Template-Type: ReDIF-Article 1.0 Author-Name: T.K. Sreeja Author-X-Name-First: T.K. Author-X-Name-Last: Sreeja Author-Name: J. Jayakumari Author-X-Name-First: J. Author-X-Name-Last: Jayakumari Title: Design and analysis of compact T shape slotted patch antenna for 4G WiMAX applications Abstract: A novel single band microstrip patch antenna design is introduced for WiMAX/LTE applications. The proposed antenna has a compact size of 2.7 × 4.5 × 0.076 cm<sup align="right"><small>3</small></sup> and produces the gain of 5.47-8 dBi around the operational band. The antenna consists of T-shaped patch and coaxial feed method is used. This paper presents the antenna design along with the simulated and measured results. Design optimisation and simulation processes are investigated with the help of the Agilent advanced design system electromagnetic simulator that operates based on the numerical technique full-wave method of moment (MoM). The fabricated coaxial feed patch antenna is tested and measured by using spectrum analyser. Journal: Int. J. of Enterprise Network Management Pages: 1-10 Issue: 1 Volume: 9 Year: 2018 Keywords: 4G antenna; microstrip antenna; MSA; ADS; WiMAX; LTE. File-URL: http://www.inderscience.com/link.php?id=92049 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:1:p:1-10 Template-Type: ReDIF-Article 1.0 Author-Name: Sanjana Mohapatra Author-X-Name-First: Sanjana Author-X-Name-Last: Mohapatra Author-Name: Ajit Kumar Author-X-Name-First: Ajit Author-X-Name-Last: Kumar Author-Name: Sanjay Mohapatra Author-X-Name-First: Sanjay Author-X-Name-Last: Mohapatra Title: From a literature review to a conceptual framework for affordable quality healthcare service using internet of things (IOT) network Abstract: There has been significant interest in integration of internet of things (IOT) and healthcare both in academic and the corporate world. This can be seen from the fact by the number of conferences held and number of special issues in journals that have been published. To establish further in this domain, the purpose of this research is two-fold. First it does literature review in healthcare and IOT from 151 papers published from 1998 to 2016. Second, it summarises findings from literature review in two parts. In the first part, it identifies the antecedents that impact both affordable quality healthcare and developing an enterprise network for IOT. In the second part, it integrates factors that affect both affordable healthcares with IOT. The results of this research will be useful for both practitioners and academicians as the paper discusses how to design a IOT based healthcare network that will reduce cost of healthcare while preventing chronic diseases. The paper also shows the limitations of the present research while describing stimuli for further research. Journal: Int. J. of Enterprise Network Management Pages: 11-21 Issue: 1 Volume: 9 Year: 2018 Keywords: internet of things; IOT; affordable healthcare; conceptual framework. File-URL: http://www.inderscience.com/link.php?id=92050 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:1:p:11-21 Template-Type: ReDIF-Article 1.0 Author-Name: R. Rajasekaran Author-X-Name-First: R. Author-X-Name-Last: Rajasekaran Author-Name: A. Pal Pandi Author-X-Name-First: A. Pal Author-X-Name-Last: Pandi Author-Name: P.V. Rajendra Sethupathi Author-X-Name-First: P.V. Rajendra Author-X-Name-Last: Sethupathi Author-Name: R. Rajesh Author-X-Name-First: R. Author-X-Name-Last: Rajesh Title: Inventory parameters for a serial supply chain with lost sales through genetic algorithm approach Abstract: Supply chain is a network of facilities with varying conflicting objectives and decision making is a complex process. The uncertainty in demand increases complexity in inventory control mechanism. Backordering, partial backordering and lost-sales are considered in the inventory management to characterise the excess demand. In the present competitive scenario, mostly consumers have no patience to wait and show urgency to buy their goods failing which the management has to meet a huge loss of supply chain members and hence the profit. There are very few research works regarding lost-sales parameter in the area of multi-echelon inventory systems. It is felt that the proposed modified gene-wise genetic algorithm (MGGA) supply chain model which so far not applied in this process may help to determine best base stock levels and review periods with lost sales particularly at retailer end which minimised total supply chain cost. Journal: Int. J. of Enterprise Network Management Pages: 22-46 Issue: 1 Volume: 9 Year: 2018 Keywords: inventory management; genetic algorithm; supply chain model; lost sales. File-URL: http://www.inderscience.com/link.php?id=92059 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:1:p:22-46 Template-Type: ReDIF-Article 1.0 Author-Name: N. Mustafa Author-X-Name-First: N. Author-X-Name-Last: Mustafa Author-Name: H. Vennila Author-X-Name-First: H. Author-X-Name-Last: Vennila Title: A meta-heuristic, moth inspired algorithm for combined economic and environmental power dispatch Abstract: The problem of deciding the contribution of each generator in a power system is complex. Where some generators are more cost effective, others have cleaner operation. Right choice of generators could save thousands of dollars in operating cost or prevent release of several tons of noxious fumes like NO<sub align="right"><small>2</small></sub> and SO<sub align="right"><small>2</small></sub> annually. Rising complexity of modern power systems and special efficiency improvement methods like valve point loading, demand newer means to find this vital balance between cost and emission. This paper aims to find a solution to this problem by the use of an algorithm inspired by the flight pattern of moths. Like a moth drawn to a flame, this algorithm seeks to minimise both cost as well as emission. The standard IEEE 30 bus test system is considered as the control case and the results obtained are compared with other such algorithms to demonstrate the effectiveness of MFO. Journal: Int. J. of Enterprise Network Management Pages: 47-57 Issue: 1 Volume: 9 Year: 2018 Keywords: economic dispatch; emission dispatch; valve point loading; moth flame optimisation; MFO. File-URL: http://www.inderscience.com/link.php?id=92060 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:1:p:47-57 Template-Type: ReDIF-Article 1.0 Author-Name: Prantosh K. Paul Author-X-Name-First: Prantosh K. Author-X-Name-Last: Paul Author-Name: R. Rajesh Author-X-Name-First: R. Author-X-Name-Last: Rajesh Title: Cloud computing and engineering in the academics with its potentialities in iSchools: an eco friendly development Abstract: Cloud computing is a kind of architecture deals with the principles of virtualisation and also promote online computing platform as well as services. Tools of the information technology such as monitor, printers, databases, other applications and packages come under the preview of cloud computing. It is also considered as a cloud platform along with cloud architecture. This helps cost saving due to less software, hardware, and IT packages in the in-house settings. Cloud computing also promotes side by side the online availability. Moreover cloud computing saves initial cost as it is offered by third party and thus seeks no need to connect to the service or cloud provider. In cloud computing, internet plays an important role for converged hardware, software and IT applications. Cloud computing has healthy potentialities in <i>iSchools</i> as such academic units are offered academic programs on information and computing related domains. The paper presented the overview on cloud computing and its features with potentialities of the domain in <i>iSchools</i> and allied branches. Journal: Int. J. of Enterprise Network Management Pages: 58-71 Issue: 1 Volume: 9 Year: 2018 Keywords: cloud computing; green computing; virtualisation; academics; MSc; BSc; emerging degrees; iSchools; information sciences. File-URL: http://www.inderscience.com/link.php?id=92066 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:1:p:58-71 Template-Type: ReDIF-Article 1.0 Author-Name: S. Hemalatha Author-X-Name-First: S. Author-X-Name-Last: Hemalatha Author-Name: K. Narayana Rao Author-X-Name-First: K. Narayana Author-X-Name-Last: Rao Author-Name: G. Rambabu Author-X-Name-First: G. Author-X-Name-Last: Rambabu Author-Name: K. Venkatasubbaiah Author-X-Name-First: K. Author-X-Name-Last: Venkatasubbaiah Title: Modelling and analysis of a four stage supply chain under fuzzy environment Abstract: In today's competitive arena, the success of supply chain depends on its managerial ability to integrate and coordinate all stages of the supply chain. The supply chain predominantly consists of four stages in a typical industry, namely: suppliers, manufacturing plants, warehouses, and retailers. Supply chain shall be viewed as multi-objective decision making problem. The objectives include minimisation of cost at suppliers, plants, warehouses and retailers. Fuzzy goal programming approach is useful to solve multi-objective decision making problems. In this paper, the multiple objectives of the supply chain are aggregated using Werner's (1998) compensation operator (<i>γ</i>) and compromise solutions on the decisions of the supply chain is arrived. Risk analysis is performed over the optimised model and the effect of uncertainty in terms of increase in suppliers' price is studied. Fuzzy goal programming model was solved using LINGO 8 software. Journal: Int. J. of Enterprise Network Management Pages: 75-90 Issue: 2 Volume: 9 Year: 2018 Keywords: supply chain; multi-objective programming; fuzzy logic. File-URL: http://www.inderscience.com/link.php?id=93703 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:75-90 Template-Type: ReDIF-Article 1.0 Author-Name: B.T.D. Praveen Varma Author-X-Name-First: B.T.D. Praveen Author-X-Name-Last: Varma Author-Name: Dalveer Singh Author-X-Name-First: Dalveer Author-X-Name-Last: Singh Title: Lean management planning in Indian cement industries and its effect on industrial psychology Abstract: Cement industries are one of the growing large scale industries which play as a backbone for developing countries. This paper discusses the analysis of losses and wastage in cement manufacturing process and its rectification using lean tools and methodology mathematically. Employee's psychology varies with every new management planning, so psychology towards new lean management planning is also analysed through questioner to correlate lean management planning satisfaction to stress, job satisfaction, and safety improvement individually using Karl Pearson correlation in SPSS software. The data has been collected from various cement industries at each stage and analysed. Lean management planning resulted in a reduction of wastage in the transportation of mining, over processing and increase in efficiency of the separator in grinding mills, kiln quality control, packing plant efficiency improvement. The correlation analysis also resulted in stress reduction, improvement in job satisfaction and safety conditions with new lean management planning. Finally the result concludes that new lean management planning has positive correlation with the employee's psychology. Journal: Int. J. of Enterprise Network Management Pages: 91-107 Issue: 2 Volume: 9 Year: 2018 Keywords: lean tools; Karl Pearson correlation; SPSS analysis; organisational culture. File-URL: http://www.inderscience.com/link.php?id=93704 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:91-107 Template-Type: ReDIF-Article 1.0 Author-Name: N.M. Sivaram Author-X-Name-First: N.M. Author-X-Name-Last: Sivaram Title: Elements of a computer aided emergency management system Abstract: Past and recent disasters, both man made (technological) and natural (non-technological) have produced innumerable casualties and unimaginable harm to life and property. Though the management of factories and the authorities has responded to the challenge and introduced number of measures to minimise the hazards, the real fact is that accident cannot be completely eliminated. For this purpose, it is necessary to prepare an emergency preparedness plan for every administrative or industrial area by the competent authorities. With the help of computer simulation models, knowledge of chemicals'; it's behaviour and availability of input data, it is possible to predict the area affected under different emergency scenarios. Keeping in view the plotting requirement along with linkages of various databases, it has been considered appropriate to use computer aided emergency management system for effective mitigation and response during an industrial disaster. This paper proposes a composition of a computer aided emergency management system. Journal: Int. J. of Enterprise Network Management Pages: 108-116 Issue: 2 Volume: 9 Year: 2018 Keywords: industrial disaster; emergency preparedness; computer aided emergency management system. File-URL: http://www.inderscience.com/link.php?id=93705 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:108-116 Template-Type: ReDIF-Article 1.0 Author-Name: Sonu Rajak Author-X-Name-First: Sonu Author-X-Name-Last: Rajak Author-Name: P. Parthiban Author-X-Name-First: P. Author-X-Name-Last: Parthiban Author-Name: R. Dhanalakshmi Author-X-Name-First: R. Author-X-Name-Last: Dhanalakshmi Author-Name: S. Sujith Author-X-Name-First: S. Author-X-Name-Last: Sujith Title: Multi-objective optimisation for the vehicle routing problem using metaheuristics Abstract: The capacitated vehicle routing problem is a combinatorial optimisation problem that determines a set of routes of minimum distance to deliver the goods, using a fleet of identical vehicles with restricted capacity. The objective of this article it to optimise the total distance required to deliver the goods and also the workload imbalance in terms of distances travelled by the vehicles and their loads. Due to the combinatorial in nature, it requires metaheuristic to solve these types of problems and this is a rapidly growing field of research. Here two metaheuristics such as ant colony optimisation (ACO) and simulated annealing (SA) are proposed and analysed for solving this multi-objective formulation of the vehicle routing problem. The results obtained from these two methods were compared and found that the ACO gives better results than the SA for the VRP. Journal: Int. J. of Enterprise Network Management Pages: 117-128 Issue: 2 Volume: 9 Year: 2018 Keywords: vehicle routing problem; VRP; K-means clustering algorithm; simulated annealing; ant colony optimisation; ACO. File-URL: http://www.inderscience.com/link.php?id=93706 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:117-128 Template-Type: ReDIF-Article 1.0 Author-Name: S. Mahendran Author-X-Name-First: S. Author-X-Name-Last: Mahendran Author-Name: A. Senthilkumar Author-X-Name-First: A. Author-X-Name-Last: Senthilkumar Author-Name: R. Jeyapaul Author-X-Name-First: R. Author-X-Name-Last: Jeyapaul Title: Analysis of lean manufacturing in an automobile industry - a case study Abstract: The automobile industries are more competitive and customer demand is volatile. The customers are willing to buy the product at low cost with high quality. So common principle is created to reduce the wastage and increase the efficiency of the industry. Lean manufacturing is the best principle to adopt the manufacturing industry. The main aim of this project is reduce the wastage, cost and increase the productivity of the industry. Using lean tools just in time (JIT), kanban, value stream mapping (current and future state) and man machine chart (current and future) for reduce wastage and cost. In current state value stream map, the waste area is identified. Finally, non-value added time is reduced to 28.7%. The value added time is reduced to 27.84%. The percentage value addition is increased from 3.25% to 3.29%, the total inventory is reduced to 25.07% and man machine ratio is improved as 1.52: 1.26. Journal: Int. J. of Enterprise Network Management Pages: 129-142 Issue: 2 Volume: 9 Year: 2018 Keywords: value stream mapping; man machine chart; 5S; just in time; JIT; value addition; value added time; non-value added time; man machine ration; kanban; automobile industry. File-URL: http://www.inderscience.com/link.php?id=93708 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:129-142 Template-Type: ReDIF-Article 1.0 Author-Name: S. Gopinath Author-X-Name-First: S. Author-X-Name-Last: Gopinath Author-Name: V.R. Alagu Sundaram Author-X-Name-First: V.R. Alagu Author-X-Name-Last: Sundaram Author-Name: R. Sheshathri Author-X-Name-First: R. Author-X-Name-Last: Sheshathri Author-Name: K. Narashiman Author-X-Name-First: K. Author-X-Name-Last: Narashiman Title: Frame work of conceptual model for quality management in small and medium enterprises Abstract: Small and medium enterprises (SMEs) are the backbone of the developing economy, a pushing force the economy all over the globe involving a large workforce. This study aims to explore the obstacles to implement the effective quality system in Indian SMEs. The current scenario of SMEs, detailed literature survey and experts opinion, initiated the authors to design a conceptual model with six critical factors as an independent variables such as quality tools and techniques, total productive maintenance, quality assurance and control, quality certification, employee training and involvement, safety and environment and two dependent variables such as internal customer satisfaction and external customer satisfaction. The moderating variables are also introduced such as top management commitment and supplier relationship management to study the impact of moderator on the relationship between independent variables and dependent variables. The authors are suggesting this conceptual model implement in SMEs, enhance their overall efficiency and responsiveness. Journal: Int. J. of Enterprise Network Management Pages: 143-155 Issue: 2 Volume: 9 Year: 2018 Keywords: small and medium enterprises; SME; quality management; QM; gross domestic product; GDP; conceptual model; ministry of micro; small and medium enterprises; MSME. File-URL: http://www.inderscience.com/link.php?id=93709 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:143-155 Template-Type: ReDIF-Article 1.0 Author-Name: K. Kanaga Sundara Satishwaran Author-X-Name-First: K. Kanaga Sundara Author-X-Name-Last: Satishwaran Author-Name: M. Sivasubramanian Author-X-Name-First: M. Author-X-Name-Last: Sivasubramanian Author-Name: S. Aravind Raj Author-X-Name-First: S. Aravind Author-X-Name-Last: Raj Title: A case study on hazard evaluation on catering service in educational institution Abstract: Hazard evaluation plays a decisive role in the catering service. In order to intensify the safety of the catering service, a hazard assessment and its evaluation is conducted in educational institution. Safety audit is a formal procedure for assessment of the accident potential and expected safety performance for any service or system. Safety audit is being performed with appropriate checklists including occupational hygiene, worker safety, storage and handling and general working conditions. Fault tree analysis (FTA) is a method that directly focuses on the modes of failure. This paper presents FTA for chance of fire accident due to leakage of liquefied petroleum gas (LPG) in storage yard of catering service. Correlation and regression analysis were used to get the lines of regression in order to place it in normal distribution. The probability of fire accident due to leakage of LPG is being calculated and substantial suggestions are provided. Journal: Int. J. of Enterprise Network Management Pages: 156-168 Issue: 2 Volume: 9 Year: 2018 Keywords: safety audit; fault tree analysis; catering service; educational institution. File-URL: http://www.inderscience.com/link.php?id=93711 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:156-168 Template-Type: ReDIF-Article 1.0 Author-Name: G. Rajesh Author-X-Name-First: G. Author-X-Name-Last: Rajesh Author-Name: P. Malliga Author-X-Name-First: P. Author-X-Name-Last: Malliga Title: Selection of suppliers using Swara and Copras-G Abstract: In order to optimise a supply chain, the effective management of suppliers plays a key role. Firms seeking competitive advantage are participating in cooperative supply chain arrangements, such as strategic partnerships, which combine their individual strengths and unique resources. Supplier selection is a multi-criteria decision making problem which includes both qualitative and quantitative factors. In the present scenario environmental criteria should also be given due importance, this further increases the challenge of supplier selection. Generally, decision makers' judgments are often uncertain and cannot be estimated by an exact numerical value. The grey systems theory is a powerful tool to deal with uncertain information. This paper presents a structured model for evaluation and selection of strategic supplier. Stepwise Weight Assessment Ratio Analysis (SWARA) is applied to decision making in order to calculate the relative importance of the criteria. The COmplex PRoportional ASsessment of alternatives with grey relations (COPRAS-G) method is used for supplier evaluation and selection of strategic supplier. A case study is presented to demonstrate the applicability of the proposed model to select a strategic green supplier. Journal: Int. J. of Enterprise Network Management Pages: 169-185 Issue: 2 Volume: 9 Year: 2018 Keywords: strategic supplier selection; COPRAS-G; SWARA; MCDM; green supplier selection. File-URL: http://www.inderscience.com/link.php?id=93712 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:2:p:169-185 Template-Type: ReDIF-Article 1.0 Author-Name: R. Manivannan Author-X-Name-First: R. Author-X-Name-Last: Manivannan Author-Name: M. Chinnadurai Author-X-Name-First: M. Author-X-Name-Last: Chinnadurai Title: An efficient protocol for power consumption in wireless enterprise ad hoc virtual community network with Triso framework Abstract: Today's global technology has various security treats which made the identity protection essential among user's for establishing communication over internet. Generally these identity protecting network were well known as anonymous communication networks. Mix networks are multistage systems which provide efficient mechanisms for anonymous communication over internet. According to which these networks have various traffic analysis attacks which need to compromise the identities of users. The major objective of this paper is to present a diversity mix techniques against traffic analysis attacks, disclosure attack and spam attack. In this work, we propose traffic re-allocation which involves in varying the size as well as number of messages in the network. By means of enabling this bursting and blending of messages among the network nodes the attacker get confused with the varied message count and sizes. The performance of our proposed work is examined against the three attacks in order to check its security and anonymity. The obtained result proves the effectiveness of our proposed techniques. Journal: Int. J. of Enterprise Network Management Pages: 317-332 Issue: 3/4 Volume: 9 Year: 2018 Keywords: mix networks; disclosure attacks; spam attack; traffic analysis attacks; burst mix and blend mix. File-URL: http://www.inderscience.com/link.php?id=94656 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:317-332 Template-Type: ReDIF-Article 1.0 Author-Name: S. Lakshmi Author-X-Name-First: S. Author-X-Name-Last: Lakshmi Author-Name: B. Sathiyabhama Author-X-Name-First: B. Author-X-Name-Last: Sathiyabhama Author-Name: K. Batri Author-X-Name-First: K. Author-X-Name-Last: Batri Title: Entropy a new measure to gauge search engine optimisation Abstract: This article tries to analyse, and measure the uncertainty associated with the relevant document selection in web-search engines. The number of index terms, and their occurrence frequency influences the relevance calculation. The variation in term frequency either in processed web documents or in users' query influences the relevance calculation. This leads to an uncertainty associated with the document selection, and it is relevance calculation. In this article, we proposed a new measure called entropy. The entropy can be measured by varying the documents' term frequency or user's query term frequency. As the web documents can't be changed, we used variation in user's query term frequency to measure the uncertainty associated with the document selection in web-search engines. The query's term frequency is varied and given to the search engines. namely 'Google', and 'Bing' The high uncertainty gives scope for search engine optimisation. From the high uncertainty search engines, we can extract more relevant documents. Journal: Int. J. of Enterprise Network Management Pages: 189-204 Issue: 3/4 Volume: 9 Year: 2018 Keywords: web search engines; uncertainty; entropy; document selection; Google; Bing; search engine optimisation. File-URL: http://www.inderscience.com/link.php?id=94657 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:189-204 Template-Type: ReDIF-Article 1.0 Author-Name: S. Ravi Shankar Author-X-Name-First: S. Ravi Author-X-Name-Last: Shankar Author-Name: S. Kuppusamy Author-X-Name-First: S. Author-X-Name-Last: Kuppusamy Title: Impact of talent management practices on employee retention - an empirical study in select IT companies with special reference to Chennai Abstract: The major worldwide corporations have been rising to the challenge that the talent management is more complicated and entangled. This study is mainly emphasised on the success of organisation due to obtain talent management and also retain the talent employees in the best way of highlighting selected IT companies. The aim of this research is mainly spotlight on retain the employees by the way of managing their talent in selected IT companies. The sample size has been taken as 150 by using simple random basis. For proofing the hypotheses setting, percentage analysis, mean score analysis, ANOVA analysis, Chi-square analysis and correlation analysis have been used in this research. This study also emphasised regarding the employees are benefited and more equipped with the programmes related to talent management. The analysis mainly focused that majority of the respondents are satisfied with the result of this program. Journal: Int. J. of Enterprise Network Management Pages: 205-216 Issue: 3/4 Volume: 9 Year: 2018 Keywords: talent management practices; IT companies; retention; satisfaction. File-URL: http://www.inderscience.com/link.php?id=94658 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:205-216 Template-Type: ReDIF-Article 1.0 Author-Name: S. Manthandi Periannasamy Author-X-Name-First: S. Manthandi Author-X-Name-Last: Periannasamy Author-Name: P. Thirumurugan Author-X-Name-First: P. Author-X-Name-Last: Thirumurugan Title: Classification approach to avoid link failures in wireless sensor networks in mobile virtual communities and teleworking Abstract: Security issues are the primary issues in wireless sensor networks (WSN) due to its large network coverage and number of nodes. The attackers in WSN attack the particular node which has a low energy level and converts this node into malicious node. The formation of malicious node is the primary reason for link failures between nodes. This paper proposes an efficient methodology to detect the malicious nodes in WSN using feed forward back propagation neural network classifier. This classifier differentiates the malicious node from trusty node based on the extracted features of the test node. The performance of the proposed malicious node detection system is analysed in terms of detection rate, packet delivery ratio (PDR) and latency. The experimental results are compared with state-of-art methods. Journal: Int. J. of Enterprise Network Management Pages: 217-226 Issue: 3/4 Volume: 9 Year: 2018 Keywords: security; malicious nodes; features; packet delivery ratio; PDR; link failures. File-URL: http://www.inderscience.com/link.php?id=94659 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:217-226 Template-Type: ReDIF-Article 1.0 Author-Name: V. Kavitha Author-X-Name-First: V. Author-X-Name-Last: Kavitha Author-Name: Agnus S. Swarnanisha Lakshmi Author-X-Name-First: Agnus S. Swarnanisha Author-X-Name-Last: Lakshmi Title: Wireless system for flight safety industry Abstract: Many parameters can be measured and stored in the black box. The details stored in the black box are essential for the analysis of causes of the accident. In the formal black box, data is stored and it can be retrieved only after the identification of black box after crash. So it is very difficult to identify the exact location of the black box after a crash. Many leading officials and famous personalities died in air crashes and it takes a lot of time to identify the location of crash. It leads to wastage of money and time. Saving human life is the basic nature of humanity. In this article, black box data is transmitted to an earth station. The details are updated to the base station through wireless medium. It is transmitted to selected base stations by calculating the shortest path between them using ad hoc algorithm. Ad hoc algorithm is a multi hop network algorithm which switches to various stations by calculating its distance. Thus black box data is updated to base station wirelessly using ad hoc algorithm. Journal: Int. J. of Enterprise Network Management Pages: 227-233 Issue: 3/4 Volume: 9 Year: 2018 Keywords: flight data recorder; ad hoc algorithm; wireless communication; black box; on board data. File-URL: http://www.inderscience.com/link.php?id=94661 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:227-233 Template-Type: ReDIF-Article 1.0 Author-Name: M.R. Sumalatha Author-X-Name-First: M.R. Author-X-Name-Last: Sumalatha Author-Name: M. Parthiban Author-X-Name-First: M. Author-X-Name-Last: Parthiban Title: SaaS multitenant performance testing over social networks Abstract: Recent years, cloud computing is description for facilitating suitable on-demand network access. In cloud, computing multi-tenancy plays a significant role on software as a service (SaaS). Structure of SaaS multi-tenant cloud aware applications initiates several new challenges the central one being a tenant. In cloud testing, tenant applications need to be tested in addition to performance testing be used. At the same time as numerous performance-testing techniques exist; most of them produce only fixed progressions of test configurations. This paper focuses on the challenges for Multi-tenancy testing in SaaS and analyses the configuration dynamically in which SaaS testing differs from testing conventional applications. The paper proposes performance testing and fittest function of each tenant. For fitness function, GASE algorithm is used which combines a genetic algorithm and a symbolic execution. This proposed algorithm uses the above performance testing values for obtaining the best of each tenant, in the form of fitness generations. A real experimentation is proposed using a multiple tenants on open stack cloud computing environment over social networks. Journal: Int. J. of Enterprise Network Management Pages: 234-250 Issue: 3/4 Volume: 9 Year: 2018 Keywords: SaaS cloud; multi-tenant; software testing; performance testing; fitness generations. File-URL: http://www.inderscience.com/link.php?id=94662 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:234-250 Template-Type: ReDIF-Article 1.0 Author-Name: V. Jackins Author-X-Name-First: V. Author-X-Name-Last: Jackins Author-Name: D. Shalini Punithavathani Author-X-Name-First: D. Shalini Author-X-Name-Last: Punithavathani Title: An anomaly-based network intrusion detection system using ensemble clustering Abstract: The numbers of hacking and intrusion incidents are high due to the increasing use of internet services and computer application. Therefore, intrusion detection systems (IDS) are inevitable in today's scenario (Koruba et al., 2017). In this paper, an unsupervised technique based on hybrid clustering algorithms is used for Anomaly detection. Incremental support vector machine (ISVM) and C means (FCM) algorithms are applied to preprocess the data set and detect the anomalies respectively. Further, the processed data is fed to the DBSCAN algorithm for further detection of anomalies. The results of the detection system are communicated to the intrusion prevention system (IPS). The proposed hybrid algorithm is applied for KDD Cup 1999 dataset and Gure Kdd Cup data base (2008) and the results show high detection rates and low false positive alarms. Further, the proposed technique performs well with a real time data in detecting anomalies with enhanced true positive rate. Journal: Int. J. of Enterprise Network Management Pages: 251-260 Issue: 3/4 Volume: 9 Year: 2018 Keywords: intrusion detection system; IDS; intrusion prevention system; IPS; KDD Cup 1999; Gure Kdd Cup database (2008); anomaly; clustering; network IDS. File-URL: http://www.inderscience.com/link.php?id=94664 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:251-260 Template-Type: ReDIF-Article 1.0 Author-Name: D. Sasikala Author-X-Name-First: D. Author-X-Name-Last: Sasikala Author-Name: S. Muthukumar Author-X-Name-First: S. Author-X-Name-Last: Muthukumar Author-Name: R. Sivaranjani Author-X-Name-First: R. Author-X-Name-Last: Sivaranjani Title: Power efficient digital circuits for ECG front end data acquisition mobile system Abstract: The electrical motion of the heart is characterised by the ECG signal. ECG elucidation can be used to detect the heart syndrome. This technology has an efficient diagnostic tool, due to the high regard of portable electronic products, low power system has fascinated more consideration in recent years. This work presents digital ECG data acquisition system to diminish the power consumption. In the proposed work, analogue block is not used, they convert the input voltage into a digital code by delay lines. This digital architecture is capable of operating with a low supply voltage such as 0.3 V and 0.1 V. In this architecture, analogue blocks such as low-noise amplifier (LNA) and filters are not used. A digital feedback loop is employed to cancel the impact of the dc offset on the circuit, which eliminates the requirements for coupling capacitors. The circuit is implemented in 130 nm and 65 nm CMOS process. The simulation results illustrate that the front-end circuit of digital architecture for 130 nm consumes 18.9 pW and 65 nm consumes 109 pW of power. Journal: Int. J. of Enterprise Network Management Pages: 261-272 Issue: 3/4 Volume: 9 Year: 2018 Keywords: electrocardiogram; ECG; mobile monitoring; digital; amplification; analogue; acquisition; delay; offset. File-URL: http://www.inderscience.com/link.php?id=94665 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:261-272 Template-Type: ReDIF-Article 1.0 Author-Name: D. Arivudainambi Author-X-Name-First: D. Author-X-Name-Last: Arivudainambi Author-Name: D. Dhanya Author-X-Name-First: D. Author-X-Name-Last: Dhanya Title: Three phase optimisation for qualified and secured VMs for resource allocation Abstract: Cloud computing services enable the users to use required computing resources for the required period which thereby permit the users to build a flexible information system. Choosing genuine and secured virtual machines (VM) among thousands of virtual machines is one of the main challenges in resource allocation to achieve higher accuracy. In this paper, VM optimisation techniques namely match making algorithm, memory aware VM and cuckoo technique is incorporated to select the best and secured virtual machine from cloud. In the proposed technique the first two are combined to select the best VM, where cuckoo is used to provide optimised resources to the finest VM. During the selection of finest VM from above techniques, it is necessary to select secured VM's to achieve an optimum result during resource allocation. To select secured VM, signature based detection and secure counters are employed to analyse network traffic and to monitor the data transactions. Journal: Int. J. of Enterprise Network Management Pages: 273-293 Issue: 3/4 Volume: 9 Year: 2018 Keywords: virtual machine; resource allocation; match making algorithm; memory aware scheduling; cuckoo optimisation technique. File-URL: http://www.inderscience.com/link.php?id=94668 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:273-293 Template-Type: ReDIF-Article 1.0 Author-Name: A.K. Kranthi Author-X-Name-First: A.K. Author-X-Name-Last: Kranthi Author-Name: K.A. Asraar Ahmed Author-X-Name-First: K.A. Asraar Author-X-Name-Last: Ahmed Title: Determinants of smartwatch adoption among IT professionals - an extended UTAUT2 model for smartwatch enterprise Abstract: Smartwatches these days have gained popularity under wearable device category. Consumers of smartwatches consider several factors while choosing smartwatches. On this premise, the current research is undertaken to identify the determinants of the smartwatch adoption. In order to arrive at this objective, the study has employed unified theory of acceptance and use of technology 2 (UTAUT2) model as a means and underpinning framework. To suit context, the present study has extended UTAUT2 model by incorporating self-efficacy (SEF), personal innovativeness (PINNO), social media influence (SMI), social image (SIMG), aesthetics (AES) and external social influence (ESI). To validate and check the explanatory power of the extended UTAUT2 model the study has considered Structural equation modelling using Smart PLS 2.0.The results arrived in this study has concluded that the extended UTAUT2 model has a better explanatory power on behavioural intention towards smartwatch adoption. Effect size (<i>f</i><SUP align="right"><SMALL>2</SMALL></SUP>) and predictive relevance (<i>Q</i><SUP align="right"><SMALL>2</SMALL></SUP>) for the extended UTAUT2 model are also discussed. Journal: Int. J. of Enterprise Network Management Pages: 294-316 Issue: 3/4 Volume: 9 Year: 2018 Keywords: unified theory of acceptance and use of technology; UTAUT2; smartwatch; social image; self-efficacy; SEF; personal innovativeness; PINNO; social media influence; SMI; SIMG; aesthetics; AES; external social influence; ESI; wearable device. File-URL: http://www.inderscience.com/link.php?id=94669 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:294-316 Template-Type: ReDIF-Article 1.0 Author-Name: Radwan Al-Dwairi Author-X-Name-First: Radwan Author-X-Name-Last: Al-Dwairi Author-Name: Emad Abu-Shanab Author-X-Name-First: Emad Author-X-Name-Last: Abu-Shanab Author-Name: Mohammad Daradkeh Author-X-Name-First: Mohammad Author-X-Name-Last: Daradkeh Title: A framework for antecedents of trust in social commerce Abstract: Trust is essential in social commerce environment, where consumers rely on feedback and advice that they collect from social platforms. Despite the importance of trust in virtual environments, there are a limited number of studies in this field. Research need to identify the main drivers that establish trust in social commerce domain. To this end, this study reviewed the literature related to trust in social commerce environment and proposed a framework for the antecedents of trust in social commerce. The proposed framework suggests two main components: social networking site and social company. The results supported nine hypotheses out of ten excluding the relationship between perceived-ease-of-use (PEOU) and content quality. Word-of-mouth, communication, perceived ability, after sale service, trust in transaction, and perceived usefulness were found as key factors that significantly impacted trust in social commerce. The model explained 33.2% of the variance in trust in social commerce. Journal: Int. J. of Enterprise Network Management Pages: 333-351 Issue: 3/4 Volume: 9 Year: 2018 Keywords: social commerce; trust; Web 2.0; social media; ability; after sale service; communication; word-of-mouth. File-URL: http://www.inderscience.com/link.php?id=94673 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:333-351 Template-Type: ReDIF-Article 1.0 Author-Name: S. Vijayalakshmi Author-X-Name-First: S. Author-X-Name-Last: Vijayalakshmi Author-Name: G.R. Karpagam Author-X-Name-First: G.R. Author-X-Name-Last: Karpagam Title: Authentication as a service in cloud from a fuzzy perspective Abstract: In a cloud based online voting system, the life cycle starts with voter registration, authentication, voting and counting. The election process is a secret process as whole democratic administration is centralised on voting. Authentication, confidentiality, integrity, scalability, speeds and accuracy these are few important criteria to be satisfied by an online voting system. Authentication can be considered as the most critical issue among all the above. So the voters should be kept at the highest priority to make the voting process fair and effective. Through some of the literatures that deal with the issue of authentication mechanisms, the proposed method conceals the original biometric template such that it is impossible to recover the biometric template even when the stored data in the system is open to an attacker. We assess the system with relativity matrix between security requirements, issues, techniques and mechanisms. Journal: Int. J. of Enterprise Network Management Pages: 352-362 Issue: 3/4 Volume: 9 Year: 2018 Keywords: authentication; cloud security; fuzzy commitment; online voting system. File-URL: http://www.inderscience.com/link.php?id=94674 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:352-362 Template-Type: ReDIF-Article 1.0 Author-Name: James Joseph Author-X-Name-First: James Author-X-Name-Last: Joseph Author-Name: K.V. Sriram Author-X-Name-First: K.V. Author-X-Name-Last: Sriram Author-Name: Lewlyn L.R. Rodrigues Author-X-Name-First: Lewlyn L.R. Author-X-Name-Last: Rodrigues Author-Name: Asish Oommen Mathew Author-X-Name-First: Asish Oommen Author-X-Name-Last: Mathew Author-Name: K.C. Gana Author-X-Name-First: K.C. Author-X-Name-Last: Gana Title: An empirical study on customer adoption of mobile payment application in India Abstract: Digital economy is becoming a reality. Business all over the world is moving towards digital platform and so is the payment option. Mobile application is becoming one of the easiest and fastest options for making payments and is predicted to have a very large potential in the days to come. This study focuses on the customer adoption of mobile payment application. The study reveals that the factors like usefulness, pervasiveness, ease of use, offers and cash back and service assume a vital role in encouraging adoption of mobile payment applications. Results show customers have greater preference towards mobile payment applications over the mobile web browsers, which is a clear sign of awareness among the customers. The study also showed that teenagers are more aggressive in embracing mobile payment application than the older age groups. Compared to other modes of payments, mobile payment with 14.5% preference among customers is low and there is a need for aggressive promotions and marketing campaigns. The study throws light into the customer adoption factors which can act as guidelines for improving customer adoption and awareness of mobile payment applications. Journal: Int. J. of Enterprise Network Management Pages: 363-375 Issue: 3/4 Volume: 9 Year: 2018 Keywords: mobile payment application; customer adoption; smartphone; merchant acquisition; digital payment; ease of use; usefulness; service; India. File-URL: http://www.inderscience.com/link.php?id=94675 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:363-375 Template-Type: ReDIF-Article 1.0 Author-Name: P. Senthil Kumar Author-X-Name-First: P. Senthil Author-X-Name-Last: Kumar Author-Name: J. Abdul Samath Author-X-Name-First: J. Abdul Author-X-Name-Last: Samath Author-Name: M. Mohamed Iqbal Author-X-Name-First: M. Mohamed Author-X-Name-Last: Iqbal Title: Ontology-based effective information retrieval from the web using concept aware user profile construction Abstract: Similar document retrieval from the enormous volume of documents in database is a critical task. In this research work, improved information retrieval system utilising cooperative ontological based user profile construction (IIRS-COUPC) is introduced for accurate similar document retrieval. Here, cooperative ontology-based user profile (COUP) is built to take back the documents from diverse ideas that match with the user's demand. In order to make simplicity of document looking for process and merges the numerous users with identical demands, documents clustering (DC) and query clustering (QC) is accomplished in this work independently. Lastly, concept mapping (CM) is accomplished to take back the documents which matches with the user needs proficiently. The whole assessment of the current research work is accomplished in the java simulation environment from which it is shown that the current research methodologies confirms its improved performance. Journal: Int. J. of Enterprise Network Management Pages: 376-389 Issue: 3/4 Volume: 9 Year: 2018 Keywords: information retrieval; similarity; personalised search; clustering; ontology profile construction. File-URL: http://www.inderscience.com/link.php?id=94677 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:376-389 Template-Type: ReDIF-Article 1.0 Author-Name: Amiruddin Bin Ahamat Author-X-Name-First: Amiruddin Bin Author-X-Name-Last: Ahamat Author-Name: Muhamad Sham Bin Shahkat Ali Author-X-Name-First: Muhamad Sham Bin Shahkat Author-X-Name-Last: Ali Author-Name: Nor Akmal Nabihah Binti Zahari Author-X-Name-First: Nor Akmal Nabihah Binti Author-X-Name-Last: Zahari Title: The effects of brand image in purchasing of online marketing among university students Abstract: The brand image can give a huge impact to the marketer and the consumer as the buyer of the product. The brand image factor can also motivate consumer in their purchasing decision because the brand image may reflect the product itself. The purpose of this paper is to elaborate the relation between the awareness of a brand and the intention of buying a brand. There were several brand image factors highlighted in this research which is pricing, advertisement, brand name and quality of the product. A quantitative method was used through an online questionnaire in order to prove the factors that can affect the brand image in online marketing among university students. Based on the results, several factors were identified as the contributing effect on a brand image which is the price of a product, advertisement of product and the quality of a product. Journal: Int. J. of Enterprise Network Management Pages: 390-406 Issue: 3/4 Volume: 9 Year: 2018 Keywords: online marketing; brand image; brand image factors. File-URL: http://www.inderscience.com/link.php?id=94678 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:390-406 Template-Type: ReDIF-Article 1.0 Author-Name: Satya Prakash Author-X-Name-First: Satya Author-X-Name-Last: Prakash Author-Name: Gunjan Soni Author-X-Name-First: Gunjan Author-X-Name-Last: Soni Author-Name: Vipul Jain Author-X-Name-First: Vipul Author-X-Name-Last: Jain Author-Name: Gaurav Kumar Badhotiya Author-X-Name-First: Gaurav Kumar Author-X-Name-Last: Badhotiya Author-Name: Murari Lal Mittal Author-X-Name-First: Murari Lal Author-X-Name-Last: Mittal Title: Multisite aggregate production and distribution planning: a review Abstract: Increase in the demand of products causes a company to change its manufacturing system from single-plant to multi-plant (or, multi-site) with an objective to gain competitive advantage in the global manufacturing scenario. Multi-site production and distribution (P-D) planning have been studied and practiced by the researchers and practitioners over the past two decades. A good size of literature has been published and trend is continuing. In the light of impact of multi-site manufacturing in gaining commercial advantage in global competition scenario, this review is dedicated to multi-site aggregate production planning (MSAPP) and multi-site aggregate P-D planning (MSAPDP). This review focuses on analysing the major research gaps and unaddressed areas of MSAPP/MSAPDP. It has been felt that switching from discrete to continuous and pure mathematical to simulation and agent based models along with consideration of economical and environmental aspects have become very important to effectively deal with real world MSAPP/MSAPDP problems. Journal: Int. J. of Enterprise Network Management Pages: 407-434 Issue: 3/4 Volume: 9 Year: 2018 Keywords: supply chain; multi-site manufacturing; aggregate production planning; aggregate P-D planning. File-URL: http://www.inderscience.com/link.php?id=94680 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:407-434 Template-Type: ReDIF-Article 1.0 Author-Name: N. Kumaresh Author-X-Name-First: N. Author-X-Name-Last: Kumaresh Author-Name: J. Abdul Samath Author-X-Name-First: J. Abdul Author-X-Name-Last: Samath Author-Name: M. Mohamed Iqbal Author-X-Name-First: M. Mohamed Author-X-Name-Last: Iqbal Title: An automatic construction of domain ontology to analyse competence prerequisites of jobs Abstract: In many industries, the hiring process is a critical task, where many applicants will be applied for the single position, so it is required to analyse their qualification which ought to suit the requirement. Identifying feasible candidate with the required knowledge and skills is the difficult task which is faced by the organisations. In the proposed work, this issue is rectified through domain ontology construction framework (DOCF) from the job knowledge thesis and the job requirements details, which are obtained from online. The obtained documents were clustered regarding the content and conceptual similarity-based clustering method. From those clustered documents job-know ontology will be built. So it is easy to create the information requirements about the job search phase by both candidates and the human resources (HR) of the industries. It is proved that proposed research method leads to give better result when compared with the existing research method in terms of increased accuracy rate. Journal: Int. J. of Enterprise Network Management Pages: 441-454 Issue: 3/4 Volume: 9 Year: 2018 Keywords: job requirement analysis; competence level finding; domain ontology construction; conceptual similarity. File-URL: http://www.inderscience.com/link.php?id=94687 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:441-454 Template-Type: ReDIF-Article 1.0 Author-Name: V.K. Ajay Author-X-Name-First: V.K. Author-X-Name-Last: Ajay Author-Name: L. Vijay Author-X-Name-First: L. Author-X-Name-Last: Vijay Author-Name: K. Manivel Author-X-Name-First: K. Author-X-Name-Last: Manivel Title: Stress of new age entrepreneurs and its implications of affecting heart-alerting-heart using MIOT Abstract: Cardiologists, across the globe, opine that 25% of death in the age band between 25-70 years is mainly caused by high stress ambience they are subjected to in their work place especially professionals like first generation entrepreneur's. It is found that the common health issues like depression, anxiety, addiction, sleeping disorders are leading more and more of heart disease and heart attacks. The system proposed here uses an advanced technology called MIOT system in the form of a wristwatch to detect and analyse the parameter deviations on the person who is wearing this wristwatch. Journal: Int. J. of Enterprise Network Management Pages: 435-440 Issue: 3/4 Volume: 9 Year: 2018 Keywords: stress; entrepreneurs; heart attack; internet of things; IOT. File-URL: http://www.inderscience.com/link.php?id=94688 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:435-440 Template-Type: ReDIF-Article 1.0 Author-Name: Asma Khan Author-X-Name-First: Asma Author-X-Name-Last: Khan Author-Name: Asif Ali Syed Author-X-Name-First: Asif Ali Author-X-Name-Last: Syed Title: Determinants of online consumer behaviour towards e-tailing in India Abstract: Internet has brought a revolution in the way we live today. This paper aims to provide an overview of the e-tail scenario in India and study the factors that influence the online buying behaviour of e-consumers. It explores the various issues, opportunities and endeavours to draw an effective e-tailing strategy for Indian online sector based upon extensive the literature reviewed and factors assimilated on e-tailing models from Indian and global studies. The research also suggests ways in which the e-tailers can recuperate their virtual presence and enhance online consumer purchases and revisits. The contributions of the findings would attempt to assist policy makers, e-marketers and provide an insight for further research exploring the gaps in this important social and commercial economic discipline which impacts each and everyone of us. Journal: Int. J. of Enterprise Network Management Pages: 455-480 Issue: 3/4 Volume: 9 Year: 2018 Keywords: e-consumers; e-tailing; e-shopper; e-marketing; India. File-URL: http://www.inderscience.com/link.php?id=94689 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:455-480