1,823 research outputs found

    Mediating effects of broadband consumers’ behavior in India

    Get PDF
    Internet usage is rapidly growing in areas like cosmopolitan cities, semi-urban cities in India. I-enabled services offered by various government agencies, educational institutions and commercial activities force users of these services to seek superior internet access like broadband, WiMax is likely to replace traditional broadband and dial-up access soon. Interestingly, reforms in telecom sector are taking place at a rapid pace in India. Many private players started internet services affecting monopolistic public sector telecoms. The advent of private ISPs, the consumer behavior and brand choice of broadband consumers are witnessing dynamic shift in favor of private players. Cost competitiveness, transparency, paradigm shift in consumer responsiveness etc weigh in favor of Public Sector telecoms. This paper attempts to identify the factors affecting broadband consumer behavior. Further, paper studies the causes and effects, mediating effects of consumer behavior and conceptualizes a model to capture these effects. The results suggest that adoption of broadband service is playing a mediatory role in consumer satisfaction.Broadband, Adoption, Normative constructs, mediating

    Mapping of Applied Psychology Publications: A Study Based on Scimago Journal and Country Rank Database

    Get PDF
    This paper discusses about the Applied Psychology publications and its citation available in the Scimago Journal and Country Rank data base by the authors from top 15 countries (based on publications). The relevant data are collected from Scimago Journal and Country Rank data base and it was analyzed. Itshows among the Applied Psychology publications totally 99276 articles were published the maximum of 47753(48.10%) articles published by United States followed by United Kingdom with 11819(11.91%) publications during the study period

    Scientometric Analysis of Indian Citation Index (2004-2015): Profile of the Domain of Psychology Journals

    Get PDF
    Indian Citation Index database is a powerful tool to search, track, and measure and collaborate in the sciences, social sciences, arts and humanities. This paper is discussed the published research articles, citations and self-citations in the Psychology journals which are available in Indian Citation Index. There are 3333 articles published from 6 Psychology Journals. Among the journals, Indian Journal of Psychiatry occupies first position with 989 (29.68%) articles and Indian Journal of Psychological Medicine occupies second rank with 644 (19.32%) articles and Psychological Studies is in third 584 (17.52%). Further, in the year 2012, 390 (11.70%) articles are published and it is highest when comparing to other years. It is pointed out that the frequency of the journals is varying and that is one of the reasons for the strength of articles

    Bifurcations and Chaos in Time Delayed Piecewise Linear Dynamical Systems

    Full text link
    We reinvestigate the dynamical behavior of a first order scalar nonlinear delay differential equation with piecewise linearity and identify several interesting features in the nature of bifurcations and chaos associated with it as a function of the delay time and external forcing parameters. In particular, we point out that the fixed point solution exhibits a stability island in the two parameter space of time delay and strength of nonlinearity. Significant role played by transients in attaining steady state solutions is pointed out. Various routes to chaos and existence of hyperchaos even for low values of time delay which is evidenced by multiple positive Lyapunov exponents are brought out. The study is extended to the case of two coupled systems, one with delay and the other one without delay.Comment: 34 Pages, 14 Figure

    Global phase synchronization in an array of time-delay systems

    Get PDF
    We report the identification of global phase synchronization (GPS) in a linear array of unidirectionally coupled Mackey-Glass time-delay systems exhibiting highly non-phase-coherent chaotic attractors with complex topological structure. In particular, we show that the dynamical organization of all the coupled time-delay systems in the array to form GPS is achieved by sequential synchronization as a function of the coupling strength. Further, the asynchronous ones in the array with respect to the main sequentially synchronized cluster organize themselves to form clusters before they achieve synchronization with the main cluster. We have confirmed these results by estimating instantaneous phases including phase difference, average phase, average frequency, frequency ratio and their differences from suitably transformed phase coherent attractors after using a nonlinear transformation of the original non-phase-coherent attractors. The results are further corroborated using two other independent approaches based on recurrence analysis and the concept of localized sets from the original non-phase-coherent attractors directly without explicitly introducing the measure of phase.Comment: 11 pages, 13 figures, Appear in Physical Review

    Characterization of Natural Fiber Extracted from Sesbania rostrata: An Alternative Potential for Synthetic Fibers

    Get PDF
    Enriching natural materials is essential for developing eco-friendly composites in structural and automotive applications. The aim of this work is to extensively characterize new natural cellulosic fiber extracted from Sesbania rostrata stem.       S. rostrata fibers (SRFs) show cellulose content of 64.36 % with a range of tensile strength from 156 to 460 MPa and have a low density of 1.365 g/cm3. SRFs has crystallinity index of 58.41%, which is comparable with that of other common natural fibers. Furthermore, SRFs can resist the degradation of cellulose up to 246°C, which is revealed by thermogravimetric analysis.Â

    Artificial neural network based delamination prediction in composite plates using vibration signals

    Get PDF
    Dynamic loading on composite components may induce damages such as cracks, delaminations, etc. and development of an early damage detection technique for delaminations is one of the most important aspects in ensuring the integrity and safety of composite components. The presence of damages such as delaminations on the composites reduces its stiffness and further changes the dynamic behaviour of the structures. As the loss in stiffness leads to changes in the natural frequencies, mode shapes, and other aspects of the structure, vibration analysis may be the ideal technique to employ in this case. In this research work, the supervised feed-forward multilayer back-propagation Artificial Neural Network (ANN) is used to determine the position and area of delaminations in GFRP plates using changes in natural frequencies as inputs. The natural frequencies were obtained by finite element analysis and results are validated by experimentation. The findings show that the suggested technique can satisfactorily estimate the location and extent of delaminations in composite plates

    Natural Frequency based delamination estimation in GFRP beams using RSM and ANN

    Get PDF
    The importance of delamination detection can be understood from aircraft components like Vertical Stabilizer, which is subjected to heavy vibration during the flight movement and it may lead to delamination and finally even flight crash can happen because of that. Any solid structure's vibration behaviour discloses specific dynamic characteristics and property parameters of that structure. This research investigates the detection of delamination in composites using a method based on vibration signals.  The composite material's flexural stiffness and strength are reduced as a result of delaminations, and vibration properties such as natural frequency responses are altered. In inverse problems involving vibration response, the response signals such as natural frequencies are utilized to find the location and magnitude of delaminations. For different delaminated beams with varying position and size, inverse approaches such as Response Surface Methodology (RSM) and Artificial Neural Network (ANN) are utilized to address the inverse problem, which aids in the prediction of delamination size and location

    Neuro-Protective Effect of Ethanolic Extract of Trombidium Grandissimum Koch Against Aluminium Chloride (Alcl3) Induced Neurotoxicity in Albino Rats

    Get PDF
    The current goal of this investigation is to assess the ethanolic extract of T. grandissimum (EETG) against AlCl3-initiated neurotoxicity, where AlCl3 (100 mg/kg/p.o) is administered for 42 days by provoking oxidative stress followed by neurotoxicity. The evaluation of behavioural parameters such as locomotor activity, elevated plus maze, and motor incoordination, as well as biochemical parameters such as reduced glutathione, lipid peroxidation, Superoxide dismutase (SOD), Catalase (CAT), total Protein, and Acetylcholinesterase in the brain, was performed. According to the study report, behavioural changes such as dropped locomotor movements, enhanced transfer latency, and muscle weakness were often noted. Significant rising of lipid peroxides and AChE activity in rat brain tissue was observed, and activity of antioxidant enzymes like SOD, Catalase, and Reduced Glutathione decreased substantially in alcl3 treated rats compared to control, whereas EETG at both dose and standard treated rats showed a significant reduction in LPO, AChE activity and significant elevation in SOD, CAT, and GSH in brain tissues compared to AlCl3 treated rats. The findings are further supported by histopathology of the brain. This is due to the extract's enormous amount of bioactive components. Through in-silico analysis, isolation, and characterisation, future research will be required to pinpoint the chemical component responsible for the extract's observed biological effect

    Analysing security risk of a cloud computing system to produce a model for secured business environment

    Get PDF
    These days, almost all the medium and big size of businesses is using the cloud computing system to run their business across the globe and around the clock. It becomes popular and of huge application due to its characteristics such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service. Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. This is an affordable and effective place for businesses to sell and promote their goods and services. However the security problems for the cloud computing system are very significant. It can ruin the rapid development of cloud computing. In Business, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. The data privacy and service availability in cloud computing are the key security problem. The internet also provides opportunities for fraudulent behaviour and unauthorized access to business and client data. Attacks on the computer system of a business can have immediate and ongoing effects, such as targeting customers for identity crimes or infecting website visitors with malicious software. Due to having combination of various types of models in the cloud computing, the single security method cannot solve its security problem. Various traditional and new technologies and strategies together need to consider for protecting a cloud computing system totally. The aim of this paper is to bring into the deep sight of the cloud computing systems working and then to analyse the cloud computing security problem and its strategy according to the cloud computing concepts and characters. In addition to that, we are identifying the higher vulnerabilities in this type of systems and the most important threats found in the literature study related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with the possible solutions
    • …
    corecore