4,926 research outputs found

    Analysis of T.S. Eliot’s ‘Tradition and the Individual Talent’: Its Implications for the Concept of Intertextuality

    Get PDF
    The present paper aims to analyze the concept of ‘Tradition’ and ‘Individual Talent’ propounded by T.S. Eliot and its implications for ‘Intertextuality’. Intertextuality is widely used phenomenon which states that every text whether spoken or written is connected with the pre existing texts. No text is an island and it always emerges in a context or in a relationship with other texts. Though the term is coined in different ways by different theorists, it has a concurrent relationship with Eliot’s concept of tradition, historical sense and depersonalization of poetry

    Comparative Analysis of E-Governance Models

    Get PDF
    Online working of a government or providing its services online to its citizens at their access is known as E-Governance. E-Governance is E-Commerce tool means online accessibility of government services. The technology and the methods used in E-Governance plan provide a roadmap for well-organized delivery of services at the door step. In today’s time the development of any country depends on the uses of E-Governance and also their dispersion Development of any country can be reviewed by the extent of E-Governance in that country. Moreover, today’s government has also full confidence in E-Governance and its widespread network across the world proves it. E-government security is a key problem to confine the structure and development of E-government systems in any country over the world. E-Government security models are broadly used in the implementation and development of e-government systems. Due to the deference situation of the countries over the world there are diverse security models applied in each country. . Based on this analysis, the security requirements of the data and the applications have been formulated in the form of security parameters like confidentiality, integrity and availability as well the access requirements of the roles. The overall aim of this research is to review the available existing E-governance security models, find out their merits and demerits and analysis of the available models with respect of security in E-Governance. This paper discusses about the possible threats and vulnerabilities for different data locations separately for different models. Here data are considered for four states: data in store, data in process, data in transit and data in destination

    “A STUDY TO ASSESS THE IMPACT OF SOCIAL MEDIA USE ON LEARNING, SOCIAL INTERACTION AND SLEEP DURATION ON STUDENT’S LIFE IN SELECTED COLLEGES OF NADIAD CITY.”

    Get PDF
    discussions among its participant.” Social networking sites have changed how we engage with each other in person, how we obtain information, and how our social networks and friendships operate.(1) Additionally, the amount of time students spends daily utilizing social networks decreases the quality of their sleep and increases depression as well as impact on learning ability and social interaction using of social media impact on college students both : positively & negatively in learning, social interaction and sleep duration.(2) AIMS: The essence of this research work is to primarily study the influence of social media on the learning ability, sleeping pattern and social interaction of students. METHODOLOGY: A Quantitative research study was conducted. 100 college students from 1st and 2nd year were chosen for the study. A standardized questionnaire was used to examine their sociodemographic profile, structured 4-point Likert Scale to assess the impact of social media on learning, Social Interaction and Sleep duration. Descriptive and Inferential statistics were used to analyze the data. RESULT: In this study total 100 students are participated the result revealed than 48(48%) students have moderate impact of social media on learning, 50(50%) students have moderate impact of social media on social interaction, 55(55%) students have moderate impact of social media on sleep duration. CONCLUSION: The purpose of present study is to a Descriptive study to assess the effect of social media on learning, social interaction and sleep duration among students in selected colleges of Nadiad city. Based on the findings, social media occupies the most important part of the student’s life. It consumes most of their productive hours and results in anxiety, depression, loneliness, attention deficit, hyperactivity disorder and addiction. The students who addicted by dopamine spend excess time on social media sleeps only fewer hours in the night time. This makes them become stressed and sleepy in their daily classes which makes in the reduction of the concentration level of students. This study also reveals that student who do not have proper sleeping habit tend to be less interactive to lecture that result in poor academic performanc

    Prospecting Risk factors for Anxiety and Depression among University Students : A Delhi based Cross-Sectional Study

    Get PDF
    Recent studies on trends in depression and anxiety have led to raised concern regarding overall health status of college students during this crucial period of transition into adulthood which can potentially adversely affect their social and academic development. The present study aims to examine the association of various socio-demographic factors along with different forms of social and physical activities with prevalence of depression and anxiety among college students. The prevalence of depression and anxiety was found to be 33.3% and 32.4% respectively among the study participants. It was found that depression was lower among those who shared a close bond with their parents and siblings. Girls were found to be at significantly higher risk of depression (1.86; 95% C.I. (1.16-2.97)) compared to boys.  Students involved in active yoga showed lower depressive and anxiety disorders. The study identified being overweight and obese, along with an increasing consumption of social media (which promoted fad diets, comparisons etc.), as some of the major risk factors for mental disorders

    Novel Wireless Biometric System with Sensor Analysis

    Get PDF
    With increase in complexity of current Health & Disease scenario in society, Modern medical practices greatly relies on technology for analyzing patient’s health condition & for arriving at suitable best possible treatment. Use of technology is greatly assisting medical profession for quick & accurate decisions making but at the same time exponentially increasing medical expenses making it un-accessible to wide range of social class. Statistics reveal that every minute a human is losing his/her life across the globe. Motivation of this paper is to develop efficient & affordable wireless biometric system that can monitor multiple patients’ health parameters simultaneously and can effectively deliver the data to a patient monitoring system where it is stored permanently. It enables the doctors to monitor many parameters of patient’s health, in that our project investigates the potential of wireless biometric system to reliably, wirelessly collect, send and process the temperature & heart rate of multiple patients simultaneously. Thus we have designed and developed a reliable, energy efficient patient monitoring system. Use of suitable wireless communication technique to manage interference & accurately deliver information at user interface (output device) is one of major challenge that is considered here. We have tried to address this challenge by adopting scheduling scheme in data transmission & using unique ID for each patient’s noted parameters. The system also alerts the doctor/nurse of some measured value cross threshold limits. On the basis of monitored data performance evaluation is to be done which helps for performance of sensors. A data storage mechanism employed here become of help as a ready past data reference and remedial action by the doctor. At present, under current medical practice, there is individual patient monitoring system for every patient which makes it expensive, whereas our proposed system uses the same resources to monitor multiple patients, with more comfort and convenience which can pave way to distribute cost of system to multiple patients at the same time maintaining flexibility expected by and useful for the healthcare professionals. This project helps to provide a solution which not only is reliable and flexible but also affordable which is need of time considering huge burden of Medical Expenses which are hardly manageable by for vast range of patients

    AN ANALYTICAL STUDY OF SUSTAINABLE HUMAN RESOURCE POLICIES AND TALENT MANAGEMENT IN INDIAN SCENARIO

    Get PDF
    In a recent survey of Indian CEO’s, it was suggested that Indian managerial leaders were less dependent on their personal charisma, but they emphasised logical and step by step implementation processes. Indian leaders focused on empowerment and accountability in cases of critical turnaround challenges, innovative challenges, innovative technology, product planning and marketing or when other similar challenges were encountered (Spencer, Rajah, Narayan, Mohan & Latiri 2007). These social scientists contend. Leaders in other countries often tell about why they chose a peculiar person for a certain role per task, detailing the personal characteristics that made that person right for that situation. They may also consider, in detail, how an assignment would help someone grow and develop their abilities. In general, Indian leaders simply did not discuss how they matched particular people to certain roles or tasks, nor did they usually consider in detail how the personal characteristics of individuals might shape or inform the best way to influence that person. (Spencer, et al 2007:90)

    Review on Colour Image Denoising using Wavelet Soft Thresholding Technique

    Get PDF
    In this modern age of communication the image and video is important as Visual information transmitted in the form of digital images, but after the transmission image is often ruined with noise. Therefore the received image needs to be processing before it can be used for further applications. Image denoising implicates the manipulation of the image data to produce a high quality of image without any noise. Most of the work which had done in color scale image is by filter domain approach, but we think that the transform domain approach give great result in the field of color image denoising.. This paper reviews the several types of noise which corrupted the color image and also the existing denoising algorithms based on wavelet threshodling technique. DOI: 10.17762/ijritcc2321-8169.15039

    Network Reconfiguration in Distribution System by Software Simulation for Loss Reduction

    Get PDF
    The main aim of the distribution companies is to reduce their operating costs to get ahead of competition. One of the most popular approach is to increase the degree of reliability of distribution system. The management of network defeats (e.g. earth fault, short circuits) offers a lot of feasibilities for automation. The main jobs are fault localization, fault detachment and system refurbishing. The network manipulator needs excellent knowledge about the controlled network area to accomplish these tasks efficiently. In this paper a fault management system is described which magnifies the reliability of the system with the help of network reconfiguration. The fault localization, segregation and refurbishing allowance to remedy the operator from these demanding tasks during network defeats. This paper present a CYMDIST based analysis for the loss minimization problem. This method is tested in 11 KV distribution systems for loss minimization

    Cortical plasticity as a new endpoint measurement for chronic pain

    Get PDF
    Animal models of chronic pain are widely used to investigate basic mechanisms of chronic pain and to evaluate potential novel drugs for treating chronic pain. Among the different criteria used to measure chronic pain, behavioral responses are commonly used as the end point measurements. However, not all chronic pain conditions can be easily measured by behavioral responses such as the headache, phantom pain and pain related to spinal cord injury. Here I propose that cortical indexes, that indicate neuronal plastic changes in pain-related cortical areas, can be used as endpoint measurements for chronic pain. Such cortical indexes are not only useful for those chronic pain conditions where a suitable animal model is lacking, but also serve as additional screening methods for potential drugs to treat chronic pain in humans. These cortical indexes are activity-dependent immediate early genes, electrophysiological identified plastic changes and biochemical assays of signaling proteins. It can be used to evaluate novel analgesic compounds that may act at peripheral or spinal sites. I hope that these new cortical endpoint measurements will facilitate our search for new, and more effective, pain medicines, and help to reduce false lead drug targets

    Authentication System Using Text Passwords Along With Persuasive Cued Click Points

    Get PDF
    This paper presents an implementation of a two level authentication using a combination of text passwords and persuasive cued click points on three or five images. The most common method for authentication is textual passwords. Though textual passwords are easy to remember, they are vulnerable to eavesdropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords have been introduced as an alternative to textual passwords. But same as textual passwords, shoulder surfing attacks make most of the graphical schemes vulnerable. To address this problem, textual passwords can be combined with graphical schemes in what gives a two level security without the use of additional hardware. This paper also presents an evaluation of the text based passwords and graphical password schemes which have been tested previously but failed, including usability and security evaluations
    corecore