International Journal of Enterprise Network Management (28 papers in press)
Design and Analysis of Compact T Shape Slotted Patch Antenna for 4G WiMAX Applications
by Sreeja T.K, Jayakumari J
Abstract: A novel single band microstrip patch antenna design is introduced for WiMAX/LTE applications. The proposed antenna has a compact size of 2.7
Keywords: 4G Antenna; Microstrip Antenna (MSA); ADS; WiMAX; LTE.
FROM A LITERATURE REVIEW TO A CONCEPTUAL FRAMEWORK FOR AFFORDABLE QUALITY HEALTHCARE SERVICE USING INTERNET OF THINGS (IOT) NETWORK
by Sanjana Mohapatra, Ajit Kumar, Sanjay Mohapatra
Abstract: There has been significant interest in integration of Internet Of Things (IOT) and healthcare both in academic and corporate world. This can be seen from the fact that number of conferences held and number of special issues in journals that have been published. To establish further in this domain, the purpose of this research is two folds. First it does literature review in healthcare and IOT from 151 papers published from 1998 to 2016. Second, it summarizes findings from literature review in two parts. In the first part, it identifies the antecedents that impact both affordable quality healthcare and developing an enterprise network for IOT. In the second part, it integrates factors that affect both affordable healthcare with IOT. The results of this research will be useful for both practitioners and academicians as the paper discusses how to design a IOT based healthcare network that will reduce cost of healthcare while preventing chronic diseases. The paper also shows the limitations of the present research while describing stimuli for further research.
Keywords: Internet of Things; IOT; Affordable healthcare; Conceptual Framework.
Investigation on effect of geometric, material and load parameters on strength of composites with cutouts
by Anoop Kumar S, Rajesh R
Abstract: Composite applications require presence of multiple holes for mechanical fasteners or cutouts in laminates. Holes and cutouts help in lightening composite laminates used as aerospace structures. Unlike isotropic materials, composite materials experience change in stress values due to different parameters such as geometric, material and loading parameters. The present study is devoted to primarily determine whether geometric, material or loading parameters have dominant influence on strength of composite laminates. Geometric parameters such as cutout shape, size, orientation, proximity (in case of multiple holes) as well as edge interaction are taken into consideration. Among material parameters, fiber material, fiber orientation and stacking sequence are varied. Numerical study using ABAQUS CAE software is employed for the analyses. Experiment on Open Hole Tension specimen as per ASTM standards is also conducted to validate the numerical model. Results reveal that geometric parameters have much significant influence on stress concentration factor and thereby the strength of composite laminates, when compared to material parameters. Among the geometric parameters, edge interaction is the most critical factor affecting the stress concentration. An elliptical cutout is seen to have comparatively more adverse effect on strength of laminate, when compared with other cutout shapes. Further, effect of load parameters in-plane tension, compression and shear, is also studied. However, no effect was evidenced in stress concentration factor due to load parameters.
Keywords: Stress Concentration Factor; Composite Laminate; Edge Interaction; Open Hole Tension; Geometrical parameters; Material parameters; Load parameters.
Inventory Parameters for a Serial Supply Chain with Lost Sales through Genetic Algorithm Approach
by Rajasekaran R, Pal Pandi A, Rajendra Sethupathi P.V, Rajesh R
Abstract: Supply chain is a network of facilities with varying conflicting objectives, and decision making is a complex process. The uncertainty in demand increases complexity in inventory control mechanism. Backordering, partial backordering and lost-sales are considered in the inventory management to characterize the excess demand. In the present competitive scenario, mostly consumers have no patience to wait and show urgency to buy their goods. Hence, customers are likely to seek for an alternative retailer which may cause a loss of profit due to loss of customer. There are very few research works regarding lost-sales parameter in the area of multi-echelon inventory systems. It is felt that the proposed Modified Gene-wise Genetic Algorithm (MGGA) in supply chain model which so far not applied and may help to determine best base stock levels and review periods with lost sales particularly at retailer end which minimized total supply chain cost.
Keywords: Inventory Management; Genetic Algorithm; Supply Chain Model; Lost Sales.
A Meta-Heuristic, Moth Inspired Algorithm for Combined Economic and Environmental Power Dispatch
by Mustafa N, Vennila H
Abstract: The problem of deciding the contribution of each generator in a power system is a complex one. Where some generators may be more fuel efficient, others may have a cleaner operation. Determining the right amount of power generated could mean the difference between saving thousands of dollars a year in operation costs or prevention of several tons of noxious fumes like NO2 and SO2 being released into the atmosphere each year. It is thus necessary to strike a balance between the amount of fuel consumed and the amount of emission produced. Usually conventional methods are used to solve such problems; but with added complexity of the system, it becomes more and more difficult to do this. With special methods like Valve Point Loading which help further improve efficiency, it is necessary to find new and better ways to determine the power to be supplied by each generator in a power system. The aim of this paper is to find a solution to this problem by the use of an algorithm inspired by the flight pattern of moths. Like a moth drawn to a flame, this algorithm zones in on the optimal solution, to minimise fuel cost as well as shrink emission of harmful gases. The problem considered is the standard IEEE 30-bus Test System, for which the optimal generation pattern is to be determined. The results obtained are compared with other such algorithms to demonstrate the ability of moth flame optimisation.
Keywords: Keywords— Economic Dispatch; Emission Dispatch; Valve-point Loading; Moth Flame Optimisation.
Special Issue on: TAMMIE Advances in Supply Chain Operations in Emerging Economies
MODELING AND ANALYSIS OF A FOUR STAGE SUPPLY CHAIN UNDER FUZZY ENVIRONMENT
by Hemalatha Somireddi, Narayana Rao Kandukuri, Ramababu Govada, Venkata Subbaiah
Abstract: In todays competitive arena the success of supply chain depends on its managerial ability to integrate and coordinate all stages of the supply chain. The supply chain predominantly consists of four stages in a typical industry, namely: suppliers, manufacturing plants, warehouses, and retailers. Supply chain shall be viewed as multi objective decision making problem. The objectives include minimization of cost at suppliers, plants, warehouses and retailers. Fuzzy goal programming approach is useful to solve multi objective decision making problems. In this paper, the multiple objectives of the supply chain are aggregated using Werners compensation operator (γ) and compromise solutions on the decisions of the supply chain is arrived. Risk analysis is performed over the optimized model and the effect of uncertainty in terms of increase in suppliers price is studied. Fuzzy goal programming model was solved using LINGO 8 software.
Keywords: supply chain; Multi-objective programming; Fuzzy logic.
LEAN MANAGEMENT PLANNING IN INDIAN CEMENT INDUSTRIES AND ITS EFFECT ON INDUSTRIAL PSYCHOLOGY
by B.T.D. Praveen Varma, Dalveer Singh
Abstract: Cement industries are one of the growing large scale industries which play as a backbone for developing countries. This paper discuss about the analysis of losses and wastage in cement manufacturing process and its rectification using lean tools and methodology mathematically. Employees psychology varies with every new management planning, so psychology towards new lean management planning is also analysed through Questioner to correlate lean management planning satisfaction to stress, job satisfaction, and safety improvement individually using Karl Pearson correlation in SPSS software. The data has been collected from various cement industries at each stage and analysed. Lean management planning resulted in reduction of wastage in transportation of mining, over processing and increase in efficiency of separator in grinding mills, kiln quality control, packing plant efficiency improvement. The correlation analysis also resulted in stress reduction, improvement in job satisfaction and safety conditions with new lean management planning. Finally the result concludes that new lean management planning has positive correlation with the employees psychology.
Keywords: Lean tools; Karl Pearson correlation; SPSS analysis; organisational culture.
ELEMENTS OF A COMPUTER AIDED EMERGENCY MANAGEMENT SYSTEM
by N.M. Sivaram
Abstract: Past and recent disasters, both man made (technological) and natural (non-technological) have produced innumerable casualties and unimaginable harm to life and property. Though the management of factories and the authorities has responded to the challenge and introduced number of measures to minimize the hazards, the real fact is that accident cannot be completely eliminated. For this purpose, it is necessary to prepare an emergency preparedness plan for every administrative or industrial area by the competent authorities. With the help of computer simulation models, knowledge of chemicals; its behavior and availability of input data, it is possible to predict the area affected under different emergency scenarios. Keeping in view the plotting requirement along with linkages of various databases, it has been considered appropriate to use Computer Aided Emergency Management System for effective mitigation and response during an industrial disaster. This paper proposes a composition of a Computer Aided Emergency Management System.
Keywords: Industrial Disaster; Emergency Preparedness; Computer Aided Emergency Management System.
Multi-Objective Optimization for the Vehicle Routing Problem Using Metaheuristics
by Sonu Rajak, P. Parthiban, R. Dhanalakshmi, Sujith S
Abstract: The Capacitated Vehicle Routing Problem is a combinatorial optimization problem that determines a set of routes of minimum distance to deliver the goods, using a fleet of identical vehicles with restricted capacity. The objective of this article it to optimize the total distance required to deliver the goods and also the workload imbalance in terms of distances travelled by the vehicles and their loads. Due to the combinatorial in nature, it requires metaheuristic to solve these types of problems and this is a rapidly growing field of research. Here two metaheuristics such as Ant Colony Optimization (ACO) and Simulated Annealing (SA) are proposed and analyzed for solving this multi-objective formulation of the Vehicle Routing Problem. The results obtained from these two methods were compared and found that the ACO gives better results than the SA for the VRP.
Keywords: Vehicle Routing Problem; K-means Clustering Algorithm; Simulated Annealing; Ant Colony Optimization.
ANALYSIS OF LEAN MANUFACTURING IN AN AUTOMOBILE INDUSTRY A CASE STUDY
by Mahendran Subramanian, Senthil Kumar A, Jeyapaul R
Abstract: The automobile industries are more competitive and customer demand is volatile. The customers are willing to buy the product at low cost with high quality. So common principle is created to reduce the wastage and increase the efficiency of the industry. Lean manufacturing is the best principle to adopt the manufacturing industry. The main aim of this project is reduce the wastage, cost and increase the productivity of the industry. Using lean tools jit, kanban, value stream mapping (current and future state) and man machine chart (current and future) for reduce wastage and cost. In current state value stream map, the waste area is identified. Finally, non value added time is reduced to 28.7 %. The value added time is reduced to 27.84%. The percentage value addition is increased from 3.25% to 3.29%, the total inventory is reduced to 25.07% and man machine ratio is improved as 1.52: 1.26.
Keywords: value stream mapping; man machine chart; 5s; jit; value addition; value added time; non value added time; man machine ratio; kanban; automobile industry.
FRAME WORK OF CONCEPTUAL MODEL FOR QUALITY MANANGEMENT IN SMALL AND MEDIUM ENTERPRISES (SME)
by Gopinath S, Alagu Sundaram VR, Sheshathri R, Narashiman K
Abstract: SME are the backbone of this developing economy, a pushing force the economies all over the globe involving a large workforce. The development of SMEs in todays concept stands for the improvement in Quality. This study aims to explore the quality system adopted by some SMEs. Several studies were done on the factors acting as an obstacle or risk in implementing the quality system, which directly affect the total efficiency of the SME.The results of the study indicated few critical factors of quality which were not given importance in the organization. For sustaining their competitiveness, they have to implement some of the quality systems and embrace quality management techniques efficiently. In this paper the conceptual model is suggested to enhance the quality system in SME to improve the Gross Domestic Product.
Keywords: Quality risk; SME Small and Medium Enterprises; QM quality management; GDP Gross Domestic Product.
A Case Study on Hazard Evaluation on Catering Service in Educational Institution
by Kanaga Sundara Satishwaran K, Sivasubramanian M, Aravind Raj Sakthivel
Abstract: Hazard Evaluation plays a decisive role in the Catering Service. In order to intensify the Safety of the Catering Service, a Hazard Assessment and its Evaluation is conducted in educational institution. Safety Audit is a formal procedure for assessment of the accident potential and expected safety performance for any service or system. Safety Audit is being performed with appropriate checklists including Occupational Hygiene, Worker Safety, Storage & Handling and General working conditions. Fault Tree Analysis (FTA) is a method that directly focuses on the modes of failure. This paper presents FTA for chance of fire accident due to leakage of Liquefied Petroleum Gas (LPG) in storage yard of Catering Service. Correlation and Regression Analysis were used to get the lines of regression in order to place it in Normal Distribution. The probability of fire accident due to leakage of LPG is being calculated and substantial suggestions are provided.
Keywords: Safety Audit; Fault Tree Analysis; Catering Service; Educational Institution.
SELECTION OF SUPPLIERS USING SWARA AND COPRAS-G
by Rajesh G, Malliga P
Abstract: In order to optimize a supply chain, the effective management of suppliers plays a key role. Firms seeking competitive advantage are participating in cooperative supply chain arrangements, such as strategic partnerships, which combine their individual strengths and unique resources. Supplier selection is a multicriteria decision making problem which includes both qualitative and quantitative factors. In the present scenario environmental criteria should also be given due importance, this further increases the challenge of supplier selection. Generally, decision makers judgments are often uncertain and cannot be estimated by an exact numerical value. The grey systems theory is a powerful tool to deal with uncertain information. This paper presents a structured model for evaluation and selection of strategic supplier. Stepwise Weight Assessment Ratio Analysis (SWARA) is applied to decision making in order to calculate the relative importance of the criteria. The COmplex PRoportional ASsessment of alternatives with Grey relations (COPRAS-G) method is used for supplier evaluation and selection of strategic supplier. A case study is presented to demonstrate the applicability of the proposed model to select a strategic green supplier.
Keywords: strategic supplier selection; complex proportional assessment of alternatives with grey relations; COPRAS-G;stepwise Weight Assessment Ratio Analysis; SWARA; MCDM; Green supplier selection.
Special Issue on: Enterprise Network Management Technologies and Tools for E-commerce, Mobile Commerce and Social Commerce Frameworks
Ontology based Effective Information Retrieval from the Social Web Using Concept aware User Profile Construction
by SENTHIL KUMAR PONGALLIAPPAN, Abdul Samath
Abstract: Improved utilization of network based communication enhances the amount of document generation from which discovery and taking back of user needed documents depends upon their requirements is a very complicated task. This could be solved by building the personalized user profile depending on their interest by utilizing which user needed documents that are alike to their inquiry could be got back. In the previous work, Information Retrieval System utilizing Differential Weighting Scheme (IRS-DWS) has been presented that builds the user profile with the point of subjects and recurrent terms exists in the user retrieved documents. On the other hand, this work does not focus on the idea of user queries and take back the documents wherein terms concerned more devoid of thinking the concept. In addition, the previous works do not concentrate on the identical demands from the numerous users where it will process individual user needs only, therefore it will result in more computational overhead. This issue is solved in this work by presenting Improved Information Retrieval System utilizing Cooperative Ontological based User Profile Construction (IIRS-COUPC). In this research work, cooperative ontology based user profile (COUP) is built to take back the documents from diverse ideas that matches with the users demand. In order to make simplicity of document looking for process and merges the numerous users with identical demands, documents clustering (DC) and Query Clustering (QC) is accomplished in this work independently. Lastly, Concept Mapping (CM) is accomplished to take back the documents which matches with the user needs proficiently. The whole assessment of the current research work is accomplished in the java simulation environment from which it is shown that the current research methodologies confirms its improved performance.
Keywords: Keywords--- Information Retrieval, Similarity, Personalized Search, Clustering, Ontology Profile Construction.
THE EFFECTS OF BRAND IMAGE IN PURCHASING OF ONLINE MARKETING AMONG UNIVERSITY STUDENTS
by Amiruddin Ahamat, Muhammad Sham Shahkat Ali, Nor Akmal Nabihah Zahari
Abstract: Today, online marketing is one of the most popular business trends. It has high demand and becomes one of the important tools to market products to the consumers by using the internet. There’s a rapid growth in online marketing over the last 10 years. Various applications were used to attract consumers to use it. In online marketing, brand image of the product was often highlighted. The brand image can give a huge impact to the marketer and the consumer as the buyer of the product. The brand image factor can also motivate consumer in their purchasing decision because the brand image may reflect the product itself. The purpose of this paper is to elaborate the relation between the awareness of a brand and the intention of buying a brand. There were several brand image factors highlighted in this research which is pricing, advertisement, brand name and quality of the product. A quantitative method was used through an online questionnaire in order to prove the factors that can affect the brand image in online marketing among university students. SPSS software was used to analyse and test the reliability and validity of data. Based on the results, several factors were identified as the contributing effect on a brand image which is the price of a product, advertisement of product and the quality of a product. This research was conducted in order to give the reader especially online marketer more information about various factors that can make people attracted to buy a product in online marketing.
Keywords: Online marketing; Brand image; Brand image factors
Entropy a new measure to gauge search engine optimization
by Batri Krishnan
Abstract: This article tries to analyze, and measure the uncertainty associated with the relevant document selection in web-search engines. The web-search engines process, organize the web-documents based on their index term's occurrence frequency. The number of index terms, and their occurrence frequency influences the relevance calculation. The variation in term frequency either in processed web documents or in users' query influences the relevance calculation. This leads to an uncertainty associated with the document selection, and its relevance calculation. In this article, we proposed a new measure called Entropy, to calculate the uncertainty associated with the document selection. The Entropy can be measured by varying the documents' term frequency or user's query term frequency. As the web documents can't be changed, we used variation in user's query term frequency to measure the uncertainty associated with the document selection in web-search engines. The experiments are conducted on two search engines namely 'Google', and 'Bing'. The query's term frequency is varied and given to the search engines. Based on our proposed method, the uncertainty is calculated for the search engines. The high Entropy value indicates the high uncertainty associated with the document selection. The high uncertainty gives scope for search engine optimization. From the high uncertainty search engines, we can extract more relevant documents. It can be used as a performance indicator.
Keywords: web search engines; uncertainty; entropy; document selection; Google; Bing; Search Engine optimization.
Classification Approach to Avoid Link Failures in Wireless Sensor Networks in Mobile Virtual communities and teleworking
by Manthandi Periannasamy Subramanian
Abstract: Security issues are the primary issues in Wireless Sensor Networks (WSN) due to its large network coverage and number of nodes. The attackers in WSN attack the particular node which has low energy level and converts this node into malicious node. The formation of malicious node is the primary reason for link failures between nodes. This paper proposes an efficient methodology to detect the malicious nodes in WSN using feed forward back propagation neural netwok classifier. This classifier differentiates the malicious node from trusty node based on the extracted features of the test node. The performance of the proposed malicious node detection system is analyzed interms of detection rate, Packet Delivery Ratio (PDR) and latency. The experimental results are compared with state-of-art methods
Keywords: Security; malicious nodes; features; PDR; link failures.
Wireless system for flight safety industry
by Kavitha V
Abstract: Many parameters can be measured and stored in the black box. The details stored in the black box are essential for the analysis of causes of the accident. In the formal black box, data is stored and it can be retrieved only after the identification of black box after crash. So it is very difficult to identify the exact location of the black box after a crash. Many leading officials and famous personalities died in air crashes and it takes a lot of time to identify the location of crash. It leads to wastage of money and time. Saving human life is the basic nature of humanity. In this article, black box data is transmitted to an earth station. The details are updated to the base station through wireless medium. It is transmitted to selected base stations by calculating the shortest path between them using ad hoc algorithm. Ad hoc algorithm is a multi hop network algorithm which switches to various stations by calculating its distance. Thus black box data is updated to base station wirelessly using ad hoc algorithm.
Keywords: Flight data recorder; Ad hoc algorithm; wireless communication; black box; on board data.
SaaS Multitenant Performance Testing Over Social Networks
by Parthiban M
Abstract: Recent years, cloud computing is description for facilitating suitable on-demand network access. In cloud, computing multi-tenancy plays a significant role on software as a service (SaaS). Structure of SaaS multi-tenant cloud aware applications initiates several new challenges the central one being a tenant. In cloud testing, tenant applications need to be tested in addition to performance testing be used. At the same time as numerous performance-testing techniques exist; most of them produce only fixed progressions of test configurations. This paper focuses on the challenges for Multi-tenancy testing in SaaS and analyses the configuration dynamically in which SaaS testing differs from testing conventional applications. The paper proposes performance testing and fittest function of each tenant. For fitness function, GASE algorithm is used which combines a Genetic algorithm and a Symbolic execution. This proposed algorithm uses the above performance testing values for obtaining the best of each tenant, in the form of fitness generations. A real experimentation is proposed using a multiple tenants on Open Stack cloud computing environment over Social networks.
Keywords: SaaS Cloud; Multi-tenant Testing; Software Testing; Performance Testing; Fitness Generations.
An Anomaly-based Network Intrusion Detection System using Ensemble Clustering
by Jackins V
Abstract: Due to the rapidly increasing use of internet services and computer applications all over the world, the numbers of hacking and intrusion incidents are increasing year on year as technology rolls out. Therefore, Intrusion Detection Systems (IDS) are the prime need in todays scenario . Misuse detection can detect previously known attacks but cannot detect new types of attacks. To overcome this limitation Anomaly detection techniques are often used and proven to be an effective method. Anomaly detection can make use of unsupervised techniques to identify new types of attacks . In this paper, an unsupervised technique is used for Anomaly detection based on hybrid clustering algorithms. The technique uses two algorithms in order to obtain accurate and high detection rate of attacks.  Incremental Support Vector Machine (ISVM) algorithm is used to preprocess the dataset. After Preprocessing, Fuzzy C Means (FCM) algorithm is adopted to detect the anomalies. FCM algorithm isolates the normal and abnormal data effectively. The processed data is fed to the DBSCAN algorithm for further detection of anomalies. The results of the detection system are communicated to the Intrusion Prevention System (IPS) which is responsible for sharing a suitable response to an anomalous request. The proposed hybrid algorithm is applied for KDD Cup 1999 dataset, Gure Kdd Cup data base (2008) and the results shows high detection rates and low false positive alarms. Further, the technique is tested with a real time data and it is observed that a high detection rate of anomalies with enhanced true positive rate.
Keywords: Intrusion Detection System (IDS); Intrusion Prevention System (IPS).
Power Efficient Digital Circuits for ECG Front End Data Acquisition Mobile System
by Sasi Kala
Abstract: The electrical motion of the heart is characterized by the ECG signal. ECG elucidation can be used to detect the heart syndrome. This technology has an efficient diagnostic tool, due to the high regard of portable electronic products, low power system has fascinated more consideration in recent years. This work presents digital ECG data acquisition system to diminish the power consumption .In the proposed work, analog block are not used, they convert the input voltage into a digital code by delay lines. This digital architecture is capable of operating with a low supply voltage such as 0.3 V and 0.1 V. In this architecture analog blocks such as low-noise amplifier (LNA) and filters are not used. A digital feedback loop is employed to cancel the impact of the dc offset on the circuit, which eliminates the requirements for coupling capacitors. The circuit is implemented in 130nm and 65nm CMOS process. The simulation results illustrate that the front-end circuit of digital architecture for 130nm consumes 18.9pW and 65nm consumes 109pW of power.
Keywords: ECG; analog; digital; acquisition; delay; offset.
Three phase optimization for Qualified and Secured VMs for Resource Allocation
by Dhanya D Aidhan, Arivudainambi D
Abstract: Cloud computing services enable the users to use required computing resources for the required period which thereby permit the users to build a flexible information system. Choosing genuine and secured Virtual Machines (VM) among thousands of virtual machines is one of the main challenges in resource allocation to achieve higher accuracy. In this paper, VM optimization techniques namely match making algorithm, memory aware VM and cuckoo technique is incorporated to select the best and secured virtual machine from cloud. In the proposed technique the first two are combined to select the best VM, where cuckoo is used to provide optimized resources to the finest VM. During the selection of finest VM from above techniques, it is necessary to select secured VMs to achieve an optimum result during resource allocation. To select secured VM, signature based detection and secure counters are employed to analyze network traffic and to monitor the data transactions.
Keywords: Virtual machine; resource allocation; match making algorithm; memory aware scheduling; cuckoo optimization technique.
Determinants of Smartwatch Adoption among IT professionals An Extended UTAUT2 Model for Smartwatch Enterprise
by Kranthi Kumar Alampuri, Asraar Ahmed
Abstract: Smartwatches these days have gained popularity in recent past under wearable device category. The main objective behind this current study is to identify the determinants of smart watch. To accomplish this objective, the present study has employed Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model as its theoretical background. To suit the context the present study has extended UTAUT2 model by incorporating self-efficacy (SEF), personal innovativeness (PINNO), social media influence (SMI), social image (SIMG), aesthetics (AES) and external social influence (ESI). Structural equation modeling is done using Smart PLS 2.0 in order to check the explanatory power in extended UTAUT2 model. The results obtained in this study concludes that the extended UTAUT2 model has a better explanatory power on behavioral intention towards smartwatch adoption. Effect size (f2) and predictive relevance (Q2) for the extended UTAUT2 model are discussed.
Keywords: Unified Theory of Acceptance and Use of Technology (UTAUT2); smartwatch; social image; social media influence; wearable device.
A Framework for Antecedents of Trust in Social Commerce
by Radwan Al-Dwairi, Emad Abu-Shanab, Mohammad Daradkeh
Abstract: Trust is essential in social commerce environment, where consumers rely on feedback and advice that they collect from social platforms. Despite the importance of trust in virtual environments, there are a limited number of studies in this field. Research need to identify the main drivers that establish trust in social commerce domain. To this end, this study reviewed the literature related to trust in social commerce environment and proposed a framework for the antecedents of trust in social commerce. The proposed framework suggests two main components: social networking site and social company. The results supported nine hypotheses out of ten excluding the relationship between perceived-ease-of-use (PEOU) and content quality. Word-of-mouth, communication, perceived ability, after sale service, trust in transaction, and perceived usefulness were found as key factors that significantly impacted trust in social commerce. The model explained 33.2% of the variance in trust in social commerce.
Keywords: Social commerce; trust; web 2.0; social media; ability; after sale service; communication; word-of-mouth.
Authentication as a Service in Cloud from a Fuzzy Perspective
by Vijayalakshmi Subramani
Abstract: Cloud computing is one of the most popular techniques in distributed computing which will increase scalability and flexibility in computer processing due to its ability to reduce the cost and time. Cloud Computing presents a distinct way to share resources and services through internet, There are many security issues like authentication, access control, integrity, confidentiality and availability. All the security issues are sensitive but most important issue is authentication. We consider online voting system, its life cycle starts with voter registration, authentication, voting and finally counting stage. The election process is very important and secret process as whole democratic administration is centralized on voting. Authentication, confidentiality, integrity, scalability, speeds and accuracy these are few important criteria to be satisfied by a typical voting system. Authentication can be considered as the most critical issue among all the above mentioned criteria. So the voters should be kept at the highest priority to make the voting process fair and effective. Through some of the literature that deal with the issue of authentication mechanisms, Authentication as a service in cloud using biometric data from a fuzzy perspective method conceals the original biometric template such that it is impossible to recover the biometric template even when the stored data in the system is open to an attacker. We assess the system with Relativity Matrix between Security requirements, issues, techniques and Mechanisms.
Keywords: Authentication; cloud security; fuzzy commitment; online voting system.
An Empirical Study on Customer Adoption of Mobile Payment Application in India
by James Joseph, Sriram K V, Lewlyn L. R. Rodrigues, Asish Oommen Mathew, Gana K C
Abstract: Digital economy is becoming a reality. Business all over the world is moving towards digital platform and so is the payment option. Mobile application is becoming one of the easiest and fastest option for making payments and is predicted to have a very large potential in the days to come.This paper discusses the customer adoption of mobile payment application. The study reveals that the factors like Usefulness, Pervasiveness, Ease of Use, Offers & Cash back and Service assume a vital role in encouraging adoption of mobile payment applications. Results show customers have greater preference towards mobile payment applications over the mobile web browsers, which is a clear sign of awareness among the customers. The study also showed that teenagers are more aggressive in embracing mobile payment application than the older age groups.Compared to other modes of payments, mobile payment with 14.5% preference among customers is low and there is a need for aggressive promotions and marketing campaigns. The study throws light into the customer adoption factors which can act as guidelines for improving customer adoption and awareness of mobile payment applications.
Keywords: Mobile Payment Application;Customer adoption; Smart Phone; Merchant Acquisition; Digital Payment; Ease of Use; Usefulness; Service.
AN EFFICIENT PROTOCOL FOR POWER CONSUMPTION IN WIRELESS ENTERPRISE ADHOC VIRTUAL COMMUNITY NETWORK WITH TRISO FRAMEWORK
by Manivannan Ramanathan
Abstract: Todays global technology has various security treats which made the identity protection essential among users for establishing communication over internet. Generally these identity protecting network were well known as anonymous communication networks. Mix networks are multistage systems which provide efficient mechanisms for anonymous communication over internet. According to which these networks have various traffic analysis attacks which need to compromise the identities of users. The major objective of this paper is to present a diversity mix techniques against traffic analysis attacks, disclosure attack and spam attack. In this work, we propose traffic re-allocation which involves in varying the size as well as number of messages in the network. By means of enabling this bursting and blending of messages among the network nodes the attacker get confused with the varied message count and sizes. The performance of our proposed work is examined against the three attacks in order to check its security and anonymity. The obtained result proves the effectiveness of our proposed techniques.
Keywords: Mix networks; Disclosure attacks; Spam Attack; Traffic analysis attacks; Burst Mix and Blend Mix.
IMPACT OF TALENT MANAGEMENT PRACTICES ON EMPLOYEE RETENTION AN EMPIRICAL STUDY IN SELECT IT COMPANIES WITH SPECIAL REFERENCE TO CHENNAI
by RAVISHANKAR Sathasivam, S. KUPPUSAMY
Abstract: The major worldwide corporations have been rising to the challenge that the talent management is more complicated and entangled. This study is mainly emphasized on the success of organization due to obtain talent management and also retain the talent employees in the best way of highlighting selected IT companies. The aim of this research is mainly spotlight on retain the employees by the way of managing their talent in selected IT companies. The sample size has been taken as 150 by using simple random basis. For proofing the hypotheses setting, percentage analysis, mean score analysis, Anova analysis, Chi-square analysis and Correlation analysis have been used in this research. This study also emphasized regarding the employees are benefited and more equipped with the programmes related to talent management. And also in this research, the additional calculations are revealed the understanding of the programs helps to retain the employees. The analysis mainly focused that majority of the respondents are satisfied with the result of this program. Nearly all the employees stated that the programs related to talent management are enhancing the good working output and also decrease the employee turnover in the organization. The majority of the respondents are highly satisfied towards the talent management program helps to show out the strength and weakness of the employees.
Keywords: Talent Management Practices; IT companies; Retention; Satisfaction.