Browse Items (558 total)
Sort by:
-
Role of Marital Status of Parents on Self-esteem, Happiness and Academic-achievement among Adolescents
Adolescence is that development period of human life where the adolescent learns the knowledge of reasoning, critical thinking, problem solving behavior, emotional intelligence, and managing relationships. In today???s society, divorce has become a common affair. A child perception of divorce will be largely determined by age and gender. The purpose of the current study was to find out the role of marital status of parents and gender in self-esteem, happiness and academic achievement of adolescents. Four CBSE schools from Bhubanseswar, Odisha were contacted for the data collection. Total number of samples was 60 students of separated family and 60 students from intact family were selected randomly for the study of happiness, selfesteem and academic achievement. Among each 60 sample 30 were female and 30 were male to check the effect of gender on happiness, self-esteem and academic achievement of adolescents. The result of the study shown that adolescents with divorced parents has less happiness score, low self-esteem and less academic achievement in comparison to adolescents with both parents. On gender basis it was found out that female adolescents have less happiness score and low selfesteem in comparison to male adolescents. But female adolescents have shown high academic achievement in comparison to male adolescents. Adolescence is the vulnerable time period of a human???s life span. The adolescents need to get proper love, affection, attention from parents and society. Parents play a vital role in adolescents??? life. According to the current study the adolescents with divorced parents need to get proper support, love and counseling if necessary. -
ROLE OF MEDIA IN PROPAGATING WELFARE SCHEMES
Media has always been pro-active about disseminating information. But it is no longer limiting itself to information. The concept of infotainment and sensationalism has taken over. Whether it is news channels or entertainment channels, all believe in the concept of garnering number one slots. The concept of ??media has evolved over a period of time. Unlike before, it is not limited to newspapers, radio and pamphlets. Recently, an upcoming Kannada singer committed suicide as he was not allowed to participate in one of the reality shows. This is a clear example to show the importance and the kind of recognition one gives to this medium. This research paper tries to understand the role of media in propagating welfare schemes. Various committees are formed across the country to provide a fair chance for the common man to access better facilities and fruits of development. If information about the same development or welfare schemes is not disseminated widely, how can one try to bring better standards of living? Running behind scams or 24 hours news coverage does not guarantee high quality news. The media is no longer a mediator between the government and public, but more of a commercial entity. Freedom to design program content has meant that the private TV channels, especially 24x7 news channels, do not have any special interest in propagating information about social welfare schemes. Government-owned broadcast media entities, on the other hand, follow government guidelines on media content, with specialized content to meet social development objectives. However, government-owned broadcast media is far behind in terms of catching up with latest technology and following best practices, when compared to private channels. Bureaucracy, red-tapism and lack of agility have meant that the government-owned channels have lost out to the private channels in presentation and holding the attention of viewers. -
Second Language Learners problems in acquiring Reading and Writing skills in English: A Study at the Higher Secondary Level
This dissertation is the result of a study that aimed at identifying problems in Reading and Writing skills in English faced by students studying at the higher secondary level. The study, by way of a series of tests administered to students from three schools in Bangalore, and questionnaires administered to the teachers, along with interviews of the faculty, found that students faced problems in acquiring language skills, and the teachers certain challenges in imparting these skills to students. The sample consisted of 110 participants. It included three schools. The survey employed three research instruments for data collection: four tests, questionnaire and interview. By listening to the teachers through the interviews, and the evaluation of their caliber as teachers through the questionnaire, and through the results of the tests conducted for the students, the researcher was able to garner information that helped to make the dissertation more comprehensive by identifying the specific area that students face problems in and the reasons behind these problems. Based on the above-mentioned information, the researcher was able to propose a few suggestions for the learners, teachers and the management. The objective of the study was to motivate students and to develop an interest in English language learning so that they will be better-equipped to cope with the challenges of society in future. The results impelled the researcher to conclude that one cannot generalize that students from English medium schools would perform better. Students from the regional medium marginally out performed those of the English medium, and this was a surprising element of the study. This helped the researcher to understand that the role of the teacher in imparting skills is very important. It was noticed that if provided with better learning facilities, and adequate motivation, appreciation and encouragement, students from regional medium schools can do well on English language tests. -
Secure authentication framework for cloud
The growing popularity of cloud based services is prompting organizations to consider shifting applications and data onto cloud. However, organizations dealing with highly sensitive information are apprehensive of moving its applications & data to public cloud owing to concern about security of its information. It is hence incumbent on service providers that only legitimate Users will access its services and resources in cloud. Verifying authenticity of remote users is a necessary pre-requisite in a cloud environment before allowing access to secure resources/services/ applications. The simplest & most commonly used user authentication mechanism is password based authentication. However, Users tend to choose easy to remember password, and many a times use same password for multiple accounts, which makes it often the weakest link in security. Furthermore, service providers authenticating Users on the basis of password, stores password verification information in their databases and such authentication schemes with verification table are known to be vulnerable to various attacks. From the perspective of authentication requirements, service providers in a cloud environment can be broadly categorized into two. Those service providers dealing with highly sensitive information and working in a regulated environment can be grouped into category one ?? as in those offering services for sectors like health care, finance. These providers require a strong and secure authentication mechanism to authenticate its users, without any additional functionality. Similarly, there is a second category of service providers dealing with secure information but operate in a collaborative environment ?? as providers providing their applications bundled through a web portal. To provide the Users with a seamless authentication experience, while accessing multiple services during a session, the second category of service providers prefer to have Single Signon functionality. Two-factor authentication technology overcomes the limitations of password authentication and decreases the probability that the claimant is presenting false evidence of its identity to verifier. If different service providers set up their own two-factor authentication services, Users have to do registration and login process repeatedly. Also, Users accessing multiple cloud services may be required to hold multiple authentication tokens associated with various service providers. Authentication factors such as crypto-tokens and smart cards with cryptographic capabilities have been vastly used as a second authentication factor. However, Users are required to always carry these authentication tokens which make it cumbersome from practical usability perspective. Also its usage involves cost thus restricting its adoption to corporate environments. The authentication process can be made more user-convenient if the authentication factor chosen is such that it is commonly used by all types of Users. Leveraging the use of mobile phone as an authentication factor can help address issue of user convenience at no extra cost while improving the security of authentication schemes. Though, there has been an increasing focus on strengthening the authentication methods of cloud service users, there is no significant work that discusses an authentication scheme that can be adopted by the two categories of cloud Service Providers. Taking cognizance of aforesaid issues related to secured authentication in cloud environment, this research focused on designing secure Two-Factor authentication schemes that can be adopted by the two categories of service providers. This research carried out in different levels, proposes authentication architecture and protocols for the two categories of service providers. At the first level, research proposes Direct Authentication architecture for cloud Service Providers who prefer to authenticate its users by using a strong authentication mechanism and does not require Single Sign-On (SSO) functionality. For those Providers who prefer to provide its user with a SSO functionality the research proposes Brokered Authentication architecture. The next level of research focuses on proposing User Authentication Protocols for both Direct Authentication Service Providers (DASPs) and Brokered Authentication Service Providers (BASPs). The research proposes use of strong, Two-Factor Authentication Protocols without Verifier Table. The suggested protocols, provides Users with flexibility of using a Password and either a Crypto-token or a Mobile-token to authenticate with Service Providers. The proposed approach eliminates the requirement of the User to remember multiple identities to access multiple services and provides the benefit of a higher level of security on account of second authentication factor and non-maintenance of verifier table at server. Access to different services offered by multiple service providers using a single authentication token requires interoperability between providers. Also, the Service Providers will have to address the task of issuing the second authentication factor to Users. As a result, the research intends to propose the utilization of proposed two-factor authentication scheme within a specific environment which includes a trusted entity called an Identity Provider (IdP), with whom Users and Service Providers will be registered. The IdP is responsible for issuing and managing the second authentication factor. In brokered authentication, the IdP playing the role of an authentication broker also provides Single Sign-on functionality. The Security Assertion Markup Language (SAML) is used by BASPs and the IdP to exchange authentication information about Users. A major objective of this research is to propose an authentication model that can be adopted by both categories of service providers. Hence, this research proposes an authentication framework for cloud which supports an integrated authentication architecture that provides the service providers with the flexibility to choose between direct and brokered authentication. The integrated two-factor authentication protocol, which does not require the server to maintain a verifier table, supported by the frame work allows users to do a single registration and access services of both direct & brokered authentication service providers using the same crypto-token/mobile-token. To verify claims about security strengths of the proposed authentication protocols, security analysis is done using theoretical intuition. The proposed protocols are found to offer desirable security features such as resistance to replay attack, stolen verifier attack, guessing attack, user impersonation attack etc. To verify the efficiency of the proposed protocols, the communication and computation costs are compared with similar schemes and it is seen that the costs are comparable. To validate the resistance of protocols to authentication attacks, they are analyzed using automated verification tool called ????Scyther??? and the protocol strength is verified by ???no attacks??? results. -
Situating censorship: A study of the politics of state and self in literary translations in Iran /
A nation’s culture flourishes by interacting with other cultures” (Razmjou). Cultural variety not only enriches our knowledge, but also acts as a guide towards the growth of a nation. It gives an insight about the basic human right practices of different cultures. The standard of culture of any particular nation can be gauged through various tools, but importance is given to literature, as it acts as a barometer to measure the cultural growth of the nation. To interpret any culture it is important to understand the beginnings of that particular culture and make an in-depth study of the progress of its civilization. The cultural evolution of any place is continuous and is a combination of many factors like geographic location, weather conditions prevalent, suitable food crops grown, its political policies, religious influences, its history and its present circumstances. The above factors directly or indirectly become responsible to blend and give shape to a culture. -
SOCIAL MEDIA AND CRISIS COMMUNICATION.THE NEW AGE MANTRA?
The topic Social Media and Crisis communication ?? The new age mantra? is indeed one where immense amount of research is possible. Simply because social media today has become one of the most rapidly growing means of communication. The researcher through this research aims to find out if Public relations professionals use this medium extensively while communicating crisis. The theory used behind this research is ??uses and gratification theory??. The research begins with the theoretical aspect of social media and crisis communication. The researcher has taken examples of a few ground breaking crisis that have taken place in the consumer world and cited their examples where in prominent use of social media has made people aware of the crisis and it is the same social media that has eventually regained people??s faith back into the brand. By the end of the research conducted with the help of the questionnaire that was administered to the target audience, the researcher aims to arrive at the conclusion, whether social media indeed is the new age mantra for crisis communication or not.Through this study the researcher aims to study if social media has become the new age mantra for crisis communication. -
SOCIAL MEDIA AND SOCIO-POLITICAL CAMPAIGNS IN INDIA: SLACTIVISM VS. ACTIVISM
The Internet has only about 6% penetration in India. These are words we repeatedly hear whenever there is a discussion about the power of social media and the Internet in general. Even though we say that the Internet penetration in India is very little, the figure in numbers is 100,000,000, as of 2010, which is a penetration of 8.5%. (Internet Usage and Population Statistics, 2010). In a country like India, even one percent is a few million people. That's not a discountable figure in a democracy. Therefore, the effect it has in the social context because of social media, cannot be undermined. This paper aims to study the effects of social media campaigns by doing a study on the socio- political campaigns in India. Some campaigns like the Pink Chaddi Campaign and the ??Support Anna Hazare Campaign?? have made extensive use of the social media. Social media activism today has come to be known as ??slacktivism?? as cited and explained in the further sections of this research paper. This research paper aims to find out if this term applies to activism on social media for socio-political campaigns in the Indian context. The aim is to understand if and how the social media has been effective in propagating different causes and how it has affected the new media users and sensitized them to issues. The implications of the findings, if proven that social media has a mass effect on the people of India, will be that using platforms like Facebook, Twitter, YouTube and other public information sharing sites will have to be integrated into every social message that circulates around in the media industry and the loss the campaign will incur if this isn??t fulfilled. -
SOCIAL NETWORKING - A COMPARATIVE STUDY ON THE NEW GOOGLE + PPROJECT AND FACEBOOK
This research project set out to study the new Google + Project, a new social network by Google. The dissertation looks at the social network as compared to already existing social networks especially Facebook, what the sight possesses that other social networks may not have and how successful the site will be in the years to come and if there is a need for a new social network after what is already there. The researcher went out to find out from users of the social networks, how popular Google plus and Facebook are and how frequently the sites are and what possible future the sites have. The researcher found out that Google plus isnt as popular as Facebook just yet but in years to come if they can learn from the mistakes that the already existing social network have made and develop on that to make the site more user friendly. -
SOCIAL REHABILITATION THROUGH NEW MEDIA: A COMPARATIVE ANALYSIS OF 3 CONTINENTS WITH INDIA TO OVERCOME TABOOS ASSOCIATED WITH THERAPY
This paper attempts to measure the significance of New Media as a branch of social sciences and the growing impact it has on other walks of life, specifically its role in social rehabilitation. The word ??therapy is a ubiquitously known term and often used in daily speech in the branch of psychology. Given the new application of new media, the term has now crossed fences over the sphere of media with its application in online communication. The advantages of therapy and social rehabilitation through the online application of new media have been discussed as a central argument. It further seeks to analyze if it triumphs the role of traditional forms of therapy in making the latter a more viable medium today. The role of technology and its impact have certainly impacted the way one looks at the term ??therapy and ??counseling. This paper hence seeks to find the effectiveness of online therapy in social rehabilitation in comparison to traditional therapy while examining the perspectives of 3 continents specifically USA, UK and Africa and comparing it with India. -
Soft computing techniques for hub sequence analysis /
Bioinformatics, the combination of Biology and Information Technology has become a pioneer industry booming worldwide. One of the grand challenges in biology is to understand organizing principles of bimolecular networks. There seems to be a deliberate effort towards uncovering new laws of biological complexity. One of the most pressing needs in this area is the understanding of protein-protein interaction networks and their complexity. Hub proteins- network elements with high connectivity- literally ??hold the networks together. Though several experimental methods have been developed to identify hub proteins, it is important to supplement procedures for pattern recognition to classify/predict hub protein sequences. This research work aims at the classification and prediction of hub proteins of two model organisms- Homo sapiens and Escherichia coli using different computational approaches of pattern recognition such as Principal Component Analysis (PCA), Artificial Neural Network (ANN) and Linear Discriminant Analysis using (i) Class Dependent Approach (LDACD), (ii) Class Independent Approach (LDACIND), and (iii) Normal Bayes Classification (LDANB). -
SOURCES OF OCCUPATIONAL STRESS AND ITS CONSEQUENCES AMONG TEACHERS
Occupational Stress in workplace occurs when the job demands that are required by the individual cannot be fulfilled at a given time, which in turn leads to adverse effect on individual. Teaching has been identified as one of the most stressful occupations in many countries. The Purpose of this research was to measure the Sources of Occupational Stress and its Consequences among Private and Government Teachers of Pre- University College of Shillong, Meghalaya. The sample of the study consisted of 60 participants from Shillong city, Meghalaya, where 16 male and 44 female teachers and the participants between the age group of 20-51 years and above who are working in Private and Government institutions were considered for the study. The data was collected using structured, open and close ended questionnaire which was mailed to some participants and personally distributed to 70 participants out of which only 60 participants responded from Private and Government institution using Purposive Sampling. The Objectives of the study were, to study the demographic details of the teachers, to identify the sources of occupational stress, to study the consequences among teachers; to compare government and private teachers in terms of sources of occupational stress and its consequences. The Tools used were demographic details, Teacher Stress Inventory (Fimian & Fastenau, 1990). The collected data were analyzed using Statistical Package for social sciences (SPSS) 17.0 version. Frequency and Percentage: was used to interpret the demographic characteristics, sources of occupational stress and its consequences. T-test: was used for the comparison between two groups. Pearson's chi-square test was used to discover if relationship exist between two categorical variables. One way ANOVA was used for the comparison between three groups. The results shows that there were no significant differences found between private teachers and government teachers on sources of occupational stress and its consequences. Significant differences were found between male and female teachers on sources of occupational stress and its consequences. Keywords: Occupational Stress, Higher Secondary Teachers, Consequences of Stress