Communities in Avinashilingam Institute for Home Science and Higher Education for Women - AULIB-IR Central Library

Select a community to browse its collections.

Recent Submissions

Item
Seen on the shelf
(The Hindu, 2026-01-30) Nidhi Adlakha
Item
A paper a day
(The Hindu, 2026-02-09) Elango K
Item
A Hybrid Machine Learning approach for Detecting Intentional and Unintentional Insider Threats with Mitigation through Behavioral Biometrics and User Profiling Mechanism
(Avinashilingam, 2025-07) Asha S; Guide - Dr. D. Shanmugapriya
Insider threat is a potential threat to an organization that results in financial and reputation losses while exposing sensitive information. Past research extensively focused on external threats, and overlooked on both intentional and unintentional insider threats.Several researchers majorly focused on detecting such insider activities but fail to mitigate both intentional and unintentional insider threats. Few challenges such as mishandling imbalanced dataset and fail to incorporate feature engineering techniques, limited mitigation strategies are encountered. This research employs a hybrid machine learning approach to identify insider threats and incorporated behavioural biometrics with user profiling to mitigate both intentional and unintentional insiders effectively. A methodology comprising of three phases is proposed. It consist of Preprocessing and Insider Detection (P&ID) in Phase I, Unintentional Insider Mitigation (UIM) in Phase II, and Intentional Insider Mitigation (IIM) in Phase III. P&ID consist of two layers - Preprocessing, and Insider Detection. In Layer 1, log data is preprocessed using data integration, encoding and tuned the nearmiss-2 sampling technique to obtain a balanced data to diminish the class imbalance problem. In Layer 2, a hybrid B-SVM combining Support Vector Machines (SVM) and Balanced Iterative Reducing and Clustering using Hierarchies (BIRCH) is applied. It classifies users into genuine, intentional insiders, and unintentional insiders. The proposed method achieved a 99.15% detection accuracy, with a low misclassification rate of 0.85% for detecting both intentional and unintentional insider threats. Once unintentional insiders are detected, the unintentional insiders are mitigated in UIM phase. UIM phase consist of two layers – Feature engineering, and Core behavior identification. In Layer 1, Clonal Kernel Principal Component Analysis (CKPCA) is proposed for feature engineering. CKPCA integrates population subset selection, kernel mean embedding, and dimensionality reduction to improve feature representation. These features are further analyzed using Deep Belief Networks (DBN) in Layer 2 that achieved 99.84% authentication accuracy and a 0.15% Equal Error Rate (EER) of 0.15%. This phase significantly minimizes false alarms and ensures a reliable mitigation process for unintentional insiders. In IIM phase, the detected intentional insiders are mitigated using user profiling mechanism based on their authentication outcome. IIM phase consist of three layers – Data pre-processing, Model training and evaluation, and User profiling. In Layer 1, data pre-processing is done using label encoding and train-test split. In layer 2, Decision tree is modeled to categorize users low-risk and high-risk. In Layer 3, Low-risk users with legitimate activities are profiled into the Allowlist, while users displaying malicious intent with high-risk are placed on the Denylist. This adaptive profiling ensures that intentional threats are neutralized without affecting genuine users. The methodology was validated using two datasets namely the CERT Insider Threat Dataset and the CIC Darknet Dataset. P&ID detected 8 intentional and one unintentional insider among 250,078 daily logs using CERT Dataset. P&ID is validated with darknet dataset, detected 4,783 intentional-Darknet users and 68 unintentional- Darknet users where (VPN: 42) (Tor: 21) (NonVPN: 5) among 134,305 daily activities. UIM mitigated one unintentional insider as an intentional insider using CERT log activities. UIM mitigated 68 unintentional-Darknet users as 64 Intentional-Darknet and 4 benign users using darknet dataset. IIM profiled 57 genuine users in Allowlist and 8 intentional insiders in Denylist using CERT dataset. Using CIC Darknet dataset, the IIM profiled 5063 benign users in Allowlist and 4847 Intentional-Darknet users in Denylist. This study offers a practical and highly effective solution for insider threats in environments where user log data is analyzed. By combining hybrid machine learning models with behavioral biometrics and user profiling, the approach ensures accurate detection and mitigation of both intentional and unintentional threats. This approach can be applied in any environment where user log is prevalent.
Item
Genomic and epidemiological profile of cervical cancer patients - identifying risk factors, pathways and novel variants through integrated survey and whole exome sequencing strategies
(Avinashilingam, 2025-01) Sudha B; Guide - Dr. S. Sumathi
Cervical cancer is a serious global health concern in Tamil Nadu, India. It significantly affects rural women due to their fewer facilities and lesser knowledge regarding healthcare. The study was designed to examine cervical cancer's sociodemographic, clinical, and genetic aspects, thereby identifying existing knowledge gaps, enhancing clinical perception, and determining molecular targets for precision medicine. The socio-demographic assessment revealed poor awareness of the symptoms, preventive measures, and immunization, the most severe deficit in rural areas. Clinical profile analysis of cervical cancer patients from Sri Ramakrishna Hospital, Coimbatore, Tamil Nadu, revealed that middle-aged rural women were the most affected and squamous cell carcinoma is the predominant subtype. The advanced stage of diagnosis was typical, with the prevalent symptoms being abdominal pain and post-menopausal bleeding. It also proved that cisplatin combination therapy is effective enough to change survival results. Considering the dominance of squamous cell cervical cancer, we have tried to profile the mutational patterns from biopsy samples using whole exome sequencing. Genomic analysis of 37 detrimental mutations found in critical genes and confirmation of novel variants in genes like POM121C, PRICKLE1, and GLIS3 by Sanger sequencing revealed bioinformatic dysregulated pathways like Hippo and TGF-beta signaling pathways, highlighting the molecular complexity of the disease and potential targets for precision treatment. Despite the limitations of having insufficient biopsy samples, the study calls for immediate improvement in public awareness, early detection strategies, and genomic-based therapy tailored to individual needs. These results offer crucial insight into the clinical and molecular landscape of cervical cancer and pave the way for precision medicine approaches to reduce mortality rates among affected populations.
Item
Exploring Neutrosophic Set Variants: Investigating Topological Insights, Approximation Spaces and Decision-Making Approaches
(Avinashilingam, 2025-08) Bhuvaneshwari S; Guide - Dr. C.Antony Crispin Sweety
List of Notations and Abbreviations : FS Fuzzy Set IVFS Interval Valued Fuzzy Set IFS Intuitionistic Fuzzy Set NS Neutrosophic Set SVNS Single Valued Neutrosophic Set TFS Temporal Fuzzy Set TIFS Temporal Intuitionistic Fuzzy Set PFS Pythagorean Fuzzy Set SFS Spherical Fuzzy Set PNS Pythagorean Neutrosophic Set NSS Neutrosophic Spherical Set FNS Fermatean Neutrosophic Set FTNS Fermatean Temporal Neutrosophic Set IVFNS Interval Valued Fermatean Neutrosophic Set FNCS Fermatean Neutrosophic Cubic Set PNT Pythagorean Neutrosophic Topology PNP Pythagorean Neutrosophic Point PNTS Pythagorean Neutrosophic Topological Space PNN Pythagorean Neutrosophic Neighbourhood PNOS Pythagorean Neutrosophic Open Set PNCS Pythagorean Neutrosophic Closed Set NST Neutrosophic Spherical Topology NSTS Neutrosophic Spherical Topological Space NSP Neutrosophic Spherical Point NSN Neutrosophic Spherical Neighbourhood NSOS Neutrosophic Spherical Open Set NSCS Neutrosophic Spherical Closed Set FNT Fermatean Neutrosophic Topology FNTS Fermatean Neutrosophic Topological Space FNP Fermatean Neutrosophic Point FNN Fermatean Neutrosophic Neighbourhood FNOS Fermatean Neutrosophic Open Set FNCS Fermatean Neutrosophic Closed Set BT-FNS Bitopologies of Fermatean Neutrosophic Set BT-FNSubs Bitopologies of Fermatean Neutrosophic Subsets FTNS Fermatean Temporal Neutrosophic Set FNGO Fermatean Neutrosophic Gradation of Openness FNGC Fermatean Neutrosophic Gradation of Closedness gp- map Gradation preserving map In-BTF Category of all-inclusive BT-FNSubs and continuous functions FNr-top Category of rth graded FNTSs and gp-maps FT-NTS Fermatean Temporal Neutrosophic Topological Spaces SFT-NT Fermatean Temporal Neutrosophic Topology in Šostak’s sense CFT-NT Fermatean temporal neutrosophic topology in Chang’s sense LFT-NT Fermatean Temporal neutrosophic topology in Lowen’s sense FTN- closed Fermatean Temporal Neutrosophic closed FTNRS Fermatean Temporal Neutrosophic Rough Set FNRAS Fermatean Neutrosophic Rough Approximation Space FN-r Fermatean Neutrosophic relation LT Linguistic Term MCDM Multi-Criteria Decision-Making CODAS Combinative Distance-Based Assessment ÐϺ Decision Maker SWAM Spherical Weighted Arithmetic Mean SWGM Spherical Weighted Geometric Mean FWAM Fermatean Weighted Arithmetic Mean FWGM Fermatean Weighted Geometric Mean D-Mx Decision Matrix NS D-Mx Neutrosophic Spherical Decision Matrix FN D-Mx Fermatean Neutrosophic Decision Matrix PIS Positive Ideal Solution NIS Negative Ideal Solution SF Score Function AC Accuracy Function TMNSDM Tangent Metric Neutrosophic Spherical Distance Measure TMFNDM Tangent Metric Fermatean Neutrosophic Distance Measure TOPSIS Technique for Order Preference by Similarity to Ideal Solution ED Euclidean distance N-ED Normalized Euclidean Distance HD Hamming Distance N-HD Normalized Hamming Distance SMSVND Sine Metric Single- Valued Neutrosophic Distance : The scope of this thesis is to explore some of the existing neutrosophic variants and introduce some new types of neutrosophic variants. The notion of extended Pythagorean neutrosophic set, neutrosophic spherical set, and Fermatean neutrosophic set has been examined and the concepts of topology, rough set, operators, and measures has been developed and analysed. The idea of the proposed logic is extended to define Fermatean neutrosophic cubic set to manage high levels of uncertainty and vagueness and also to introduce Fermatean temporal neutrosophic set to deal with time moments. Further, the thesis combines rough set concept with Fermatean temporal neutrosophic set to construct a new class of rough set called Fermatean temporal neutrosophic rough set. A new class of aggregation operators for neutrosophic variant has been developed and used in a COmbinative Distance-based ASsessment (CODAS) evaluation method. Furthermore, tangent metric neutrosophic spherical distance measure and tangent metric Fermatean neutrosophic distance measure are formulated and applied to the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method. Illustrative examples have been provided to validate and compare the defined aggregation operators and distance measures.
Item
Antioxidant Potential of Cucurbita Pepo L Pumpkin Seed Extract in the treatment of Stress Induced Male Infertility An in Vivo Study
(Avinashilingam, 2025-01) Amrutha B Nair; Guide - Rajeswari P.A
Infertility is a growing global health concern, with male factors contributing to nearly 50% of reported cases. Environmental toxicants such as lead are known to impair male reproductive function primarily through oxidative stress. Pumpkin (Cucurbita pepo L.) seeds, often discarded as biowaste, are rich in bioactive compounds and possess potential antioxidant properties. However, their role in stress-induced male infertility remains inadequately explored. The present study investigated the ameliorative effects of C. pepo seed aqueous extract against lead acetate induced reproductive toxicity in male Wistar rats. The study was conducted in five phases involving nutritional and antinutritional profiling, phytochemical and chromatographic analyses, in vitro antioxidant assays, acute oral toxicity evaluation, and an in vivo experimental study. Thirty rats were divided into five groups: control, lead acetate (30 mg/kg bw), seed extract alone (1000 mg/kg bw), lead acetate with low-dose extract (100 mg/kg bw), and lead acetate with high-dose extract (1000 mg/kg bw). Oral administration was carried out intermittently (15th, 30th and 45th days) for a duration of 45 days. The parameters such as body weight and individual organ weight measurements, sperm parameters, hormonal assays, serum and testis antioxidant assays, and histopathology analysis of reproductive organs were carried out using established methodologies. Lead acetate exposure resulted in significant reductions in body and individual organ weights, sperm count, motility, viability, reproductive hormone levels (FSH, LH and testosterone) and antioxidant enzyme levels (SOD, GPx, catalase) along with increased sperm abnormalities, semen pH, lipid peroxidation (MDA), and histopathological alterations in reproductive organ tissues. Co-administration of C. pepo seed extract, particularly at the higher dose, significantly ameliorated these alterations in a dose-dependent manner. The key finding of this research was that the C. pepo seed extract treatment has mitigated lead induced toxicity and exhibited significant improvement in their reproductive potential owing to the antioxidant property of their phytochemical components. Keywords: Male Infertility, Oxidative Stress, Lead Acetate, Cucurbita pepo L. Seeds, Antioxidant Potential
Item
Acquisition and adoption of Digital Competency among Women Entrepreneurs in the Informal Sector
(Avinashilingam, 2025-07) Mary Treasa C P; Guide - Dr. P .Shanthi
Digital competency has emerged as a critical requirement for business development, sustained growth, and long-term competitiveness across sectors. The ability to navigate digital tools and platforms enhances operational efficiency, facilitates access to broader markets, strengthens customer engagement, and improves financial and administrative management. In this context, Digital skills serve as a vital indicator of an individual’s capacity to remain competitive, adapt to technological advancements, and leverage innovation for sustainable business outcomes. In the absence of adequate digital proficiency, many face the risk of exclusion from mainstream economic activities. The present study examines the influence of core antecedents, namely digital competency, performance expectancy, effort expectancy, social influence, and facilitating conditions, on behavioural intention, and how these factors contribute to the actual usage of technology in business operations. The study adopts the Unified Theory of Acceptance and Use of Technology (UTAUT) as its theoretical framework, which effectively captures the interplay between these constructs and their impact on technology adoption. The study is both descriptive and analytical. The locale of the study is Palakkad district in Kerala, India, which was purposively selected due to its prominence for largely informal micro-enterprises. Primary data were collected from a sample of 240 informal women entrepreneurs using a structured questionnaire, and the internal consistency of the instrument was confirmed with a Cronbach’s alpha value exceeding 0.70, indicating acceptable reliability. In addition, secondary sources such as government reports, published research articles, and institutional databases were utilized to complement and contextualize the findings. Targeted Digital competency intervention addresses the digital skill gap by systematically enhancing individual abilities in preparing training modules across key dimensions of digital competency and business applications for business operations. Moreover, technology adoption is closely linked to behavioural factors of technology adoption. Rank analysis was employed to identify the most significant challenges to technology adoption. To assess whether a significant mean difference existed in digital competency levels of women in the informal sector before and after the training intervention, the Wilcoxon Signed-Rank Test was applied. Additionally, the Kruskal-Wallis Test and the Mann-Whitney U Test were used to examine significant differences in digital competency across various socio-demographic and business profile variables of the respondents. The Structural Equation Modelling (SEM) was conducted to evaluate the influence of key antecedents of behavioural intention on the actual use of technology The result indicated that digital competency was found to be significantly influenced by performance expectancy, indicating that enhanced digital skills improve perceptions of technology’s usefulness in business operations. This perception of performance expectancy, in turn, had a strong positive impact on behavioural intention to adopt technology. Social influence also emerged as a significant predictor of behavioural intention, emphasising the role of peer support and community validation in shaping technology adoption decisions. Furthermore, both digital competency and behavioural intention significantly contributed to the actual use of technology in business, confirming their pivotal roles in the adoption process. Behavioural intention was also identified as a key mediator between social influence and actual technology usage. On the other hand, Digital competency did not influence effort expectancy, suggesting that users still perceive new technologies as requiring effort despite increased digital proficiency. Effort expectancy and facilitating conditions did not significantly affect behavioural intention, indicating that ease of use and external support were less influential in determining intent to adopt technology. The sustained technology adoption is more closely tied to internal factors such as digital competency and perceived performance benefits than to structural or external enablers alone. Keywords: Women Entrepreneurs, Technology Adoption, Digital Competency, Behavioural Intention, Performance Expectancy, Effort Expectancy, Social Influence, Facilitating Conditions, Actual Usage.
Item
Exploring Entrepreneurship as a Coping Strategy for Mothers of Visually Challenged Children
(Avinashilingam, 2025-08) Nirmala Fousta. A; Guide - Dr. Rymala Mathen
Exploring Entrepreneurship as a Coping Strategy for Mothers of Visually Challenged Children :Mothers of visually challenged children face persistent emotional, social, and economic challenges arising from intensive caregiving responsibilities, societal stigma, financial insecurity, and limited institutional support. These stressors often lead to elevated parenting stress, reduced self-esteem, and diminished personal and social well-being. The present study investigates the effectiveness of entrepreneurship as a coping strategy to alleviate stress and enhance the overall quality of life of mothers of visually challenged children. Anchored in Resource Management Theory, the study conceptualises time, energy, and financial resources as critical constraints and examines how these can be effectively reorganised through life skills development and entrepreneurial engagement. A mixed-methods research design was adopted, and the study was conducted in Chennai, Tamil Nadu, across four systematic phases. Phase I, a cross-sectional survey, comprised a total sample of 423 mothers of visually challenged children drawn from eight special schools and organisations to assess socio-economic characteristics, factors leading to stress, parenting stress levels, and personal and social well-being. Phase II employed a pre-test and post-test intervention design with a sub-sample of 50 mothers, who participated in a structured Life Skills Training (LST) and handskills training programme focusing on stress management, decision-making, positive thinking, and income-generating skills. Phase III involved 20 trained mothers who established and operated a small-scale vending enterprise on the school campus (St. Louis Thai Store), while Phase IV evaluated the impact of entrepreneurship and satisfaction levels through detailed case studies of 10 mothers. Data were analysed using descriptive statistics, independent and paired ttests, one-way ANOVA, and correlation analysis to examine differences and relationships between socio-demographic variables, stress factors, parenting stress, and personal and social well-being. The findings revealed statistically significant differences at the 1 per cent level, indicating that socio-demographic variables significantly influenced stress and well-being outcomes. Post-intervention results demonstrated a significant reduction in parenting stress and substantial improvement in life skills, emotional resilience, self-confidence, decision-making ability, financial independence, and personal and social well-being among the mothers. The study further establishes that entrepreneurship, when supported through structured training,institutional backing, and community-based frameworks, functions not only as a viable economic intervention but also as a powerful psychosocial coping mechanism.The integration of livelihood creation with emotional and social support contributed to enhanced resilience, improved caregiving capacity, and sustainable empowerment of mothers of visually challenged children. The study recommends the incorporation of inclusive livelihood initiatives, school-based entrepreneurial models, and supportive policy frameworks to promote the long-term well-being and socioeconomic security of caregivers of children with disabilities. Keywords: Coping strategy, Entrepreneurship, Life skills training, Mothers of visually challenged children, Parenting stress, Quality of life, Resource management,Visual impairment.
Item
A Neo-Marxist Study of the Select Retellings of Mahabharata
(Avinashilingam, 2024-03) Kushma Kumari T V; Guide - Dr. A. Vijayarani
Myth is a dynamic and man-made belief to maintain the culture of a society. It is revisited and altered according to the necessity of people and acts as a guiding source for people. The retellings of Mahabharata fascinate the researchers to apply literary theories and experiment it from different points of view. The present study is an attempt to explore on the retellings of Mahabharata by Devudtt Pattanaik (Jaya: an Illustrated Retelling of Mahabharata), Anand Neelakantan (Ajaya: Roll of the Dice), Kavita Kane (Karna’s Wife: the Outcast’s Queen) and Ashutosh Nadkar (Shakuni: Master of the Game) by applying a Neo-Marxian concepts ‘Theory of Cultural Hegemony’ and ‘Role of Intellectuals’ by Antonio Gramsci. The researcher has taken both male and female characters from the chosen primary texts to discuss about the cultural domination prevailed during the ancient time and has also highlighted on the functional solution enumerated by Gramsci with the aid of the characters. The study explicates on the retellings of Mahabharata with certain aspects from Gramsci’s ‘Theory of Cultural Hegemony’ and ‘Role of Intellectuals’. Elucidates on the purpose of retelling of Mahabharata by critically analysing the selected texts and elaborates on the cultural aspects from them. The study also draws attention to the culture based dominations, capitalist ideologies and gives a practical solution for domination in accordance with Gramsci. The area of research is relevant in this present scenario to highlight the cultural hegemony which still exists among the Indians in different forms. The work is significant as it can relate the issues depicted by the authors of the selected retellings of Mahabharata with our current society.