74 research outputs found

    Comparative Analysis of E-Governance Models

    Get PDF
    Online working of a government or providing its services online to its citizens at their access is known as E-Governance. E-Governance is E-Commerce tool means online accessibility of government services. The technology and the methods used in E-Governance plan provide a roadmap for well-organized delivery of services at the door step. In today’s time the development of any country depends on the uses of E-Governance and also their dispersion Development of any country can be reviewed by the extent of E-Governance in that country. Moreover, today’s government has also full confidence in E-Governance and its widespread network across the world proves it. E-government security is a key problem to confine the structure and development of E-government systems in any country over the world. E-Government security models are broadly used in the implementation and development of e-government systems. Due to the deference situation of the countries over the world there are diverse security models applied in each country. . Based on this analysis, the security requirements of the data and the applications have been formulated in the form of security parameters like confidentiality, integrity and availability as well the access requirements of the roles. The overall aim of this research is to review the available existing E-governance security models, find out their merits and demerits and analysis of the available models with respect of security in E-Governance. This paper discusses about the possible threats and vulnerabilities for different data locations separately for different models. Here data are considered for four states: data in store, data in process, data in transit and data in destination

    Product Acquisition Strategies: An Analytical Approach

    Get PDF
    Recovery of returned products is an emerging field, which has received increased attention from environmental as well as economic point of view. They help reduce the harmful impact of the industry on the environment by engaging in material recycling, reducing energy consumption and the need for landfill space. Businesses are finding it an attractive investment because it is highly profitable for the company as, it not only adds to the ‘green image’ of the company, which the company can use as a marketing tool to attract and retain environmentally conscious customers, but also companies can use discarded products as a valuable source of components and materials and hence reducing waste. A firm operating a recoverable product system relies on the return of used products as a basic input (raw material) to a reuse system and hence remanufacturing requires a continuous flow of used products. This highlights the importance of having efficient product acquisition management system. In this report we try to investigate how product acquisition choices affect the rate of return of used products and its impact on the economic value recovered from the remanufacturing system by using analytical models. This report also attempts to compare the percentage cost improvement between open and closed loop supply chains

    System insights from ‘WellAhead’

    Get PDF
    System Insights from ‘WellAhead’: A Social Innovation Lab Approach to Advance the Prioritization and Sustained Integration of Student Social and Emotional Wellbeing in K-12 Schools

    AN IMPROVEMENT OF AODV PROTOCOL BASED ON THREADED ROUTING IN MOBILE AD HOC NETWORKS

    Get PDF
    The Mobile Ad hoc NETworks (MANETS) are suitable to be utilized in the context of an extreme emergency conditions such as battle field and disaster recovery because less requirement of infrastructure and dynamic nature. These, along with applications of these networks in military, government and in commercial area, MANETs are being researched by many organizations and institutes. Many protocols have been developed for data link layer and network layer. Many researchers have been conducted numerous simulations for comparing the performance of these protocols under varying conditions and constraints. The widely-used protocol in Mobile Ad hoc Network (MANET) achieves a dynamic, self-organizing and on-demand multi-hop routing by means of the AODV routing protocol. MANETs are characterized by self-organized, dynamic changes of network topology, limited bandwidth, and instability of link capacity, etc. The reliability of data transmission in the network cannot be guaranteed, in some special application conditions with harsh requirements on Packet Delivery Ratio (PDR) and link quality, higher criteria for routing protocol will have been laid out. This paper presents an AODV with threaded routing (AODV-FLTR) for security purpose. To reduce routing overhead and to increase packet delivery ratio, local route discovery process is used when link breaks during transmission. The performance comparison of AODV-FLTR with DSR and AODV is also carried out

    Caesarean scar pregnancy: a case report with review of management options

    Get PDF
    Cesarean scar pregnancy is a rare but life-threatening complication. It is the abnormal implantation of gestational sac into myometrium and fibrous scar of previous cesarean section. Its incidence is on rising trend due to increase in rate of cesarean section all over the world. A thirty years old second gravida presented at eight weeks of gestation with complaints of bleeding per vaginum and pain lower abdomen. She was diagnosed as a case of cesarean scar pregnancy (CSP) on ultrasonography and confirmation of diagnosis was done on magnetic resonance imaging. Medical management of scar pregnancy was done successfully with combination of mifepristone and methotrexate. Cesarean scar pregnancy could be catastrophic, if not managed well in time. Management includes both surgical and medical options. Treatment has to be individualized depending on patient’s hemodynamic profile, size of gestational sac, desire for future fertility, compliance for follow up and availability of interventional radiology

    Further delineation of the clinical spectrum of White-Sutton syndrome: 12 new individuals and a review of the literature

    Get PDF
    White–Sutton syndrome (WHSUS) is a neurodevelopmental disorder caused by heterozygous loss-of-function variants in POGZ. Through the Deciphering Developmental Disorders study and clinical testing, we identified 12 individuals from 10 families with pathogenic or likely pathogenic variants in POGZ (eight de novo and two inherited). Most individuals had delayed development and/or intellectual disability. We analyzed the clinical findings in our series and combined it with data from 89 previously reported individuals. The results demonstrate WHSUS is associated with variable developmental delay or intellectual disability, increased risk of obesity, visual defects, craniofacial dysmorphism, sensorineural hearing loss, feeding problems, seizures, and structural brain malformations. Our series includes further individuals with rod-cone dystrophy, cleft lip and palate, congenital diaphragmatic hernia, and duplicated renal drainage system, suggesting these are rare complications of WHSUS. In addition, we describe an individual with a novel, de novo missense variant in POGZ and features of WHSUS. Our work further delineates the phenotypic spectrum of WHSUS highlighting the variable severity of this disorder and the observation of familial pathogenic POGZ variants

    Börjeson–Forssman–Lehmann syndrome: Delineating the clinical and allelic spectrum in 14 new families

    Get PDF
    Börjeson-Forssman-Lehmann syndrome (BFLS) is an X-linked intellectual disability syndrome caused by variants in the PHF6 gene. We ascertained 19 individuals from 15 families with likely pathogenic or pathogenic PHF6 variants (11 males and 8 females). One family had previously been reported. Six variants were novel. We analysed the clinical and genetic findings in our series and compared them with reported BFLS patients. Affected males had classic features of BFLS including intellectual disability, distinctive facies, large ears, gynaecomastia, hypogonadism and truncal obesity. Carrier female relatives of affected males were unaffected or had only mild symptoms. The phenotype of affected females with de novo variants overlapped with the males but included linear skin hyperpigmentation and a higher frequency of dental, retinal and cortical brain anomalies. Complications observed in our series included keloid scarring, digital fibromas, absent vaginal orifice, neuropathy, umbilical hernias, and talipes. Our analysis highlighted sex-specific differences in PHF6 variant types and locations. Affected males often have missense variants or small in-frame deletions while affected females tend to have truncating variants or large deletions/duplications. Missense variants were found in a minority of affected females and clustered in the highly constrained PHD2 domain of PHF6. We propose recommendations for the evaluation and management of BFLS patients. These results further delineate and extend the genetic and phenotypic spectrum of BFLS
    • …
    corecore