A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sharma, Rakesh
- Sustainable Destination Development & Implications for the State of Jammu & Kashmir
Authors
1 BGSBU Rajouri, Jammu & Kashmir, IN
2 Lovely Professional University, Jalandar, Punjab, IN
3 Central University of Jammu, Jammu & Kashmir, IN
Source
PRIMA: Practices and Research in Marketing, Vol 6, No 1&2 (2015), Pagination: 14-20Abstract
The business of tourism has been seen as a key player in the uprising of any destination but at the same time, makes it vulnerable to numerous parallel threats where a destination strives hard for its sustainability in the long run. Thus the future competitiveness and strength to survive for any destination depends on its ability to survive in the longer run and stand sustainable in terms of economic, natural and cultural resources and at the same time to ensure, efficient and planned consumption of the same. To satisfy the same it becomes imperative for the destination planners to incorporate their polices as such that lowest minimal depletion of resources is observed and maximum sustainable development of the destination is attained. The involvement of various stakeholders or destination planners in the progression of development of the destination cannot be overlooked .The state of Jammu and Kashmir is one of the leading destinations in terms of tourist inflow and the contribution of the various planning agencies cannot be ignored as far the development of the destination is concerned in the long run. This paper is an attempt to highlight the contribution of the various planning agencies in the sustainable development of the state of Jammu and Kashmir. The study gives an outline as to the various practices that should be adhered by the agencies so as augment the practice of sustainable development.Keywords
Jammu & Kashmir, Sustainability, Stakeholders, Tourism.References
- Ahn, B. Y., Lee, B. K., & Shafer, C. S. (2002). Operationalizing sustainability in regional tourism planning: An application of the limits of acceptable change framework. Journal of Tourism Management, 23(1), 1-15.
- Bramwell, B. (2006), Actors, power, and discourses of growth limits. Annals of Tourism Research, 33(4), 957-978.
- Butler, R., Hall, C., & Jenkins, J. (1998), Introduction, In Butler, R., Hall, C., & Jenkins, J. (Eds.), Tourism and Recreation in Rural Areas (pp.3-16), New York John Wiley and Sons Ltd.
- Butler, R. W. (1993). Tourism - An evolutionary perspective, In J. G. Nelson, R. Butler, & G. Wall (Eds.), Tourism and Sustainable Development: Monitoring, Planning, and Managing (pp.26-43), Waterloo, Heritage Resources Centre, University of Waterloo.
- DBEDT Report (2006a). Planning For Sustainable Tourism Part 1. Summary Report.
- Dyer, P., Gursoy, D., Sharma, B., & Carter, J. (2007). Structural modelling of resident perceptions of tourism and associated development on the sunshine coast, Australia. Tourism Management, 28 (2), 409-422.
- Dowling, R. (1993). An environmentally-based planning model for regional tourism development. Journal of Sustainable Tourism, 1(1), 17-37.
- De Oliveira, J. (2003). Governmental responses to tourism development: Three Brazilian case studies. Tourism Management, 24, 97-100
- Franch, M., Martini, U., & Buffa, F. (2010). Profili hardpath e soft-path deituristi 4L in Italia, risultati di un’indagine sui viaggiatori del Cts, Disa Working Paper, (2), 1-61.
- Fliorino, D. J. (1990). Citizen participation and environmental risk: A survey of institutional mechanisms. Journal of Science, Technology, & Human Values, 15(2), 226-243.
- Gunn, C. A. (1994). Tourism planning: Basic concepts cases (3rd ed.). Washington, D.C, Taylor and Francis.
- Jamal, T. B., & Getz, D. (1995). Collaboration theory and community tourism planning. Annals of Tourism Research, 22(1), 186-204
- Larson, L. E., & Poudyal, N. C. (2012). Developing sustainable tourism through adaptive resource management: A case study of Machu Picchu, Peru. Journal of Sustainable Tourism, 20(7), 917-938
- Mc Cool, S. F. (1995). Linking tourism, the environment and concepts of sustainability: Setting the stage, In Mc Cool, S. F., Watson, A. E., & Comps. (1995), linking tourism: The environment and sustainability - topical volume of compiled papers from a special session of the annual meeting of the National Recreation and Park Association, 3-7.
- McCool, S. F, Moisey, R. N., & Nickerson, N. P. (2001). What should tourism sustain? The disconnect with industry perceptions of useful indicators. Journal of Travel Research, 40(2), 124-131.
- Mowforth, M., & Munt, I. (2008). Tourism and sustainability. Development, Globalisation and New Tourism in the Third World, London, Routledge.
- Sreekumar, T. T., & Parayil G. (2002). Contentions and contradictions of tourism as development option: The case of Kerala. Third World Quarterly, 23(3), 529-548
- WCED: World Commission on Environment and Development . (1987). Our common future. Oxford, Oxford University Press
- World Tourism Organization (1993). Sustainable Tourism Development Guide for Local Planners. Spain, WTO publication.
- Uranium Mineralisation Associated with Felsic Volcanism at Mohar, Shivpuri District, Madhya Pradesh
Authors
1 Atomic Minerals Directorate for Exploration and Research, Bangalore, 560 072, IN
2 Atomic Minerals Directorate for Exploration and Research, Shillong – 793 011, IN
3 Atomic Minerals Directorate for Exploration and Research, Hyderabad – 560 016, IN
Source
Journal of Geological Society of India (Online archive from Vol 1 to Vol 78), Vol 78, No 1 (2011), Pagination: 57-62Abstract
Several small lensoidal bodies of felsic volcanics are exposed in a curvilinear pattern within the brecciated granitoids of Bundelkhand Gneissic Complex (BGC) at Mohar. Sub-surface data reveals extensive presence of these felsic volcanics below the sediment of Vindhyan Supergroup. It occurs like a sheet with thickness varying from 12 m to 134 m. Its lateral extent has been traced upto 4.8 km. Multiple flows of felsic magma are identified based on colour, granularity, cross cutting relations and cyclic distribution of multiple vesicular bands along the entire thickness of felsic magma. The felsic rock contains upto 13.21% K2O. Chemical composition of these felsic volcanics varies across the column. Petrographically and chemically all these felsic volcanics are identified as rhyolite or rhyolite tuff.
Significant uranium mineralisation of 0.0165% eU3O8 average grade has been intercepted for 11.10 m thick with <0.005% ThO2 within the felsic rock. Radiometric assay of a mineralised intercept (15 cm length) has revealed up to 0.15% U3O8 with disequilibrium in favour of parent. Uranium occurs as disseminated grains of coffinite - (Y) associated with pyrite, chalcopyrite, galena, molybdenite, hematite, fluorite, anglesite and cerrusite. Mineral assemblage and mode of occurrence of the uranium and other minerals in the host rock indicates its hydrothermal nature. This is the first reported uranium occurrence from the volcanogenic environment of Bundelkhand.
Keywords
Uranium Mineralisation, Felsic Volcanism, Mohar, Madhya Pradesh.- Psychological Impact of Social Networking Sites
Authors
1 Department of Forensic Science, Teerthankar Mahaveer University, Moradabad, IN
Source
Indian Journal of Health and Wellbeing, Vol 7, No 1 (2016), Pagination: 169-171Abstract
Youngsters are progressively using social networking sites (SNSs), like Facebook, Twitter, Linkdin, Google+, Pinterest to connect with others. The use of Social Networking Sites can have both positive and negative impacts on the individual; be that as it may, few research studies distinguish the sorts of individuals who visit these Internet sites. Social networking sites empower people to oversee their own picture. By giving different chances to particular self-presentation through photographs, individual subtle elements, what's more, comments these sites power human services masters to reexamine psychological processes. This study tried to anticipate youthful grown-ups'use of Social Networking Sites and addictive inclination towards the use of Social networking sites from their identity qualities and levels of self-regard. The Internet has turned into today's characterizing medium and impressively impacts the behavior of numerous individuals. Our encounters in online networking, our associations with gadgets like cell phones, tablets and portable PCs, and the routes in which our quick physical environment is in effect falsely extended by "the internet", are all a vital part of the field of "media psychology". As a case, one of the more well known elements of Facebook is the status update, in which person composed content depicting the proprietor's present experience or feeling are shown alongside the date and time of disclosure. Such an option is especially essential, considering that youths regularly reveal more about themselves on informal organizations than they do in individual.As per study persons don't take as much time as necessary and don't think about time which causes an extremely non genuine state of mind with education or work. Getting to be someone who is addicted of social networks feels like you have such a large number of companions yet in genuine the majority of the contacts are virtual contacts. This demonstration of going a long way from your family, companions,education and different affiliations could be all that much risky for life and education or work.Keywords
Social Networking Sites, Impact of Social Networks, Addiction.- Role of Mathematics in Economic Theory and Modeling
Authors
1 Govt. College, Sangrah, District Sirmour, H.P.– 173 023, IN
Source
International Journal of Technology, Vol 6, No 2 (2016), Pagination: 170-174Abstract
The introduction of Mathematical methods into Economics has been a long process passed through various stages. Initially, it began with a total rejection, followed by a partial acceptance. Pieces of mathematical reasoning applied to economic problems have been found as far back in history as in Aristotle's work. In 18th and 19th Century, Bernoulli, Gauss, Laplace and Poisson developed mathematical models to discuss economic problems. However, Economics became more mathematical as a discipline throughout the first quarter of the 20th century, but introduction of new and generalized techniques in the period around the Second World War, broaden the use of mathematical formulations that led to the major development of mathematization of the Economics. Now, it is being widely accepted as a tool to be very useful in improved Economic Theory and Modeling for policy formulation and providing corrective measures for deficiencies or shortcomings of existing policies with better sense and sound judgment. Having a fair idea of economic problems with expert knowledge supplemented by appropriate mathematical techniques do provide a better formal intuitive insight into the problem and can promote one's understanding in a systematic and consistent form. Empirical support and mathematical logic makes the theory more easily understandable so that some otherwise confused and ambiguous observations can be visualized within a proper perspective. Economic reasoning based on mathematics has been a fundamental factor in the development of economic theory as a science. Some challenges of mathematics and certain prerequisites and concepts may push the readers away from modern Economics, but knowledge of some important tools of mathematics provides a convenient alternative between intensive and extensive points of view and may end up providing a grasp of the both.- Some Studies on Chromium Carbide Hardfacing with Self Shielded Flux Cored Wire
Authors
1 MECON, Ranchi, IN
2 Welding Research Laboratory, University of Roorkee, Roorkee, IN
Source
Indian Welding Journal, Vol 27, No 4 (1994), Pagination: 13-18Abstract
Detailed investigations have been carried out to study the effect of welding parameters on the charecteristics of hard metal deposited by self shielded flux-cored wire
The various characteristics of the deposited layer such as dilution, hardness, chemical composition etc. have been evaluted with respect to variation in the welding voltage current and speed.
It has been found that welding parameters have difinite influence on the above mentioned characteristics of the deposited layer of the hard metal as well as on the efficiency of the deposition.
- Survey of Intrusion Detection Techniques and Architectures in Wireless Sensor Networks
Authors
1 Department of Computer Science &Engg., I. K. Gujral Punjab Technical University, Jalandhar, Punjab, IN
2 Department of Computer Science & Engg., Gulzar group of Institutes, Khanna, Punjab, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No 4 (2019), Pagination: 3925-3937Abstract
Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). However, WSNs practice from lots of constraints, with low computation capability, small memory, limited energy resources, vulnerability to physical capture, and the need of infrastructure, which enforce lonely security challenges mostly for the applications where confidentiality has key significance. There are diverse applications for wireless sensor networks, and security is very major issue for several of them. Before attackers can damage the WSN system (i.e., sensor nodes) and/or information destination (i.e., data sink or base station) in order to work WSNs in a secure way, any sort of intrusions should be detected.Keywords
Intrusion Detection, IDS, Security, Wireless Sensor Network, WSN.References
- I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A survey on sensor networks”, IEEE Commun. Mag., vol. 40, num. 8, pp. 102- 114, 2002.
- M. Ngadi, A.H. Abdullah, and S. Mandala, “A survey on MANET intrusion detection”, International J.Computer Science and Security, volume 2, number 1, pages 1-11, 2008.
- Y. Zhang, W. Lee, and Y.A. Huang, “Intrusion detection techniques for mobile wireless networks”, J. Wireless Networks, vol. 9, num. 5, pp.545-556, 2003.
- T.S. Sobh, “Wired and wireless intrusion detection system: Classifications, good characteristics and state-oftheart”, Elsevier J. Computer Standards and Interfaces, volume 28, number 6, pages 670-694, 2006.
- T. Anantvalee and J. Wu, “A survey on intrusion detection in mobile ad hoc networks”, Springer J. Wireless Network Security, pages 159-180, 2007.
- P. Albers, O. Camp, J. Percher, B. Jouga, L. M, and R. Puttini, “Security in Ad Hoc Networks: A General Intrusion Detection Architecture Enhancing Trust Based Approaches,” Proc. 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 1-12, April 2002.
- Noureddine Assad, Brahim Elbhiri, Moulay Ahmed Faqihi, Mohamed Ouadou and Driss Aboutajdine, "Efficient deployment quality analysis for intrusion detection in wireless sensor networks", Wireless Networks, vol. 22, no. 3, pp. 991-1006, April 2016.
- Michael Riecker, Sebastian Biedermann, Rachid El Bansarkhani and Matthias Hollick, "Lightweight energy consumption-based intrusion detection system for wireless sensor networks", International Journal of Information Security, vol. 14, no. 2, pp. 155-167, 2015.
- Hussein Moosavi and Francis Minhthang Bui, "A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks", IEEE Transactions on Information Forensics and Security, vol. 9, no. 9, pp. 1367-1379, June 2014.
- Mohammad Wazid and Ashok Kumar Das, "An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks", Wireless Personal Communications, vol. 90, no. 4, pp. 1971-2000, October 2016.
- Helio Mendes Salmon, Claudio M. de Farias, Paula Loureiro, Luci Pirmez, "Intrusion Detection System for Wireless Sensor Networks Using Danger Theory ImmuneInspired Techniques", International Journal of Wireless Information Networks, vol. 20, no. 1, pp. 39-66, 2013.
- Shahaboddin Shamshirband, Nor Badrul Anuar and Miss Laiha Mat Kiah, "Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks", Journal of Network and Computer Applications, vol. 42, pp. 102-117, 2014.
- Sutharshan Rajasegarar, Christopher Leckie and Marimuthu Palaniswami, "Hyperspherical cluster based distributed anomaly detection in wireless sensor networks", Journal of Parallel and Distributed Computing, vol. 74, no. 1, pp. 1833-1847, 2014.
- Anil Kumar Sagar and D. K. Lobiyal, "Probabilistic Intrusion Detection in Randomly Deployed Wireless Sensor Networks", Wireless Personal Communications, vol. 84, no. 2, pp. 1017-1037, 2015.
- Ashfaq Hussain Farooqi, Farrukh Aslam Khan, Jin Wang and Sungyoung Lee, "A novel intrusion detection framework for wireless sensor networks", Personal and Ubiquitous Computing, vol. 17, no. 5, pp. 907-919, 2013.
- Ahmed Saeed, Ali Ahmadinia, Abbas Javed and Hadi Larijani, "Random Neural Network based Intelligent Intrusion Detection for Wireless Sensor Networks", In proceedings of International Conference on Computational Science, vol. 80, pp. 2372-2376, 2016.
- Sandhya G and Anitha Julian, "Intrusion Detection in Wireless Sensor Network Using Genetic K-Means Algorithm", In proceedings of IEEE International Conference on Advanced Communication Control and Computing Teclmologies, pp. 1-4, 2014.
- Shahaboddin Shamshirband, Amineh Amini, Nor Badrul Anuar, Miss Laiha Mat Kiah, Teh Ying Wah and Steven Furnell, "D-FICCA: A Density-based Fuzzy Imperialist Competitive Clustering Algorithm for Intrusion Detection in Wireless Sensor Networks", Measurement, vol. 55, pp. 212-226, 2014.
- Guangjie Han, Jinfang Jiang, Wen Shen, Lei Shu and Joel Rodrigues, "IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks", IET Information Security, vol. 7, no. 2, pp. 97-105, 2013.
- Maissa Elleuch, Osman Hasan, Sofi`ene Tahar and Mohamed Abid, "Formal probabilistic analysis of detection properties in wireless sensor networks", Formal Aspects of Computing, vol. 27, no. 1, pp. 79-102, 2015.
- Laura Gheorghe, Razvan Rughinis and Razvan Tataroiu, "Adaptive Trust Management Protocol based on Intrusion Detection for Wireless Sensor Networks", In proceedings of IEEE International Conference on Networking in Education and Research, pp. 1-7, 2013.
- Masud Moshtaghi, Christopher Leckie, Shanika Karunaseker and Sutharshan Rajasegarar, "An adaptive elliptical anomaly detection model for wireless sensor networks", Computer Networks, vol. 64, pp. 195-207, 2014.
- Yassine Maleh, Abdellah Ezzati, Youssef Qasmaoui and Mohamed Mbida, "A Global Hybrid Intrusion Detection System for Wireless Sensor Networks", The fiifth International Symposium on Frontiers in Ambient and Mobile Systems, vol. 52, pp. 1047-1052, 2015.
- Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang and Dharma P. Agrawal, "Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks", IEEE Transactions on Mobile computing, vol. 7, no. 6, pp. 698-710, 2008.
- S. Shamshirband, N.B. Anuar, M.L.M. Kiah, A. Patel, "An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique", Engineering Applications of Artificial Intelligence, vol. 26, no. 9, pp. 2105-2127, 2013.
- Yun Wang and Zhengdong Lun, "Intrusion detection in a K-Gaussian distributed wireless sensor network", Journal of Parallel and Distributed Computing", vol. 71, no. 12, pp. 1598-1607, 2011.
- Shigen Shen, Yuanjie Li, Hongyun Xu and Qiying Cao, "Signaling game based strategy of intrusion detection in wireless sensor networks”, Computers & Mathematics with Applications, vol. 62, no. 6, pp. 2404-2416, 2011.
- Guorui Li, Jingsha He and Yingfang Fu, "Group-based intrusion detection system in wireless sensor Networks”, Computer Communications, vol. 31. No.18, pp. 4324-4332, 2008.
- Hichem Sedjelmaci and Mohamed Feham, “ Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4 July 2011.
- Hossein Jadidoleslamy, “A hierarchical intrusion detection architecture for wireless sensor networks”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011.
- K.Q. Yan, S.C. Wang, C.W. Liu, “A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks”, Proceedings of the International Multi Conference of Engineers and Computer Scientists 2009 Vol I IMECS 2009, March 18 – 20, 2009.
- Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos,Felix C. Freiling, and Tassos Dimitriou, “Cooperative Intrusion Detection in Wireless Sensor Networks”, U. Roedig and C.J. Sreenan (Eds.): EWSN 2009, LNCS 5432, pp. 263–278, 2009. Springer-Verlag Berlin Heidelberg, 2009.
- Soumya Banerjee, Crina Grosan and Ajith Abraham, “IDEAS: Intrusion Detection based on Emotional Ants for Sensors”, 5th international conference on Intelligent systems design and application, pp. 344-349, Sep 2005.