Template-Type: ReDIF-Article 1.0
Author-Name: T.K. Sreeja
Author-X-Name-First: T.K.
Author-X-Name-Last: Sreeja
Author-Name: J. Jayakumari
Author-X-Name-First: J.
Author-X-Name-Last: Jayakumari
Title: Design and analysis of compact T shape slotted patch antenna for 4G WiMAX applications
Abstract:
A novel single band microstrip patch antenna design is introduced for WiMAX/LTE applications. The proposed antenna has a compact size of 2.7 × 4.5 × 0.076 cm<sup align="right"><small>3</small></sup> and produces the gain of 5.47-8 dBi around the operational band. The antenna consists of T-shaped patch and coaxial feed method is used. This paper presents the antenna design along with the simulated and measured results. Design optimisation and simulation processes are investigated with the help of the Agilent advanced design system electromagnetic simulator that operates based on the numerical technique full-wave method of moment (MoM). The fabricated coaxial feed patch antenna is tested and measured by using spectrum analyser.
Journal: Int. J. of Enterprise Network Management
Pages: 1-10
Issue: 1
Volume: 9
Year: 2018
Keywords: 4G antenna; microstrip antenna; MSA; ADS; WiMAX; LTE.
File-URL: http://www.inderscience.com/link.php?id=92049
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:1:p:1-10
Template-Type: ReDIF-Article 1.0
Author-Name: Sanjana Mohapatra
Author-X-Name-First: Sanjana
Author-X-Name-Last: Mohapatra
Author-Name: Ajit Kumar
Author-X-Name-First: Ajit
Author-X-Name-Last: Kumar
Author-Name: Sanjay Mohapatra
Author-X-Name-First: Sanjay
Author-X-Name-Last: Mohapatra
Title: From a literature review to a conceptual framework for affordable quality healthcare service using internet of things (IOT) network
Abstract:
There has been significant interest in integration of internet of things (IOT) and healthcare both in academic and the corporate world. This can be seen from the fact by the number of conferences held and number of special issues in journals that have been published. To establish further in this domain, the purpose of this research is two-fold. First it does literature review in healthcare and IOT from 151 papers published from 1998 to 2016. Second, it summarises findings from literature review in two parts. In the first part, it identifies the antecedents that impact both affordable quality healthcare and developing an enterprise network for IOT. In the second part, it integrates factors that affect both affordable healthcares with IOT. The results of this research will be useful for both practitioners and academicians as the paper discusses how to design a IOT based healthcare network that will reduce cost of healthcare while preventing chronic diseases. The paper also shows the limitations of the present research while describing stimuli for further research.
Journal: Int. J. of Enterprise Network Management
Pages: 11-21
Issue: 1
Volume: 9
Year: 2018
Keywords: internet of things; IOT; affordable healthcare; conceptual framework.
File-URL: http://www.inderscience.com/link.php?id=92050
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:1:p:11-21
Template-Type: ReDIF-Article 1.0
Author-Name: R. Rajasekaran
Author-X-Name-First: R.
Author-X-Name-Last: Rajasekaran
Author-Name: A. Pal Pandi
Author-X-Name-First: A. Pal
Author-X-Name-Last: Pandi
Author-Name: P.V. Rajendra Sethupathi
Author-X-Name-First: P.V. Rajendra
Author-X-Name-Last: Sethupathi
Author-Name: R. Rajesh
Author-X-Name-First: R.
Author-X-Name-Last: Rajesh
Title: Inventory parameters for a serial supply chain with lost sales through genetic algorithm approach
Abstract:
Supply chain is a network of facilities with varying conflicting objectives and decision making is a complex process. The uncertainty in demand increases complexity in inventory control mechanism. Backordering, partial backordering and lost-sales are considered in the inventory management to characterise the excess demand. In the present competitive scenario, mostly consumers have no patience to wait and show urgency to buy their goods failing which the management has to meet a huge loss of supply chain members and hence the profit. There are very few research works regarding lost-sales parameter in the area of multi-echelon inventory systems. It is felt that the proposed modified gene-wise genetic algorithm (MGGA) supply chain model which so far not applied in this process may help to determine best base stock levels and review periods with lost sales particularly at retailer end which minimised total supply chain cost.
Journal: Int. J. of Enterprise Network Management
Pages: 22-46
Issue: 1
Volume: 9
Year: 2018
Keywords: inventory management; genetic algorithm; supply chain model; lost sales.
File-URL: http://www.inderscience.com/link.php?id=92059
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:1:p:22-46
Template-Type: ReDIF-Article 1.0
Author-Name: N. Mustafa
Author-X-Name-First: N.
Author-X-Name-Last: Mustafa
Author-Name: H. Vennila
Author-X-Name-First: H.
Author-X-Name-Last: Vennila
Title: A meta-heuristic, moth inspired algorithm for combined economic and environmental power dispatch
Abstract:
The problem of deciding the contribution of each generator in a power system is complex. Where some generators are more cost effective, others have cleaner operation. Right choice of generators could save thousands of dollars in operating cost or prevent release of several tons of noxious fumes like NO<sub align="right"><small>2</small></sub> and SO<sub align="right"><small>2</small></sub> annually. Rising complexity of modern power systems and special efficiency improvement methods like valve point loading, demand newer means to find this vital balance between cost and emission. This paper aims to find a solution to this problem by the use of an algorithm inspired by the flight pattern of moths. Like a moth drawn to a flame, this algorithm seeks to minimise both cost as well as emission. The standard IEEE 30 bus test system is considered as the control case and the results obtained are compared with other such algorithms to demonstrate the effectiveness of MFO.
Journal: Int. J. of Enterprise Network Management
Pages: 47-57
Issue: 1
Volume: 9
Year: 2018
Keywords: economic dispatch; emission dispatch; valve point loading; moth flame optimisation; MFO.
File-URL: http://www.inderscience.com/link.php?id=92060
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:1:p:47-57
Template-Type: ReDIF-Article 1.0
Author-Name: Prantosh K. Paul
Author-X-Name-First: Prantosh K.
Author-X-Name-Last: Paul
Author-Name: R. Rajesh
Author-X-Name-First: R.
Author-X-Name-Last: Rajesh
Title: Cloud computing and engineering in the academics with its potentialities in iSchools: an eco friendly development
Abstract:
Cloud computing is a kind of architecture deals with the principles of virtualisation and also promote online computing platform as well as services. Tools of the information technology such as monitor, printers, databases, other applications and packages come under the preview of cloud computing. It is also considered as a cloud platform along with cloud architecture. This helps cost saving due to less software, hardware, and IT packages in the in-house settings. Cloud computing also promotes side by side the online availability. Moreover cloud computing saves initial cost as it is offered by third party and thus seeks no need to connect to the service or cloud provider. In cloud computing, internet plays an important role for converged hardware, software and IT applications. Cloud computing has healthy potentialities in <i>iSchools</i> as such academic units are offered academic programs on information and computing related domains. The paper presented the overview on cloud computing and its features with potentialities of the domain in <i>iSchools</i> and allied branches.
Journal: Int. J. of Enterprise Network Management
Pages: 58-71
Issue: 1
Volume: 9
Year: 2018
Keywords: cloud computing; green computing; virtualisation; academics; MSc; BSc; emerging degrees; iSchools; information sciences.
File-URL: http://www.inderscience.com/link.php?id=92066
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:1:p:58-71
Template-Type: ReDIF-Article 1.0
Author-Name: S. Hemalatha
Author-X-Name-First: S.
Author-X-Name-Last: Hemalatha
Author-Name: K. Narayana Rao
Author-X-Name-First: K. Narayana
Author-X-Name-Last: Rao
Author-Name: G. Rambabu
Author-X-Name-First: G.
Author-X-Name-Last: Rambabu
Author-Name: K. Venkatasubbaiah
Author-X-Name-First: K.
Author-X-Name-Last: Venkatasubbaiah
Title: Modelling and analysis of a four stage supply chain under fuzzy environment
Abstract:
In today's competitive arena, the success of supply chain depends on its managerial ability to integrate and coordinate all stages of the supply chain. The supply chain predominantly consists of four stages in a typical industry, namely: suppliers, manufacturing plants, warehouses, and retailers. Supply chain shall be viewed as multi-objective decision making problem. The objectives include minimisation of cost at suppliers, plants, warehouses and retailers. Fuzzy goal programming approach is useful to solve multi-objective decision making problems. In this paper, the multiple objectives of the supply chain are aggregated using Werner's (1998) compensation operator (<i>γ</i>) and compromise solutions on the decisions of the supply chain is arrived. Risk analysis is performed over the optimised model and the effect of uncertainty in terms of increase in suppliers' price is studied. Fuzzy goal programming model was solved using LINGO 8 software.
Journal: Int. J. of Enterprise Network Management
Pages: 75-90
Issue: 2
Volume: 9
Year: 2018
Keywords: supply chain; multi-objective programming; fuzzy logic.
File-URL: http://www.inderscience.com/link.php?id=93703
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:75-90
Template-Type: ReDIF-Article 1.0
Author-Name: B.T.D. Praveen Varma
Author-X-Name-First: B.T.D. Praveen
Author-X-Name-Last: Varma
Author-Name: Dalveer Singh
Author-X-Name-First: Dalveer
Author-X-Name-Last: Singh
Title: Lean management planning in Indian cement industries and its effect on industrial psychology
Abstract:
Cement industries are one of the growing large scale industries which play as a backbone for developing countries. This paper discusses the analysis of losses and wastage in cement manufacturing process and its rectification using lean tools and methodology mathematically. Employee's psychology varies with every new management planning, so psychology towards new lean management planning is also analysed through questioner to correlate lean management planning satisfaction to stress, job satisfaction, and safety improvement individually using Karl Pearson correlation in SPSS software. The data has been collected from various cement industries at each stage and analysed. Lean management planning resulted in a reduction of wastage in the transportation of mining, over processing and increase in efficiency of the separator in grinding mills, kiln quality control, packing plant efficiency improvement. The correlation analysis also resulted in stress reduction, improvement in job satisfaction and safety conditions with new lean management planning. Finally the result concludes that new lean management planning has positive correlation with the employee's psychology.
Journal: Int. J. of Enterprise Network Management
Pages: 91-107
Issue: 2
Volume: 9
Year: 2018
Keywords: lean tools; Karl Pearson correlation; SPSS analysis; organisational culture.
File-URL: http://www.inderscience.com/link.php?id=93704
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:91-107
Template-Type: ReDIF-Article 1.0
Author-Name: N.M. Sivaram
Author-X-Name-First: N.M.
Author-X-Name-Last: Sivaram
Title: Elements of a computer aided emergency management system
Abstract:
Past and recent disasters, both man made (technological) and natural (non-technological) have produced innumerable casualties and unimaginable harm to life and property. Though the management of factories and the authorities has responded to the challenge and introduced number of measures to minimise the hazards, the real fact is that accident cannot be completely eliminated. For this purpose, it is necessary to prepare an emergency preparedness plan for every administrative or industrial area by the competent authorities. With the help of computer simulation models, knowledge of chemicals'; it's behaviour and availability of input data, it is possible to predict the area affected under different emergency scenarios. Keeping in view the plotting requirement along with linkages of various databases, it has been considered appropriate to use computer aided emergency management system for effective mitigation and response during an industrial disaster. This paper proposes a composition of a computer aided emergency management system.
Journal: Int. J. of Enterprise Network Management
Pages: 108-116
Issue: 2
Volume: 9
Year: 2018
Keywords: industrial disaster; emergency preparedness; computer aided emergency management system.
File-URL: http://www.inderscience.com/link.php?id=93705
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:108-116
Template-Type: ReDIF-Article 1.0
Author-Name: Sonu Rajak
Author-X-Name-First: Sonu
Author-X-Name-Last: Rajak
Author-Name: P. Parthiban
Author-X-Name-First: P.
Author-X-Name-Last: Parthiban
Author-Name: R. Dhanalakshmi
Author-X-Name-First: R.
Author-X-Name-Last: Dhanalakshmi
Author-Name: S. Sujith
Author-X-Name-First: S.
Author-X-Name-Last: Sujith
Title: Multi-objective optimisation for the vehicle routing problem using metaheuristics
Abstract:
The capacitated vehicle routing problem is a combinatorial optimisation problem that determines a set of routes of minimum distance to deliver the goods, using a fleet of identical vehicles with restricted capacity. The objective of this article it to optimise the total distance required to deliver the goods and also the workload imbalance in terms of distances travelled by the vehicles and their loads. Due to the combinatorial in nature, it requires metaheuristic to solve these types of problems and this is a rapidly growing field of research. Here two metaheuristics such as ant colony optimisation (ACO) and simulated annealing (SA) are proposed and analysed for solving this multi-objective formulation of the vehicle routing problem. The results obtained from these two methods were compared and found that the ACO gives better results than the SA for the VRP.
Journal: Int. J. of Enterprise Network Management
Pages: 117-128
Issue: 2
Volume: 9
Year: 2018
Keywords: vehicle routing problem; VRP; K-means clustering algorithm; simulated annealing; ant colony optimisation; ACO.
File-URL: http://www.inderscience.com/link.php?id=93706
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:117-128
Template-Type: ReDIF-Article 1.0
Author-Name: S. Mahendran
Author-X-Name-First: S.
Author-X-Name-Last: Mahendran
Author-Name: A. Senthilkumar
Author-X-Name-First: A.
Author-X-Name-Last: Senthilkumar
Author-Name: R. Jeyapaul
Author-X-Name-First: R.
Author-X-Name-Last: Jeyapaul
Title: Analysis of lean manufacturing in an automobile industry - a case study
Abstract:
The automobile industries are more competitive and customer demand is volatile. The customers are willing to buy the product at low cost with high quality. So common principle is created to reduce the wastage and increase the efficiency of the industry. Lean manufacturing is the best principle to adopt the manufacturing industry. The main aim of this project is reduce the wastage, cost and increase the productivity of the industry. Using lean tools just in time (JIT), kanban, value stream mapping (current and future state) and man machine chart (current and future) for reduce wastage and cost. In current state value stream map, the waste area is identified. Finally, non-value added time is reduced to 28.7%. The value added time is reduced to 27.84%. The percentage value addition is increased from 3.25% to 3.29%, the total inventory is reduced to 25.07% and man machine ratio is improved as 1.52: 1.26.
Journal: Int. J. of Enterprise Network Management
Pages: 129-142
Issue: 2
Volume: 9
Year: 2018
Keywords: value stream mapping; man machine chart; 5S; just in time; JIT; value addition; value added time; non-value added time; man machine ration; kanban; automobile industry.
File-URL: http://www.inderscience.com/link.php?id=93708
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:129-142
Template-Type: ReDIF-Article 1.0
Author-Name: S. Gopinath
Author-X-Name-First: S.
Author-X-Name-Last: Gopinath
Author-Name: V.R. Alagu Sundaram
Author-X-Name-First: V.R. Alagu
Author-X-Name-Last: Sundaram
Author-Name: R. Sheshathri
Author-X-Name-First: R.
Author-X-Name-Last: Sheshathri
Author-Name: K. Narashiman
Author-X-Name-First: K.
Author-X-Name-Last: Narashiman
Title: Frame work of conceptual model for quality management in small and medium enterprises
Abstract:
Small and medium enterprises (SMEs) are the backbone of the developing economy, a pushing force the economy all over the globe involving a large workforce. This study aims to explore the obstacles to implement the effective quality system in Indian SMEs. The current scenario of SMEs, detailed literature survey and experts opinion, initiated the authors to design a conceptual model with six critical factors as an independent variables such as quality tools and techniques, total productive maintenance, quality assurance and control, quality certification, employee training and involvement, safety and environment and two dependent variables such as internal customer satisfaction and external customer satisfaction. The moderating variables are also introduced such as top management commitment and supplier relationship management to study the impact of moderator on the relationship between independent variables and dependent variables. The authors are suggesting this conceptual model implement in SMEs, enhance their overall efficiency and responsiveness.
Journal: Int. J. of Enterprise Network Management
Pages: 143-155
Issue: 2
Volume: 9
Year: 2018
Keywords: small and medium enterprises; SME; quality management; QM; gross domestic product; GDP; conceptual model; ministry of micro; small and medium enterprises; MSME.
File-URL: http://www.inderscience.com/link.php?id=93709
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:143-155
Template-Type: ReDIF-Article 1.0
Author-Name: K. Kanaga Sundara Satishwaran
Author-X-Name-First: K. Kanaga Sundara
Author-X-Name-Last: Satishwaran
Author-Name: M. Sivasubramanian
Author-X-Name-First: M.
Author-X-Name-Last: Sivasubramanian
Author-Name: S. Aravind Raj
Author-X-Name-First: S. Aravind
Author-X-Name-Last: Raj
Title: A case study on hazard evaluation on catering service in educational institution
Abstract:
Hazard evaluation plays a decisive role in the catering service. In order to intensify the safety of the catering service, a hazard assessment and its evaluation is conducted in educational institution. Safety audit is a formal procedure for assessment of the accident potential and expected safety performance for any service or system. Safety audit is being performed with appropriate checklists including occupational hygiene, worker safety, storage and handling and general working conditions. Fault tree analysis (FTA) is a method that directly focuses on the modes of failure. This paper presents FTA for chance of fire accident due to leakage of liquefied petroleum gas (LPG) in storage yard of catering service. Correlation and regression analysis were used to get the lines of regression in order to place it in normal distribution. The probability of fire accident due to leakage of LPG is being calculated and substantial suggestions are provided.
Journal: Int. J. of Enterprise Network Management
Pages: 156-168
Issue: 2
Volume: 9
Year: 2018
Keywords: safety audit; fault tree analysis; catering service; educational institution.
File-URL: http://www.inderscience.com/link.php?id=93711
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:156-168
Template-Type: ReDIF-Article 1.0
Author-Name: G. Rajesh
Author-X-Name-First: G.
Author-X-Name-Last: Rajesh
Author-Name: P. Malliga
Author-X-Name-First: P.
Author-X-Name-Last: Malliga
Title: Selection of suppliers using Swara and Copras-G
Abstract:
In order to optimise a supply chain, the effective management of suppliers plays a key role. Firms seeking competitive advantage are participating in cooperative supply chain arrangements, such as strategic partnerships, which combine their individual strengths and unique resources. Supplier selection is a multi-criteria decision making problem which includes both qualitative and quantitative factors. In the present scenario environmental criteria should also be given due importance, this further increases the challenge of supplier selection. Generally, decision makers' judgments are often uncertain and cannot be estimated by an exact numerical value. The grey systems theory is a powerful tool to deal with uncertain information. This paper presents a structured model for evaluation and selection of strategic supplier. Stepwise Weight Assessment Ratio Analysis (SWARA) is applied to decision making in order to calculate the relative importance of the criteria. The COmplex PRoportional ASsessment of alternatives with grey relations (COPRAS-G) method is used for supplier evaluation and selection of strategic supplier. A case study is presented to demonstrate the applicability of the proposed model to select a strategic green supplier.
Journal: Int. J. of Enterprise Network Management
Pages: 169-185
Issue: 2
Volume: 9
Year: 2018
Keywords: strategic supplier selection; COPRAS-G; SWARA; MCDM; green supplier selection.
File-URL: http://www.inderscience.com/link.php?id=93712
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:169-185
Template-Type: ReDIF-Article 1.0
Author-Name: R. Manivannan
Author-X-Name-First: R.
Author-X-Name-Last: Manivannan
Author-Name: M. Chinnadurai
Author-X-Name-First: M.
Author-X-Name-Last: Chinnadurai
Title: An efficient protocol for power consumption in wireless enterprise ad hoc virtual community network with Triso framework
Abstract:
Today's global technology has various security treats which made the identity protection essential among user's for establishing communication over internet. Generally these identity protecting network were well known as anonymous communication networks. Mix networks are multistage systems which provide efficient mechanisms for anonymous communication over internet. According to which these networks have various traffic analysis attacks which need to compromise the identities of users. The major objective of this paper is to present a diversity mix techniques against traffic analysis attacks, disclosure attack and spam attack. In this work, we propose traffic re-allocation which involves in varying the size as well as number of messages in the network. By means of enabling this bursting and blending of messages among the network nodes the attacker get confused with the varied message count and sizes. The performance of our proposed work is examined against the three attacks in order to check its security and anonymity. The obtained result proves the effectiveness of our proposed techniques.
Journal: Int. J. of Enterprise Network Management
Pages: 317-332
Issue: 3/4
Volume: 9
Year: 2018
Keywords: mix networks; disclosure attacks; spam attack; traffic analysis attacks; burst mix and blend mix.
File-URL: http://www.inderscience.com/link.php?id=94656
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:317-332
Template-Type: ReDIF-Article 1.0
Author-Name: S. Lakshmi
Author-X-Name-First: S.
Author-X-Name-Last: Lakshmi
Author-Name: B. Sathiyabhama
Author-X-Name-First: B.
Author-X-Name-Last: Sathiyabhama
Author-Name: K. Batri
Author-X-Name-First: K.
Author-X-Name-Last: Batri
Title: Entropy a new measure to gauge search engine optimisation
Abstract:
This article tries to analyse, and measure the uncertainty associated with the relevant document selection in web-search engines. The number of index terms, and their occurrence frequency influences the relevance calculation. The variation in term frequency either in processed web documents or in users' query influences the relevance calculation. This leads to an uncertainty associated with the document selection, and it is relevance calculation. In this article, we proposed a new measure called entropy. The entropy can be measured by varying the documents' term frequency or user's query term frequency. As the web documents can't be changed, we used variation in user's query term frequency to measure the uncertainty associated with the document selection in web-search engines. The query's term frequency is varied and given to the search engines. namely 'Google', and 'Bing' The high uncertainty gives scope for search engine optimisation. From the high uncertainty search engines, we can extract more relevant documents.
Journal: Int. J. of Enterprise Network Management
Pages: 189-204
Issue: 3/4
Volume: 9
Year: 2018
Keywords: web search engines; uncertainty; entropy; document selection; Google; Bing; search engine optimisation.
File-URL: http://www.inderscience.com/link.php?id=94657
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:189-204
Template-Type: ReDIF-Article 1.0
Author-Name: S. Ravi Shankar
Author-X-Name-First: S. Ravi
Author-X-Name-Last: Shankar
Author-Name: S. Kuppusamy
Author-X-Name-First: S.
Author-X-Name-Last: Kuppusamy
Title: Impact of talent management practices on employee retention - an empirical study in select IT companies with special reference to Chennai
Abstract:
The major worldwide corporations have been rising to the challenge that the talent management is more complicated and entangled. This study is mainly emphasised on the success of organisation due to obtain talent management and also retain the talent employees in the best way of highlighting selected IT companies. The aim of this research is mainly spotlight on retain the employees by the way of managing their talent in selected IT companies. The sample size has been taken as 150 by using simple random basis. For proofing the hypotheses setting, percentage analysis, mean score analysis, ANOVA analysis, Chi-square analysis and correlation analysis have been used in this research. This study also emphasised regarding the employees are benefited and more equipped with the programmes related to talent management. The analysis mainly focused that majority of the respondents are satisfied with the result of this program.
Journal: Int. J. of Enterprise Network Management
Pages: 205-216
Issue: 3/4
Volume: 9
Year: 2018
Keywords: talent management practices; IT companies; retention; satisfaction.
File-URL: http://www.inderscience.com/link.php?id=94658
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:205-216
Template-Type: ReDIF-Article 1.0
Author-Name: S. Manthandi Periannasamy
Author-X-Name-First: S. Manthandi
Author-X-Name-Last: Periannasamy
Author-Name: P. Thirumurugan
Author-X-Name-First: P.
Author-X-Name-Last: Thirumurugan
Title: Classification approach to avoid link failures in wireless sensor networks in mobile virtual communities and teleworking
Abstract:
Security issues are the primary issues in wireless sensor networks (WSN) due to its large network coverage and number of nodes. The attackers in WSN attack the particular node which has a low energy level and converts this node into malicious node. The formation of malicious node is the primary reason for link failures between nodes. This paper proposes an efficient methodology to detect the malicious nodes in WSN using feed forward back propagation neural network classifier. This classifier differentiates the malicious node from trusty node based on the extracted features of the test node. The performance of the proposed malicious node detection system is analysed in terms of detection rate, packet delivery ratio (PDR) and latency. The experimental results are compared with state-of-art methods.
Journal: Int. J. of Enterprise Network Management
Pages: 217-226
Issue: 3/4
Volume: 9
Year: 2018
Keywords: security; malicious nodes; features; packet delivery ratio; PDR; link failures.
File-URL: http://www.inderscience.com/link.php?id=94659
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:217-226
Template-Type: ReDIF-Article 1.0
Author-Name: V. Kavitha
Author-X-Name-First: V.
Author-X-Name-Last: Kavitha
Author-Name: Agnus S. Swarnanisha Lakshmi
Author-X-Name-First: Agnus S. Swarnanisha
Author-X-Name-Last: Lakshmi
Title: Wireless system for flight safety industry
Abstract:
Many parameters can be measured and stored in the black box. The details stored in the black box are essential for the analysis of causes of the accident. In the formal black box, data is stored and it can be retrieved only after the identification of black box after crash. So it is very difficult to identify the exact location of the black box after a crash. Many leading officials and famous personalities died in air crashes and it takes a lot of time to identify the location of crash. It leads to wastage of money and time. Saving human life is the basic nature of humanity. In this article, black box data is transmitted to an earth station. The details are updated to the base station through wireless medium. It is transmitted to selected base stations by calculating the shortest path between them using ad hoc algorithm. Ad hoc algorithm is a multi hop network algorithm which switches to various stations by calculating its distance. Thus black box data is updated to base station wirelessly using ad hoc algorithm.
Journal: Int. J. of Enterprise Network Management
Pages: 227-233
Issue: 3/4
Volume: 9
Year: 2018
Keywords: flight data recorder; ad hoc algorithm; wireless communication; black box; on board data.
File-URL: http://www.inderscience.com/link.php?id=94661
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:227-233
Template-Type: ReDIF-Article 1.0
Author-Name: M.R. Sumalatha
Author-X-Name-First: M.R.
Author-X-Name-Last: Sumalatha
Author-Name: M. Parthiban
Author-X-Name-First: M.
Author-X-Name-Last: Parthiban
Title: SaaS multitenant performance testing over social networks
Abstract:
Recent years, cloud computing is description for facilitating suitable on-demand network access. In cloud, computing multi-tenancy plays a significant role on software as a service (SaaS). Structure of SaaS multi-tenant cloud aware applications initiates several new challenges the central one being a tenant. In cloud testing, tenant applications need to be tested in addition to performance testing be used. At the same time as numerous performance-testing techniques exist; most of them produce only fixed progressions of test configurations. This paper focuses on the challenges for Multi-tenancy testing in SaaS and analyses the configuration dynamically in which SaaS testing differs from testing conventional applications. The paper proposes performance testing and fittest function of each tenant. For fitness function, GASE algorithm is used which combines a genetic algorithm and a symbolic execution. This proposed algorithm uses the above performance testing values for obtaining the best of each tenant, in the form of fitness generations. A real experimentation is proposed using a multiple tenants on open stack cloud computing environment over social networks.
Journal: Int. J. of Enterprise Network Management
Pages: 234-250
Issue: 3/4
Volume: 9
Year: 2018
Keywords: SaaS cloud; multi-tenant; software testing; performance testing; fitness generations.
File-URL: http://www.inderscience.com/link.php?id=94662
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:234-250
Template-Type: ReDIF-Article 1.0
Author-Name: V. Jackins
Author-X-Name-First: V.
Author-X-Name-Last: Jackins
Author-Name: D. Shalini Punithavathani
Author-X-Name-First: D. Shalini
Author-X-Name-Last: Punithavathani
Title: An anomaly-based network intrusion detection system using ensemble clustering
Abstract:
The numbers of hacking and intrusion incidents are high due to the increasing use of internet services and computer application. Therefore, intrusion detection systems (IDS) are inevitable in today's scenario (Koruba et al., 2017). In this paper, an unsupervised technique based on hybrid clustering algorithms is used for Anomaly detection. Incremental support vector machine (ISVM) and C means (FCM) algorithms are applied to preprocess the data set and detect the anomalies respectively. Further, the processed data is fed to the DBSCAN algorithm for further detection of anomalies. The results of the detection system are communicated to the intrusion prevention system (IPS). The proposed hybrid algorithm is applied for KDD Cup 1999 dataset and Gure Kdd Cup data base (2008) and the results show high detection rates and low false positive alarms. Further, the proposed technique performs well with a real time data in detecting anomalies with enhanced true positive rate.
Journal: Int. J. of Enterprise Network Management
Pages: 251-260
Issue: 3/4
Volume: 9
Year: 2018
Keywords: intrusion detection system; IDS; intrusion prevention system; IPS; KDD Cup 1999; Gure Kdd Cup database (2008); anomaly; clustering; network IDS.
File-URL: http://www.inderscience.com/link.php?id=94664
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:251-260
Template-Type: ReDIF-Article 1.0
Author-Name: D. Sasikala
Author-X-Name-First: D.
Author-X-Name-Last: Sasikala
Author-Name: S. Muthukumar
Author-X-Name-First: S.
Author-X-Name-Last: Muthukumar
Author-Name: R. Sivaranjani
Author-X-Name-First: R.
Author-X-Name-Last: Sivaranjani
Title: Power efficient digital circuits for ECG front end data acquisition mobile system
Abstract:
The electrical motion of the heart is characterised by the ECG signal. ECG elucidation can be used to detect the heart syndrome. This technology has an efficient diagnostic tool, due to the high regard of portable electronic products, low power system has fascinated more consideration in recent years. This work presents digital ECG data acquisition system to diminish the power consumption. In the proposed work, analogue block is not used, they convert the input voltage into a digital code by delay lines. This digital architecture is capable of operating with a low supply voltage such as 0.3 V and 0.1 V. In this architecture, analogue blocks such as low-noise amplifier (LNA) and filters are not used. A digital feedback loop is employed to cancel the impact of the dc offset on the circuit, which eliminates the requirements for coupling capacitors. The circuit is implemented in 130 nm and 65 nm CMOS process. The simulation results illustrate that the front-end circuit of digital architecture for 130 nm consumes 18.9 pW and 65 nm consumes 109 pW of power.
Journal: Int. J. of Enterprise Network Management
Pages: 261-272
Issue: 3/4
Volume: 9
Year: 2018
Keywords: electrocardiogram; ECG; mobile monitoring; digital; amplification; analogue; acquisition; delay; offset.
File-URL: http://www.inderscience.com/link.php?id=94665
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:261-272
Template-Type: ReDIF-Article 1.0
Author-Name: D. Arivudainambi
Author-X-Name-First: D.
Author-X-Name-Last: Arivudainambi
Author-Name: D. Dhanya
Author-X-Name-First: D.
Author-X-Name-Last: Dhanya
Title: Three phase optimisation for qualified and secured VMs for resource allocation
Abstract:
Cloud computing services enable the users to use required computing resources for the required period which thereby permit the users to build a flexible information system. Choosing genuine and secured virtual machines (VM) among thousands of virtual machines is one of the main challenges in resource allocation to achieve higher accuracy. In this paper, VM optimisation techniques namely match making algorithm, memory aware VM and cuckoo technique is incorporated to select the best and secured virtual machine from cloud. In the proposed technique the first two are combined to select the best VM, where cuckoo is used to provide optimised resources to the finest VM. During the selection of finest VM from above techniques, it is necessary to select secured VM's to achieve an optimum result during resource allocation. To select secured VM, signature based detection and secure counters are employed to analyse network traffic and to monitor the data transactions.
Journal: Int. J. of Enterprise Network Management
Pages: 273-293
Issue: 3/4
Volume: 9
Year: 2018
Keywords: virtual machine; resource allocation; match making algorithm; memory aware scheduling; cuckoo optimisation technique.
File-URL: http://www.inderscience.com/link.php?id=94668
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:273-293
Template-Type: ReDIF-Article 1.0
Author-Name: A.K. Kranthi
Author-X-Name-First: A.K.
Author-X-Name-Last: Kranthi
Author-Name: K.A. Asraar Ahmed
Author-X-Name-First: K.A. Asraar
Author-X-Name-Last: Ahmed
Title: Determinants of smartwatch adoption among IT professionals - an extended UTAUT2 model for smartwatch enterprise
Abstract:
Smartwatches these days have gained popularity under wearable device category. Consumers of smartwatches consider several factors while choosing smartwatches. On this premise, the current research is undertaken to identify the determinants of the smartwatch adoption. In order to arrive at this objective, the study has employed unified theory of acceptance and use of technology 2 (UTAUT2) model as a means and underpinning framework. To suit context, the present study has extended UTAUT2 model by incorporating self-efficacy (SEF), personal innovativeness (PINNO), social media influence (SMI), social image (SIMG), aesthetics (AES) and external social influence (ESI). To validate and check the explanatory power of the extended UTAUT2 model the study has considered Structural equation modelling using Smart PLS 2.0.The results arrived in this study has concluded that the extended UTAUT2 model has a better explanatory power on behavioural intention towards smartwatch adoption. Effect size (<i>f</i><SUP align="right"><SMALL>2</SMALL></SUP>) and predictive relevance (<i>Q</i><SUP align="right"><SMALL>2</SMALL></SUP>) for the extended UTAUT2 model are also discussed.
Journal: Int. J. of Enterprise Network Management
Pages: 294-316
Issue: 3/4
Volume: 9
Year: 2018
Keywords: unified theory of acceptance and use of technology; UTAUT2; smartwatch; social image; self-efficacy; SEF; personal innovativeness; PINNO; social media influence; SMI; SIMG; aesthetics; AES; external social influence; ESI; wearable device.
File-URL: http://www.inderscience.com/link.php?id=94669
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:294-316
Template-Type: ReDIF-Article 1.0
Author-Name: Radwan Al-Dwairi
Author-X-Name-First: Radwan
Author-X-Name-Last: Al-Dwairi
Author-Name: Emad Abu-Shanab
Author-X-Name-First: Emad
Author-X-Name-Last: Abu-Shanab
Author-Name: Mohammad Daradkeh
Author-X-Name-First: Mohammad
Author-X-Name-Last: Daradkeh
Title: A framework for antecedents of trust in social commerce
Abstract:
Trust is essential in social commerce environment, where consumers rely on feedback and advice that they collect from social platforms. Despite the importance of trust in virtual environments, there are a limited number of studies in this field. Research need to identify the main drivers that establish trust in social commerce domain. To this end, this study reviewed the literature related to trust in social commerce environment and proposed a framework for the antecedents of trust in social commerce. The proposed framework suggests two main components: social networking site and social company. The results supported nine hypotheses out of ten excluding the relationship between perceived-ease-of-use (PEOU) and content quality. Word-of-mouth, communication, perceived ability, after sale service, trust in transaction, and perceived usefulness were found as key factors that significantly impacted trust in social commerce. The model explained 33.2% of the variance in trust in social commerce.
Journal: Int. J. of Enterprise Network Management
Pages: 333-351
Issue: 3/4
Volume: 9
Year: 2018
Keywords: social commerce; trust; Web 2.0; social media; ability; after sale service; communication; word-of-mouth.
File-URL: http://www.inderscience.com/link.php?id=94673
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:333-351
Template-Type: ReDIF-Article 1.0
Author-Name: S. Vijayalakshmi
Author-X-Name-First: S.
Author-X-Name-Last: Vijayalakshmi
Author-Name: G.R. Karpagam
Author-X-Name-First: G.R.
Author-X-Name-Last: Karpagam
Title: Authentication as a service in cloud from a fuzzy perspective
Abstract:
In a cloud based online voting system, the life cycle starts with voter registration, authentication, voting and counting. The election process is a secret process as whole democratic administration is centralised on voting. Authentication, confidentiality, integrity, scalability, speeds and accuracy these are few important criteria to be satisfied by an online voting system. Authentication can be considered as the most critical issue among all the above. So the voters should be kept at the highest priority to make the voting process fair and effective. Through some of the literatures that deal with the issue of authentication mechanisms, the proposed method conceals the original biometric template such that it is impossible to recover the biometric template even when the stored data in the system is open to an attacker. We assess the system with relativity matrix between security requirements, issues, techniques and mechanisms.
Journal: Int. J. of Enterprise Network Management
Pages: 352-362
Issue: 3/4
Volume: 9
Year: 2018
Keywords: authentication; cloud security; fuzzy commitment; online voting system.
File-URL: http://www.inderscience.com/link.php?id=94674
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:352-362
Template-Type: ReDIF-Article 1.0
Author-Name: James Joseph
Author-X-Name-First: James
Author-X-Name-Last: Joseph
Author-Name: K.V. Sriram
Author-X-Name-First: K.V.
Author-X-Name-Last: Sriram
Author-Name: Lewlyn L.R. Rodrigues
Author-X-Name-First: Lewlyn L.R.
Author-X-Name-Last: Rodrigues
Author-Name: Asish Oommen Mathew
Author-X-Name-First: Asish Oommen
Author-X-Name-Last: Mathew
Author-Name: K.C. Gana
Author-X-Name-First: K.C.
Author-X-Name-Last: Gana
Title: An empirical study on customer adoption of mobile payment application in India
Abstract:
Digital economy is becoming a reality. Business all over the world is moving towards digital platform and so is the payment option. Mobile application is becoming one of the easiest and fastest options for making payments and is predicted to have a very large potential in the days to come. This study focuses on the customer adoption of mobile payment application. The study reveals that the factors like usefulness, pervasiveness, ease of use, offers and cash back and service assume a vital role in encouraging adoption of mobile payment applications. Results show customers have greater preference towards mobile payment applications over the mobile web browsers, which is a clear sign of awareness among the customers. The study also showed that teenagers are more aggressive in embracing mobile payment application than the older age groups. Compared to other modes of payments, mobile payment with 14.5% preference among customers is low and there is a need for aggressive promotions and marketing campaigns. The study throws light into the customer adoption factors which can act as guidelines for improving customer adoption and awareness of mobile payment applications.
Journal: Int. J. of Enterprise Network Management
Pages: 363-375
Issue: 3/4
Volume: 9
Year: 2018
Keywords: mobile payment application; customer adoption; smartphone; merchant acquisition; digital payment; ease of use; usefulness; service; India.
File-URL: http://www.inderscience.com/link.php?id=94675
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:363-375
Template-Type: ReDIF-Article 1.0
Author-Name: P. Senthil Kumar
Author-X-Name-First: P. Senthil
Author-X-Name-Last: Kumar
Author-Name: J. Abdul Samath
Author-X-Name-First: J. Abdul
Author-X-Name-Last: Samath
Author-Name: M. Mohamed Iqbal
Author-X-Name-First: M. Mohamed
Author-X-Name-Last: Iqbal
Title: Ontology-based effective information retrieval from the web using concept aware user profile construction
Abstract:
Similar document retrieval from the enormous volume of documents in database is a critical task. In this research work, improved information retrieval system utilising cooperative ontological based user profile construction (IIRS-COUPC) is introduced for accurate similar document retrieval. Here, cooperative ontology-based user profile (COUP) is built to take back the documents from diverse ideas that match with the user's demand. In order to make simplicity of document looking for process and merges the numerous users with identical demands, documents clustering (DC) and query clustering (QC) is accomplished in this work independently. Lastly, concept mapping (CM) is accomplished to take back the documents which matches with the user needs proficiently. The whole assessment of the current research work is accomplished in the java simulation environment from which it is shown that the current research methodologies confirms its improved performance.
Journal: Int. J. of Enterprise Network Management
Pages: 376-389
Issue: 3/4
Volume: 9
Year: 2018
Keywords: information retrieval; similarity; personalised search; clustering; ontology profile construction.
File-URL: http://www.inderscience.com/link.php?id=94677
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:376-389
Template-Type: ReDIF-Article 1.0
Author-Name: Amiruddin Bin Ahamat
Author-X-Name-First: Amiruddin Bin
Author-X-Name-Last: Ahamat
Author-Name: Muhamad Sham Bin Shahkat Ali
Author-X-Name-First: Muhamad Sham Bin Shahkat
Author-X-Name-Last: Ali
Author-Name: Nor Akmal Nabihah Binti Zahari
Author-X-Name-First: Nor Akmal Nabihah Binti
Author-X-Name-Last: Zahari
Title: The effects of brand image in purchasing of online marketing among university students
Abstract:
The brand image can give a huge impact to the marketer and the consumer as the buyer of the product. The brand image factor can also motivate consumer in their purchasing decision because the brand image may reflect the product itself. The purpose of this paper is to elaborate the relation between the awareness of a brand and the intention of buying a brand. There were several brand image factors highlighted in this research which is pricing, advertisement, brand name and quality of the product. A quantitative method was used through an online questionnaire in order to prove the factors that can affect the brand image in online marketing among university students. Based on the results, several factors were identified as the contributing effect on a brand image which is the price of a product, advertisement of product and the quality of a product.
Journal: Int. J. of Enterprise Network Management
Pages: 390-406
Issue: 3/4
Volume: 9
Year: 2018
Keywords: online marketing; brand image; brand image factors.
File-URL: http://www.inderscience.com/link.php?id=94678
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:390-406
Template-Type: ReDIF-Article 1.0
Author-Name: Satya Prakash
Author-X-Name-First: Satya
Author-X-Name-Last: Prakash
Author-Name: Gunjan Soni
Author-X-Name-First: Gunjan
Author-X-Name-Last: Soni
Author-Name: Vipul Jain
Author-X-Name-First: Vipul
Author-X-Name-Last: Jain
Author-Name: Gaurav Kumar Badhotiya
Author-X-Name-First: Gaurav Kumar
Author-X-Name-Last: Badhotiya
Author-Name: Murari Lal Mittal
Author-X-Name-First: Murari Lal
Author-X-Name-Last: Mittal
Title: Multisite aggregate production and distribution planning: a review
Abstract:
Increase in the demand of products causes a company to change its manufacturing system from single-plant to multi-plant (or, multi-site) with an objective to gain competitive advantage in the global manufacturing scenario. Multi-site production and distribution (P-D) planning have been studied and practiced by the researchers and practitioners over the past two decades. A good size of literature has been published and trend is continuing. In the light of impact of multi-site manufacturing in gaining commercial advantage in global competition scenario, this review is dedicated to multi-site aggregate production planning (MSAPP) and multi-site aggregate P-D planning (MSAPDP). This review focuses on analysing the major research gaps and unaddressed areas of MSAPP/MSAPDP. It has been felt that switching from discrete to continuous and pure mathematical to simulation and agent based models along with consideration of economical and environmental aspects have become very important to effectively deal with real world MSAPP/MSAPDP problems.
Journal: Int. J. of Enterprise Network Management
Pages: 407-434
Issue: 3/4
Volume: 9
Year: 2018
Keywords: supply chain; multi-site manufacturing; aggregate production planning; aggregate P-D planning.
File-URL: http://www.inderscience.com/link.php?id=94680
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:407-434
Template-Type: ReDIF-Article 1.0
Author-Name: N. Kumaresh
Author-X-Name-First: N.
Author-X-Name-Last: Kumaresh
Author-Name: J. Abdul Samath
Author-X-Name-First: J. Abdul
Author-X-Name-Last: Samath
Author-Name: M. Mohamed Iqbal
Author-X-Name-First: M. Mohamed
Author-X-Name-Last: Iqbal
Title: An automatic construction of domain ontology to analyse competence prerequisites of jobs
Abstract:
In many industries, the hiring process is a critical task, where many applicants will be applied for the single position, so it is required to analyse their qualification which ought to suit the requirement. Identifying feasible candidate with the required knowledge and skills is the difficult task which is faced by the organisations. In the proposed work, this issue is rectified through domain ontology construction framework (DOCF) from the job knowledge thesis and the job requirements details, which are obtained from online. The obtained documents were clustered regarding the content and conceptual similarity-based clustering method. From those clustered documents job-know ontology will be built. So it is easy to create the information requirements about the job search phase by both candidates and the human resources (HR) of the industries. It is proved that proposed research method leads to give better result when compared with the existing research method in terms of increased accuracy rate.
Journal: Int. J. of Enterprise Network Management
Pages: 441-454
Issue: 3/4
Volume: 9
Year: 2018
Keywords: job requirement analysis; competence level finding; domain ontology construction; conceptual similarity.
File-URL: http://www.inderscience.com/link.php?id=94687
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:441-454
Template-Type: ReDIF-Article 1.0
Author-Name: V.K. Ajay
Author-X-Name-First: V.K.
Author-X-Name-Last: Ajay
Author-Name: L. Vijay
Author-X-Name-First: L.
Author-X-Name-Last: Vijay
Author-Name: K. Manivel
Author-X-Name-First: K.
Author-X-Name-Last: Manivel
Title: Stress of new age entrepreneurs and its implications of affecting heart-alerting-heart using MIOT
Abstract:
Cardiologists, across the globe, opine that 25% of death in the age band between 25-70 years is mainly caused by high stress ambience they are subjected to in their work place especially professionals like first generation entrepreneur's. It is found that the common health issues like depression, anxiety, addiction, sleeping disorders are leading more and more of heart disease and heart attacks. The system proposed here uses an advanced technology called MIOT system in the form of a wristwatch to detect and analyse the parameter deviations on the person who is wearing this wristwatch.
Journal: Int. J. of Enterprise Network Management
Pages: 435-440
Issue: 3/4
Volume: 9
Year: 2018
Keywords: stress; entrepreneurs; heart attack; internet of things; IOT.
File-URL: http://www.inderscience.com/link.php?id=94688
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:435-440
Template-Type: ReDIF-Article 1.0
Author-Name: Asma Khan
Author-X-Name-First: Asma
Author-X-Name-Last: Khan
Author-Name: Asif Ali Syed
Author-X-Name-First: Asif Ali
Author-X-Name-Last: Syed
Title: Determinants of online consumer behaviour towards e-tailing in India
Abstract:
Internet has brought a revolution in the way we live today. This paper aims to provide an overview of the e-tail scenario in India and study the factors that influence the online buying behaviour of e-consumers. It explores the various issues, opportunities and endeavours to draw an effective e-tailing strategy for Indian online sector based upon extensive the literature reviewed and factors assimilated on e-tailing models from Indian and global studies. The research also suggests ways in which the e-tailers can recuperate their virtual presence and enhance online consumer purchases and revisits. The contributions of the findings would attempt to assist policy makers, e-marketers and provide an insight for further research exploring the gaps in this important social and commercial economic discipline which impacts each and everyone of us.
Journal: Int. J. of Enterprise Network Management
Pages: 455-480
Issue: 3/4
Volume: 9
Year: 2018
Keywords: e-consumers; e-tailing; e-shopper; e-marketing; India.
File-URL: http://www.inderscience.com/link.php?id=94689
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:455-480