13 research outputs found

    Gender Differences in the Use of FTAs when Reporting Incidents of UI: An Indian Study

    Get PDF
    The study, conducted in an Indian organization, aims to examine differences, if any, across genders in the use of face threatening acts (FTAs) while reporting incidents of upward influence (UI). The nature of incidents reported for use of UI entails the possible use of FTAs, that is, challenging the positive or negative face of the target to achieve certain desired objectives. Given research evidence on the differences in communication styles between men and women, we examined the possibility of any such differences in the use of FTA in reported speech within an organization. No significant differences were found between women and men in the use of FTAs. When the target was of the opposite gender as the agent, the latter was more likely to use either bald on-record or on-record with redressive action strategy for influencing. In cases where both the interactants were of the same gender, the agent generally used FTAs such as on-record with redressive action and solidarity politeness to gain compliance. A combination of UI strategies was employed in such instances.

    Early diagnosis, a step towards reducing mortality in placenta accreta spectrum: a case series

    Get PDF
    The worldwide incidence of placenta accrete spectrum (PAS) is increasing day by day, mostly due to the increasing trends in caesarean section (CS) rates. PAS is accountable for high maternal morbidity and mortality as it is associated with extensive haemorrhage, which often requires hysterectomy, multiple blood and blood product transfusions, ureteric and bladder injuries and prolonged ICU stay. The aim of this case series is to highlight the importance of early diagnosis and high degree of suspicion of PAS for a planned management in decreasing maternal morbidity and mortality. Antenatal patients who were associated with PAS and managed in obstetrics and gynaecology department, Kalinga institute of medical sciences, Bhubaneswar during the time period of 2 years were critically reviewed and are being presented as case series. High degree of suspicion, pre operative radiological diagnosis, well preparedness and multidisciplinary approach help us in reducing the maternal mortality and morbidity significantly. Conservative management of PAS can preserve future fertility but should only be done in hospitals with 24 hour emergency care and enough expertise as it carries high chances of maternal complications

    DeMalFier: Detection of Malicious web pages using an effective classifier

    Get PDF
    The web has become an indispensable global platform that glues together daily communication, sharing, trading, collaboration and service delivery. Web users often store and manage critical information that attracts cybercriminals who misuse the web and the internet to exploit vulnerabilities for illegitimate benefits. Malicious web pages are transpiring threatening issue over the internet becaus

    A study of practical aspects of menstrual hygiene -A Rural community based study

    Get PDF
    Method: Data collection regarding their current knowledge about menstruation & menstrual hygiene was collected by using a pre-tested questionnaire. Topics included-concerning menstruation, source of information, menstrual hygiene. This was explained to the girls going to school in their classroom after taking permission from the school authority. Result : 1. The mean age -14.5 yrs, Minimum age -11 yrs, Maximum age -20yrs 2. Menstrual related problem--Regular menstrual cycle -73% Nature of bleeding -Moderate -64 %, Heavy -22 %, Scanty -14 % 3. Other complaints during menstrual cycleAbdominal pain -59.25 %, Giddiness -15%, Nausea and vomiting -18 %, Generalised weakness -47 % girls, White discharge -22 % 4. Menstrual hygiene Taking regular bath.-90 %, Cleaning of external genitals-77 %, Use of clothes -35%, Sanitary napkins -65 %. Nutrition - According to B.M.I.-55.55 % in healthy and 44.45% were underweight group

    ReP-ETD: A Repetitive Preprocessing technique for Embedded Text Detection from images in spam emails

    Get PDF
    Email service proves to be a convenient and powerful communication tool. As internet continues to grow, the type of information available to user has shifted from text only to multimedia enriched. Embedded text in multimedia content is one of the prevalent means for delivering messages to content viewers. With the increasing importance of emails and the incursions of internet marketers, spam has become a major problem and has given rise to unwanted mails. Spammers are continuously adopting new techniques to evade detection. Image spam is one such technique where in embedded text within images carries the main information of the spam message instead of text based spam. Currently, image spam is evaluated to be roughly 50% of all spam traffic and is still on the rise, thus a serious research issue. Filtering mails is one of the popular approaches used to block spam mails. This work proposes new model ReP-ETD (Repetitive Pre-processing technique for Embedded Text Detection) for efficiently and accurately detecting spam in email images. The performance of the proposed ReP-ETD model has been evaluated across the identified parameters and compared with other existing models. The simulation results demonstrate the effectiveness of the proposed model

    Dynamic hierarchical communication paradigm for wireless sensor networks : A centralized, energy efficient approach

    No full text
    Effective utilization of limited power resources by the sensors is pre-eminent to Wireless Sensor Networks. Organizing the network into balanced clusters based on assigning equal number of sensors to each cluster may have the consequence of unbalanced load on the cluster heads. By-product of this is unbalanced consumption of energy by the nodes which leads to minimization of network lifetime. We put forth a Sink administered Load balanced Dynamic Hierarchical Protocol (SLDHP) to balance the load on the principal nodes. Hierarchical layout of the sensors endows the network with increased lifespan. Outcome of this protocol also includes substantial saving of the energy consumed by the nodes. Simulation results indicate significant improvement of performance over Base station Controlled Dynamic Clustering Protocol (BCDCP). © 2008 IEEE

    Sink administered load balanced dynamic hierarchical protocol in wireless sensor networks

    No full text
    Effective utilization of limited power resources by the sensors is pre-eminent to the Wireless Sensor Networks. Organizing the network into balanced clusters based on assigning equal number of sensors to each cluster may have the consequence of unbalanced load on the cluster heads. By-product of this is unbalanced consumption of the energy by the nodes which leads to minimization of network lifetime. We put forth a Sink administered Load balanced Dynamic Hierarchical Protocol (SLDHP) to balance the load on the principal nodes. Hierarchical layout of the sensors endows the network with increased lifespan. Outcome of this protocol also includes substantial saving of the energy consumed by the nodes. Simulation results indicate a significant improvement of performance over Base station Controlled Dynamic Clustering Protocol (BCDCP)
    corecore