Search results for: Sandeep Kaur
155 A Simple Device for Characterizing High Power Electron Beams for Welding
Authors: Aman Kaur, Colin Ribton, Wamadeva Balachandaran
Abstract:
Electron beam welding due to its inherent advantages is being extensively used for material processing where high precision is required. Especially in aerospace or nuclear industries, there are high quality requirements and the cost of materials and processes is very high which makes it very important to ensure the beam quality is maintained and checked prior to carrying out the welds. Although the processes in these industries are highly controlled, however, even the minor changes in the operating parameters of the electron gun can make large enough variations in the beam quality that can result in poor welding. To measure the beam quality a simple device has been designed that can be used at high powers. The device consists of two slits in x and y axis which collects a small portion of the beam current when the beam is deflected over the slits. The signals received from the device are processed in data acquisition hardware and the dedicated software developed for the device. The device has been used in controlled laboratory environments to analyse the signals and the weld quality relationships by varying the focus current. The results showed matching trends in the weld dimensions and the beam characteristics. Further experimental work is being carried out to determine the ability of the device and signal processing software to detect subtle changes in the beam quality and to relate these to the physical weld quality indicators.Keywords: electron beam welding, beam quality, high power, weld quality indicators
Procedia PDF Downloads 324154 Multi-Level Clustering Based Congestion Control Protocol for Cyber Physical Systems
Authors: Manpreet Kaur, Amita Rani, Sanjay Kumar
Abstract:
The Internet of Things (IoT), a cyber-physical paradigm, allows a large number of devices to connect and send the sensory data in the network simultaneously. This tremendous amount of data generated leads to very high network load consequently resulting in network congestion. It further amounts to frequent loss of useful information and depletion of significant amount of nodes’ energy. Therefore, there is a need to control congestion in IoT so as to prolong network lifetime and improve the quality of service (QoS). Hence, we propose a two-level clustering based routing algorithm considering congestion score and packet priority metrics that focus on minimizing the network congestion. In the proposed Priority based Congestion Control (PBCC) protocol the sensor nodes in IoT network form clusters that reduces the amount of traffic and the nodes are prioritized to emphasize important data. Simultaneously, a congestion score determines the occurrence of congestion at a particular node. The proposed protocol outperforms the existing Packet Discard Network Clustering (PDNC) protocol in terms of buffer size, packet transmission range, network region and number of nodes, under various simulation scenarios.Keywords: internet of things, cyber-physical systems, congestion control, priority, transmission rate
Procedia PDF Downloads 308153 Seasonal Variation in Aerosols Characteristics over Ahmedabad
Authors: Devansh Desai, Chamandeep Kaur, Nirmal Kullu, George Christopher
Abstract:
Study of aerosols has become very important tool in assuming the climatic changes over a region.Spectral and temporal variability’s in aerosol optical depth(AOD) and size distribution are investigated using ground base measurements over Ahmedabad during the months of January(2013) to may (2013). Angstrom coefficient (ἁ) was found to be higher in winter season (January to march) indicating the dominance of fine mode aerosol concentration over Ahmedabad, and the Angstrom coefficient (ἁ) was found to be lower indicating the dominance of coarse mode aerosol concentration over Ahmedabad. The different values of alpha are observed when calculated over different wavelength ranges indicating bimodal aerosol size distribution. Discrimination of aerosol size during different seasons is made using the coefficient of polynomial fit (ἁ1 and ἁ2) which shows the presence of changing dominant aerosol types as a function of season over Ahmedabad. The ἁ2- ἁ1 value is used to get the confirmation on the dominant aerosol mode over Ahmedabad in both seasons. During pre-monsoon about 90% of AOD spectra is dominated by coarse mode aerosols and during winter about 60% of AOD spectra is dominated by fine mode aerosols. This characterization of aerosols is important in assessing the response of different aerosols type in radiative forcing and over climate of Ahmedabad.Keywords: radiative forcing, aerosol optical depth, fine mode, coarse mode
Procedia PDF Downloads 500152 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm
Authors: Sukhleen Kaur
Abstract:
In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper
Procedia PDF Downloads 414151 Antioxidant Potential of Methanolic Extracts of Four Indian Aromatic Plants
Authors: Harleen Kaur, Richa
Abstract:
Plants produce a large variety of secondary metabolites. Phenolics are the compounds that contain hydroxyl functional group on an aromatic ring. These are chemically heterogeneous compounds. Some are soluble only in organic solvents, some are water soluble and others are large insoluble polymers. Flavonoids are one of the largest classes of plant phenolics. The carbon skeleton of a flavonoid contains 15 carbons arranged in two aromatic rings connected by a three carbon ridge. Both phenolics and flavonoids are good natural antioxidants. Four Indian aromatic plants were selected for the study i.e, Achillea species, Jasminum primulinum, Leucas cephalotes and Leonotis nepetaefolia. All the plant species were collected from Chail region of Himachal Pradesh, India. The identifying features and anatomical studies were done of the part containing the essential oils. Phenolic cotent was estimated by Folin Ciocalteu’s method and flavonoids content by aluminium chloride method. Antioxidant property was checked by using DPPH method. Maximum antioxidant potential was found in Achillea species, followed by Leonotis nepetaefolia, Jaminum primulinum and Leucas cephalotes. Phenolics and flavonoids are important compounds that serve as defences against herbivores and pathogens. Others function in attracting pollinators and absorbing harmful radiations.Keywords: antioxidants, DPPH, flavonoids, phenolics
Procedia PDF Downloads 347150 Healthcare-SignNet: Advanced Video Classification for Medical Sign Language Recognition Using CNN and RNN Models
Authors: Chithra A. V., Somoshree Datta, Sandeep Nithyanandan
Abstract:
Sign Language Recognition (SLR) is the process of interpreting and translating sign language into spoken or written language using technological systems. It involves recognizing hand gestures, facial expressions, and body movements that makeup sign language communication. The primary goal of SLR is to facilitate communication between hearing- and speech-impaired communities and those who do not understand sign language. Due to the increased awareness and greater recognition of the rights and needs of the hearing- and speech-impaired community, sign language recognition has gained significant importance over the past 10 years. Technological advancements in the fields of Artificial Intelligence and Machine Learning have made it more practical and feasible to create accurate SLR systems. This paper presents a distinct approach to SLR by framing it as a video classification problem using Deep Learning (DL), whereby a combination of Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) has been used. This research targets the integration of sign language recognition into healthcare settings, aiming to improve communication between medical professionals and patients with hearing impairments. The spatial features from each video frame are extracted using a CNN, which captures essential elements such as hand shapes, movements, and facial expressions. These features are then fed into an RNN network that learns the temporal dependencies and patterns inherent in sign language sequences. The INCLUDE dataset has been enhanced with more videos from the healthcare domain and the model is evaluated on the same. Our model achieves 91% accuracy, representing state-of-the-art performance in this domain. The results highlight the effectiveness of treating SLR as a video classification task with the CNN-RNN architecture. This approach not only improves recognition accuracy but also offers a scalable solution for real-time SLR applications, significantly advancing the field of accessible communication technologies.Keywords: sign language recognition, deep learning, convolution neural network, recurrent neural network
Procedia PDF Downloads 27149 Design an Algorithm for Software Development in CBSE Envrionment Using Feed Forward Neural Network
Authors: Amit Verma, Pardeep Kaur
Abstract:
In software development organizations, Component based Software engineering (CBSE) is emerging paradigm for software development and gained wide acceptance as it often results in increase quality of software product within development time and budget. In component reusability, main challenges are the right component identification from large repositories at right time. The major objective of this work is to provide efficient algorithm for storage and effective retrieval of components using neural network and parameters based on user choice through clustering. This research paper aims to propose an algorithm that provides error free and automatic process (for retrieval of the components) while reuse of the component. In this algorithm, keywords (or components) are extracted from software document, after by applying k mean clustering algorithm. Then weights assigned to those keywords based on their frequency and after assigning weights, ANN predicts whether correct weight is assigned to keywords (or components) or not, otherwise it back propagates in to initial step (re-assign the weights). In last, store those all keywords into repositories for effective retrieval. Proposed algorithm is very effective in the error correction and detection with user base choice while choice of component for reusability for efficient retrieval is there.Keywords: component based development, clustering, back propagation algorithm, keyword based retrieval
Procedia PDF Downloads 378148 A Test Methodology to Measure the Open-Loop Voltage Gain of an Operational Amplifier
Authors: Maninder Kaur Gill, Alpana Agarwal
Abstract:
It is practically not feasible to measure the open-loop voltage gain of the operational amplifier in the open loop configuration. It is because the open-loop voltage gain of the operational amplifier is very large. In order to avoid the saturation of the output voltage, a very small input should be given to operational amplifier which is not possible to be measured practically by a digital multimeter. A test circuit for measurement of open loop voltage gain of an operational amplifier has been proposed and verified using simulation tools as well as by experimental methods on breadboard. The main advantage of this test circuit is that it is simple, fast, accurate, cost effective, and easy to handle even on a breadboard. The test circuit requires only the device under test (DUT) along with resistors. This circuit has been tested for measurement of open loop voltage gain for different operational amplifiers. The underlying goal is to design testable circuits for various analog devices that are simple to realize in VLSI systems, giving accurate results and without changing the characteristics of the original system. The DUTs used are LM741CN and UA741CP. For LM741CN, the simulated gain and experimentally measured gain (average) are calculated as 89.71 dB and 87.71 dB, respectively. For UA741CP, the simulated gain and experimentally measured gain (average) are calculated as 101.15 dB and 105.15 dB, respectively. These values are found to be close to the datasheet values.Keywords: Device Under Test (DUT), open loop voltage gain, operational amplifier, test circuit
Procedia PDF Downloads 447147 Integration of Technology for Enhanced Learning among Generation Y and Z Nursing Students
Authors: Tarandeep Kaur
Abstract:
Generation Y and Z nursing students have a much higher need for technology-based stimulation than previous generations, as they may find traditional methods of education boring and disinterested. These generations prefer experiential learning and the use of advanced technology for enhanced learning. Therefore, nursing educators must acquire knowledge to make better use of technology and technological tools for instruction. Millennials and generation are digital natives, optimistic, assertive, want engagement, instant feedback, and collaborative approach. The integration of technology and the efficacy of its use can be challenging for nursing educators. The SAMR (substitution, augmentation, modification, and redefinition) model designed and developed by Dr. Ruben Puentedura can help nursing educators to engage their students in different levels of technology integration for effective learning. Nursing educators should understand that technology use in the classroom must be purposeful. The influx of technology in nursing education is ever-changing; therefore, nursing educators have to constantly enhance and develop technical skills to keep up with the emerging technology in the schools as well as hospitals. In the Saskatchewan Collaborative Bachelor of Nursing (SCBSCN) program at Saskatchewan polytechnic, we use technology at various levels using the SAMR model in our program, including low and high-fidelity simulation labs. We are also exploring futuristic options of using virtual reality and gaming in our classrooms as an innovative way to motivate, increase critical thinking, create active learning, provide immediate feedback, improve student retention and create collaboration.Keywords: generations, nursing, SAMR, technology
Procedia PDF Downloads 110146 To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution
Authors: Bhaumik Tyagi, Mandeep Kaur, Kanika Singla
Abstract:
The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done.Keywords: hybrid blockchain, secure e-voting system, convolutional neural networks, quantum key distribution, one-time pad
Procedia PDF Downloads 94145 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud
Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal
Abstract:
Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid
Procedia PDF Downloads 318144 A Study of Chaos Control Schemes for Plankton-Fish Dynamics
Authors: Rajinder Pal Kaur, Amit Sharma, Anuj Kumar Sharma, Govind Prasad Sahu
Abstract:
The existence of chaos in the marine ecosystems may cause planktonic blooms, disease outbreaks, extinction of some plankton species, or some complex dynamics in oceans, which can adversely affect the sustainable marine ecosystem. The control of the chaotic plankton-fish dynamics is one of the main motives of marine ecologists. In this paper, we have studied the impact of phytoplankton refuge, zooplankton refuge, and fear effect on the chaotic plankton-fish dynamics incorporating phytoplankton, zooplankton, and fish biomass. The fear of fish predation transfers the unpredictable(chaotic) behavior of the plankton system to a stable orbit. The defense mechanism developed by prey species due to fear of the predator population can also terminate chaos from the given dynamics. Moreover, the impact of external disturbances like seasonality, noise, periodic fluctuations, and time delay on the given chaotic plankton system has also been discussed. We have applied feedback mechanisms to control the complexity of the system through the parameter noise. The non-feedback schemes are implemented to observe the role of seasonal force, periodic fluctuations, and time delay in suppressing the given chaotic system. Analytical results are substantiated by numerical simulation.Keywords: plankton, chaos, noise, seasonality, fluctuations, fear effect, prey refuge
Procedia PDF Downloads 84143 Requirements Management in Agile
Authors: Ravneet Kaur
Abstract:
The concept of Agile Requirements Engineering and Management is not new. However, the struggle to figure out how traditional Requirements Management Process fits within an Agile framework remains complex. This paper talks about a process that can merge the organization’s traditional Requirements Management Process nicely into the Agile Software Development Process. This process provides Traceability of the Product Backlog to the external documents on one hand and User Stories on the other hand. It also gives sufficient evidence that the system will deliver the right functionality with good quality in the form of various statistics and reports. In the nutshell, by overlaying a process on top of Agile, without disturbing the Agility, we are able to get synergic benefits in terms of productivity, profitability, its reporting, and end to end visibility to all Stakeholders. The framework can be used for just-in-time requirements definition or to build a repository of requirements for future use. The goal is to make sure that the business (specifically, the product owner) can clearly articulate what needs to be built and define what is of high quality. To accomplish this, the requirements cycle follows a Scrum-like process that mirrors the development cycle but stays two to three steps ahead. The goal is to create a process by which requirements can be thoroughly vetted, organized, and communicated in a manner that is iterative, timely, and quality-focused. Agile is quickly becoming the most popular way of developing software because it fosters continuous improvement, time-boxed development cycles, and more quickly delivering value to the end users. That value will be driven to a large extent by the quality and clarity of requirements that feed the software development process. An agile, lean, and timely approach to requirements as the starting point will help to ensure that the process is optimized.Keywords: requirements management, Agile
Procedia PDF Downloads 370142 Evaluation Criteria for Performance of Knitted Terry Fabrics and Building Elements of Fashion: A Critical Review
Authors: Harpinder Kaur, Amit Madahar
Abstract:
The terry fabric is one of the fastest growing and challenging sub-sectors of the textile industry. Terry fabrics are produced using ground weft, ground warp, and pile yarns. The terry fabrics not only finds applications in towels but also in home textile products, sauna dressing- gowns, slippers, jackets, garments, apparels, outerwears, overcoats, sweatshirts, children’s clothes, and hygiene products for babies, beachwear, sleepwear, gloves, scarfs, shawls, etc. In some cases, these wide ranges of applications not only demand a high degree of absorption but also necessitate the due consideration for the handle properties of the fabrics. These fabrics are required to be accessed for their performance in terms of absorbency and comfort characteristics. Since material (yarns, colors, fabrics, fashion, patrons, accessories and fittings) are the core elements of structure of fashion, hence textile and fashion go hand in hand. This paper throws some light on the performance evaluation of terry fabrics. Here, characteristics/features that are required to be achieved for satisfactory performance of the terry fabrics with reference to fashion are discussed. The terry fabrics are being modified over the years in terms of the raw material requirements such as 100% cotton or blends or cotton with other fibers in order to obtain better performance as well as their structural parameters including stitch length and stitch density etc.Keywords: absorbency, comfort, cotton, performance, terry fabrics, fashion
Procedia PDF Downloads 146141 Isolation and Screening of Fungal Strains for β-Galactosidase Production
Authors: Parmjit S. Panesar, Rupinder Kaur, Ram S. Singh
Abstract:
Enzymes are the biocatalysts which catalyze the biochemical processes and thus have a wide variety of applications in the industrial sector. β-Galactosidase (E.C. 3.2.1.23) also known as lactase, is one of the prime enzymes, which has significant potential in the dairy and food processing industries. It has the capability to catalyze both the hydrolytic reaction for the production of lactose hydrolyzed milk and transgalactosylation reaction for the synthesis of prebiotics such as lactulose and galactooligosaccharides. These prebiotics have various nutritional and technological benefits. Although, the enzyme is naturally present in almonds, peaches, apricots and other variety of fruits and animals, the extraction of enzyme from these sources increases the cost of enzyme. Therefore, focus has been shifted towards the production of low cost enzyme from the microorganisms such as bacteria, yeast and fungi. As compared to yeast and bacteria, fungal β-galactosidase is generally preferred as being extracellular and thermostable in nature. Keeping the above in view, the present study was carried out for the isolation of the β-galactosidase producing fungal strain from the food as well as the agricultural wastes. A total of more than 100 fungal cultures were examined for their potential in enzyme production. All the fungal strains were screened using X-gal and IPTG as inducers in the modified Czapek Dox Agar medium. Among the various isolated fungal strains, the strain exhibiting the highest enzyme activity was chosen for further phenotypic and genotypic characterization. The strain was identified as Rhizomucor pusillus on the basis of 5.8s RNA gene sequencing data.Keywords: beta-galactosidase, enzyme, fungal, isolation
Procedia PDF Downloads 253140 Using Audit Tools to Maintain Data Quality for ACC/NCDR PCI Registry Abstraction
Authors: Vikrum Malhotra, Manpreet Kaur, Ayesha Ghotto
Abstract:
Background: Cardiac registries such as ACC Percutaneous Coronary Intervention Registry require high quality data to be abstracted, including data elements such as nuclear cardiology, diagnostic coronary angiography, and PCI. Introduction: The audit tool created is used by data abstractors to provide data audits and assess the accuracy and inter-rater reliability of abstraction performed by the abstractors for a health system. This audit tool solution has been developed across 13 registries, including ACC/NCDR registries, PCI, STS, Get with the Guidelines. Methodology: The data audit tool was used to audit internal registry abstraction for all data elements, including stress test performed, type of stress test, data of stress test, results of stress test, risk/extent of ischemia, diagnostic catheterization detail, and PCI data elements for ACC/NCDR PCI registries. This is being used across 20 hospital systems internally and providing abstraction and audit services for them. Results: The data audit tool had inter-rater reliability and accuracy greater than 95% data accuracy and IRR score for the PCI registry in 50 PCI registry cases in 2021. Conclusion: The tool is being used internally for surgical societies and across hospital systems. The audit tool enables the abstractor to be assessed by an external abstractor and includes all of the data dictionary fields for each registry.Keywords: abstraction, cardiac registry, cardiovascular registry, registry, data
Procedia PDF Downloads 105139 Fiber Optic Asparagine Biosensor for Fruit Juices by Co-Immobilization of L-Asparaginase and Phenol Red
Authors: Mandeep Kataria, Ritu Narula, Navneet Kaur
Abstract:
Asparagine is vital amino acid which is required for the development of brain and it regulates the equilibrium of central nervous system. Asparagine is the chief amino acid that forms acrylamide in baked food by reacting with reducing sugars at high temperature ( Millard Reaction i.e. amino acids and sugars give new flavors at high temperature). It can also be a parameter of freshness in fruit juices because on storage of juices at 37°C caused an 87% loss in the total free amino acids and major decrease was recorded in asparagine contents. With this significance of monitoring asparagine, in the present work a biosensor for determining asparagine in fruit juices is developed. For the construction of biosensor L-asparaginase enzyme (0.5 IU) was co-immobilized with phenol red on TEOS chitosan sol-gel plastic disc and fixed on the fiber optic tip. Tip was immersed in a cell having 5ml of substrate and absorption was noted at response time of 5 min with 10-1 - 10-10 M concentrations of asparagine at 538 nm. L-asparaginase was extracted and from Solanum nigrum Asparagine biosensor was applied fruit juices on the monitoring asparagine contents. L-asparagine concentration found to be present in fruit juices like Guava Juice, Apple Juice, Mango Juice, Litchi juice, Strawberry juice, Pineapple juice Lemon juice, and Orange juice. Hence the developed biosensor has commercial aspects in quality insurance of fruit juices.Keywords: fiber optic biosensor, chitosan, teos, l-asparaginase
Procedia PDF Downloads 289138 Utilization of Whey for the Production of β-Galactosidase Using Yeast and Fungal Culture
Authors: Rupinder Kaur, Parmjit S. Panesar, Ram S. Singh
Abstract:
Whey is the lactose rich by-product of the dairy industry, having good amount of nutrient reservoir. Most abundant nutrients are lactose, soluble proteins, lipids and mineral salts. Disposing of whey by most of milk plants which do not have proper pre-treatment system is the major issue. As a result of which, there can be significant loss of potential food and energy source. Thus, whey has been explored as the substrate for the synthesis of different value added products such as enzymes. β-galactosidase is one of the important enzymes and has become the major focus of research due to its ability to catalyze both hydrolytic as well as transgalactosylation reaction simultaneously. The enzyme is widely used in dairy industry as it catalyzes the transformation of lactose to glucose and galactose, making it suitable for the lactose intolerant people. The enzyme is intracellular in both bacteria and yeast, whereas for molds, it has an extracellular location. The present work was carried to utilize the whey for the production of β-galactosidase enzyme using both yeast and fungal cultures. The yeast isolate Kluyveromyces marxianus WIG2 and various fungal strains have been used in the present study. Different disruption techniques have also been investigated for the extraction of the enzyme produced intracellularly from yeast cells. Among the different methods tested for the disruption of yeast cells, SDS-chloroform showed the maximum β-galactosidase activity. In case of the tested fungal cultures, Aureobasidium pullulans NCIM 1050, was observed to be the maximum extracellular enzyme producer.Keywords: β-galactosidase, fungus, yeast, whey
Procedia PDF Downloads 325137 COVID-19 Impact on Online Digital Marketing Business Activities
Authors: Veepaul Kaur Mann Balwinder Singh
Abstract:
The COVID-19 had an intense impact on several countries across the world. National governments have imposed widespread restrictions to prevent the growth of this pandemic. The new health competitive scenario induced by the COVID-19 crisis raised many issues on how business activities should be reorganized due to the difficulties of physical interactions with distributors, suppliers and customers. The pandemic has particularly affected the whole selling process because of the relevant issues that emerged in managing physical sale channels and interactions with one another, both in the Business-to-Consumer and in the Business-to-Business markets. Recent research about the appropriate actions and strategies that could help firms overcome the crisis has highlighted the key role of digital expertise that may ensure connections and, thus, help business activities run smoothly. This could be true, especially with the occurrence of strong limitations on physical interactions during the COVID-19 pandemic. The catastrophe changes life publically and economically. People are living alone for following the social distancing norms. In that set-up, Digital Marketing is playing an important role in civilization. Anyone can buy any item, pay bills, transfer money and compare items through Digital Marketing without physical interactions. After COVID-19, people will be more aware of health safety and trust. So, through Digital Marketing, organizations can approach customers and provide good service environments. In such a situation, the online network becomes the most important encouraging for online customers to get in contact with the firm and carry out online selling and purchasing activities around the world.Keywords: COVID-19, business, digital marketing, online customer
Procedia PDF Downloads 54136 Grit and Psychological Well-Being Among Elite Wushu Players
Authors: Guneet Inder Jit Kaur, Kuldeep Singh, Sunil G. Purohit
Abstract:
Being a collective phrase for Martial arts that originated from China, Wushu is a form of self-defense and an international (Olympic) sport. Having emerged as a competitive sport, the competitions are generally in two disciplines in Wushu, namely ‘taolu,’ which refers to the forms, and ‘sanda’, which refers to the sparring. Indeed, the competition at the elite level is challenging more mentally than physically. Being masters of their games, excellence at that level is immensely defined by the mental strength characterized by perseverance and passion (grit) along with the psychological wellbeing. Thus, research attempting to understand this relationship is important. The present study was aimed to investigate the relationship between grit and psychological wellbeing among elite Wushu players. The sample of the present study comprised of 35 elite wushu players from India. Out of the 35 players, 16 were females (45.7%), and 19 were males (54.3%), and all had represented at the National and International level. 14 players were from the event of Taolu, and 21 players were from the event of Sanda. The questionnaires used were the short grit scale (Duckworth & Quinn, 2009) and the flourishing scale for psychological wellbeing (Diener et. al., 2009). The statistics included Descriptive (Mean, Standard deviation) and Inferential analysis (correlation). The results highlighted the relationship between the two variables. The insights gained from this study indeed seem immensely helpful in adding to the research of the psychological profile of Elite wushu players and has implications for psychological interventions and mental training for the players.Keywords: wushu, elite athletes, grit, psychological wellbeing, excellence
Procedia PDF Downloads 114135 Code-Switching among Local UCSI Stem and N-Stem Undergraduates during Knowledge Sharing
Authors: Adeela Abu Bakar, Minder Kaur, Parthaman Singh
Abstract:
In the Malaysian education system, a formal setting of English language learning takes place in a content-based classroom (CBC). Until recently, there is less study in Malaysia, which researched the effects of code-switching (CS) behaviour towards the students’ knowledge sharing (KS) with their peers. The aim of this study is to investigate the frequency, reasons, and effect that CS, from the English language to Bahasa Melayu, has among local STEM and N-STEM undergraduates towards KS in a content-based classroom. The study implies a mixed-method research design with questionnaire and interviews as the instruments. The data is collected through distribution of questionnaires and interviews with the undergraduates. The quantitative data is analysed using SPSS in simple frequencies and percentages, whereas qualitative data involves organizing the data into themes, followed by analysis. Findings found that N-STEM undergraduates code-switch more as compared to STEM undergraduates. In addition to that, both the STEM and N-STEM undergraduates agree that CS acts as a catalyst towards KS in a content-based classroom. However, they also acknowledge that excess use of CS can be a hindrance towards KS. The findings of the study can benefit STEM and N-STEM undergraduates, education policymakers, language teachers, university educators, and students with significant insights into the role of CS towards KS in a content-based classroom. Some of the recommendations that can be applied for future studies are that the number of participants can be increased, an observation to be included for the data collection.Keywords: switching, content-based classroom, content and language integrated learning, knowledge sharing, STEM and N-STEM undergraduates
Procedia PDF Downloads 135134 Enhancement of Hydrophobicity of Thermally Evaporated Bi Thin Films by Oblique Angle Deposition
Authors: Ravish K. Jain, Jatinder Kaur, Shaira Arora, Arun Kumar, Amit K. Chawla, Atul Khanna
Abstract:
Surface-dependent properties such as hydrophobicity can be modified significantly by oblique angle deposition technique. Bi thin films were studied for their hydrophobic nature. The effects of oblique angle deposition on structural, surface morphology, electrical and wettability properties of Bi thin films have been studied and a comparison of these physical properties of normally deposited and obliquely deposited Bi films has been carried out in this study. X-ray diffraction studies found that films have highly oriented hexagonal crystal structure and crystallite size is smaller for obliquely deposited (70 nm) film as compared to that of the normally deposited film (111 nm). Raman spectra of the films consist of peaks corresponding to E_g and A_1g first-order Raman modes of bismuth. The atomic force and scanning electron microscopy studies show that the surface roughness of obliquely deposited film is higher as compared to that of normally deposited film. Contact angle measurements revealed that both films are strongly hydrophobic in nature with the contact angles of 105ᵒ and 119ᵒ for normally and obliquely deposited films respectively. Oblique angle deposition enhances the hydrophobicity of the film. The electrical conductivity of the film is significantly reduced by oblique angle deposition. The activation energies for electrical conduction were determined by four-probe measurements and are 0.016 eV and 0.018 eV for normally and obliquely deposited films respectively.Keywords: bi thin films, hydrophobicity, oblique angle deposition, surface morphology
Procedia PDF Downloads 260133 Dynamics of Mach Zehnder Modulator in Open and Closed Loop Bias Condition
Authors: Ramonika Sengupta, Stuti Kachhwaha, Asha Adhiya, K. Satya Raja Sekhar, Rajwinder Kaur
Abstract:
Numerous efforts have been done in the past decade to develop the methods of secure communication that are free from interception and eavesdropping. In fiber optic communication, chaotic optical carrier signals are used for data encryption in secure data transmission. Mach-Zehnder Modulators (MZM) are the key components for generating the chaotic signals to be used as optical carriers. This paper presents the dynamics of a lithium niobate MZM modulator under various biasing conditions. The chaotic fluctuations of the intensity of a laser diode have been generated using the electro-optic MZM modulator operating in a highly nonlinear regime. The modulator is driven in closed loop by its own output at an earlier time. When used as an electro-optic oscillator employing delayed feedback, the MZM displays a wide range of output waveforms of varying complexity. The dynamical behavior of the system ranges from periodic to nonlinear oscillations. The nonlinearity displayed by the system is reproducible and is easily controllable. In this paper, we demonstrate a wide variety of optical signals generated by MZM using easily controllable device parameters in both open and close loop bias conditions.Keywords: chaotic carrier, fiber optic communication, Mach-Zehnder modulator, secure data transmission
Procedia PDF Downloads 272132 Effect of Different Spacings on Growth Yield and Fruit Quality of Peach in the Sub-Tropics of India
Authors: Harminder Singh, Rupinder Kaur
Abstract:
Peach is primarily a temperate fruit, but its low chilling cultivars are grown quite successfully in the sub-tropical climate as well. The area under peach cultivation is picking up rapidly in the sub tropics of northern India due to higher return on a unit area basis, availability of suitable peach cultivar and their production technology. Information on the use of different training systems on peach in the sub tropics is inadequate. In this investigation, conducted at Punjab Agricultural University, Ludhiana (Punjab), India, the trees of the Shan-i-Punjab peach were planted at four different spacings i.e. 6.0x3.0m, 6.0x2.5m, 4.5x3.0m and 4.5x2.5m and were trained to central leader system. The total radiation interception and penetration in the upper and lower canopy parts were higher in 6x3.0m and 6x2.5m planted trees as compared to other spacings. Average radiation interception was maximum in the upper part of the tree canopy, and it decreased significantly with the depth of the canopy in all the spacings. Tree planted at wider spacings produced more vegetative (tree height, tree girth, tree spread and canopy volume) and reproductive growth (flower bud density, number of fruits and fruit yield) per tree but productivity was maximum in the closely planted trees. Fruits harvested from the wider spaced trees were superior in fruit quality (size, weight, colour, TSS and acidity) and matured earlier than those harvested from closed spaced trees.Keywords: quality, radiation, spacings, yield
Procedia PDF Downloads 188131 Molecular Portraits: The Role of Posttranslational Modification in Cancer Metastasis
Authors: Navkiran Kaur, Apoorva Mathur, Abhishree Agarwal, Sakshi Gupta, Tuhin Rashmi
Abstract:
Aim: Breast cancer is the most common cancer in women worldwide, and resistance to the current therapeutics, often concurrently, is an increasing clinical challenge. Glycosylation of proteins is one of the most important post-translational modifications. It is widely known that aberrant glycosylation has been implicated in many different diseases due to changes associated with biological function and protein folding. Alterations in cell surface glycosylation, can promote invasive behavior of tumor cells that ultimately lead to the progression of cancer. In breast cancer, there is an increasing evidence pertaining to the role of glycosylation in tumor formation and metastasis. In the present study, an attempt has been made to study the disease associated sialoglycoproteins in breast cancer by using bioinformatics tools. The sequence will be retrieved from UniProt database. A database in the form of a word document was made by a collection of FASTA sequences of breast cancer gene sequence. Glycosylation was studied using yinOyang tool on ExPASy and Differential genes expression and protein analysis was done in context of breast cancer metastasis. The number of residues predicted O-glc NAc threshold containing 50 aberrant glycosylation sites or more was detected and recorded for individual sequence. We found that the there is a significant change in the expression profiling of glycosylation patterns of various proteins associated with breast cancer. Differential aberrant glycosylated proteins in breast cancer cells with respect to non-neoplastic cells are an important factor for the overall progression and development of cancer.Keywords: breast cancer, bioinformatics, cancer, metastasis, glycosylation
Procedia PDF Downloads 294130 Non-Coplanar Nuclei in Heavy-Ion Reactions
Authors: Sahila Chopra, Hemdeep, Arshdeep Kaur, Raj K. Gupta
Abstract:
In recent times, we noticed an interesting and important role of non-coplanar degree-of-freedom (Φ = 00) in heavy ion reactions. Using the dynamical cluster-decay model (DCM) with Φ degree-of-freedom included, we have studied three compound systems 246Bk∗, 164Yb∗ and 105Ag∗. Here, within the DCM with pocket formula for nuclear proximity potential, we look for the effects of including compact, non-coplanar configurations (Φc = 00) on the non-compound nucleus (nCN) contribution in total fusion cross section σfus. For 246Bk∗, formed in 11B+235U and 14N+232Th reaction channels, the DCM with coplanar nuclei (Φc = 00) shows an nCN contribution for 11B+235U channel, but none for 14N+232Th channel, which on including Φ gives both reaction channels as pure compound nucleus decays. In the case of 164Yb∗, formed in 64Ni+100Mo, the small nCN effects for Φ=00 are reduced to almost zero for Φ = 00. Interestingly, however, 105Ag∗ for Φ = 00 shows a small nCN contribution, which gets strongly enhanced for Φ = 00, such that the characteristic property of PCN presents a change of behaviour, like that of a strongly fissioning superheavy element to a weakly fissioning nucleus; note that 105Ag∗ is a weakly fissioning nucleus and Psurv behaves like one for a weakly fissioning nucleus for both Φ = 00 and Φ = 00. Apparently, Φ is presenting itself like a good degree-of-freedom in the DCM.Keywords: dynamical cluster-decay model, fusion cross sections, non-compound nucleus effects, non-coplanarity
Procedia PDF Downloads 302129 Mature Cystic Teratomas of Ovary: A Series of 19 Cases with Rare Malignant Transformation in Three
Authors: Parveen Kundu, Nitika Chawla, Ruchi Agarwal, Swaran Kaur
Abstract:
Background: Mature cystic teratoma is a benign, most common tumor of the ovary occurring mostly in young and middle-aged females. This study consists of 19 cases of mature cystic teratomas which were received in the Department Of Pathology over a period of two years. There were malignant transformations observed in three cases, which makes it very important for pathologists to thoroughly examine the entire specimen of mature cystic teratomas. Material and Methods: Nineteen reported cases of mature cystic teratomas were received in Deptt. Of Pathology, BPS GMC Khanpur Kalan, Sonepat, over a two-year period from November 2020 to October 2022 and reviewed retrospectively. Data regarding age, size, laterality, gross, morphological features, and surgery performed were retrieved from pathological archives. Results: In our study, the most common age of presentation was the 20-40 year age group. The most common presenting complaint was fullness in the abdomen or abdominal distension. Four out of 19 cases studied cases presented with bilateral ovarian cysts. Tumor size ranged from 6 to 20 cm in diameter. In seven cases, cysts were greater than or equal to 10 cm in diameter. Three cases showed malignant transformation. Conclusion: It is very important to thoroughly examine the contralateral ovary to rule out bilateral presentation. A furthermost thorough examination is advised in tumors of size >10 cm and in tumors with solid areas to rule out any malignant transformation.Keywords: teratoma, ovary, malignant, transformation
Procedia PDF Downloads 87128 Comparative Evaluation of Accuracy of Selected Machine Learning Classification Techniques for Diagnosis of Cancer: A Data Mining Approach
Authors: Rajvir Kaur, Jeewani Anupama Ginige
Abstract:
With recent trends in Big Data and advancements in Information and Communication Technologies, the healthcare industry is at the stage of its transition from clinician oriented to technology oriented. Many people around the world die of cancer because the diagnosis of disease was not done at an early stage. Nowadays, the computational methods in the form of Machine Learning (ML) are used to develop automated decision support systems that can diagnose cancer with high confidence in a timely manner. This paper aims to carry out the comparative evaluation of a selected set of ML classifiers on two existing datasets: breast cancer and cervical cancer. The ML classifiers compared in this study are Decision Tree (DT), Support Vector Machine (SVM), k-Nearest Neighbor (k-NN), Logistic Regression, Ensemble (Bagged Tree) and Artificial Neural Networks (ANN). The evaluation is carried out based on standard evaluation metrics Precision (P), Recall (R), F1-score and Accuracy. The experimental results based on the evaluation metrics show that ANN showed the highest-level accuracy (99.4%) when tested with breast cancer dataset. On the other hand, when these ML classifiers are tested with the cervical cancer dataset, Ensemble (Bagged Tree) technique gave better accuracy (93.1%) in comparison to other classifiers.Keywords: artificial neural networks, breast cancer, classifiers, cervical cancer, f-score, machine learning, precision, recall
Procedia PDF Downloads 277127 Correlation Analysis between the Corporate Governance and Financial Performance of Banking Sectors Using Parameter Estimation
Authors: Vishwa Nath Maurya, Rama Shanker Sharma, Saad Talib Hasson Aljebori, Avadhesh Kumar Maurya, Diwinder Kaur Arora
Abstract:
Present paper deals with problems of determining the relationship between the variables of corporate governance and financial performance of Islamic banks. Here, we dealt with the corporate governance in the banking sector, where increasing the importance of corporate governance, due to their special nature, as the bankruptcy of banks affects not only the relevant parties from customers, depositors and lenders, but also affect financial stability and then the economy as a whole. Through this paper we dealt to the specificity of governance in Islamic banks, which face double governance: Anglo-Saxon governance system and Islamic governance system. In addition, we focused our attention to measure the impact of corporate governance variables on financial performance through an empirical study on a sample of Islamic banks during the period 2005-2012 in the GCC region. Our present study implies that there is a very strong relationship between the variables of governance and financial performance of Islamic banks, where there is a positive relationship between return on assets and the composition of the Board of Directors, the size of the Board of Directors, the number of committees in the Council, as well as the number of members of the Sharia Supervisory Board, while it is clear that there is a negative relationship between return on assets and concentration ownership.Keywords: correlation analysis, parametric estimation, corporate governance, financial performance, financial stability, conventional banks, bankruptcy, Islamic governance system
Procedia PDF Downloads 516126 Reverse Supply Chain Analysis of Lithium-Ion Batteries Considering Economic and Environmental Aspects
Authors: Aravind G., Arshinder Kaur, Pushpavanam S.
Abstract:
There is a strong emphasis on shifting to electric vehicles (EVs) throughout the globe for reducing the impact on global warming following the Paris climate accord. Lithium-ion batteries (LIBs) are predominantly used in EVs, and these can be a significant threat to the environment if not disposed of safely. Lithium is also a valuable resource not widely available. There are several research groups working on developing an efficient recycling process for LIBs. Two routes - pyrometallurgical and hydrometallurgical processes have been proposed for recycling LIBs. In this paper, we focus on life cycle assessment (LCA) as a tool to quantify the environmental impact of these recycling processes. We have defined the boundary of the LCA to include only the recycling phase of the end-of-life (EoL) of the battery life cycle. The analysis is done assuming ideal conditions for the hydrometallurgical and a combined hydrometallurgical and pyrometallurgical process in the inventory analysis. CML-IA method is used for quantifying the impact assessment across eleven indicators. Our results show that cathode, anode, and foil contribute significantly to the impact. The environmental impacts of both hydrometallurgical and combined recycling processes are similar across all the indicators. Further, the results of LCA are used in developing a multi-objective optimization model for the design of lithium-ion battery recycling network. Greenhouse gas emissions and cost are the two parameters minimized for the optimization study.Keywords: life cycle assessment, lithium-ion battery recycling, multi-objective optimization, network design, reverse supply chain
Procedia PDF Downloads 157