Browse Items (11858 total)
Sort by:
-
DISTANCE SPECTRUM OF TWO FAMILIES OF GRAPHS
Let H1 and H2 be two copies of the complete graph Kn, n ? 3 with vertex sets V(H1) = {v1,v2...,vn} and V(H2) = {u1,u2,...,un}. Graph ?(n,p), 1 ? p ? n-1, is obtained from the union of graphs H1 and H2 by adding edges {uivi)|i ? {1, 2...,p}}. Graph ?(n) is obtained from the union of graphs H1 and H2 by joining each vertex vi of H1 to every vertex in {u1, u2, ..., un} \ {ui}, i = 1, 2, ..., n. The adjacency spectrum of ?(n, p) and ?(n) were determined in [9]. An open problem posed in [7] was to find families of graphs of diameter greater than two, for which the adjacency and distance spectrum are both integral. To answer the open problem, the distance spectrum of the above family of graphs is calculated, and new distance equienergetic graphs are constructed in this paper. 2024 Jangjeon Research Institute for Mathematical Sciences and Physics. All rights reserved. -
Distillery effluent valorization through cost effective production of polyhydroxyalkanoate: optimization and characterization
The devastating effect of fossil plastics in the biosphere has tuned the concern for bioplastic production in the last few decades. Polyhydroxyalkanoate, a biopolyester, has a wide range of applications as they impose positive societal impact by being biodegradable and void of any ill-effects when used in vivo. Despite their eco-friendly nature, the outreach of PHA is bounded in industrial scale as the overall expense is highly comparable to conventional plastics. Therefore, in an attempt to attain a feasible production, the present study aims at utilizing raw distillery effluent for PHA production using Bacillus subtilis NCDC 0671. Different dilutions of spent wash (5%, 10%, 15%, and 20%) were assessed for PHA production in the modified medium among which 10% showed maximum PHA accumulation. Furthermore, statistical optimization by response surface methodology enhanced PHA synthesis to 6.3g/L which is 3.3-fold increases. FTIR and NMR characterization of the biopolymer from the optimized medium was similar to the previous literature which provides a promising approach for cost effective production. 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature. -
Distributed denial-of-service detection and mitigation using software-defined network and internet of things
Internet of Things (IoT) is one of the promising technologies that are developing quickly in various fields such as automation, safety and health. It is a heterogeneous network that links various physical devices. It consists of a variety of vulnerabilities due to its heterogeneous nature. It makes a different level of security issues. Distributed Denial-of-service (DDoS) attack denies services to an authentic user and makes the resources of network inaccessible. DDoS attack is a significant problem for IoT. It is easy to carry out this attack on an IoT network. Main aim of the proposed methodology is to use Software-defined Network (SDN). The primary structure of proposed system is to integrate SDN and IoT technology. This combination is to provide a more secure infrastructure compare to traditional system. The secondary structure of proposed system is used to detect and mitigate the DDoS attacks. The proposed methodology is to check associativity of MAC IP address, source IP address and destination IP address. It was able to detect and mitigate the attack in short span of time. The results are compared on different parameters. That parameters are packet delay time, flow entries and average packet received per second by the controller. This hybrid method is to provide higher security and improve the Quality of Service (QoS). 2019, Institute of Advanced Scientific Research, Inc.. All rights reserved. -
Distributed DoS Detection in IoT Networks Using Intelligent Machine Learning Algorithms
The threat of a Distributed Denial of Service (DDoS) attack on web-based services and applications is grave. It only takes a few minutes for one of these attacks to cripple these services, making them unavailable to anyone. The problem has further persisted with the widespread adoption of insecure Internet of Things (IoT) devices across the Internet. In addition, many currently used rule-based detection systems are weak points for attackers. We conducted a comparative analysis of ML algorithms to detect and classify DDoS attacks in this paper. These classifiers compare Nave Bayes with J48 and Random Forest with ZeroR ML as well as other machine learning algorithms. It was found that using the PCA method, the optimal number of features could be found. ML has been implemented with the help of the WEKA tool. 2021 IEEE. -
Distributed Feedback Laser (DFB) for Signal Power Amplitude Level Improvement in Long Spectral Band
This study outlines the distributed feedback laser for signal power amplitude level improvement in the long spectral band of 1550 nm wavelength within supporting pumped wavelength of 1480 nm. The bias and modulation peak currents based distributed feedback laser are varied in order to test the signal power level, peak signal amplitude variations after the fiber-optic channel and light detectors. The signal power level, peak signal amplitude is measured against spectral wavelength and time bit period variations. The study emphasis the signal power level, peak signal amplitude are enhanced for the best selection values of both a bias current at 45 mA and modulation peak current at 0.5 mA. 2023 Walter de Gruyter GmbH. All rights reserved. -
Distributed Maximum Power Point Tracking for Mismatched Modules of Photovoltaic Array
The multiple peaks in the output P-V characteristics of the photovoltaic (PV) module and the complete loss of shaded modules generation due to the existing bypass diode-based scheme are eliminated through the implementation of proven distributed maximum power point tracking (DMPPT). Considering the unique behavior of each PV Module, the artificial neural network is used in the DMPPT algorithm to track the MPP at every instant by learning the unique behavior of each PV module in this chapter. This eliminates the effect of manufacturing dispersion. Though the unique MPP is identified, the inability of the DMPPT algorithm in maintaining the PV modules in its own MPP is eliminated by the compensator circuits which are introduced in the array configuration along with the DMPPT in this chapter. These compensators enabled the maintenance of each PV module in its own MPP by providing the deficient current of each module and the deficient voltage of each string. So, this configuration increases the output power by including the generation of shaded modules instead of bypassing it. The results show that the proposed configuration avoids the multiple peak condition in P-V characteristics and improves the efficiency of the PV array under partially shaded conditions. 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
District Level Analytical Study of Infant Malnutrition in Madhya Pradesh
One of the main causes for Indias high infant mortality rate is malnutrition. It can be addressed using three broad groups of conditions: stunting, wasting, and underweight. Other factors such as sanitation, poverty, breastfeeding also contribute to the prevalence of malnutrition. Understanding the contribution of these factors and thus, eliminating them, to reduce malnutrition, is the purpose of this study. In this chapter, the district-level data obtained through NFHS-4 is used for analytical study for infant malnutrition, in Madhya Pradesh. Hierarchical Agglomerative clustering is used to group the districts based on the factors such as exclusively breastfeeding, inoculation, breastfeeding within one hour, no inoculation. The proposed model presents the effect of each factor, on infant malnutrition. It will help decision-makers and the government to shortlist the most appropriate districts contributing to malnutrition and to take curative action to reduce the rate of infant malnutrition. It is a generic model which can be utilized by other states to study infant malnutrition. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Divergent Synthesis of Azole Tailored Compounds and Their Biological and Photoluminescence Applications
Producing a library of diverse compounds with minor structural differences can provide newlinevaluable information related to the structure-activity relationship (SAR), which would not be possible by studying just one molecule. The main goal of the divergent synthesis approach is to efficiently create a collection of valuable compounds, which is different from the traditional methods of making compounds in a linear or convergent way. This approach, known as divergent synthesis, helps select the best compound from the group for its applications. In the newlinecurrent study, the focus is on synthesizing different types of azoles, such as Thiazole Schiff bases, fused tetrazoles, substituted imidazole, and 1H-tetrazoles, and exploring their potential uses in biological and photoluminescence studies. Several methods were utilized to synthesize the derivatives of azole compounds. The synthesized molecules were examined and identified using techniques like 1HNMR, 13CNMR, Mass spectrometry, and IR spectroscopy. After creating a library of molecules, they were evaluated for their potential applications in biology and photoluminescence. The most promising molecule was selected from the preliminary evaluation for further investigation. newlineThiazole Schiff bases were synthesized, and their photoluminescence properties were newlineinvestigated. Among the synthesized compounds, the bromo derivative showed the most promising results in developing fluorescent organic nanoparticles with versatile applications. The compound delivered exceptional results in aggregation-induced emission (AIE), viscochromism, detection of Al3+ions, pH sensing, latent fingerprint detection, and cell imaging. Synthesis of fused azole-derivatives was accomplished using the organo-catalyst 10- newlinecamphor sulfonic acid. Detailed optimization and mechanistic studies were conducted, along newlinewith evaluating the antifungal activity against Candida tropicalis ATCC 10231 for the newlinesynthesized compounds. -
Diverse Morphologies of Nb2O5 Nanomaterials: A Comparative Study for the Growth Optimization of Elongated Spiky Nb2O5 and Carbon Nanosphere Composite
Controlled synthesis and design of nanomaterials with intricate morphologies and active phases offer new prospects in harnessing their unique chemical and physical properties for various applications. Herein, a facile and efficient hydrothermal approach is reported for obtaining various complex Nb2O5 nanostructures, including thin sheets, thick flakes, spiky and elongated spiky sea urchin morphologies using urotropin as a growth-directing and hydrolyzing agent in various mixed and pure solvents. The detailed structural and chemical composition, surface morphology and crystallinity of as-synthesized Nb2O5 nanostructures are presented. The urotropin concentration, reaction time, and water-ethanol solvent mixture play a critical role for obtaining the elongated spiky sea urchin morphologies. The spiky Nb2O5 structures show a pseudohexagonal phase with less urotropin content, while thin sheets are obtained with a higher urotropin concentration and are primarily amorphous. These structures undergo transformation in their crystal phase and morphologies during calcination at higher temperatures revealing the active role of urotropin in stabilizing them. A composite of spiky sea urchin Nb2O5-carbon nanospheres (suNb2O5-CNS) is achieved by in-situ growth of Nb2O5 in the presence of CNS without compromising on morphology, phase, and crystallinity. suNb2O5-CNS composite is shown to possess higher charge storage capacity compared to its constituents for supercapacitor applications. 2023 Wiley-VCH GmbH. -
Diversifying investor's portfolio using bitcoin: An econometric analysis
Rational investors look into maximizing returns with minimal risk. Since this is highly unlikely, optimizing risk and return is a practical solution. Bitcoin is a new financial product that can be included in an investment portfolio. This paper looks at Bitcoins as a separate asset class and attempts to capture the volatility using the Exponential GARCH (E-GARCH) as well as to check if Bitcoins can be used as an optimal tool to hedge using the Dynamic Conditional Correlation GARCH against four traditional asset classes in the U.S. economy which includes the stock market (S&P 500 index), Bonds (U.S. Aggregate Bond Index), Gold and Crude Oil. The period of study is a little over 7 years. The results suggest that Bitcoin stands as a highly speculative class of asset with extremely high volatility and with respect to hedging, Bitcoin stands as a possible tool of hedge with the U.S. Aggregate Bond index and to a certain extent against Gold but fails to be an optimal hedge against the S&P 500 and Crude Oil in the U.S. economy between April 29, 2013 and October 31, 2019 due to its highly volatile nature. 2020 John Wiley & Sons, Ltd. -
Divine Consulting Services: A Sinking Ship or Back to Land Safely?
[No abstract available] -
Divorce prevention programme an intervention based on qualitatively derived psychological themes from newlywed distressed and divorced couples
This study has aimed to develop a competent intervention program as a preventive measure to tackle the increasing divorce rate in the current Indian scenario. Towards this end, the study has been arranged in three phases, with specific objectives guided by specific research questions in each phase. Holding pragmatic philosophical stance, a mixed method framework has directed the entire study, precisely, exploratory mixed design. newlineThe first phase of the study has focused on investigating the in-depth psychological components or etiology of marital distress and divorce in the problem context. Using an Interpretative Phenomenological Analysis (IPA) design, the lived marital experiences of 14 separated and 36 divorced (n=50) newlywed participants has been rigorously explored. Five superordinate themes along with 23 subordinate and 35 emergent themes have been derived in the data analysis, as reasons for marital distress and divorce in newlywed couples. newlineThe challenge of the second phase was to spin a proficient intervention program that is competent to address the identified reasons for marital distress, during the phase-one of the study. Towards this target, the theoretical framework developed by Hughes (1994, 2012 and 2014), Framework for Developing Family Life Education Programme is the model utilized. Following the five steps in the Hughes s framework, the intervention program has been designed and titled Divorce Prevention Programme (DPP). Finally, the phase three task of the study includes experimentation over the immediate and short-term (two-month) effect of the DPP as to what extent marital satisfaction and consummate love would improve to prevent divorce. The pretest, posttest experimental, and waitlist control group design was utilized with a two months follow-up with the experimental group. -
Divulging the teachers job satisfaction effect on better work performance
The achievement and ruin of man's presence depends on how he functions adequately. In the event that he acknowledges what he does, with all the information and capability he has, there won't be even a solitary explanation behind him not to succeed. This study is an endeavor to research or to discover the impact of job satisfaction on teacher's better work performance among secondary teachers especially in aided and unaided sectors in Bangalore. To accomplish this objective, a survey was organized and was regulated to a sample of 1294 among the secondary school teachers, educating in aided and unaided sectors in Bangalore. In the wake of gathering the surveys, the quantitative information was arranged, coded and isolated based upon the real subjects and the individual study hypothesis. The outcomes uncovered the job satisfaction impacts on Better Work Performance. The discoveries give us a superior comprehension of the way of the theories demonstrates that job satisfaction significantly affect teachers better work performance better way of the teachers chose under the specimen concentrate on. Maybe, the execution won't not hold an affecting variable on job satisfaction in business area. IAEME Publication. -
DKMI: Diversification ofWeb Image Search Using Knowledge Centric Machine Intelligence
Web Image Recommendation is quite important in the present-day owing to the large scale of the multimedia content on the World Wide Web (WWW) specifically images. Recommendation of the images that are highly pertinent to the query with diversified yet relevant query results is a challenge. In this paper the DKMI framework for web image recommendation has been proposed which is mainly focused on ontology alignment and knowledge pool derivation using standard crowd-sourced knowledge stores like Wikipedia and DBpedia. Apart from this the DKMI model encompasses differential classification of the same dataset using the GRU and SVM, which are two distinct differential classifiers at two different levels. GRU being a Deep Learning classifier and the SVM being a Machine Learning classifier, enhances the heterogeneity and diversity in the results. Semantic similarity computation using Cosine Similarity, PMI and SOC-PMI at several phases ensures strong relevance computation in the model. The DKMI model yields overall Precision of 97.62% with an accuracy of 98.36% along with the lowest FDR score of 0.03 and is much better than the other models that are considered to be the baseline models. 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
DMD Based Multi-Object Spectrograph for INdian Spectroscopic and Imaging Space Telescope: INSIST
INdian Spectroscopic and Imaging Space Telescope (INSIST) is the next-generation UV-Optical space mission proposed by the Indian Astronomical community motivated by the great success of India's first multi-wavelength Astronomical satellite (ASTROSAT) where Ultra Violet Imaging Telescope (UVIT) was one of the main payload launched in 2015 by Indian Space Research Organisation. INSIST is primarily designed for photometry observation in three bands (g-[400nm-550nm], u-[300nm-400nm] and UV-[150nm-300nm]) simultaneously over 0.25 sq.degree field of view. INSIST is equipped with a low resolution [R?500] spectrograph for multi-Object slitless spectroscopy over the imaging field of view and also has a medium resolution [R?2000] spectrograph for multi-object slit spectroscopy in UV-band over ?6 sq.arcmin sky. MEMS-based Digital Micromirror Device [DMD] is used to form configurable slits for the selection of objects at the focal plane of the telescope for multi-object slit spectrograph. Multi-Object spectrograph with DMD as a re-configurable slit for INSIST is designed and the performance of the spectrograph is presented. 2023 World Scientific Publishing Company. -
DNA based cryptography to improve usability of authenticated access of electronic health records
The quality of health care has been drastically improved with the evolution of Internet. Electronic health records play a major role in interoperability and accessibility of patients data which helps in effective and timely treatment irrespective of the demographic area. The proposed model is to ensure and monitor maternal health during pregnancy and to create awareness alerts (options include messages, voice alerts or flash the system) based on the individual health record. The system aims to prevent maternal death due to medical negligence and helps to make recommendations to prevent future mortality based on medical history and take appropriate action. Authentication is a critical aspect considering the trade-off between usability and security whereas data breach and related cybercrime are major concerns in health care. The proposed model uses DNA based authentication techniques to ensure usability and confidentiality of electronic data, Aadhaar to prevent unauthorized access to patients data in case of emergency without affecting availability. 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. -
DNA for information security: A Survey on DNA computing and a pseudo DNA method based on central dogma of molecular biology
Biology is a life science which has high significance on the quality of life and information security is that aspect for social edification, which human beings will never compromise. Both are subjects of high relevance and inevitable for mankind. So, an amalgamation of these subjects definitely turns up as utility technology, either for security or data storage and is known as Bio computing. The secure transfer of information was a major concern from ancient civilizations. Various techniques have been proposed to maintain security of data so that only intended recipient should be able to receive the message other than the sender. These practices became more significant with the introduction of the Internet. Information varies from big data to a particular word, but every piece of information requires proper storage and protection which is a major concern. Cryptography is an art or science of secrecy which protects information from unauthorized access. Various techniques evolved through years for information protection, including Ciphers, Cryptography, Steganography, Biometrics and recent DNA for security.DNA cryptography was a major breakthrough in the field of security which uses Bio-molecular concepts and gives us a new hope of unbreakable algorithms. This paper discusses various DNA based Cryptographic methods proposed till now. It also proposes a DNA symmetric algorithm based on the Pseudo DNA Cryptography and Central dogma of molecular biology. The suggested algorithm uses splicing and padding techniques along with complementary rules which make the algorithm more secure as it is an additional layer of security than conventional cryptographic techniques. 2014 IEEE. -
DNA-based authentication to access internet of things-based healthcare data
Data security and privacy are always considered as critical aspects, especially in healthcare. The advent of technologies such as the Internet of Things (IoT) has encouraged a great deal of attention in this digital era and helped to improve e-health services. IoT-based services in healthcare and their applications have led to potential growth of quality services in healthcare. However, the sensitive nature of healthcare data and IoT devices which store and collect real-time data makes it even more vulnerable to various attacks. With the development of digitalized data and IoT-based e-health systems, authentication mechanisms are essential to ensure both usability and security. Considering these aspects, a novel, secure user authentication scheme is proposed that uses user ID, unique ID (AADHAAR), password, DNA steganography, and hash function. An One Time Password method is also proposed to strengthen the device authentication. The Scyther tool is used for security analysis and to validate the claims. 2021 Elsevier Inc. All rights reserved. -
Do all shocks produce embedded herding and bubble? An empirical observation of the Indian stock market
Herding has a history of igniting large, irrational market ups and downs, usually based on a lack of fundamental support. Intuitively, most herds start with an external shock. This empirical study seeks to detect shock-induced herding and the creation of nascent bubbles in the Indian stock market. Initially, the multifractal form of the detrended fluctuation analysis was applied. Then the Reformulated Hurst exponent for the Bombay stock exchange (BSE) was determined using Kantelhardt's calibration. The investigation found evidence of high-level herding and a bubble in 2012, with a high value of Hurst Exponent (0.7349). The other years of the research period (2011, 2013, 2016, 2018, 2020-2021) observed mild to significant herding with comparatively lower Hurst values. The results confirm that herding behavior occurs during a crisis and harsh situations emitting shocks. The study concludes that shock-based herding is prevalent in all six shocks: the economic meltdown, commodities and currency devaluation, geo-political problems, the Central Bank's decision on liquidity management, and the Pandemic. Additionally, the years following the Financial Crisis and the years of the Pandemic are when herding and bubble are prominent. Tabassum Khan, Suresh G., 2022.

