Browse Items (1473 total)
Sort by:
-
Role of Soft Skills Development Programme on Employable Skills of Management Students in Bengaluru
With the increase in technology access, the expectations of the employers while hiring the candidates has increased manifold. The newlinecandidates however do not possess the required skills as expected by the corporate professionals. The study, therefore, aims to understand the impact of an employable newlineskill training module based on experiential learning on the soft skill development of management postgraduate students. The study used a one-group pre-test post-test design. The study was based on the Experiential newlineLearning Theory (Kolb, 1984) and the Theory of Multiple Intelligences (Gardner, 1983). In order to find the essential skill sets that have to be possessed by management postgraduates a systematic review of literature of 243 included studies was conducted to understand the skill sets required by management postgraduates. newlineFrom the analysis, it was found that formal communication skills like oral communication, meeting participation, written communication could be effectively developed using the modules with a high effect on the skill newlinedevelopment. The modules were also found to have a significantly large effect on the problem-solving, persuasiveness, critical thinking and lateral thinking skills of the students. In addition to the above, the modules created a deeper understanding of the strengths, capabilities and the weaknesses of newlinethe participants and enabled them to communicate the same effectively thus newlinepreparing them for interviews and group discussions. The modules additionally enabled the participants to appropriately use gestures, tone and their voice in formal communication in a manner that can enhance the effectiveness of their communication. These skills were also found to be lacking in students according to the studies of Abas and Imam (2016); Andelt et al., (1997); Cotton (1993); Crosling and Ward (2002); Gandhi (2013); Hodges and Burchell (2003); Jackson (2009); Levy and Canon (2016) among newlineothers. -
Sale and transplantation of human organs in india critical evaluation of the legal framework
The demand for the organ transplantation far exceeds the availability of organs or donors. This leads to unfair trade and commerce in human organs. Though India has a legal framework to regulate various aspects of organ transplantation the same does not seemed to have addressed the issue either adequately or comprehensively. The supply of donated organs has been inadequate for years. Current methods of obtaining organs and tissues have not provided an adequate supply of organs for use in transplantation. Obviously, the problem of scarcity is acute newlinefor the individuals who require organ transplants.Organ Transplantation is a lifesaving method.But, still it is unclear whether existing law is adequate to curb the organ sale and regulate organ transplantation. Although the general field of transplantation is still in a state of change and growth, there have been recent developments in legislation, especially giving priority to the genuine consent of the donor. Although the majority of legislation has been written for cadaver organ donation, slowly, regulation is developing for living organ donation as well.The advantages of cadaver transplantation are obvious: the dead donor encounters no risk in the performance of the transplantation operation. At present this is the only way that a vital organ newlinecan be replaced. The donor, once pronounced dead, is not exposed to any of the hazards which face the live donor. The laws of different countries allow either the potential organ donor to consent or dissent to the donation during his life time, or his relatives to consent or dissent after newlinehis death. Due to these different legislative possibilities, the number of donations per million people varies substantially in different countries. In most countries with the dissent solutions, newlinethere is no waiting list for donations, or the list is short, while most countries with consent solutions have substantial organ shortages. -
School Counseling in India : School Counselor Roles, Policy and Implementation
With a lack of comprehensive policy and literature on stakeholders perspectives and the counseling program s implementation, there is much to be known about the present status of school counseling in India. Three research questions examined in two phases were the perception of actual and preferred roles of the school counselors from the perspective of school administrators, school counselors, teachers, students, and parents; awareness and implementation of school counseling policy from the perspective of administrator and counselors; and implementation of the school counseling program. Quantitative phase I met newlineobjectives one and two using cluster sampling to select 1029 participants. School newlineadministrators and counselors completed the Survey on Knowledge and Implementation of newlinePolicies Regarding School Counseling which was developed and validated by two experts in newlinethe study. All participants completed the International Survey of School Counselor Activities (ISSCA) (Fan et al., 2018). Statistical analysis included descriptive statistics, the KruskalWallis H test, and post-hoc Bonferroni-Dunn. Qualitative phase II met objective three using purposive sampling to recruit 14 participants for a semi-structured interview. Qualitative newlinecontent analysis indicated that school counseling in India is still developing, with newlineinconsistencies in understanding the counselor s role among stakeholders. There were differences in awareness and knowledge about the responsibility of implementing school counseling policies. School counseling programs were affected by role ambiguity, stigma about mental health issues, lack of comprehensive structure to the counseling program, and lack of research and evaluation. Implications of the study are discussed. -
Second Language Learners problems in acquiring Reading and Writing skills in English: A Study at the Higher Secondary Level
This dissertation is the result of a study that aimed at identifying problems in Reading and Writing skills in English faced by students studying at the higher secondary level. The study, by way of a series of tests administered to students from three schools in Bangalore, and questionnaires administered to the teachers, along with interviews of the faculty, found that students faced problems in acquiring language skills, and the teachers certain challenges in imparting these skills to students. The sample consisted of 110 participants. It included three schools. The survey employed three research instruments for data collection: four tests, questionnaire and interview. By listening to the teachers through the interviews, and the evaluation of their caliber as teachers through the questionnaire, and through the results of the tests conducted for the students, the researcher was able to garner information that helped to make the dissertation more comprehensive by identifying the specific area that students face problems in and the reasons behind these problems. Based on the above-mentioned information, the researcher was able to propose a few suggestions for the learners, teachers and the management. The objective of the study was to motivate students and to develop an interest in English language learning so that they will be better-equipped to cope with the challenges of society in future. The results impelled the researcher to conclude that one cannot generalize that students from English medium schools would perform better. Students from the regional medium marginally out performed those of the English medium, and this was a surprising element of the study. This helped the researcher to understand that the role of the teacher in imparting skills is very important. It was noticed that if provided with better learning facilities, and adequate motivation, appreciation and encouragement, students from regional medium schools can do well on English language tests. -
Secure authentication frame work for cloud
The growing popularity of cloud based services is prompting organizations to consider shifting applications and data onto cloud. However, organizations dealing with highly sensitive information are apprehensive of moving its applications and data to public cloud owing to concern about security of its information. It is hence incumbent on service providers that only legitimate Users will access its services and resources in cloud. newlineVerifying authenticity of remote users is a necessary pre-requisite in a cloud environment before allowing access to secure resources/services/ applications. The simplest and most commonly used user authentication mechanism is password based authentication. However, Users tend to choose easy to remember password, and many a times use same password for multiple accounts, which makes it often the weakest link in security. Furthermore, service providers authenticating Users on the basis of password, stores password verification information in their databases and such authentication schemes with verification table are known to be vulnerable to various attacks. newlineFrom the perspective of authentication requirements, service providers in a cloud environment can be broadly categorized into two. Those service providers dealing with highly sensitive information and working in a regulated environment can be grouped into category one as in those offering services for sectors like health care, finance. These providers require a strong and secure authentication mechanism to authenticate its users, without any additional functionality. Similarly, there is a second category of service providers dealing with secure information but operate in a collaborative environment as providers providing their applications bundled through a web portal. To provide the Users with a seamless authentication experience, while accessing multiple services during a session, the second category of service providers prefer to have Single Sign-on functionality. -
Secure authentication framework for cloud
The growing popularity of cloud based services is prompting organizations to consider shifting applications and data onto cloud. However, organizations dealing with highly sensitive information are apprehensive of moving its applications & data to public cloud owing to concern about security of its information. It is hence incumbent on service providers that only legitimate Users will access its services and resources in cloud. Verifying authenticity of remote users is a necessary pre-requisite in a cloud environment before allowing access to secure resources/services/ applications. The simplest & most commonly used user authentication mechanism is password based authentication. However, Users tend to choose easy to remember password, and many a times use same password for multiple accounts, which makes it often the weakest link in security. Furthermore, service providers authenticating Users on the basis of password, stores password verification information in their databases and such authentication schemes with verification table are known to be vulnerable to various attacks. From the perspective of authentication requirements, service providers in a cloud environment can be broadly categorized into two. Those service providers dealing with highly sensitive information and working in a regulated environment can be grouped into category one ?? as in those offering services for sectors like health care, finance. These providers require a strong and secure authentication mechanism to authenticate its users, without any additional functionality. Similarly, there is a second category of service providers dealing with secure information but operate in a collaborative environment ?? as providers providing their applications bundled through a web portal. To provide the Users with a seamless authentication experience, while accessing multiple services during a session, the second category of service providers prefer to have Single Signon functionality. Two-factor authentication technology overcomes the limitations of password authentication and decreases the probability that the claimant is presenting false evidence of its identity to verifier. If different service providers set up their own two-factor authentication services, Users have to do registration and login process repeatedly. Also, Users accessing multiple cloud services may be required to hold multiple authentication tokens associated with various service providers. Authentication factors such as crypto-tokens and smart cards with cryptographic capabilities have been vastly used as a second authentication factor. However, Users are required to always carry these authentication tokens which make it cumbersome from practical usability perspective. Also its usage involves cost thus restricting its adoption to corporate environments. The authentication process can be made more user-convenient if the authentication factor chosen is such that it is commonly used by all types of Users. Leveraging the use of mobile phone as an authentication factor can help address issue of user convenience at no extra cost while improving the security of authentication schemes. Though, there has been an increasing focus on strengthening the authentication methods of cloud service users, there is no significant work that discusses an authentication scheme that can be adopted by the two categories of cloud Service Providers. Taking cognizance of aforesaid issues related to secured authentication in cloud environment, this research focused on designing secure Two-Factor authentication schemes that can be adopted by the two categories of service providers. This research carried out in different levels, proposes authentication architecture and protocols for the two categories of service providers. At the first level, research proposes Direct Authentication architecture for cloud Service Providers who prefer to authenticate its users by using a strong authentication mechanism and does not require Single Sign-On (SSO) functionality. For those Providers who prefer to provide its user with a SSO functionality the research proposes Brokered Authentication architecture. The next level of research focuses on proposing User Authentication Protocols for both Direct Authentication Service Providers (DASPs) and Brokered Authentication Service Providers (BASPs). The research proposes use of strong, Two-Factor Authentication Protocols without Verifier Table. The suggested protocols, provides Users with flexibility of using a Password and either a Crypto-token or a Mobile-token to authenticate with Service Providers. The proposed approach eliminates the requirement of the User to remember multiple identities to access multiple services and provides the benefit of a higher level of security on account of second authentication factor and non-maintenance of verifier table at server. Access to different services offered by multiple service providers using a single authentication token requires interoperability between providers. Also, the Service Providers will have to address the task of issuing the second authentication factor to Users. As a result, the research intends to propose the utilization of proposed two-factor authentication scheme within a specific environment which includes a trusted entity called an Identity Provider (IdP), with whom Users and Service Providers will be registered. The IdP is responsible for issuing and managing the second authentication factor. In brokered authentication, the IdP playing the role of an authentication broker also provides Single Sign-on functionality. The Security Assertion Markup Language (SAML) is used by BASPs and the IdP to exchange authentication information about Users. A major objective of this research is to propose an authentication model that can be adopted by both categories of service providers. Hence, this research proposes an authentication framework for cloud which supports an integrated authentication architecture that provides the service providers with the flexibility to choose between direct and brokered authentication. The integrated two-factor authentication protocol, which does not require the server to maintain a verifier table, supported by the frame work allows users to do a single registration and access services of both direct & brokered authentication service providers using the same crypto-token/mobile-token. To verify claims about security strengths of the proposed authentication protocols, security analysis is done using theoretical intuition. The proposed protocols are found to offer desirable security features such as resistance to replay attack, stolen verifier attack, guessing attack, user impersonation attack etc. To verify the efficiency of the proposed protocols, the communication and computation costs are compared with similar schemes and it is seen that the costs are comparable. To validate the resistance of protocols to authentication attacks, they are analyzed using automated verification tool called ????Scyther??? and the protocol strength is verified by ???no attacks??? results. -
Selective Oxidation of Hetrocyclic Alcohols Using Carbon Based Modified Electrodes
Electro-organic synthesis has achieved great significance over the conventional synthesis routes due to its diverse features which includes the in-situ generation of reagents, replacement of harmful redox reagents, rapid response, and low energy consumption. The choice of reactants (heterocyclic alcohols) for the electrochemical oxidation is solely based on the applications of its corresponding aldehydes. Furthermore, 2-thiophene methanol, piperonyl alcohol, 5-methyl furfuryl alcohol and Tetrahydro furfuryl alcohol have been chosen as reactants of interest as their corresponding aldehydes 2-thiophene carboxaldehyde, piperonal, 5-methyl furfural and Tetrahydro furfural possess various synthetic applications such as production of newlinedyestuffs, perfumes, veterinary products, agrochemicals and pharmaceutical drugs. newlineCarbon based electrodes provide a versatile platform for catalysis reactions. newlineElectrocatalysts for the selective oxidation of heterocyclic alcohols are designed on newlineemploying diverse modifications on the carbon fiber paper (CFP) electrode. Such newlinemodifications have attracted researchers due to their exceptional selectivity, stability, newlineelectrical conductivity and lower charge transfer resistance. The modifications newlineemployed in the current study include immobilized laccase-based materials and newlinegraphitic carbon nitride-based composites. newlineThe physico-chemical properties of the fabricated electrodes were studied using newlinedifferent characterization techniques like Field Emission Scanning Electron Microscopy (FESEM), Energy Dispersive X-ray Spectrometry (EDS), X-Ray Photoelectron spectroscopy (XPS), Optical Profilometry (OP) and Fourier Transform Infrared Spectroscopy (FTIR). Electrochemical investigations were performed using Cyclic Voltammetry (CV), Chronoamperometry (CA) and Electrochemical Impedance Spectroscopy (EIS). Optimization of experimental conditions such as effect of pH and scan rate to understand the reaction mechanism were studied in detail. -
Self-care practices, professional quality of life and challenges : An exploration among counsellors in Kerala
The profession of counselling continues to prove its importance in today's fast- paced world, where pausing down and listening to someone are becoming an odd and luxurious concern of people. The counsellor may feel as though they are in a marathon, which demands them to continuously offer unconditional positive regard and empathy for their clients. This may leave them incapacitated to look into themselves and to recognize what is happening to them in this process of caring for others. Though profound discourses take place in the international scenario about the criticality of rendering to the need and well- being of counsellors, evidence-based studies, and effective interventions in this regard are still lacking in the Indian context. This study seeks to fill this gap by exploring, how the positive and negative feelings of continuous caring can affect the professional quality of life of counsellors, what are the self-care mechanisms they adopt, and which are the professional issues they find most concerning. To meet these objectives, the present research employs a mixed- method design in a sequential explanatory fashion. The study encompasses three different phases wherein phase I and II; the sample consisted of counsellors working in various government projects in Kerala selected through dense sampling method and purposive sampling method respectively. In phase III, counsellor experts with more than 20 years of experience in the field are considered through purposive sampling. Findings describe that counsellors tend to follow an unbalanced self-care routine with significantly less focus on professional aspects. The presence of a high risk of burnout and secondary traumatic stress with a moderate feeling of compassion satisfaction call for immediate interventions for counsellors. Lack of benefits, safety issues, concerns about professional identity, poor working conditions, absence of career prospects, and lack of professional credentials are the major challenges identified by the counsellors. Considering these challenges, a set of recommendations are proposed by counsellor experts, which suggest reformations at both the systemic level and academic formation. Specific recommendations are also listed on the development of personal self and professional self for safe, effective and ethical practice of counsellors across a variety of practice settings. Implications exist for policymakers and counsellor educators to create an avenue for supporting a healthier and sustainable counsellor workforce. -
Self-care practices, professional quality of life and challenges: An exploration among counsellors in Kerala
The profession of counselling continues to prove its importance in today's fastpaced world, where pausing down and listening to someone are becoming an odd and luxurious concern of people. The counsellor may feel as though they are in a marathon, which demands them to continuously offer unconditional positive regard and empathy for their clients. This may leave them incapacitated to look into themselves and to recognize what is happening tothem in this process of caring for others. Though profound discourses take place in the international scenario about the criticality of rendering to the need and wellbeing of counsellors, evidence-based studies, and effective interventions in this regard are still lacking in the Indian context. This study seeks to fill this gap by exploring, how the positive and negative feelings of continuous caring can affect the professional quality of life of counsellors, what are the self-care mechanisms they adopt, and which are the professional issues they find most concerning. To meet these objectives, the present research employs a mixedmethod design in a sequential explanatory fashion. The study encompasses three different phases wherein phase I and II; the sample consisted of counsellors working in various government projects in Kerala selected through dense sampling method and purposive sampling method respectively. -
Sensitivity Analysis of Heat Transport in Nanofluids with Marangoni Convection
Crystal growth, soap flm stabilization, coating processes, and growth of silicon newlinewafers involve Marangoni convective and#64258;ows. In microgravity situations, Marangoni effect is more prominent than gravity-induced buoyancy forces. In such situations, the convective and#64258;ows in the and#64258;uids will be driven by surface tension gradients. Moreover, the control of heat transport in the hydromagnetic semiconductor crystals involves Marangoni convection. Therefore, the heat transport rate in Marangoni convective and#64258;ow of nanoand#64258;uids is optimized in this research work. The thermal, thermo-solutal, mixed thermo-solutal Marangoni convection problems are explored in the presence of an external magnetic feld. The thermal phenomenon is scrutinized by including thermal radiation. Diand#64256;erent external eand#64256;ects are included in the problems and a detailed parametric analysis is carried out by using graphical visualizations. The newlinegoverning equations are constructed by utilizing the conservation equations of mass, newlinemomentum, energy and concentration. Realistic nanoand#64258;uid models are chosen which are validated with experimental data. Finite-diand#64256;erence-based and Runge-Kuttabased solving methodologies are adopted. The optimization of the heat (and mass) transport is carried out using the Response Surface Methodology (RSM). The facecentered central composite design is used for optimization. The quadratic empirical models obtained are further explored by estimating the sensitivity. The problem studied in each chapter is given below: Thermal Marangoni and#64258;ow of a nanoand#64258;uid with nanoparticle aggregation newlineA study of magnetohydrodynamic thermal Marangoni convection of ethylene glycol (EG) based titania (TiO2) nanoand#64258;uid is carried out by considering the eand#64256;ect of nanoparticle aggregation. The heat transport phenomenon is scrutinized with thermal radiation. The eand#64256;ective thermal conductivity and viscosity with aggregation are modeled by using the Maxwell-Bruggeman and Krieger-Dougherty models. -
Sentencing Framework in the Administration of Criminal Justice in India :
This Thesis aims at having uniformity while sentencing the accused in respect of similar newlineoffences by various criminal courts. It is submitted that, in India, there is no separate sentencing Act which provides for the sentencing of the accused. It is submitted that the present thesis also recommends for the post sentencing/research process and administration of Criminal Justice through courts and supervisory power of the court over the executive after newlinethe conviction of the accused and during the pre-trial detention. Emphasis is also laid on newlineBails Act which is required to be legislated in the administration of Criminal Justice in India. The said Bails Act and Sentencing Act are very much in force in different common law countries such as New Zealand, UK, and USA. Similar legislations are the need of hour in the present day for administration of Criminal justice in India. The thesis also aims at highlighting the disparity of Sentencing by the different Criminal Courts in India. There are instances where length of detention itself is held to be sufficient, mitigating grounds are taken into consideration, and the accused is being given set-off for the period that he has already newlineundergone. The administration of post-sentencing process, more particularly probation is also being highlighted. The need for probation is also being highlighted, so also the requirement of plea bargaining being more popularised. The grant of parole by the executive in ignorance of conviction order is also critically analysed. Reforms are suggested for the better administration of criminal justice with special reference to sentencing.