39 research outputs found

    A study on physico-chemical parameters of Dah lake water, District-Ballia (U.P.), India

    Get PDF
    The back water of river Saryu is a prime source of water for Dah Lake, located in Ballia district, have been studied to project the pristinety of water with respect to different pollution sensitive parameters i.e. organic pollutants– BOD, DO, COD, Inorganic pollutants - Electrical Conductivity, Turbidity, pH, total alkalinity, Chloride, Total hardness etc. The pH (7.68), total alkalinity (180.5 mg/l), Chloride (133.12 mg/l), Total hardness(139.83 mg/l), Calcium (60.26 mg/l) and Magnesium hardness (19.38 mg/l) were found well within the prescribed standard for drinking water (BIS 10500:1991) during the study period i.e. April 2006- March 2008. The study inferred that the water quality of Dah Lake is still free from the any kind of pollutants, must be due to its higher assimilative capacity. It also indicates the higher potential for pisiculture and drinking water sources (after disinfection) for the nearby villages which may ultimately improve the economic condition of the surrounding habitation

    An Optimized Approach for Maximizing Business Intelligence using Machine Learning

    Get PDF
    The subject of study known as business intelligence is responsible for the development of techniques and tools for the analysis of business information with the goal of assisting in the management and decision-making processes of corporations. In the current climate, business intelligence is essential to the process of formulating a strategy and carrying out operations that are data-driven. Throughout the many stages of the company operation, an organization will need assistance evaluating data and making decisions; a decision support system may provide this assistance by including business intelligence as an essential component. The fact that this enormous quantity of data is distributed over a number of different types of platforms, however, makes it a difficult challenge, in particular to understand the information that is actually relevant and to make efficient use of it for business intelligence. One of the most important challenges facing modern society is maximizing business intelligence through the application of machine learning. It offers a full analysis that is based on predictions and is extracted for Business Intelligence techniques along with current application fields. This anomalous gap has been pointed up, and solutions and future research areas have been offered to overcome it in order to create effective business strategies

    Enablers for Competitiveness of Indian Manufacturing Sector: An ISM-Fuzzy MICMAC Analysis

    Get PDF
    AbstractNow a days global competitive scenario plays a critical role in success of Indian manufacturing sector. The present study argues that innovation can play a very important role in providing this competitiveness of Indian manufacturing sector. The study identifies 11 enablers for promotion of innovation in the Indian manufacturing sector. Based on the rigorous literature review 11 major innovation enablers (IEs) are obtained. The Delphi technique is applied as a potentially valuable tool for the grouping these enablers. The study, analyse the impact of innovation enablers (IEs) to enhance the manufacturing competitiveness and categories into three phases firstly, identification of innovation enablers, secondly, qualitative analysis of enablers and final quantitative analysis of the innovation enablers. The research theme has been categories into three segments, i.e. identifying the enablers from the literature, conduct interviews with directors of different departments and analysis of the manufacturing industries. The study involves 100 manufacturing companies across India and the data is gathered using a 5-point Likert scale. Interpretive Structural Modeling (ISM) has been used to analyse the relationships among these enablers as well as fuzzy MICMAC (Matriced’ Impacts Croise's Multiplication Appliquée a UN Classement) analysis used to find out driving and the dependence power of enablers. To identify the driving and the dependence power of various IEs the final outcomes of ISM are used as input to the fuzzy MICMAC analysis. This analysis serves to identify which (IEs) is performing as the most leading one to raise the competitiveness of manufacturing industries. This study plays a vital role to enhance the competitiveness of manufacturing industries in India

    A Survey on Vulnerabilities and Performance Evaluation Criteria in Blockchain Technology

    Get PDF
    The blockchain technology firstly presented by Haber and Stornetta in the year 1990, and first time blockchain technology used in Bitcoin by Satoshi Nakamoto in 2008. The blockchain technology is truly decentralized technology. In blockchain technology, every block has consisted three main parts that is data, hash block, and the previous hash block. Hash is controls the uniqueness of each block and it is unique for each block. Each block also contains the hash of the previous block; thus, the blocks are connected to each other. A blockchain can divided into three categories public blockchain, consortium blockchain and private blockchain. The proposed paper provided the comparative and analytical review on the blockchain consensus algorithms

    Addressing Dissociative Trance Disorder Patients in India: An Interpretative Phenomenological Analysis of Adolescent Girls\u27 Help-Seeking and Encounters with Inaccurate Medical Information

    Get PDF
    Background: Dissociative Trance Disorder (DTD), is a complex psychological condition characterized by abrupt trance-like states and altered consciousness, commonly seen in young women throughout various regions of India. Currently, there is a lack of research on the experiences of Indian adolescent girls with DTD and how inaccurate medical information affects their quest for suitable care. This study aims to develop a thorough comprehension of the help-seeking patterns and experiences of adolescent girls with DTD, specifically concerning encountering medical misinformation. By identifying the obstacles, they face and the cultural beliefs that shape their decision-making, this research seeks to guide interventions and initiatives aimed at enhancing care and support for this group. Method: Six adolescent girls and young women, who sought therapy at a district hospital in Sikkim were recruited for the study. They were interviewed extensively and their interview data were transcribed verbatim and analyzed using interpretative phenomenological analysis. Result: Three super-ordinate themes that emerged were: challenges in seeking diagnosis and treatment; emotional and psychological struggles; support and healing journey. Conclusion: Misinformation surrounding DTD in India impacts the help-seeking behaviours of adolescent girls, leading to delays in diagnosis and inadequate treatment. Cultural beliefs, reliance on exorcism, and insufficient healthcare professional training contribute to this problem. Awareness campaigns are necessary to correct misconceptions and misinformation and promote accurate understanding among parents, communities, and healthcare providers. Culturally sensitive approaches, accurate information dissemination, and collaboration among stakeholders are crucial for improving care and support for individuals affected by DTD in India. Additionally, it is acknowledged that certain religious beliefs resist empirical evidence, but it is vital to recognize that not all religious beliefs are misinformation solely based on scientific evidence. As we address the impact of cultural beliefs, it is essential to strike a balance between respecting individual faith and promoting evidence-based interventions

    PASSENGER SECURITY FOR PUBLIC TRANSPORT SYSTEM

    Get PDF
    Techniques are provided to effectively monitor and alert situations involving compromised passenger security in a public transport system. This solution includes three layers of voice synthesis. The first layer includes voice sensors/enablers incorporated within passenger vehicles. The second layer is a fog/edge layer with a voice threat detection mechanism. The third layer is a cloud layer with Machine Language (ML) trained models. These techniques help build a safe and secured society

    Retrieval of a retained broken scalpel blade from lumbar intervertebral disc space: A case report

    Get PDF
    Lumbar diskectomy is a common procedure in neurosurgery, besides the common complications broken scalpel blade during disc removal is a rare event. Usually retrieval of such sharp retained fragments in same sitting is difficult and to prevent further complications another session is warranted [1]. We report a case of broken scalpel blade during L1-L2 lumbar intervertebral disc removal and successful surgical retrieval of that tip of knife with the help of operative microscope under fluoroscopic guidance during same sitting before any hazardous complications develop
    corecore