Search results
1 – 10 of over 2000Prabhugouda Mallanagouda Patil, Bharath Goudar and Ebrahim Momoniat
Many industries use non-Newtonian ternary hybrid nanofluids (THNF) because of how well they control rheological and heat transport. This being the case, this paper aims to…
Abstract
Purpose
Many industries use non-Newtonian ternary hybrid nanofluids (THNF) because of how well they control rheological and heat transport. This being the case, this paper aims to numerically study the Casson-Williamson THNF flow over a yawed cylinder, considering the effects of several slips and an inclined magnetic field. The THNF comprises Al2O3-TiO2-SiO2 nanoparticles because they improve heat transmission due to large thermal conductivity.
Design/methodology/approach
Applying suitable nonsimilarity variables transforms the coupled highly dimensional nonlinear partial differential equations (PDEs) into a system of nondimensional PDEs. To accomplish the goal of achieving the solution, an implicit finite difference approach is used in conjunction with Quasilinearization. With the assistance of a script written in MATLAB, the numerical results and the graphical representation of those solutions were ascertained.
Findings
As the Casson parameter
Originality/value
There is no existing research on the effects of Casson-Williamson THNF flow over a yawed cylinder with multiple slips and an angled magnetic field, according to the literature.
Details
Keywords
Shekhar S. Patil and Keith R. Molenaar
Proper identification, allocation, and pricing of risks are critical to effective procurement and project delivery, particularly when contracts specify the intended performance…
Abstract
Proper identification, allocation, and pricing of risks are critical to effective procurement and project delivery, particularly when contracts specify the intended performance instead of how the work is to be performed. This paper presents an overview of the sources of project risks when performance specifications are used for highway infrastructure procurement. The findings are based on a comprehensive literature review and interviews with subject-matter experts involved in developing performance specifications for highway infrastructure. The authors conclude that wider use of performance specifications in U.S. highway infrastructure construction requires a fundamental reassessment of risk allocation and pricing. Highway agencies and the contractors need to realign their respective organizational capabilities with the goal of using performance specifications as a facilitator of innovation, a goal that remains elusive after decades of applied research.
Shekhar S. Patil and Keith R. Molenaar
Proper identification, allocation, and pricing of risks are critical to effective procurement and project delivery, particularly when contracts specify the intended performance…
Abstract
Proper identification, allocation, and pricing of risks are critical to effective procurement and project delivery, particularly when contracts specify the intended performance instead of how the work is to be performed. This paper presents an overview of the sources of project risks when performance specifications are used for highway infrastructure procurement. The findings are based on a comprehensive literature review and interviews with subject-matter experts involved in developing performance specifications for highway infrastructure. The authors conclude that wider use of performance specifications in U.S. highway infrastructure construction requires a fundamental reassessment of risk allocation and pricing. Highway agencies and the contractors need to realign their respective organizational capabilities with the goal of using performance specifications as a facilitator of innovation, a goal that remains elusive after decades of applied research.
Shubangini Patil and Rekha Patil
Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…
Abstract
Purpose
Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.
Design/methodology/approach
The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.
Findings
Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.
Originality/value
Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.
Details
Keywords
Lalit Narendra Patil, Hrishikesh P. Khairnar and S.G. Bhirud
Electric vehicles are well known for a silent and smooth drive; however, their presence on the road is difficult to identify for road users who may be subjected to certain…
Abstract
Purpose
Electric vehicles are well known for a silent and smooth drive; however, their presence on the road is difficult to identify for road users who may be subjected to certain incidences. Although electric vehicles are free from exhaust emission gases, the wear particles coming out from disc brakes are still unresolved issues. Therefore, the purpose of the present paper is to introduce a smart eco-friendly braking system that uses signal processing and integrated technologies to eventually build a comprehensive driver assistance system.
Design/methodology/approach
The parameters obstacle identification, driver drowsiness, driver alcohol situation and heart rate were all taken into account. A contactless brake blending system has been designed while upgrading a rapid response. The implemented state flow rule-based decision strategy validated with the outcomes of a novel experimental setup.
Findings
The drowsiness state of drivers was successfully identified for the proposed control map and set up vindicated with the improvement in stopping time, atmospheric environment and increase in vehicle active safety regime.
Originality/value
The present study adopted a unique approach and obtained a brake blending system for improved braking performance as well as overall safety enhancement with rapid control of the vehicle.
Details
Keywords
Ashish Arunrao Desai and Subim Khan
The investigation aims to improve Nd: YAG laser technology for precision cutting of carbon fiber reinforcing polymers (CFRPs), specifically those containing newly created resin…
Abstract
Purpose
The investigation aims to improve Nd: YAG laser technology for precision cutting of carbon fiber reinforcing polymers (CFRPs), specifically those containing newly created resin (NDR) from the polyethylene and polyurea group, is the goal of the study. The focus is on showing how Nd: YAG lasers may be used to precisely cut CFRP with NDR materials, emphasizing how useful they are for creating intricate and long-lasting components.
Design/methodology/approach
The study employs a systematic approach that includes complicated factorial designs, Taguchi L27 orthogonal array trials, Gray relational analysis (GRA) and machine learning predictions. The effects of laser cutting factors on CFRP with NDR geometry are investigated experimentally, with the goal of optimizing the cutting process for greater quality and efficiency. The approach employs data-driven decision-making with GRA, which improves cut quality and manufacturing efficiency while producing high-quality CFRP composites. Integration of machine learning models into the optimization process significantly boosts the precision and cost-effectiveness of laser cutting operations for CFRP materials.
Findings
The work uses Taguchi L27 orthogonal array trials for systematically explore the effects of specified parameters on CFRP cutting. The cutting process is then optimized using GRA, which identifies influential elements and determines the ideal parameter combination. In this paper, initially machining parameters are established at level L3P3C3A2, and the optimal machining parameters are determined to be at levels L3P2C3A3 and L3P2C1A2, based on predictions and experimental results. Furthermore, the study uses machine learning prediction models to continuously update and optimize kerf parameters, resulting in high-quality cuts at a lower cost. Overall, the study presents a holistic method to optimize CFRP cutting processes employing sophisticated techniques such as GRA and machine learning, resulting in better quality and efficiency in manufacturing operations.
Originality/value
The novel concept is in precisely measuring the kerf width and deviation in CFRP samples of NDR using sophisticated imaging techniques like SEM, which improves analysis and precision. The newly produced resin from the polyethylene and polyurea group with carbon fiber offers a more precise and comprehensive understanding of the material's behavior under different cutting settings, which makes it novel for kerf width and kerf deviation in their studies. To optimize laser cutting settings in real time while considering laser machining conditions, the study incorporates material insights into machine learning models.
Details
Keywords
B.S. Patil and M.R. Suji Raga Priya
The purpose of this study is to target utilizing Human resources (HRs) data analytics that may enhance strategic business, but little study has examined how it affects components…
Abstract
Purpose
The purpose of this study is to target utilizing Human resources (HRs) data analytics that may enhance strategic business, but little study has examined how it affects components. Data analytics, HRM and strategic business require empirical investigations and how to over come HR data analytics implementation issues.
Design/methodology/approach
A semi-systematic methodology for its evaluation allows for a more complete examination of the literature that emerges theoretical framework and a structured survey questionnaire for quantitative data collection from IT sector personnel. SPSS analyses data.
Findings
Future research is essential for organisations to exploit HR data analytics’ performance-enhancing potential. Data analytics should complement human judgment, not replace it. This paper details these transitions, the important contributions to theory and practice and future research.
Research limitations/implications
Data analytics has grown rapidly and might make HRM practices faster, more efficient and data-driven. HR data analytics may improve strategic business. HR data analytics on employee retention, engagement and organisational success is insufficient. HR data analytics may boost performance, but there is limited proof. The authors do not know how HRM data analytics influences firms and employees.
Originality/value
Data analytics offers HRM new opportunities, along with technical and ethical challenges. This study makes a significant contribution to HR data analytics, evidence-based practice and strategic business literature. In addition to estimating turnover risk, identifying engagement factors and planning interventions to increase retention and engagement, HR data analytics can also estimate the risk of employee attrition.
Details
Keywords
Rajeshwari S. Patil and Nagashettappa Biradar
Breast cancer is one of the most common malignant tumors in women, which badly have an effect on women's physical and psychological health and even danger to life. Nowadays…
Abstract
Purpose
Breast cancer is one of the most common malignant tumors in women, which badly have an effect on women's physical and psychological health and even danger to life. Nowadays, mammography is considered as a fundamental criterion for medical practitioners to recognize breast cancer. Though, due to the intricate formation of mammogram images, it is reasonably hard for practitioners to spot breast cancer features.
Design/methodology/approach
Breast cancer is one of the most common malignant tumors in women, which badly have an effect on women's physical and psychological health and even danger to life. Nowadays, mammography is considered as a fundamental criterion for medical practitioners to recognize breast cancer. Though, due to the intricate formation of mammogram images, it is reasonably hard for practitioners to spot breast cancer features.
Findings
The performance analysis was done for both segmentation and classification. From the analysis, the accuracy of the proposed IAP-CSA-based fuzzy was 41.9% improved than the fuzzy classifier, 2.80% improved than PSO, WOA, and CSA, and 2.32% improved than GWO-based fuzzy classifiers. Additionally, the accuracy of the developed IAP-CSA-fuzzy was 9.54% better than NN, 35.8% better than SVM, and 41.9% better than the existing fuzzy classifier. Hence, it is concluded that the implemented breast cancer detection model was efficient in determining the normal, benign and malignant images.
Originality/value
This paper adopts the latest Improved Awareness Probability-based Crow Search Algorithm (IAP-CSA)-based Region growing and fuzzy classifier for enhancing the breast cancer detection of mammogram images, and this is the first work that utilizes this method.
Details
Keywords
Sateesh V. Shet, S.V. Patil and Meena R. Chandawarkar
The purpose of this paper is to explore the relationship between competency-based performance management and organizational effectiveness (OE). It signifies the importance of…
Abstract
Purpose
The purpose of this paper is to explore the relationship between competency-based performance management and organizational effectiveness (OE). It signifies the importance of developing competency-based performance concept in organizations. Since conventional performance management systems (PMSs) are diminishing and as organizations are looking for breakthrough PMSs, this research attempted to fill the gap from stakeholder’s perspective – employee, manager and organization in devising new approach in PMS.
Design/methodology/approach
The research design involved developing scale for “competency-based superior performance” and validating scale for “organizational effectiveness,” The data for this survey are collected from 292 respondents through structured questionnaire. Hypotheses depicting aforementioned relationships were empirically tested in the context of competency-based performance practices in organizations based in India. Structural equation modeling (SEM) technique was used for data analysis.
Findings
The empirical results provide methods to accelerate the performance management initiatives based on a leadership competency model (LCM), which are necessary for building performance culture in the organization. The paper contributes by developing a new scale for measuring competency-based performance practices. The scale for OE is revisited. A positive relationship between competency-based superior performance and OE with productivity, adaptability and flexibility has been empirically confirmed using SEM.
Research limitations/implications
The paper limits the performance measurement concept using leadership competencies.
Practical implications
The developed model will act as a building block for performance measurement in organizations. This paper promotes LCM to be applied in creating a performance-based culture.
Originality/value
This is a unique attempt to test the relationship between competency-based performance management and OE.
Details
Keywords
Sanjaykumar R. Gangurde and Saurabh S. Patil
The purpose of this paper is to apply the proposed methodology to develop the product as per customer’s requirements (CRs) and increase customer satisfaction (CS).
Abstract
Purpose
The purpose of this paper is to apply the proposed methodology to develop the product as per customer’s requirements (CRs) and increase customer satisfaction (CS).
Design/methodology/approach
The companies are using different methods to identify CRs and translate these requirements into new products. The Kano model is used to identify CRs. The result of the Kano model is used in quality function deployment (QFD) to decide the priority for improvements of CRs and the technical requirements.
Findings
The integration of the Kano model and QFD is applied on the mobile phone. The Kano model helps to find out the CRs which affect the CS, such as attractive (A) attribute, one (O)-dimensional attribute and must be (M) attribute. The QFD method helps to translate the CRs into technical requirements so that the designer can decide priority of requirements for improvement or new product development.
Research limitations/implications
The proposed methodology can be applied to different consumers as well as industrial products.
Originality/value
The Kano model has been used in manufacturing as well as service sector. This work explores its usefulness and applicability for consumer and industrial products.
Details