Beulah Shekhar | Karunya University (original) (raw)
Papers by Beulah Shekhar
Pregnancy is supposed to be a time of peace and safety. Intimate partner violence during pregnanc... more Pregnancy is supposed to be a time of peace and safety. Intimate partner violence during pregnancy is a focused attack that puts not just one, but two lives at risk. The study aimed to assess the effect of intimate partner violence on the psychological state of the pregnant women. A descriptive study was done on 100 pregnant victims residing at urban area named, Purasaivakkam in Chennai, TamilNadu, India. The tool comprised of Section A-demographic profile, Section B-structured interview schedule to assess intimate partner violence and Section Crating scale measuring the psychological wellbeing. The study findings revealed severe verbal, emotional, social, economic and sexual abuse. The risk factors identified in the study were severe anxiety, depression, emotional labiality and stress. The results revealed a statistically significant negative correlation between the intimate partner violence and psychological wellbeing at p < 0.001 level of significance and a statistically signi...
Abstract: Problem statement: Virtual private networks have provided customers with a secure and l... more Abstract: Problem statement: Virtual private networks have provided customers with a secure and low-cost communication environment. Approach: The COVPA, the provisioning algorithm for a Virtual Private Network service, which built and managed VPNs on demand. Results: The COVPA allowed each VPN to have guaranteed resources and customized control and supported a highly dynamic VPN service where creation and modification operations took place on fast timescales at reduced cost. Also, it allowed the sharing of bandwidth on the links to reduce the cost. A design process is described, that attempts to satisfy the goals of both the customer and the VPN Service Provider (VSP). Conclusion/Recommendations: The performance of the proposed algorithm is analyzed in terms of cost, the number of nodes, the number of VPN nodes, asymmetric ratio and rejection ratio with the breadth first search, steiner tree and primal dual algorithms. With the enhancement on the design process, the COVPA performs b...
The openness of wireless networks enables adversaries to deception as other devices. Spoofing att... more The openness of wireless networks enables adversaries to deception as other devices. Spoofing attacks are vulnerable in wireless network, which are allowed the many form of attacks in the network. Wireless spoofing attacks are effortless to start and can extensively impact the performance of networks. A physical property coupled with each node is proposed which uses spatial information, hard to forge, and not contingent on cryptography, as the beginning for, detecting spoofing attacks, determining the number of attackers when multiple adversaries hidden as the same node identity and localizing multiple adversaries. To use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, we explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. An...
Information Technology Industry plays a vital role in contributing GDP andproviding employment op... more Information Technology Industry plays a vital role in contributing GDP andproviding employment opportunities to the persons of the country. Over the years, severalenactments have been passed for the protection and welfare of the working women in India.Maternity Benefit Act is one of the such acts which safeguards the working women in India.The research paper aims to analyze the level of awareness and satisfaction of workingmarried women on the Maternity Benefit Act 1961 & 2017. The study also conducted toanalyze the role of Maternity Benefit Act in protecting working married women in IT/ITESCompanies in Chennai. The sample was collected from 125 woman married employeesworking in various IT/ITES Companies in Chennai district by using structuredquestionnaire through convenience sampling method. The study employed both descriptiveand inferential statistical tools for data analysis. Independent Sample ‘t’ test, Correlationand Multiple Regression Analysis were used to test the hypotheses...
Children are considered as “future pillars and valuable assets” of the country. Theirrights to be... more Children are considered as “future pillars and valuable assets” of the country. Theirrights to be protected and their welfare is to be ensured by the government and legalauthorities. The paper aims to analyse the Parents’ Perception and Satisfaction on the ChildProtection Laws with respect to “Protection from child and adolescent labour”, “ChildEducation” and “Children’s Rights” in Thiruvallur district. Based on a sample of 150Parents in Thiruvallur district, descriptive (Mean and percentage analysis) and inferential(bi-variate and multivariate) analysis were carried out. Independent Sample ‘t’ test,Correlation and Multiple Regression Analysis were used to test the hypotheses. The researchrevealed that Parents have more perception and satisfaction on the Protection of child fromChild and Adolescent Labour than Child Education and Children’s Rights. The study alsoindicated that Parents have less perception and satisfaction on Children’s rights whencompared with others. The study sugg...
Civil aviation is always silver bullet target for the terrorist due to countless favorable reason... more Civil aviation is always silver bullet target for the terrorist due to countless favorable reason for them. After the world trade Centre attack on September 11, 2001 world counties implement stringent security norms in the civil aviation. It increases the woes of the passenger at airport and sometimes valuable customer feels they are considered as suspected terrorist. Travelers today demand quick clearance and greater convenience. The outbreak of Covid-19, adds one more misery, demands touch free and contact less security to avoid transmission through exchange. But exponential growth of passenger and inundated infrastructure always create obstacle in this direction. This paper discusses about the solutions to the aforementioned dilemma, and proposes new processes and alternatives that simultaneously satisfy both passenger and security.
Civil aviation is always considered a golden target for the terrorist due to countless favorable ... more Civil aviation is always considered a golden target for the terrorist due to countless favorable reasons for them. Since the first hijack incident reported in the year 1931 in Peru, a lot of unlawful interference in civil aviation has happened. Prior to the sixties, the hijacking of aircraft was never considered a serious problem. Nevertheless, due to the splurge is hijack in the period, 1960-80 by the terrorist for malicious purpose, the period considered as hijacking era, the 80s to the bombing era and the last decade has seen most of the innovative techniques ranging from the attack against aircraft in flight caused by laser strikes on aircraft cockpits, cyber-related incident, and drones(Baum, 2019).Unmanned Aircraft Systems (UAS) or otherwise drones are a new and evolutionary component of the aviation system, offering several new and exciting opportunities, as well as many challenges.
Defined as 'Graying of India', one of the most demographic events, the process by which t... more Defined as 'Graying of India', one of the most demographic events, the process by which the Senior citizens form a proportionately large share of the total population. The parents and the senior citizens are vulnerable to social isolation when ageing lowers the status of the person. Unfortunately, the prevalence and nature of this growing problem has generally remained hidden from public view. It is imperative that both professionals and lay persons are aware of the scope and many issues surrounding this sensitive issue. Silently the older members of the family are abused physically, emotionally, financially, and sexually and driven to seek solace in Old age homes. This empirical study attempts to study the prevalence of elder abuse, the profile of the abuser and the victim. It also studied the impact of elder abuse victimization and coping methods used by the victims. The samples of 300 were chosen from the residents of old age homes in Tirunelveli district, by using non-pr...
International Review of Victimology, 2021
This research paper is a stringent analysis of the condition of commercial sex workers in India a... more This research paper is a stringent analysis of the condition of commercial sex workers in India and what is happening to them in this pandemic-stricken time. The study details their economic condition and what is forcing them to borrow money from treacherous lenders despite knowing the risks behind it. Apart from being exploited financially, they are also becoming vulnerable for sexual, emotional, and physical exploitation, worsening their situation even further. The research findings show that 90% of commercial sex workers in red light areas will be forced into a debt trap that is non-repayable in their lifetime, making it a massive movement of commercial sex workers entering into bonded labour, another form of modern-day slavery. Apart from the financial peril, poverty is forcing them to be in a situation of major health hazard. Being deprived of customers for so long, they might be forced to work in this uncertain situation making it an optimum ground for a super-spread of the vi...
Abstract— Online Reputation Systems are playing increasingly important roles in influencing peo... more Abstract— Online Reputation Systems are playing increasingly important roles in influencing people's online purchasing/downloading decisions. In this paper we propose a scheme user correlation algorithm. The existing mechanisms Time Domain Anomaly detection and Trust model based on dempster safer theory not provide better efficiency. First, limit the maximum number of ratings each user could provide with in the certain time duration. Second investigating users rating behaviors by building user trust, such as a personalized trust model, which evaluates a user's judging power as the inverse of this user's rating variance. In the proposed system, jointly consider trust evaluation and user correlation. Correlation is calculated based on already defined malicious users. Based on the user correlated relationship values eliminate the time consuming and low efficiency.
Women enjoyed a significant position in ancient India. Hindu history experienced great women scho... more Women enjoyed a significant position in ancient India. Hindu history experienced great women scholars like Gargi, Maitreyi, Sulabha, Lopamudra, Vishwaswara, Ghosha etc. there a number of female Gurus like Sarada Devi, Daya Mata etc. but from later Vedic period onwards the status of women changed. The agnipariksha inflicted for Goddess Sita in Ramayana and the humiliation meted out to Draupadi in Mahabharata are best examples. Women are physically and emotionally weaker than males.
The Palgrave International Handbook of Human Trafficking
Journal of Victimology and Victim Justice
Sharing porous borders with its neighbours, India has played a regular host to refugees from Nepa... more Sharing porous borders with its neighbours, India has played a regular host to refugees from Nepal, Burma, Tibet, Pakistan, Afghanistan, Bhutan, Bangladesh and Sri Lanka. According to UNHCR, as of 2014, there are more than 200,000 refugees living in India. Notwithstanding the fact that India is not a signatory to the 1951 UN Refugee Convention and its additional 1967 Protocol, its open-door policy to refugees has had adverse political and socio-economic repercussions. This article3 analyses the experience of the Indian state of Tamil Nadu with the Sri Lankan refugees from the first influx in 1983 up to 2000, when the refugees began returning to their homeland. The researchers identify the pull factors for the refugee influx and push factors that led to their return and in the process put together crucial learning that can be of significance to States dealing with the problem of refugees.
Asian Journal of Research in Social Sciences and Humanities
Journal of Victimology and Victim Justice
Sharing porous borders with its neighbours, India has played a regular host to refugees from Nepa... more Sharing porous borders with its neighbours, India has played a regular host to refugees from Nepal, Burma, Tibet, Pakistan, Afghanistan, Bhutan, Bangladesh and Sri Lanka. According to UNHCR, as of 2014, there are more than 200,000 refugees living in India. Notwithstanding the fact that India is not a signatory to the 1951 UN Refugee Convention and its additional 1967 Protocol, its open-door policy to refugees has had adverse political and socio-economic repercussions. This article3 analyses the experience of the Indian state of Tamil Nadu with the Sri Lankan refugees from the first influx in 1983 up to 2000, when the refugees began returning to their homeland. The researchers identify the pull factors for the refugee influx and push factors that led to their return and in the process put together crucial learning that can be of significance to States dealing with the problem of refugees.
Asian Journal of Research in Social Sciences and Humanities
Pregnancy is supposed to be a time of peace and safety. Intimate partner violence during pregnanc... more Pregnancy is supposed to be a time of peace and safety. Intimate partner violence during pregnancy is a focused attack that puts not just one, but two lives at risk. The study aimed to assess the effect of intimate partner violence on the psychological state of the pregnant women. A descriptive study was done on 100 pregnant victims residing at urban area named, Purasaivakkam in Chennai, TamilNadu, India. The tool comprised of Section A-demographic profile, Section B-structured interview schedule to assess intimate partner violence and Section Crating scale measuring the psychological wellbeing. The study findings revealed severe verbal, emotional, social, economic and sexual abuse. The risk factors identified in the study were severe anxiety, depression, emotional labiality and stress. The results revealed a statistically significant negative correlation between the intimate partner violence and psychological wellbeing at p < 0.001 level of significance and a statistically signi...
Abstract: Problem statement: Virtual private networks have provided customers with a secure and l... more Abstract: Problem statement: Virtual private networks have provided customers with a secure and low-cost communication environment. Approach: The COVPA, the provisioning algorithm for a Virtual Private Network service, which built and managed VPNs on demand. Results: The COVPA allowed each VPN to have guaranteed resources and customized control and supported a highly dynamic VPN service where creation and modification operations took place on fast timescales at reduced cost. Also, it allowed the sharing of bandwidth on the links to reduce the cost. A design process is described, that attempts to satisfy the goals of both the customer and the VPN Service Provider (VSP). Conclusion/Recommendations: The performance of the proposed algorithm is analyzed in terms of cost, the number of nodes, the number of VPN nodes, asymmetric ratio and rejection ratio with the breadth first search, steiner tree and primal dual algorithms. With the enhancement on the design process, the COVPA performs b...
The openness of wireless networks enables adversaries to deception as other devices. Spoofing att... more The openness of wireless networks enables adversaries to deception as other devices. Spoofing attacks are vulnerable in wireless network, which are allowed the many form of attacks in the network. Wireless spoofing attacks are effortless to start and can extensively impact the performance of networks. A physical property coupled with each node is proposed which uses spatial information, hard to forge, and not contingent on cryptography, as the beginning for, detecting spoofing attacks, determining the number of attackers when multiple adversaries hidden as the same node identity and localizing multiple adversaries. To use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, we explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. An...
Information Technology Industry plays a vital role in contributing GDP andproviding employment op... more Information Technology Industry plays a vital role in contributing GDP andproviding employment opportunities to the persons of the country. Over the years, severalenactments have been passed for the protection and welfare of the working women in India.Maternity Benefit Act is one of the such acts which safeguards the working women in India.The research paper aims to analyze the level of awareness and satisfaction of workingmarried women on the Maternity Benefit Act 1961 & 2017. The study also conducted toanalyze the role of Maternity Benefit Act in protecting working married women in IT/ITESCompanies in Chennai. The sample was collected from 125 woman married employeesworking in various IT/ITES Companies in Chennai district by using structuredquestionnaire through convenience sampling method. The study employed both descriptiveand inferential statistical tools for data analysis. Independent Sample ‘t’ test, Correlationand Multiple Regression Analysis were used to test the hypotheses...
Children are considered as “future pillars and valuable assets” of the country. Theirrights to be... more Children are considered as “future pillars and valuable assets” of the country. Theirrights to be protected and their welfare is to be ensured by the government and legalauthorities. The paper aims to analyse the Parents’ Perception and Satisfaction on the ChildProtection Laws with respect to “Protection from child and adolescent labour”, “ChildEducation” and “Children’s Rights” in Thiruvallur district. Based on a sample of 150Parents in Thiruvallur district, descriptive (Mean and percentage analysis) and inferential(bi-variate and multivariate) analysis were carried out. Independent Sample ‘t’ test,Correlation and Multiple Regression Analysis were used to test the hypotheses. The researchrevealed that Parents have more perception and satisfaction on the Protection of child fromChild and Adolescent Labour than Child Education and Children’s Rights. The study alsoindicated that Parents have less perception and satisfaction on Children’s rights whencompared with others. The study sugg...
Civil aviation is always silver bullet target for the terrorist due to countless favorable reason... more Civil aviation is always silver bullet target for the terrorist due to countless favorable reason for them. After the world trade Centre attack on September 11, 2001 world counties implement stringent security norms in the civil aviation. It increases the woes of the passenger at airport and sometimes valuable customer feels they are considered as suspected terrorist. Travelers today demand quick clearance and greater convenience. The outbreak of Covid-19, adds one more misery, demands touch free and contact less security to avoid transmission through exchange. But exponential growth of passenger and inundated infrastructure always create obstacle in this direction. This paper discusses about the solutions to the aforementioned dilemma, and proposes new processes and alternatives that simultaneously satisfy both passenger and security.
Civil aviation is always considered a golden target for the terrorist due to countless favorable ... more Civil aviation is always considered a golden target for the terrorist due to countless favorable reasons for them. Since the first hijack incident reported in the year 1931 in Peru, a lot of unlawful interference in civil aviation has happened. Prior to the sixties, the hijacking of aircraft was never considered a serious problem. Nevertheless, due to the splurge is hijack in the period, 1960-80 by the terrorist for malicious purpose, the period considered as hijacking era, the 80s to the bombing era and the last decade has seen most of the innovative techniques ranging from the attack against aircraft in flight caused by laser strikes on aircraft cockpits, cyber-related incident, and drones(Baum, 2019).Unmanned Aircraft Systems (UAS) or otherwise drones are a new and evolutionary component of the aviation system, offering several new and exciting opportunities, as well as many challenges.
Defined as 'Graying of India', one of the most demographic events, the process by which t... more Defined as 'Graying of India', one of the most demographic events, the process by which the Senior citizens form a proportionately large share of the total population. The parents and the senior citizens are vulnerable to social isolation when ageing lowers the status of the person. Unfortunately, the prevalence and nature of this growing problem has generally remained hidden from public view. It is imperative that both professionals and lay persons are aware of the scope and many issues surrounding this sensitive issue. Silently the older members of the family are abused physically, emotionally, financially, and sexually and driven to seek solace in Old age homes. This empirical study attempts to study the prevalence of elder abuse, the profile of the abuser and the victim. It also studied the impact of elder abuse victimization and coping methods used by the victims. The samples of 300 were chosen from the residents of old age homes in Tirunelveli district, by using non-pr...
International Review of Victimology, 2021
This research paper is a stringent analysis of the condition of commercial sex workers in India a... more This research paper is a stringent analysis of the condition of commercial sex workers in India and what is happening to them in this pandemic-stricken time. The study details their economic condition and what is forcing them to borrow money from treacherous lenders despite knowing the risks behind it. Apart from being exploited financially, they are also becoming vulnerable for sexual, emotional, and physical exploitation, worsening their situation even further. The research findings show that 90% of commercial sex workers in red light areas will be forced into a debt trap that is non-repayable in their lifetime, making it a massive movement of commercial sex workers entering into bonded labour, another form of modern-day slavery. Apart from the financial peril, poverty is forcing them to be in a situation of major health hazard. Being deprived of customers for so long, they might be forced to work in this uncertain situation making it an optimum ground for a super-spread of the vi...
Abstract— Online Reputation Systems are playing increasingly important roles in influencing peo... more Abstract— Online Reputation Systems are playing increasingly important roles in influencing people's online purchasing/downloading decisions. In this paper we propose a scheme user correlation algorithm. The existing mechanisms Time Domain Anomaly detection and Trust model based on dempster safer theory not provide better efficiency. First, limit the maximum number of ratings each user could provide with in the certain time duration. Second investigating users rating behaviors by building user trust, such as a personalized trust model, which evaluates a user's judging power as the inverse of this user's rating variance. In the proposed system, jointly consider trust evaluation and user correlation. Correlation is calculated based on already defined malicious users. Based on the user correlated relationship values eliminate the time consuming and low efficiency.
Women enjoyed a significant position in ancient India. Hindu history experienced great women scho... more Women enjoyed a significant position in ancient India. Hindu history experienced great women scholars like Gargi, Maitreyi, Sulabha, Lopamudra, Vishwaswara, Ghosha etc. there a number of female Gurus like Sarada Devi, Daya Mata etc. but from later Vedic period onwards the status of women changed. The agnipariksha inflicted for Goddess Sita in Ramayana and the humiliation meted out to Draupadi in Mahabharata are best examples. Women are physically and emotionally weaker than males.
The Palgrave International Handbook of Human Trafficking
Journal of Victimology and Victim Justice
Sharing porous borders with its neighbours, India has played a regular host to refugees from Nepa... more Sharing porous borders with its neighbours, India has played a regular host to refugees from Nepal, Burma, Tibet, Pakistan, Afghanistan, Bhutan, Bangladesh and Sri Lanka. According to UNHCR, as of 2014, there are more than 200,000 refugees living in India. Notwithstanding the fact that India is not a signatory to the 1951 UN Refugee Convention and its additional 1967 Protocol, its open-door policy to refugees has had adverse political and socio-economic repercussions. This article3 analyses the experience of the Indian state of Tamil Nadu with the Sri Lankan refugees from the first influx in 1983 up to 2000, when the refugees began returning to their homeland. The researchers identify the pull factors for the refugee influx and push factors that led to their return and in the process put together crucial learning that can be of significance to States dealing with the problem of refugees.
Asian Journal of Research in Social Sciences and Humanities
Journal of Victimology and Victim Justice
Sharing porous borders with its neighbours, India has played a regular host to refugees from Nepa... more Sharing porous borders with its neighbours, India has played a regular host to refugees from Nepal, Burma, Tibet, Pakistan, Afghanistan, Bhutan, Bangladesh and Sri Lanka. According to UNHCR, as of 2014, there are more than 200,000 refugees living in India. Notwithstanding the fact that India is not a signatory to the 1951 UN Refugee Convention and its additional 1967 Protocol, its open-door policy to refugees has had adverse political and socio-economic repercussions. This article3 analyses the experience of the Indian state of Tamil Nadu with the Sri Lankan refugees from the first influx in 1983 up to 2000, when the refugees began returning to their homeland. The researchers identify the pull factors for the refugee influx and push factors that led to their return and in the process put together crucial learning that can be of significance to States dealing with the problem of refugees.
Asian Journal of Research in Social Sciences and Humanities