Relation between burnout components and CVD in poor job design
Burnout a multidimensional construct consisting of emotional exhaustion, physical fatigue and depersonalization was shown destructive to personal health. Job design feature of demand and control model cause burnout because of high demands of work (namely production responsibility, problem solving demand and monitoring demand) and lack of control (timing control and method control) over work. There is also evidence concerning The association between burnout and risk of cardiovascular disease. The aim of the current research was to verify these relations. The participants were 128 personnel of Isfahan Gas Company. job design inventory was used to form two groups. In two groups of inappropriate job design (low control and high demand) and appropriate job design group. Instruments were Burnout Questionnaire of Maslach. Lipid serum was measures as dependent (criterion) variables. Relations between burnout and dependent variables in two group was determined and transfer to Z-fisher to compare stronger relationship in poor job design group. It is concluded that burnout is dependent on the quality of social environment especially job design and burnout bring cardiovascular disease more in poor job design group so we advice managers enrich job design characteristics to ensure you have healthy workers.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Role of Management Accounting in Managerial the Decision Making of Enterprises
The managers use management accounting information and techniques to take decisions. The decision making process of most of managers consists of economical decision making and choosing the best alternative that lead to profit maximization as well as cost and expense minimization. Management accounting measures and produces economical information which is useful to users for conscious decision making. Management accounting writers tend to present management accounting as a loosely connected set of decision-making tools. Although the various textbooks on management accounting make no attempt to develop an integrated theory, there is a high degree of consistency and standardization in methodology of presentation. In this chapter, the concepts and assumptions which form the basis of management Accounting will be formulated in a comprehensive management accounting decision Model. The formulation of theory in terms of conceptual models is a common practice. Virtually all textbooks in business administration use some type of conceptual Framework or model to integrate the fundamentals being presented. In economic theory, there are conceptual models of the firm, markets, and the economy. In Management courses, there are models of organizational structure and managerial Functions. In marketing, there are models of marketing decision-making and channels of distribution. Even in financial accounting, models of financial statements are used As a framework for teaching the fundamentals of basic financial accounting. The tactical decisions which must be preceded by strategic decisions provide the Historical data from which the accountant prepares financial statements. In addition To being statements summarizing historical transactions, financial statements may be Regarded as a descriptive model for decision-making. Every item or elements on the financial statements are the result of a decision or decisions. For each decision, a management accounting tool is exist that may be used to make a good decision. However, the management accounting tools can be used only if the management Accountant is successful in providing the information demanded by the particular Tool.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Speech Generation Using Kinect To Aid The Mute In Public Addressing
Various new technologies and aiding instruments are always being introduced for the betterment of the challenged. This project focuses on aiding the mute in expressing their views and ideas in a much efficient and effective manner thereby creating their own place in this world. The proposed system focuses on using various gestures traced into texts which could in turn be transformed into speech. The gesture identification and mapping is performed by the Kinect device, which is found to cost effective and reliable. A suitable text to speech convertor is used to translate the texts generated from Kinect into a speech. The proposed system though cannot be applied to man-to-man conversation owing to the hardware complexities, but could find itself very much of use under addressing environments such as auditoriums, classrooms, etc
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
SRTURP: Secure routing through unobservable routing protocol for mobile Ad-hoc networks
A mobile ad hoc network consists of mobile nodes that communicate in an open wireless medium. Adversaries can launch analysis against the routing information embedded in the routing message and data packets to detect the traffic pattern of the communications; thereby they can obtain the sensitive information of the system, like the identity of a critical node. Privacy-preserving routing is crucial for some ad hoc networks that require stronger privacy protection. A number of schemes have been proposed to protect privacy in ad hoc networks. However, none of these schemes offer complete unlinkability or unobservability properties since data packets and control packets are still linkable and distinguishable in these schemes. In this paper, we define stronger privacy requirements regarding privacy-preserving routing in mobile ad hoc networks. Then we propose an unobservable secure routing scheme Secure Un-Obseravable Routing Protocol to offer complete unlinkability and content unobservability for all types of packets. On- Demand secure Routing protocol is efficient as it uses a novel combination of group signature and ID-based encryption for route discovery. Security analysis demonstrates that SRTURP can well protect user privacy against both inside and outside attackers. This Secure Routing Protocol is implemented on ns2, and evaluated its performance by comparing with Ad-hoc On Demand Distance Vector and MASK. The simulation results show that SRTURP not only has satisfactory performance compared to Ad-hoc On Demand Distance Vector, but also achieves stronger privacy protection than existing schemes like MASK.A mobile ad hoc network consists of mobile nodes that communicate in an open wireless medium. Adversaries can launch analysis against the routing information embedded in the routing message and data packets to detect the traffic pattern of the communications; thereby they can obtain the sensitive information of the system, like the identity of a critical node. Privacy-preserving routing is crucial for some ad hoc networks that require stronger privacy protection. A number of schemes have been proposed to protect privacy in ad hoc networks. However, none of these schemes offer complete unlinkability or unobservability properties since data packets and control packets are still linkable and distinguishable in these schemes. In this paper, we define stronger privacy requirements regarding privacy-preserving routing in mobile ad hoc networks. Then we propose an unobservable secure routing scheme Secure Un-Obseravable Routing Protocol to offer complete unlinkability and content unobservability for all types of packets. On- Demand secure Routing protocol is efficient as it uses a novel combination of group signature and ID-based encryption for route discovery. Security analysis demonstrates that SRTURP can well protect user privacy against both inside and outside attackers. This Secure Routing Protocol is implemented on ns2, and evaluated its performance by comparing with Ad-hoc On Demand Distance Vector and MASK. The simulation results show that SRTURP not only has satisfactory performance compared to Ad-hoc On Demand Distance Vector, but also achieves stronger privacy protection than existing schemes like MASK.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Stable isotopes of water as indicator of Groundwater-Volta Lake interactions in the southwestern margin of the Volta Lake, Ghana
Stable isotopes of hydrogen (?2H) and oxygen (?18O) in groundwater, streams and Volta Lake collected in southwestern margin of the Volta Lake were investigated. While the spatial distribution of ?18O in groundwater (-3.61 to -2.17 ‰ vs VSMOW) showed that most of the heavy-isotope depleted samples were located in the higher portion of the study area (northeastern) on the Kwahu Plateau, more positive values (from -2.62 to -2.17‰ vs VSMOW) were found in areas in proximity of the Volta Lake. The isotope composition of streams (?18O) varied closely from -2.80 to -2.61‰ vs VSMOW with most depleted being the most forested stream. The Volta Lake showed relatively enriched and homogenous isotope composition (?18O between -0.66 and -0.43) reflecting high evaporation of the Lake. Stable isotope signature of the water samples point to meteoric origin of recharge to groundwater in the area also show possible intrusion of Volta Lake into the aquifers near the banks of the Volta Lake.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Strategic Effect of Socio-Economic and Financial Factors on Performance of Women Entrepreneurs in Nigeria
This study is aimed at examining the effects of socio- economic and financial factors on the performance of women entrepreneurs in Oyo state and two hundred and forty women entrepreneurs who are involved in trading, hairdressing and tailoring were purposively selected from amongst those registered in their respective associations. All the data were derived from primary sources. The results demonstrated that a significant relationship exists between socio- economic factors and the performance of women entrepreneurs. All the socio- economic factors (age, marital status, education and years of experience) were significant and positive at (P < 0.05). This implied that socio- economic factors are critical success factors that help entrepreneurs to survive, manage in difficult conditions and keep the business profitable. Furthermore, credit and savings impacted significantly on the performance of the entrepreneurs. The micro-entrepreneurs surveyed were revealed to be performing very poorly because majority of the entrepreneurs had no access to external funds. The finding indicated that the women entrepreneurs’ propensity to save for the growth of their enterprises was on average very low implying that they were experiencing some constraint factors. This tends to affect the performance of the women entrepreneurs negatively. Therefore, the study recommended that formal and informal entrepreneurship education should be given to micro- entrepreneurs in order to develop their managerial capabilities, accounting skills and overall be made more credit worthy and the Federal government should consider developing policies that will create an enabling environment for the development and proper operation of cooperative thrift and credit societies and other group initiatives.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Structural study, NCA, FT-IR, FT-Raman spectral investigations, NBO analysis and thermodynamic functions of 1-hydroxynaphthalene- 2-carboxylicacid
In this work, the vibrational characteristics of 1-hydroxynaphthalene-2-carboxylicacid (1HN2CA) have been investigated and both the experimental and theoretical vibrational data indicate the presence of functional groups in the title molecule. The density functional theoretical (DFT) computations were performed at the B3LYP/(ccPVDZ, 6-311+G(d)) levels to derive the optimized geometry, vibrational wavenumbers with IR and Raman intensities. Furthermore, the molecular orbital calculations such as natural bond orbital’s (NBOs), HOMO–LUMO energy gap and Mapped molecular electrostatic potential (MEP) surfaces were also performed with the same level of DFT. The thermal flexibility of molecule in associated with vibrational temperature was also illustrated on the basis of correlation graphs. The detailed interpretation of the vibrational spectra has been carried out with the aid of potential energy distribution (PED) results obtained quantum chemical calculations. The delocalization of electron density of various constituents of the molecule has been discussed with the aid of NBO analysis.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Students` attitude towards education loans for professional courses
Many deserving students dream of higher education, but only a few are able to arrange the necessary funds to support it. Sometimes students have to struggle for funds so that they can get the taste of higher education and build their futures. Much needed help has come in the form of student loans. The paper covers many issues relating to HE finance from students’ view point. They are the real beneficiaries of education finance schemes promoted by Government of India (GOI) in coordination with banking sector. In current study efforts have been made to analyze whether or not there exists a significant difference between average attitudes of two groups of students’ towards education loan for professional courses. The research results show that attitude towards education loan between two groups though positive but group of passed out students feel under pressure, financially as well as psychologically.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Study of effective factors on gully erosion and its zonation in Neyzar region of Qom province
Different soil erosion types including water and wind erosion which result in soil degradation and reducing fertility potential of soil, cause desertification in the region. "Gully Erosion" is one of water erosion types that with progressive trend results in soil degradation, and on the other hand, produces a lot of sediments. Determination of effective factors on gully erosion and its hazard zonation is one of substantial approaches in order to manage and control this phenomenon, and select the most appropriate and applied effective option. Hence this study is performed to classify effective factors on gully erosion, and identify regions with high potential in gully erosion using analytical hierarchy process method in Neyzar region, Qom. The most effective factors in gully erosion including slope degree, slope aspect, lithology, land use, and land suitability, were collected and digitized in geographical information systems. Then, gullies inventory map prepared using 1:20000 aerial photos (1372), and field studies was carried out by GPS. In the next step, effective factors were compared in pairs, and the weight of each factor was calculated that illustrates their contribution. Next, scaled map of each factor in respect to their quantities was prepared, and finally, gully erosion was zoned using scaled layers and scale index related to each factor. Results indicate that lithology (0.4978), and land use (0.2227) are the most important factors in gully initiation, respectively. For the assessment of zonation map, gullies inventory map shows that about 91% of gullies are located in zones of high and very high risk in this region. Therefore, due to the fact that AHP is based on dual comparision of factors, results in easy and accurate necessery calculations and it includes many effective factors, it is a suitable and efficient method for gully erosion hazard zonation.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Study of Greater Sciatic Notch in Sex Determination of Hip Bone by Metric Method
Identification of sex of an unknown individual from the skeletal remains is the first and the most important step encountered by the forensic experts and archiologists. The hip bone is considered as an ideal bone for sex determination as it provides the highest accuracy levels. Many workers have studied various metric parameters for sexing of hip bone. The present study was done with an aim to find out the sex of hip bone using various parameters of greater sciatic notch. For this purpose, 100 dry hip bones were collected from the Department of Anatomy, VIMS, Bellary. Seven different parameters of the greater sciatic notch were used for the study: Maximum width, Maximum depth, Posterior segment, Index I, Index II, Total angle and Posterior angle. All the parameters (especially posterior segment, posterior angle and index II) were found to be highly indicative of sex hip bone by t- test (p<0.005) except the depth.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]