441 research outputs found

    CYBER PORNOGRAPHY ADDICTION AMONGST MEDICAL STUDENTS OF WESTERN RURAL MAHARASHTRA

    Get PDF
    Introduction: Cyberpornography is an act of using cyberspace to create, display, distribute, impart or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults. Cyberpornography on one hand, has opened up the new terrain of \u27safe sex\u27, and a positive space for sexual non-conformists. At the same time, it has negatively impacted many offline relations, and a new space for sexual predation and exploitation. Objective: To find out the prevalence, type and form of risk towards cyber pornography addiction amongst the students. Methods & Materials: A prospective cross sectional study was conducted after obtaining an ethical approval from the institute and an informed consent from volunteers fulfilling the eligibility criteria. The Internet sex screening test (ISST) questionnaire with score sheet was used and was collected by complete anonymity and confidentiality. 300 medical students were considered for the study and data collected was analysed by Microsoft-office excel. Results: 57.15% of the volunteer are in low-risk group whereas 30% are vulnerable and 12.85% are in highest-risk group. For boys, 65% are vulnerable whereas 21% in low-risk and the remaining 14% are in highest-risk group. For girls, 73% are in a low-risk, 19% are vulnerable and 8% are in highest-risk group. Conclusion: It is concluded that the majority of boys come under vulnerable category whereas the girls comes in low-risk group showing male preponderance towards addiction. The study reveals that, questions coming under the subgroup of online sexual behaviour-isolated have been answered the maximum number of times, by both the sexes. Whereas, the questions coming under the subgroup of online sexual spending has been answered the least by both the sexes. KEYWORDS: Cyberpornography; Addiction; Sexual behaviour; ISST Questionnaire

    Thyroid Storm: Clinical Manifestation, Pathophysiology, and Treatment

    Get PDF
    Thyroid storm is a rare but life-threatening endocrine emergency. It is an acute exaggerated clinical manifestation of thyrotoxic state. The exact incidence is unknown. It occurs in 1–2% of patients admitted for thyrotoxicosis. It has a mortality of 10–20%. This chapter would help us to understand its clinical manifestations, pathophysiology, and effective treatment. Terminal learning objective would be to diagnose impending storm early and start prompt treatment in day-to-day practice. The chapter would cover pathophysiology including triggers, clinical features including various diagnostic criteria, diagnosis, and treatment of thyroid storm. Indications of surgical treatment in storm will be discussed

    Project success and critical success factors of construction projects: project practitioners’ perspectives

    Get PDF
    Project management is primarily practitioneroriented and loaded with many critical success factors (CSFs), and although these are well-evidenced in theory, they do not deliver as efficiently as factors of interest to project professionals during execution. The present study explores the perceptions of senior project managers (PMs) about project success, CSFs and complexity in large construction projects. Data from project practitioners were collected through semi-structured interviews and analysed using content analysis. The participants were selected with convenience sampling method given the complex understanding of the domain and included highly experienced PMs from the global community with expertise in project management. PMs perceive a small number of CSFs in contrast to the large exhaustive CSFs listed in the questionnaire surveys. Though important, traditional constraints of the Iron Triangle are considered inadequate in defining project success. Project professionals are seen as relying more on other performance indicators for defining a project as a success. They perceive complex construction projects in terms of a large number of interfaces, complex working systems and uncertainty. The findings of this paper suggest that project practitioners perceive differently about the CSFs and project success

    CYBER PORNOGRAPHY ADDICTION AMONGST MEDICAL STUDENTS OF WESTERN RURAL MAHARASHTRA

    Get PDF
    Introduction: Cyberpornography is an act of using cyberspace to create, display, distribute, impart or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults. Cyberpornography on one hand, has opened up the new terrain of 'safe sex', and a positive space for sexual non-conformists. At the same time, it has negatively impacted many offline relations, and a new space for sexual predation and exploitation. Objective: To find out the prevalence, type and form of risk towards cyber pornography addiction amongst the students. Methods & Materials: A prospective cross sectional study was conducted after obtaining an ethical approval from the institute and an informed consent from volunteers fulfilling the eligibility criteria. The Internet sex screening test (ISST) questionnaire with score sheet was used and was collected by complete anonymity and confidentiality. 300 medical students were considered for the study and data collected was analysed by Microsoft-office excel. Results: 57.15% of the volunteer are in low-risk group whereas 30% are vulnerable and 12.85% are in highest-risk group. For boys, 65% are vulnerable whereas 21% in low-risk and the remaining 14% are in highest-risk group. For girls, 73% are in a low-risk, 19% are vulnerable and 8% are in highest-risk group. Conclusion: It is concluded that the majority of boys come under vulnerable category whereas the girls comes in low-risk group showing male preponderance towards addiction. The study reveals that, questions coming under the subgroup of online sexual behaviour-isolated have been answered the maximum number of times, by both the sexes. Whereas, the questions coming under the subgroup of online sexual spending has been answered the least by both the sexes. KEYWORDS: Cyberpornography; Addiction; Sexual behaviour; ISST Questionnaire

    Curse of the technology-computer related musculoskeletal disorders and vision syndrome: a study

    Get PDF
    Background: Computer Related Musculoskeletal disorders and Vision Syndrome (CRMSKVS) is defined as symptoms due to prolonged use of Visual Display Terminal (VDT).Methods: A cross-sectional observational study was done among office-workers working on computer terminal. A self-reported questionnaire was distributed and Musculoskeletal (MSK) and visual symptoms in the preceding 12 months (01 October 2017 to 30 September 2018) were taken as dependent variable. Multivariate analysis was done to identify the determinants of CRMSKVS.Results: Responses from 1193 subjects were included in the study. CRMSKVS was present in 489 cases (40.98%; males - 37.5%, females - 58.29%).  The main MSK symptoms were pain/stiffness in neck (40.98%), shoulder (38.99%), lower back (35.6%) and elbow/wrist/hand/fingers (23.1%). The ocular symptoms were excessive watering (39.6%), pain (24.99), irritation (18.6%), burning/itching sensation (29.8%), redness (40.7%), blurring of vision (13.2%) and headache (40.9%). Female gender (OR-1.498(1.262-1.778)), long duration of working hours (OR-2.77(2.399-3.214)), poor break duration (OR-2.59(2.172-3.089)), excessive smart phone use (OR-2.071(1.834-2.338)), poor posture (OR-3.883(3.282-4.592)), inappropriate distance of computer screen (OR-2.173(1.829-2.582)), low height of screen (OR-1.936(1.527-2.454)), distance of keyboard (OR-3.161(2.528-3.953)) and distance of mouse (OR-5.785(3.932-8.512)) were identified as significant determinants of CRMSKVS.Conclusions: CRMSKVS is an emerging pandemic which needs urgent attention by medical and administrative authorities. The device factors, personal factors, environmental and ergonomic factors are the modifiable risk factors for CRMSKVS

    Critical Success Factor Models for Project Success

    Get PDF
    Project success is dependent on multiple stakeholders’ perceptions; however, current theories on project success are not translating into practice. Previous studies have duly captured or highlighted the need for the identification of critical success factors (CSFs) from multiple stakeholders’ perspectives. However, most of the previous research on CSFs has been carried out in developed countries. Therefore, their applicability in developing economies needs to be explored. This study reviews the existing literature on multiple stakeholders’ CSFs models for project success and investigates the existing gaps in the Indian context for project success on construction projects located in India. The findings of this paper suggest that there are few previous references in the CSFs area for project success from multiple stakeholders’ perspectives in the Indian context. Very few previous studies have proposed a CSF model that is developed taking into account multiple stakeholders’ perspectives, multiple project types, and multiple project procurement methods. Further, none of the models reviewed has evaluated the effects on all four performance criteria of time, cost, quality, and client satisfaction. This reveals an important existing research gap, that is, the need for the development of such a model for developing economies like India

    UTILIZING MACHINE LEARNING-BASED INTRUSION DETECTION TECHNOLOGIES FOR NETWORK SECURITY

    Get PDF
    Effective intrusion detection systems (IDS) are becoming essential for maintaining computer network security due to the growing complexity of cyber-attacks. Machine Learning (ML) can increase the effectiveness of intrusion detection technology, which is an essential resource to safeguard network security. A novel ML technique for intrusion information detection called Stochastic Cat Swarm Optimized Privacy-Preserving Logistic Regression (SCSO-PPLR) is proposed. We assess intrusion detection systems using KDDCup99 dataset. The dataset is pre-processed using Z-score normalization to normalize the features. Next, Features are extracted by Principal Component Analysis (PCA). By comparing the results of the SCSO-PPLR methodology with traditional methods and using assessment criteria including accuracy, precision, recall, and F1-score, the model's performance is extensively evaluated. The study reveals that SCSO-PPLR is an acceptable strategy for intrusion detection in network security and it is effective. These insights broaden IDS and groundwork for further research on reliable cybersecurity remedies

    Evolution and Final Fates of a Rotating 25 M_{\odot} Pop III star

    Full text link
    In this proceeding, we present the 1-dimensional stellar evolution of two rotating population III (Pop III) star models, each having a mass of 25 M_{\odot} at the zero-age main-sequence (ZAMS). The slowly rotating model has an initial angular rotational velocity of 10 per cent of the critical angular rotational velocity. In contrast, the rapidly rotating model has an initial angular rotational velocity of 70 per cent of the critical angular rotational velocity. As an effect of rotationally enhanced mixing, we find that the rapidly rotating model suffers an enormous mass loss due to the deposition of a significant amount of CNO elements toward the surface after the main-sequence phase. We also display the simulated light curves as these models explode into core-collapse supernovae (CCSNe).Comment: Resubmitted after incorporating minor revision, Part of 3rd^{rd} BINA conference proceeding

    An Efficient method of image compression by merging IWPT transform coding with index vector Quantization through FNN

    Get PDF
    Abstract--By the use of Neural Network, it was found that the reconstructed image has least image complexity and the image size has been reduced considerably by reducing the number of samples. This causes a remarkable increase in quality of the reconstructed image. A new quantization method is proposed in this paper. This method is useful for enhancement of compression quality when each kind of neural network is used to compress the image. Quantization, involved in image processing is achieved by compressing a range of values to a single quantum value. When the number of discrete symbols in a given stream is reduced, the stream becomes more compressible. For example, reducing the number of colors required to represent a digital image makes it possible to reduce its file size. This causes a remarkable enhancement in quality of the reconstructed image. For testing the proposed method we use IWPT transform coding and by merging it with the proposed quantization method a new compression algorithm is obtained. Then results of compression by the merged method are compared with some other transform methods. Compression time and complexity in the merged method is also better than JPEG and make it suitable for the systems with low processor and hardware implementation. Obtained results show that the proposed compression algorithm increases the compression quality of the images remarkably
    corecore