Refine your search
Collections
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Dayya, Purva
- Self-Help Groups in Empowering Women:A Study in Udaipur and Jhalawar Districts of Rajasthan
Abstract Views :242 |
PDF Views:0
Authors
Affiliations
1 AICRP – HECM, College of Home Science, Maharana Pratap University of Agriculture and Technology, Udaipur (Rajasthan), IN
2 College of Home Science, MaharanaPratap University of Agriculture and Technology, Udaipur (Rajasthan), IN
3 Department of Soil Science, Rajasthan College of Agriculture, Maharana Pratap University of Agriculture and Technology, Udaipur (Rajasthan), IN
1 AICRP – HECM, College of Home Science, Maharana Pratap University of Agriculture and Technology, Udaipur (Rajasthan), IN
2 College of Home Science, MaharanaPratap University of Agriculture and Technology, Udaipur (Rajasthan), IN
3 Department of Soil Science, Rajasthan College of Agriculture, Maharana Pratap University of Agriculture and Technology, Udaipur (Rajasthan), IN
Source
International Journal of Home Science Extension and Communication Management, Vol 4, No 1 (2017), Pagination: 57-60Abstract
The study was conducted in Udaipur and Jhalawar district of Rajasthan, to know the Empowerment status of SHG members. Total 1123 groups were registered during year 2008-09 by different forming agencies. In which, 102 SHGs were selected from NABARD, ICDS, DRDA and SAUs.Major finding revels that comparison of empowerment data before joining the SHGs, there was slight change in status of women, as before joining the SHG there were 33 office bearers who were found in the low empowerment category of legal and political empowerment however, after becoming the member of SHGs the percentage decreased upto 10 per cent and only 24 office bearers remained in this category.Keywords
Self-Help Groups, Empowerment, Empowering Women.References
- Antwal, P.N., Bellurkar, C.M. and Rathod, S.M. (2015). Dynamics and performance of women self help groups from Hingoli district. Internat. J. Appl. Soc. Sci., 2 (3&4) : 69-77.
- Archana and Singh, B.B. (2002). Performance of self help groups in economic empowerment of rural women. Indian Res. J. Extn. Edu., 2(1):13-17.
- Bairwa, Shoji Lal, Kushwaha, Saket, Lakra, Kerobim and Meena, Lokesh Kumar (2014). Women empowerment through agri-clinics and agri-business centres scheme in India. Internat. J. Com. & Bus. Manage, 7(1) : 181-185.
- Chopde, K.D., Kadam, M.M. and Bondhare, V.O. (2015).Role of self help groups in rural credit for women empowerment. Internat. Res. J. Agric. Eco. & Stat., 6 (1) : 160-163.
- Gupta, Nidhi and Patel, Komal (2015).Women empowerment through Mahatma Gandhi National Rural Employment in Anand district. Internat. J. Appl. Home Sci., 2 (1&2) : 60-64.
- Jobpaul, K.D.L. and Muthyalu, J. (2012). Women empowerment through SHG’s. Internat. J. Com. & Bus. Manage, 5(1): 98 - 104.
- Kappa, Kondal (2014). Women empowerment through self help groups in Andhra Pradesh, India. Internat. Res. J. Soc. Sci., 3 (1) : 13-17.
- Kaur, Kanwaljit, Mann, Sukhdeep Kaur and Kaur, Prabhjot (2011). Strategies for women empowerment. Adv. Res. J. Soc. Sci., 2 (2) : 275-278.
- Vinayamoorthy, A. and Pithoda, Vijay (2007). Women empowerment through SHG: A case study in North Tamil Nadu. Indian J. Mktg., 37 (11) : 32-35.
- Census (2011). Retrived from tribal.nic.in. onfebruary 10, 2016.
- Next Generation in Computing with Agent Oriented Distributed System: Protocols and Features
Abstract Views :94 |
PDF Views:0
Authors
Affiliations
1 Agriculture University, Jodhpur, IN
2 MPUAT, Udaipur, IN
1 Agriculture University, Jodhpur, IN
2 MPUAT, Udaipur, IN
Source
Oriental Journal of Computer Science and Technology, Vol 11, No 2 (2018), Pagination: 126-134Abstract
Distributed structure of programming and computing has evolved in all facets of development and spawned a new era of distributed computing. In these structures, the isolated processing nodes have been networked to form a powerful processing and communication device. Now, they need an integrated infrastructure for communication that is capable of providing and developing strong and secure mobility features. The mobile agent technology is becoming a promising solution for widely distributed systems like the Internet. Mobile agent based infrastructure is capable of forming migratory environment efficiently using the network resources. The mobile agent is software code capable of moving closer to the required resource in contrast to systems that incorporate the mobility of non-executable code only. It is also required for various agent-oriented languages to support architectural heterogeneity and less or no dependency on the previous system once an agent is transmitted to another system in the network. This paper reviews the architectural components that exist and required for agent-based systems. It also reviews various software components of universal mobile agent system and explores some aspects of migration and intercommunication of agent-oriented approaches.Keywords
Agent Oriented Languages, Mobile Objects, Distributed Programming, Dynamic Itinerary, On-the-Fly Execution, Agent Migration.References
- Shigeki Shiokawa, “Performance analysis for use of mobile agent in wireless multihop networks.” In 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 827-832. DOI: 10.1109/ ICUFN.2016.7537153, IEEE, 2016.
- S. Sobitha Ahila, and K. L. Shunmuganathan., “Overview of mobile agent security issues—Solutions.” In Information Communication and Embedded Systems (ICICES), 2014 International Conference on, pp. 1-6. IEEE, 2014.
- H. M. Eldegwi, M. B. Badawy, and Hamdy M. Kelash., “Building a Secure Decentralized Energy System with Remote Monitoring Using Mobile Agents.” In 2015 Fifth International Conference on e-Learning (econf), pp. 263-268. DOI: 10.1109/ECONF.2015.80, IEEE, 2015.
- Zhixin. Tie, “A Mobile Agent-Based System for Server Resource Monitoring.” Cybernetics and Information Technologies, Volume 13, Issue 4, Pages 104–117, ISSN (Print) 1314-4081, DOI: 10.2478/cait-2013-0057, December 2013.
- Rahul Singh Chowhan and Rajesh Purohit, “Study of mobile agent server architectures for homogeneous and heterogeneous distributed systems.” International Journal of Computer Applications. 2016; 156, no. 4: 32-37.
- Rahul Singh Chowhan, Amit Mishra, and Ajay Mathur, “Aglet and kerrighed as a tool for load balancing and scheduling in distributed environment.” In Recent Advances and Innovations in Engineering (ICRAIE), 2016 International Conference on, pp. 1-6. IEEE, 2016.
- Tina Setter, Andrea Gasparri, and Magnus Egerstedt. “Trust-based interactions in teams of mobile agents.” In 2016 American Control Conference (ACC), pp. 6158-6163. DOI: 10.1109/ACC.2016.7526637, IEEE, 2016.
- Youssef M. Essa, Gamal Attiya, and Ayman El-Sayed. "Mobile agent based new framework for improving big data analysis." In Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on, pp. 381-386. DOI: 10.1109/CLOUDCOM-ASIA.2013.75, IEEE, 2013.
- Gaoyun Chen, Jun Lu, Jian Hhuang, and Zexu Wu. “Saaas-the mobile agent based service for cloud computing in internet environment.” In 2010 Sixth International Conference on Natural Computation, vol. 6, pp. 2935-2939. IEEE, 2010.
- Lingaraj. K, Rajashree V. Biradar, and V. C. Patil. “A survey on mobile-agent middleware design principals and itinerary planning algorithms.” In 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp. 749-753. DOI: 10.1109/ICATCCT.2015.7456983, IEEE, 2015.
- Jeffrey T. McDonald, Alec Yyasinsac, and Willard C. Thompson III., “Mobile agent data integrity using multi-agent architecture” AIR FORCE INST OF TECH WRIGHT-PATTERSONAFB OH, 2004.
- Akinyokun Oluwole Charles, Ekuewa J. B., and Arekete S. A., “Development of agent-based system for monitoring software resources in a network environment.” Artificial Intelligence Research 3, DOI: 10.5430/air.v3n3p62, no. 3 (2014): p62
- H. M. Eldegwi, M. B. Badawy, and Hamdy M. Kelash., “Building a Secure Decentralized Energy System with Remote Monitoring Using Mobile Agents.” In 2015 Fifth International Conference on e-Learning (econf), pp. 263-268. DOI: 10.1109/ECONF.2015.80, IEEE, 2015.
- Mi Yyoung Jo and Keecheon Kim. “A research on the regional routing scheme based mobile agent for SDN.” In 2016 International Conference on Information Networking (ICOIN), pp. 211-213. DOI: 10.1109/ICOIN.2016.7427116, IEEE, 2016.
- Michail Fragkakis, and Nikolaos Alexandris. “Comparing the trust and security models of mobile agents.” Information Assurance and Security, 2007. IAS 2007. Third International Symposium on. IEEE, 2007.
- Imran Khan, Mohammad Nauman, Masoom Alam, and Furqan Aziz. “SAuthMash: mobile agent based self authorization in mashups.” In Proceedings of the 7th International Conference on Frontiers of Information Technology, p. 41. ACM, 2009.
- Marthie Schoeman, and Elsabé Cloete. “Architectural components for the efficient design of mobile agent systems.” In Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, pp. 48-58. South African Institute for Computer Scientists and Information Technologists. ACM, 2003.
- Masayuki Hhigashino, Shin Osaki, Shinya Otagaki, Kenichi Takahashi, Takao Kawamura, and Kazunori Sugahara. “Debugging Mobile Agent Systems.” In Proceedings of International Conference on Information Integration and Web-based Applications & Services, p. 667. ACM, 2013.
- Ko-Hhsin Cindy Wang, “Massively multi-agent pathfinding made tractable, efficient, and with completeness guarantees.” In The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 3, pp. 1343-1344. International Foundation for Autonomous Agents and Multiagent Systems, ACM, 2011.
- Rui A. Martins, Manuel E. Correia, and Alexandre B. Augusto. “A literature review of security mechanisms employed by mobile agents.” In Information Systems and Technologies (CISTI), 2012 7th Iberian Conference on, pp. 1-4. IEEE, 2012.
- Mohamed A. Madkour, Fathy E. Eassa, Abdullah M. Ali, and Noor U. Qayyum. “Securing Mobile-Agent-Based Systems Against Malicious Hhosts'.”World Applied Sciences Journal. 2014; 29, no. 2: 287-297.
- Youssef M. Essa, Gamal Attiya, and Ayman El-Sayed. "Mobile agent based new framework for improving big data analysis." In Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on, pp. 381-386. DOI: 10.1109/CLOUDCOM-ASIA.2013.75, IEEE, 2013.
- Gaoyun Chen, Jun Lu, Jian Hhuang, and Zexu Wu. “Saaas-the mobile agent based service for cloud computing in internet environment.” In 2010 Sixth International Conference on Natural Computation, vol. 6, pp. 2935-2939. IEEE, 2010.
- Behrooz Safarinejadian, and Kazem Hhasanpour., “Distributed Data Clustering Using Mobile Agents and EM Algorithm.” DOI: 10.1109/JSYST.2014.2337114, IEEE Systems Journal 10, no. 1 (2016): 281-289.
- Chowhan R.S., “Mobile Agent Based Workflow Management System (MAWFMS) for Information Flow and Business Processes”, DOI:10.13005/ojcst11.01.08, Orient. J. Comp. Sci. and Technol. 2018; 11(1):40-49.