology is useful to synthesize various N, S-heterocycles including the novel spiro molecules. HMPT reagent under the mild and aerobic reaction conditions provided the access for many manifold immense molecules. Molecular docking studies were conducted for the synthesized compounds considering MOA-B inhibitors as target. MOA-B inhibitor motifs were approved for the treatment of Parkinson illness. The synthesized thiazine and thiazinone molecules showed good binding affinity in molecular docking studies conducted. We had developed a new strategy using T3P (1-Propanephosphonic anhydride, ~ 50 % wt, in EA solution) mediated synthetic procedure for the synthesis of N-cycloalkyl newlineazoles. -
Intelligent Information Retrieval Model for Digital Documents in Title Insurance
Documents have been pivotal in shaping human history by preserving knowledge and newlineenabling the transmission of ideas across generations and cultures. They have facilitated the establishment of legal systems, institutions, and governance, fostering societal order and progress. Additionally, documents serve as a collective memory, chronicling the achievements and lessons learned, enriching the human experience. Transforming documents from physical to digital format has revolutionized how we access, store, and share information in the digital age. This transition, enabled by technological advances, began with the invention of the scanner, which allowed for newlinethe digital capture of images and text. Optical Character Recognition (OCR) technology that can convert scanned documents into searchable, editable digital texts further streamlined this process. As the storage capacity and internet speeds have increased, digitization has become more accessible and widespread. Cloud-based storage solutions, such as Google Drive and Dropbox, now allow users to store, access, and share digital documents from anywhere with an internet connection. This has improved collaboration and communication and reduced the need for physical storage space. The digitization of documents has also significantly impacted the environment, with paper consumption decreasing and many industries carbon footprint reducing. Libraries and archives have transformed digitally, making vast information more easily accessible and preserving vital historical records for future generations. This digital shift has democratized knowledge, granting people worldwide access to resources that were once limited newlineto those with physical proximity to the material. -
Divergent Synthesis of Azole Tailored Compounds and Their Biological and Photoluminescence Applications
Producing a library of diverse compounds with minor structural differences can provide newlinevaluable information related to the structure-activity relationship (SAR), which would not be possible by studying just one molecule. The main goal of the divergent synthesis approach is to efficiently create a collection of valuable compounds, which is different from the traditional methods of making compounds in a linear or convergent way. This approach, known as divergent synthesis, helps select the best compound from the group for its applications. In the newlinecurrent study, the focus is on synthesizing different types of azoles, such as Thiazole Schiff bases, fused tetrazoles, substituted imidazole, and 1H-tetrazoles, and exploring their potential uses in biological and photoluminescence studies. Several methods were utilized to synthesize the derivatives of azole compounds. The synthesized molecules were examined and identified using techniques like 1HNMR, 13CNMR, Mass spectrometry, and IR spectroscopy. After creating a library of molecules, they were evaluated for their potential applications in biology and photoluminescence. The most promising molecule was selected from the preliminary evaluation for further investigation. newlineThiazole Schiff bases were synthesized, and their photoluminescence properties were newlineinvestigated. Among the synthesized compounds, the bromo derivative showed the most promising results in developing fluorescent organic nanoparticles with versatile applications. The compound delivered exceptional results in aggregation-induced emission (AIE), viscochromism, detection of Al3+ions, pH sensing, latent fingerprint detection, and cell imaging. Synthesis of fused azole-derivatives was accomplished using the organo-catalyst 10- newlinecamphor sulfonic acid. Detailed optimization and mechanistic studies were conducted, along newlinewith evaluating the antifungal activity against Candida tropicalis ATCC 10231 for the newlinesynthesized compounds. -
Artificial Intelligence - Based Steganography Model for Social Media Data Set
Steganography, one of the data security mechanisms under our investigation, shields legitimate messages from hackers and spies by employing data hiding. Data protection is newlinecurrently the top priority due to the signifcant advancements in information technology due to high-security concerns. Traditional techniques for maintaining data confdentiality include steganography and cryptography; the distinction is that steganography does not naturally arouse suspicion, whereas cryptography does. Traditional linguistic steganographic methods suffer from limitations in automation, accuracy, and the volume of concealed text. The robustness and undetectability properties of these approaches also require improvement. Third-party vulnerability is often too high for conventional techniques to handle. Artifcial intelligence is increasingly replacing traditional model creation in steganography. Despite the fact that steganography ensures security, information sent over online social networks (OSN) is plainly not safe. Steganography along newlinewith encryption can make a difference with regard to privacy of information in transit. newlineThe research study aims to build algorithms or models and assess steganography s robustness, security, undetectability, and embedding ability. Two distinct types of data newlineconcealing employed for investigation: text and image. The results were encouraging newlinewhen we initially tested our Laplacian model using image steganography and compared newlinewith benchmark methods. The second experiment, which is based on AI, generates the cover text using secret information, examines the security and robustness of steganography. The study compared suggested text steganography model, 3-bit data concealing, with other existing techniques in order to ascertain the undetectability factor. The frst experiment used MATLAB tools, and the second used the markovify python module, RNN (Recurrent Neural networks), and the Huffman tree. Further format-based steganography methods utilized in the following experiment. -
Effectiveness of Classroom Interaction on English Language Production in Tamil Medium Schools in Coimbatore
The research study emphasized the importance of classroom interaction (CI) in English language classes for language learning among second language learners of English based on the interaction approach to language learning. The present study attempted to address the problem of students entering the tertiary level of education with dissimilar levels of English language proficiency due to the inequity in English language education among various types of schools in India. newlineThe main purpose of the study was to facilitate classroom interaction (CI) for newlineEnglish language learning in the context through the development of an Interactive Hour module and thereby providing opportunities for disadvantaged learners to be exposed to a graded target language and enabling them to produce the target language inside classroom spaces with corrective feedback on language use. The research was carried out in two phases using mixed methods research design in government-aided Tamil medium schools in the district of Coimbatore, newlineTamil Nadu, India. Phase I of the study, which was majorly qualitative in nature, was conducted to establish the need for the study in the context. It was aimed to Systematically present the actual teaching and learning scenario of English language classrooms in government-aided schools in Tamil Nadu in comparison to what is mentioned newlinein the national and state education policy notes and official documents related to newlineEnglish language teaching. The major objectives of phase I of the study were to newlineunderstand the pedagogic goals of English language teachers and their classroom newlineinteractional awareness and to observe and evaluate the nature and extent of classroom interaction in English language classes in the context of language policy and planning. -
After-Sale Service Failures and Their Influence on Customer Behaviour with Reference to Home Appliances
There are continuous technological advancements, and home appliance manufacturers have developed innovative products that make customer's life effortless. The increase in the purchasing power of the customers made the industry more competitive and put an extra burden on the manufacturers to adopt new technologies that help customers solve their problems and fulfil their needs. Firms face problems and challenges in the form of after-sale service failures. After-sale services are an integral part of home appliance products, and the companies can not avoid these while serving the customers. Although the after-service structure is rich in empirical studies on different service sectors like information technology, after-sale service failure, and consumer behaviour modelling in the home appliance have not been adequately investigated in Indian services. Previous researches have relied on understanding the services and their relation to either satisfaction or loyalty. Thus, they have been unable to disentangle the phenomenon of unfavourable reactions after an after-sale service failure from satisfaction and dissatisfaction. After-sale service is an essential component of customer behavioural outcomes. Therefore, businesses need to understand how after-sale service failures influence customer behaviour. Despite service superiority's importance, the home appliance industry lacks industry-specific, widely recognized instruments for after-sale service assessment. The primary goal of this study is to find major after-sale service failures and look at how these after-sale service failures affect customers, leading to unfavourable behavioural reactions. The study used a quantitative approach to understand the issue comprehensively. This research incorporated various after-sale service failure areas discussed and analyzed by previous research. It also discussed service theories and models (Expectancy Disconfirmation Paradigm, Justice Theory, Attribution Theory) related to failures and behaviours. However, this research focuses mainly on how these service failure areas lead to customer behavioural outcomes. Firstly, to know the major after-sale service failure areas, this study prepared the questionnaire based on the literature available on after-sale service failures and customers' reviews and their experience with the after-sale service of the home appliance companies. Data is collected from customers who have experienced after- sale service failures and their subsequent behaviour. The study analyzed the reasons for after-sale service failures, the types of failures that customers encounter, and the impact of these failures on customer behaviour, including their negative word of mouth, switching behaviour, willingness to recommend the brand etc. The findings of this study provided valuable insights into how businesses can improve their after-sale service and retain their customers. The study found seven major after-sale service failures that significantly impact customer behaviours. Unreasonable charges and policy clarity issues are the most significant service failures affecting customers, leading to negative behaviours. These findings show that different types of service failure elicit different reactions. The present study is one of the few empirical studies examining the links between service failures and actual behaviours in consumer durable after-sale service failures. -
A Study on Graph Colouring with Distance Constraints
In this dissertation, we have studied the variations of graph colouring based on distance constraints. For a given set T of non-negative integers including zero and a positive integer k, the L(T,1)-colouring of a graph G = (V,E) is a function c : V(G) and#8594; newline{0,1,2,...,k} such that |c(u)and#8722;c(v)| and#8712;/ T if the distance between u and v is 1 and |c(u)and#8722; newlinec(v)| and#8805; 1 whenever u and v are at distance 2. The L(T,1)-span, and#955;T,1(G) is the smallest positive integer k such that G admits an L(T,1)-Colouring. We have determined the newlineL(T,1)-span for some classes of graphs for set T whose elements are arranged in arithmetic progression. Further, for any general set T , we have found the bound for L(T,1)- span of a few classes of graphs. We use Python programming to colour certain classes of graphs concerning L(T,1)-colouring and fnd the value of L(T,1)-span. Next, we have explored equitable fractional open neighbourhood colouring, which is an extension of a specifc variation of L(h,k)-Colouring for h = 0 and k = 1. For a newlinepositive integer p, equitable fractional open neighbourhood colouring of a graph G is an newlineassignment of positive integers to the vertices of G such that for each vertex v and#8712;V(G), vertices of N(v) receives at least l1p|N(v)|m distinct colours and N(v) can be partitioned into k-classes V1,V2,...Vk such that ||Vi|and#8722; |Vj|| and#8804; 1 for every i and#824;= j and 1 and#8804; k and#8804; n. The minimum number of colours required to colour G such that it admits equitable fractional open neighbourhood colouring for a fxed p is called the equitable fractional open neighbourhood chromatic number, and#967;eq onc newlinep (G). We have studied some properties of equitable fractional open neighbourhood colouring and explored some classes of graphs which admit equitable fractional open neighbourhood colouring with land#8710;(pG)m colours. Further, we have introduced and examined a variation of perfect graphs, and#967;onc-perfect graphs, with respect to equitable fractional open neighbourhood colouring for the special case of p = 1.