Global

Technologies have always played a significant role in the development of human civilization. The contemporary information and communication technologies are also expected to play a similar role. These technologies facilitate of connectivity and cost-effectiveness are such characteristics of ICTs that help individual raise its political, economic and social capabilities. However, ICTs also pose certain threats to the socio-economic life of individuals. The individual seems threatened by loss of privacy, become prey to techaddiction, and suffer from piracy issues. The very nature of ICTs makes these issues global in character, demanding fresh legislation equally global in nature. This article explicates this issue at length by juxtaposing the research findings from the existing research and comes up with a theoretical model for better understanding.
Based on German experiences, this paper discusses the political economy of climate protection. The objective is to come to a better understanding of why climate change has become one of the main topics at the domestic agenda in some countries, despite the fact that there are obvious free-riding problems resulting in increasing difficulties for international policy coordination. Using a strategic trade policy framework, the paper theoretically discusses the incentives for domestic policymakers to advocate an ambitious climate policy and assesses these incentives empirically with econometric methods.
Gulmarg has a rich and diverse touristic product that holds the potential to be one of the most attractive tourist destinations for both leisure and sports tourism across the whole Kashmir Himalayan region. The place owes its importance mainly to its beautiful geo-environmental setup and unique climate. The destination has a history of tourism activities for more than five centuries. The resort has been a great attraction for several British officials posted in India and their families made Gulmarg their home for the summer months. This his to-geographical personality of the place has resulted in the development of tourist regions of interest to a range of tastes especially for holiday makers and sports and adventure tourists. Therefore present study aims at identification and delineation of the different tourist potential regions of the place which would help in proper marketing of the tourist product, management of tourist flow, optimization of economic returns and management of the environmental health of the destination for sustainable tourism development in the region.
In this paper we have established a summation formula clung to contiguous relation and recurrence relation.
A 93 year old patient who had an acute pancreatitis caused by the obstruction of the pancreatic duct stone is described in this study. He had a history of IgG4-related disease and refused to accept steroid therapy. Abdominal CT and MRCP imagines showed that multiple calculi were located in the pancreatic and the pancreatic duct was stretched. The patient underwent Endoscopic Retrograde Cholangiopancreatography detection after a multidisciplinary consultation. Yet, the catheter can’t be inserted into the major pancreatic duct owning to the hyperemia of duodenal papilla, although endoscopic sphincterotomy was performed. Fortunately, The minor duct was cannulated with a standard sphincterotome, and a sphincterotomy was performed followed by successful extraction of the pancreatic stone(1.0×0.8cm). Since then the patient had no epigastric pain and had a good quality of life. Three years later, he came to our department again for diarrhea. Pancreatic enzyme treatment of diarrhea associated with the chronic pancreatitis was very effective for the patients.
In this work, we study the existence, the uniqueness and the regularity of the solution for some boundary value problems gouverned by perturbed and generalized dynamical Lamé system operator.
Human sexuality is generally described as the sum total of manner through which people experience and articulate their sexual sensation. Consequent upon the fact that interest in sexual engagement typically increases at puberty considerable research has been conducted on human sexuality among university students. However, most of these studies have their focus on premarital sexual behaviour, knowledge and attitudes towards sex, high risk sexual behaviour, and contraceptive usage with restricted attention on socio-psychological aspects of sexual behaviours. Recent developments in human sexual behaviour make it imperative for us to increase our knowledge base about diverse aspects of human sexuality. On this premise, this paper investigated twelve psychosexual construct of 608 university students in Nigeria as well as established gender differences in their sexual esteem and depression. Descriptive survey design was adopted and Multidimensional Sexuality Questionnaire (MSQ), was used to gather data. One research question and one research hypothesis guided the study. Descriptive statistics analysis indicated that the participants reported higher mean scores for psychosexual constructs of sexual esteem, satisfaction, internal control, consciousness, assertiveness, external control, and motivation respectively and lower mean ratings for sexual depression, monitoring, preoccupation, anxiety, and fear of sex in that order. Further analysis showed that there were no significant differences on sexual esteem and depression of the participants on gender basis. It is recommended among others that counsellors should therefore broaden sexual recovery psychotherapeutic intervention programmes that will further enhance greater or lesser self report as the case may be on university students’ psychosexual lifestyles.
This documentation describes the implementation of Bayesian Network on Hiroshima Nagasaki atomic bomb survivor data, using “R” software. Bayesian networks, a state-of-the art representation of probabilistic knowledge by a graphical diagram, has emerged in recent years as essential for pattern recognition and classification in the healthcare field. Unlike some data mining techniques, Bayesian networks allow investigators to combine domain knowledge with statistical data. This tailored discussion presents the basic concepts of Bayesian networks andits use for building a health risk model on Epidemiological data. The main objectives of our study is to find interdependencies between various attributes of data and to determine the threshold value of radiation dosage under which death counts are negligible.
This study describes the differences in students’ attitudes to writing before and after the use of writing to learn [WTL] and learning to write [LTW] strategies in the delivery of their respective courses. Results reveal that students who had been exposed to LTW strategies display a significantly less favourable attitude to writing than those who had engaged in WTL activities. Further, both LTW and WTL groups are significantly less favourably disposed to writing after engaging in their respective strategies. The impact which the lack of congruence between writing activities, course assessment and outcomes may possibly have on these results is discussed. Recommendations are made as to how to improve student attitude to writing through greater alignment with assessment and objectives. Future directions for research are discussed.
Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. This paper deals with hiding text in an image file using Least Significant Bit (LSB) based Steganography, Discrete Cosine Transform (DCT) based Steganography and Discrete Wavelet Transform (DWT) based steganography. The LSB algorithm is implemented in spatial domain in which the payload bits are embedded into the least significant bits of cover image to derive the stego-image whereas DCT & DWT algorithm are implemented in frequency domain in which the stego -image is transformed from spatial domain to the frequency domain and the payload bits are embedded into the frequency components of the cover image. The performance and comparison of these three techniques is evaluated on the basis of the parameters MSE, PSNR, Capacity & Robustness.