International Journal of Enterprise Network Management (31 papers in press)
Experimental Study on the Influence of Fiber Surface Treatments and Coconut shell Powder addition on the Compressive strength, Hardness and Tribological properties of Sisal fiber-Natural Rubber Composites.
by Gopakumar R Nair, Rajesh R
Abstract: In the contemporary age of global imbalance and disasters, toxic wastes and their waste disposal is a major concern for the humankind. Development and utilization of natural materials as a viable replacement for synthetic materials in product design and development is the only long-term solution for this problem. This work aims to design and develop an elastomer composite material using 100% natural materials only- natural rubber composite reinforced with sisal fibers with improved tribological and compressive properties. Since rubber products are widely applied in industries and automotive parts, the developed material can find its place in elastomer components. A total of six composites are made with sisal natural fibers subjected to various surface modifications as reinforcement and a 10%w/w coconut shell powder as fillers in a natural rubber matrix. Sisal fibers used are raw fiber, Alkalized fibers, rubber pre-impregnated raw fibers and Rubber Pre-impregnated Alkalized fiber. The specimens are tested for wear resistance, compressive strength and hardness. It is found that sisal is a good reinforcement for enhancing the above properties of natural rubber. Maximum wear resistance exhibited by the Alkalized pre-impregnated Sisal-Rubber composite, followed by raw pre-impregnated-Coconut shell powder-Rubber Composite. The hardness of the composites Raw Sisal-Rubber and Raw Pre-impregnated improved by 228% than pure rubber (25 Shore A). Compressive strengths also improved to a notable level. The Composite raw Sisal-Coconut Shell powder-Rubber has the best compressive strength.
Keywords: Natural Rubber; Sisal fibers; Elastomer Composite; Hardness; Tribology; Compressive Strength; Bushes.
Combined Economic and Emission Dispatch using Whale Optimization Algorithm (WOA)
by Faseela C K, H. Vennila
Abstract: This paper highlight the use of latest Whale Optimization meta heuristic algorithm for solving economic dispatch problem efficiently. This is used to solve the combined economic and emission dispatch problems for standard 3 generators system and 30 bus IEEE system. The Whale Optimization algorithm was found to provide optimum results with easy convergence in comparison with other algorithms like PSO algorithm. Fuel cost and emission costs are combined to derive better result for economic dispatch.
For checking the effectiveness of the algorithm, the results obtained using the same are compared with the results of Particle Swarm Optimization (PSO) and analyzed the same against minimum generation cost and easy convergence. The results are found to be excellent for the systems considered.
Keywords: Particle Swan Optimization (PSO), Whale Optimization Algorithm (WOA), Economic and Emission Dispatch (EED), optimum, solution, fuel cost, emission cost, optimization methodology
Design and analysis of compact T shape slotted patch antenna for 4G WiMAX applications
by T.K. Sreeja, J. Jayakumari
Abstract: A novel single band microstrip patch antenna design is introduced for WiMAX/LTE applications. The proposed antenna has a compact size of 2.7 × 4.5 × 0.076 cm3 and produces the gain of 5.47-8 dBi around the operational band. The antenna consists of T-shaped patch and coaxial feed method is used. This paper presents the antenna design along with the simulated and measured results. Design optimisation and simulation processes are investigated with the help of the Agilent advanced design system electromagnetic simulator that operates based on the numerical technique full-wave method of moment (MoM). The fabricated coaxial feed patch antenna is tested and measured by using spectrum analyser.
Keywords: 4G antenna; microstrip antenna; MSA; ADS; WiMAX; LTE.
From a literature review to a conceptual framework for affordable quality healthcare service using internet of things (IOT) network
by Sanjana Mohapatra, Ajit Kumar, Sanjay Mohapatra
Abstract: There has been significant interest in integration of internet of things (IOT) and healthcare both in academic and the corporate world. This can be seen from the fact by the number of conferences held and number of special issues in journals that have been published. To establish further in this domain, the purpose of this research is two-fold. First it does literature review in healthcare and IOT from 151 papers published from 1998 to 2016. Second, it summarises findings from literature review in two parts. In the first part, it identifies the antecedents that impact both affordable quality healthcare and developing an enterprise network for IOT. In the second part, it integrates factors that affect both affordable healthcares with IOT. The results of this research will be useful for both practitioners and academicians as the paper discusses how to design a IOT based healthcare network that will reduce cost of healthcare while preventing chronic diseases. The paper also shows the limitations of the present research while describing stimuli for further research.
Keywords: internet of things; IOT; affordable healthcare; conceptual framework.
Inventory parameters for a serial supply chain with lost sales through genetic algorithm approach
by R. Rajasekaran, A. Pal Pandi, P.V. Rajendra Sethupathi, R. Rajesh
Abstract: Supply chain is a network of facilities with varying conflicting objectives and decision making is a complex process. The uncertainty in demand increases complexity in inventory control mechanism. Backordering, partial backordering and lost-sales are considered in the inventory management to characterise the excess demand. In the present competitive scenario, mostly consumers have no patience to wait and show urgency to buy their goods failing which the management has to meet a huge loss of supply chain members and hence the profit. There are very few research works regarding lost-sales parameter in the area of multi-echelon inventory systems. It is felt that the proposed modified gene-wise genetic algorithm (MGGA) supply chain model which so far not applied in this process may help to determine best base stock levels and review periods with lost sales particularly at retailer end which minimised total supply chain cost.
Keywords: inventory management; genetic algorithm; supply chain model; lost sales.
A meta-heuristic, moth inspired algorithm for combined economic and environmental power dispatch
by N. Mustafa, H. Vennila
Abstract: The problem of deciding the contribution of each generator in a power system is complex. Where some generators are more cost effective, others have cleaner operation. Right choice of generators could save thousands of dollars in operating cost or prevent release of several tons of noxious fumes like NO2 and SO2 annually. Rising complexity of modern power systems and special efficiency improvement methods like valve point loading, demand newer means to find this vital balance between cost and emission. This paper aims to find a solution to this problem by the use of an algorithm inspired by the flight pattern of moths. Like a moth drawn to a flame, this algorithm seeks to minimise both cost as well as emission. The standard IEEE 30 bus test system is considered as the control case and the results obtained are compared with other such algorithms to demonstrate the effectiveness of MFO.
Keywords: economic dispatch; emission dispatch; valve point loading; moth flame optimisation; MFO.
Cloud computing and engineering in the academics with its potentialities in iSchools: an eco friendly development
by Prantosh K. Paul, R. Rajesh
Abstract: Cloud computing is a kind of architecture deals with the principles of virtualisation and also promote online computing platform as well as services. Tools of the information technology such as monitor, printers, databases, other applications and packages come under the preview of cloud computing. It is also considered as a cloud platform along with cloud architecture. This helps cost saving due to less software, hardware, and IT packages in the in-house settings. Cloud computing also promotes side by side the online availability. Moreover cloud computing saves initial cost as it is offered by third party and thus seeks no need to connect to the service or cloud provider. In cloud computing, internet plays an important role for converged hardware, software and IT applications. Cloud computing has healthy potentialities in iSchools as such academic units are offered academic programs on information and computing related domains. The paper presented the overview on cloud computing and its features with potentialities of the domain in iSchools and allied branches.
Keywords: cloud computing; green computing; virtualisation; academics; MSc; BSc; emerging degrees; iSchools; information sciences.
Special Issue on: TAMMIE Advances in Supply Chain Operations in Emerging Economies
MODELING AND ANALYSIS OF A FOUR STAGE SUPPLY CHAIN UNDER FUZZY ENVIRONMENT
by Hemalatha Somireddi, Narayana Rao Kandukuri, Ramababu Govada, Venkata Subbaiah
Abstract: In todays competitive arena the success of supply chain depends on its managerial ability to integrate and coordinate all stages of the supply chain. The supply chain predominantly consists of four stages in a typical industry, namely: suppliers, manufacturing plants, warehouses, and retailers. Supply chain shall be viewed as multi objective decision making problem. The objectives include minimization of cost at suppliers, plants, warehouses and retailers. Fuzzy goal programming approach is useful to solve multi objective decision making problems. In this paper, the multiple objectives of the supply chain are aggregated using Werners compensation operator (γ) and compromise solutions on the decisions of the supply chain is arrived. Risk analysis is performed over the optimized model and the effect of uncertainty in terms of increase in suppliers price is studied. Fuzzy goal programming model was solved using LINGO 8 software.
Keywords: supply chain; Multi-objective programming; Fuzzy logic.
LEAN MANAGEMENT PLANNING IN INDIAN CEMENT INDUSTRIES AND ITS EFFECT ON INDUSTRIAL PSYCHOLOGY
by B.T.D. Praveen Varma, Dalveer Singh
Abstract: Cement industries are one of the growing large scale industries which play as a backbone for developing countries. This paper discuss about the analysis of losses and wastage in cement manufacturing process and its rectification using lean tools and methodology mathematically. Employees psychology varies with every new management planning, so psychology towards new lean management planning is also analysed through Questioner to correlate lean management planning satisfaction to stress, job satisfaction, and safety improvement individually using Karl Pearson correlation in SPSS software. The data has been collected from various cement industries at each stage and analysed. Lean management planning resulted in reduction of wastage in transportation of mining, over processing and increase in efficiency of separator in grinding mills, kiln quality control, packing plant efficiency improvement. The correlation analysis also resulted in stress reduction, improvement in job satisfaction and safety conditions with new lean management planning. Finally the result concludes that new lean management planning has positive correlation with the employees psychology.
Keywords: Lean tools; Karl Pearson correlation; SPSS analysis; organisational culture.
ELEMENTS OF A COMPUTER AIDED EMERGENCY MANAGEMENT SYSTEM
by N.M. Sivaram
Abstract: Past and recent disasters, both man made (technological) and natural (non-technological) have produced innumerable casualties and unimaginable harm to life and property. Though the management of factories and the authorities has responded to the challenge and introduced number of measures to minimize the hazards, the real fact is that accident cannot be completely eliminated. For this purpose, it is necessary to prepare an emergency preparedness plan for every administrative or industrial area by the competent authorities. With the help of computer simulation models, knowledge of chemicals; its behavior and availability of input data, it is possible to predict the area affected under different emergency scenarios. Keeping in view the plotting requirement along with linkages of various databases, it has been considered appropriate to use Computer Aided Emergency Management System for effective mitigation and response during an industrial disaster. This paper proposes a composition of a Computer Aided Emergency Management System.
Keywords: Industrial Disaster; Emergency Preparedness; Computer Aided Emergency Management System.
Multi-Objective Optimization for the Vehicle Routing Problem Using Metaheuristics
by Sonu Rajak, P. Parthiban, R. Dhanalakshmi, Sujith S
Abstract: The Capacitated Vehicle Routing Problem is a combinatorial optimization problem that determines a set of routes of minimum distance to deliver the goods, using a fleet of identical vehicles with restricted capacity. The objective of this article it to optimize the total distance required to deliver the goods and also the workload imbalance in terms of distances travelled by the vehicles and their loads. Due to the combinatorial in nature, it requires metaheuristic to solve these types of problems and this is a rapidly growing field of research. Here two metaheuristics such as Ant Colony Optimization (ACO) and Simulated Annealing (SA) are proposed and analyzed for solving this multi-objective formulation of the Vehicle Routing Problem. The results obtained from these two methods were compared and found that the ACO gives better results than the SA for the VRP.
Keywords: Vehicle Routing Problem; K-means Clustering Algorithm; Simulated Annealing; Ant Colony Optimization.
ANALYSIS OF LEAN MANUFACTURING IN AN AUTOMOBILE INDUSTRY A CASE STUDY
by Mahendran Subramanian, Senthil Kumar A, Jeyapaul R
Abstract: The automobile industries are more competitive and customer demand is volatile. The customers are willing to buy the product at low cost with high quality. So common principle is created to reduce the wastage and increase the efficiency of the industry. Lean manufacturing is the best principle to adopt the manufacturing industry. The main aim of this project is reduce the wastage, cost and increase the productivity of the industry. Using lean tools jit, kanban, value stream mapping (current and future state) and man machine chart (current and future) for reduce wastage and cost. In current state value stream map, the waste area is identified. Finally, non value added time is reduced to 28.7 %. The value added time is reduced to 27.84%. The percentage value addition is increased from 3.25% to 3.29%, the total inventory is reduced to 25.07% and man machine ratio is improved as 1.52: 1.26.
Keywords: value stream mapping; man machine chart; 5s; jit; value addition; value added time; non value added time; man machine ratio; kanban; automobile industry.
FRAME WORK OF CONCEPTUAL MODEL FOR QUALITY MANANGEMENT IN SMALL AND MEDIUM ENTERPRISES (SME)
by Gopinath S, Alagu Sundaram VR, Sheshathri R, Narashiman K
Abstract: SME are the backbone of this developing economy, a pushing force the economies all over the globe involving a large workforce. The development of SMEs in todays concept stands for the improvement in Quality. This study aims to explore the quality system adopted by some SMEs. Several studies were done on the factors acting as an obstacle or risk in implementing the quality system, which directly affect the total efficiency of the SME.The results of the study indicated few critical factors of quality which were not given importance in the organization. For sustaining their competitiveness, they have to implement some of the quality systems and embrace quality management techniques efficiently. In this paper the conceptual model is suggested to enhance the quality system in SME to improve the Gross Domestic Product.
Keywords: Quality risk; SME Small and Medium Enterprises; QM quality management; GDP Gross Domestic Product.
A Case Study on Hazard Evaluation on Catering Service in Educational Institution
by Kanaga Sundara Satishwaran K, Sivasubramanian M, Aravind Raj Sakthivel
Abstract: Hazard Evaluation plays a decisive role in the Catering Service. In order to intensify the Safety of the Catering Service, a Hazard Assessment and its Evaluation is conducted in educational institution. Safety Audit is a formal procedure for assessment of the accident potential and expected safety performance for any service or system. Safety Audit is being performed with appropriate checklists including Occupational Hygiene, Worker Safety, Storage & Handling and General working conditions. Fault Tree Analysis (FTA) is a method that directly focuses on the modes of failure. This paper presents FTA for chance of fire accident due to leakage of Liquefied Petroleum Gas (LPG) in storage yard of Catering Service. Correlation and Regression Analysis were used to get the lines of regression in order to place it in Normal Distribution. The probability of fire accident due to leakage of LPG is being calculated and substantial suggestions are provided.
Keywords: Safety Audit; Fault Tree Analysis; Catering Service; Educational Institution.
SELECTION OF SUPPLIERS USING SWARA AND COPRAS-G
by Rajesh G, Malliga P
Abstract: In order to optimize a supply chain, the effective management of suppliers plays a key role. Firms seeking competitive advantage are participating in cooperative supply chain arrangements, such as strategic partnerships, which combine their individual strengths and unique resources. Supplier selection is a multicriteria decision making problem which includes both qualitative and quantitative factors. In the present scenario environmental criteria should also be given due importance, this further increases the challenge of supplier selection. Generally, decision makers judgments are often uncertain and cannot be estimated by an exact numerical value. The grey systems theory is a powerful tool to deal with uncertain information. This paper presents a structured model for evaluation and selection of strategic supplier. Stepwise Weight Assessment Ratio Analysis (SWARA) is applied to decision making in order to calculate the relative importance of the criteria. The COmplex PRoportional ASsessment of alternatives with Grey relations (COPRAS-G) method is used for supplier evaluation and selection of strategic supplier. A case study is presented to demonstrate the applicability of the proposed model to select a strategic green supplier.
Keywords: strategic supplier selection; complex proportional assessment of alternatives with grey relations; COPRAS-G;stepwise Weight Assessment Ratio Analysis; SWARA; MCDM; Green supplier selection.
Special Issue on: Enterprise Network Management Technologies and Tools for E-commerce, Mobile Commerce and Social Commerce Frameworks
Entropy a new measure to gauge search engine optimization
by Batri Krishnan
Abstract: This article tries to analyze, and measure the uncertainty associated with the relevant document selection in web-search engines. The web-search engines process, organize the web-documents based on their index term's occurrence frequency. The number of index terms, and their occurrence frequency influences the relevance calculation. The variation in term frequency either in processed web documents or in users' query influences the relevance calculation. This leads to an uncertainty associated with the document selection, and its relevance calculation. In this article, we proposed a new measure called Entropy, to calculate the uncertainty associated with the document selection. The Entropy can be measured by varying the documents' term frequency or user's query term frequency. As the web documents can't be changed, we used variation in user's query term frequency to measure the uncertainty associated with the document selection in web-search engines. The experiments are conducted on two search engines namely 'Google', and 'Bing'. The query's term frequency is varied and given to the search engines. Based on our proposed method, the uncertainty is calculated for the search engines. The high Entropy value indicates the high uncertainty associated with the document selection. The high uncertainty gives scope for search engine optimization. From the high uncertainty search engines, we can extract more relevant documents. It can be used as a performance indicator.
Keywords: web search engines; uncertainty; entropy; document selection; Google; Bing; Search Engine optimization.
Classification Approach to Avoid Link Failures in Wireless Sensor Networks in Mobile Virtual communities and teleworking
by Manthandi Periannasamy Subramanian
Abstract: Security issues are the primary issues in Wireless Sensor Networks (WSN) due to its large network coverage and number of nodes. The attackers in WSN attack the particular node which has low energy level and converts this node into malicious node. The formation of malicious node is the primary reason for link failures between nodes. This paper proposes an efficient methodology to detect the malicious nodes in WSN using feed forward back propagation neural netwok classifier. This classifier differentiates the malicious node from trusty node based on the extracted features of the test node. The performance of the proposed malicious node detection system is analyzed interms of detection rate, Packet Delivery Ratio (PDR) and latency. The experimental results are compared with state-of-art methods
Keywords: Security; malicious nodes; features; PDR; link failures.
Wireless system for flight safety industry
by Kavitha V
Abstract: Many parameters can be measured and stored in the black box. The details stored in the black box are essential for the analysis of causes of the accident. In the formal black box, data is stored and it can be retrieved only after the identification of black box after crash. So it is very difficult to identify the exact location of the black box after a crash. Many leading officials and famous personalities died in air crashes and it takes a lot of time to identify the location of crash. It leads to wastage of money and time. Saving human life is the basic nature of humanity. In this article, black box data is transmitted to an earth station. The details are updated to the base station through wireless medium. It is transmitted to selected base stations by calculating the shortest path between them using ad hoc algorithm. Ad hoc algorithm is a multi hop network algorithm which switches to various stations by calculating its distance. Thus black box data is updated to base station wirelessly using ad hoc algorithm.
Keywords: Flight data recorder; Ad hoc algorithm; wireless communication; black box; on board data.
SaaS Multitenant Performance Testing Over Social Networks
by Parthiban M
Abstract: Recent years, cloud computing is description for facilitating suitable on-demand network access. In cloud, computing multi-tenancy plays a significant role on software as a service (SaaS). Structure of SaaS multi-tenant cloud aware applications initiates several new challenges the central one being a tenant. In cloud testing, tenant applications need to be tested in addition to performance testing be used. At the same time as numerous performance-testing techniques exist; most of them produce only fixed progressions of test configurations. This paper focuses on the challenges for Multi-tenancy testing in SaaS and analyses the configuration dynamically in which SaaS testing differs from testing conventional applications. The paper proposes performance testing and fittest function of each tenant. For fitness function, GASE algorithm is used which combines a Genetic algorithm and a Symbolic execution. This proposed algorithm uses the above performance testing values for obtaining the best of each tenant, in the form of fitness generations. A real experimentation is proposed using a multiple tenants on Open Stack cloud computing environment over Social networks.
Keywords: SaaS Cloud; Multi-tenant Testing; Software Testing; Performance Testing; Fitness Generations.
An Anomaly-based Network Intrusion Detection System using Ensemble Clustering
by Jackins V
Abstract: Due to the rapidly increasing use of internet services and computer applications all over the world, the numbers of hacking and intrusion incidents are increasing year on year as technology rolls out. Therefore, Intrusion Detection Systems (IDS) are the prime need in todays scenario . Misuse detection can detect previously known attacks but cannot detect new types of attacks. To overcome this limitation Anomaly detection techniques are often used and proven to be an effective method. Anomaly detection can make use of unsupervised techniques to identify new types of attacks . In this paper, an unsupervised technique is used for Anomaly detection based on hybrid clustering algorithms. The technique uses two algorithms in order to obtain accurate and high detection rate of attacks.  Incremental Support Vector Machine (ISVM) algorithm is used to preprocess the dataset. After Preprocessing, Fuzzy C Means (FCM) algorithm is adopted to detect the anomalies. FCM algorithm isolates the normal and abnormal data effectively. The processed data is fed to the DBSCAN algorithm for further detection of anomalies. The results of the detection system are communicated to the Intrusion Prevention System (IPS) which is responsible for sharing a suitable response to an anomalous request. The proposed hybrid algorithm is applied for KDD Cup 1999 dataset, Gure Kdd Cup data base (2008) and the results shows high detection rates and low false positive alarms. Further, the technique is tested with a real time data and it is observed that a high detection rate of anomalies with enhanced true positive rate.
Keywords: Intrusion Detection System (IDS); Intrusion Prevention System (IPS).
Power Efficient Digital Circuits for ECG Front End Data Acquisition Mobile System
by Sasi Kala
Abstract: The electrical motion of the heart is characterized by the ECG signal. ECG elucidation can be used to detect the heart syndrome. This technology has an efficient diagnostic tool, due to the high regard of portable electronic products, low power system has fascinated more consideration in recent years. This work presents digital ECG data acquisition system to diminish the power consumption .In the proposed work, analog block are not used, they convert the input voltage into a digital code by delay lines. This digital architecture is capable of operating with a low supply voltage such as 0.3 V and 0.1 V. In this architecture analog blocks such as low-noise amplifier (LNA) and filters are not used. A digital feedback loop is employed to cancel the impact of the dc offset on the circuit, which eliminates the requirements for coupling capacitors. The circuit is implemented in 130nm and 65nm CMOS process. The simulation results illustrate that the front-end circuit of digital architecture for 130nm consumes 18.9pW and 65nm consumes 109pW of power.
Keywords: ECG; analog; digital; acquisition; delay; offset.
Three phase optimization for Qualified and Secured VMs for Resource Allocation
by Dhanya D Aidhan, Arivudainambi D
Abstract: Cloud computing services enable the users to use required computing resources for the required period which thereby permit the users to build a flexible information system. Choosing genuine and secured Virtual Machines (VM) among thousands of virtual machines is one of the main challenges in resource allocation to achieve higher accuracy. In this paper, VM optimization techniques namely match making algorithm, memory aware VM and cuckoo technique is incorporated to select the best and secured virtual machine from cloud. In the proposed technique the first two are combined to select the best VM, where cuckoo is used to provide optimized resources to the finest VM. During the selection of finest VM from above techniques, it is necessary to select secured VMs to achieve an optimum result during resource allocation. To select secured VM, signature based detection and secure counters are employed to analyze network traffic and to monitor the data transactions.
Keywords: Virtual machine; resource allocation; match making algorithm; memory aware scheduling; cuckoo optimization technique.
Determinants of Smartwatch Adoption among IT professionals An Extended UTAUT2 Model for Smartwatch Enterprise
by Kranthi Kumar Alampuri, Asraar Ahmed
Abstract: Smartwatches these days have gained popularity in recent past under wearable device category. The main objective behind this current study is to identify the determinants of smart watch. To accomplish this objective, the present study has employed Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model as its theoretical background. To suit the context the present study has extended UTAUT2 model by incorporating self-efficacy (SEF), personal innovativeness (PINNO), social media influence (SMI), social image (SIMG), aesthetics (AES) and external social influence (ESI). Structural equation modeling is done using Smart PLS 2.0 in order to check the explanatory power in extended UTAUT2 model. The results obtained in this study concludes that the extended UTAUT2 model has a better explanatory power on behavioral intention towards smartwatch adoption. Effect size (f2) and predictive relevance (Q2) for the extended UTAUT2 model are discussed.
Keywords: Unified Theory of Acceptance and Use of Technology (UTAUT2); smartwatch; social image; social media influence; wearable device.
A Framework for Antecedents of Trust in Social Commerce
by Radwan Al-Dwairi, Emad Abu-Shanab, Mohammad Daradkeh
Abstract: Trust is essential in social commerce environment, where consumers rely on feedback and advice that they collect from social platforms. Despite the importance of trust in virtual environments, there are a limited number of studies in this field. Research need to identify the main drivers that establish trust in social commerce domain. To this end, this study reviewed the literature related to trust in social commerce environment and proposed a framework for the antecedents of trust in social commerce. The proposed framework suggests two main components: social networking site and social company. The results supported nine hypotheses out of ten excluding the relationship between perceived-ease-of-use (PEOU) and content quality. Word-of-mouth, communication, perceived ability, after sale service, trust in transaction, and perceived usefulness were found as key factors that significantly impacted trust in social commerce. The model explained 33.2% of the variance in trust in social commerce.
Keywords: Social commerce; trust; web 2.0; social media; ability; after sale service; communication; word-of-mouth.
An Empirical Study on Customer Adoption of Mobile Payment Application in India
by James Joseph, Sriram K V, Lewlyn L. R. Rodrigues, Asish Oommen Mathew, Gana K C
Abstract: Digital economy is becoming a reality. Business all over the world is moving towards digital platform and so is the payment option. Mobile application is becoming one of the easiest and fastest option for making payments and is predicted to have a very large potential in the days to come.This paper discusses the customer adoption of mobile payment application. The study reveals that the factors like Usefulness, Pervasiveness, Ease of Use, Offers & Cash back and Service assume a vital role in encouraging adoption of mobile payment applications. Results show customers have greater preference towards mobile payment applications over the mobile web browsers, which is a clear sign of awareness among the customers. The study also showed that teenagers are more aggressive in embracing mobile payment application than the older age groups.Compared to other modes of payments, mobile payment with 14.5% preference among customers is low and there is a need for aggressive promotions and marketing campaigns. The study throws light into the customer adoption factors which can act as guidelines for improving customer adoption and awareness of mobile payment applications.
Keywords: Mobile Payment Application;Customer adoption; Smart Phone; Merchant Acquisition; Digital Payment; Ease of Use; Usefulness; Service.
Ontology based Effective Information Retrieval from the Social Web Using Concept aware User Profile Construction
by SENTHIL KUMAR PONGALLIAPPAN, Abdul Samath
Abstract: Improved utilization of network based communication enhances the amount of document generation from which discovery and taking back of user needed documents depends upon their requirements is a very complicated task. This could be solved by building the personalized user profile depending on their interest by utilizing which user needed documents that are alike to their inquiry could be got back. In the previous work, Information Retrieval System utilizing Differential Weighting Scheme (IRS-DWS) has been presented that builds the user profile with the point of subjects and recurrent terms exists in the user retrieved documents. On the other hand, this work does not focus on the idea of user queries and take back the documents wherein terms concerned more devoid of thinking the concept. In addition, the previous works do not concentrate on the identical demands from the numerous users where it will process individual user needs only, therefore it will result in more computational overhead. This issue is solved in this work by presenting Improved Information Retrieval System utilizing Cooperative Ontological based User Profile Construction (IIRS-COUPC). In this research work, cooperative ontology based user profile (COUP) is built to take back the documents from diverse ideas that matches with the users demand. In order to make simplicity of document looking for process and merges the numerous users with identical demands, documents clustering (DC) and Query Clustering (QC) is accomplished in this work independently. Lastly, Concept Mapping (CM) is accomplished to take back the documents which matches with the user needs proficiently. The whole assessment of the current research work is accomplished in the java simulation environment from which it is shown that the current research methodologies confirms its improved performance.
Keywords: Keywords--- Information Retrieval; Similarity; Personalized Search; Clustering; Ontology Profile Construction.
THE EFFECTS OF BRAND IMAGE IN PURCHASING OF ONLINE MARKETING AMONG UNIVERSITY STUDENTS
by Amiruddin Ahamat, Muhammad Sham Shahkat Ali, Nor Akmal Nabihah Zahari
Abstract: Today, online marketing is one of the most popular business trends. It has high demand and becomes one of the important tools to market products to the consumers by using the internet. Theres a rapid growth in online marketing over the last 10 years. Various applications were used to attract consumers to use it. In online marketing, brand image of the product was often highlighted. The brand image can give a huge impact to the marketer and the consumer as the buyer of the product. The brand image factor can also motivate consumer in their purchasing decision because the brand image may reflect the product itself. The purpose of this paper is to elaborate the relation between the awareness of a brand and the intention of buying a brand. There were several brand image factors highlighted in this research which is pricing, advertisement, brand name and quality of the product. A quantitative method was used through an online questionnaire in order to prove the factors that can affect the brand image in online marketing among university students. SPSS software was used to analyse and test the reliability and validity of data. Based on the results, several factors were identified as the contributing effect on a brand image which is the price of a product, advertisement of product and the quality of a product. This research was conducted in order to give the reader especially online marketer more information about various factors that can make people attracted to buy a product in online marketing.
Keywords: Online marketing; Brand image; Brand image factors.
Multisite Aggregate Production and Distribution Planning: A Review
by Satya Prakash, Gunjan Soni, Vipul Jain, Gaurav Kumar Bhatodiya, Murari Lal Mittal
Abstract: Increase in the demand of products causes a company to change its manufacturing system from single-plant to multi-plant (or, multi-site) with an objective to gain competitive advantage in the global manufacturing scenario. Multi-site production and distribution (P-D) planning have been studied and practiced by the researchers and practitioners over the past two decades. A good size of literature has been published and trend is continuing. In the light of impact of multi-site manufacturing in gaining commercial advantage in global competition scenario, this review is dedicated to multi-site aggregate production planning (MSAPP) and multi-site aggregate P-D planning (MSAPDP). This review focuses on analyzing the major research gaps and unaddressed areas of MSAPP/MSAPDP. It has been felt that switching from discrete to continuous, and pure mathematical to simulation and agent based models along with consideration of economical and environmental aspects have become very important to effectively deal with real world MSAPP/MSAPDP problems.
Keywords: Supply chain; Multi-site manufacturing; Aggregate production planning; Aggregate P-D planning.
AN EFFICIENT PROTOCOL FOR POWER CONSUMPTION IN WIRELESS ENTERPRISE ADHOC VIRTUAL COMMUNITY NETWORK WITH TRISO FRAMEWORK
by Manivannan Ramanathan
Abstract: Todays global technology has various security treats which made the identity protection essential among users for establishing communication over internet. Generally these identity protecting network were well known as anonymous communication networks. Mix networks are multistage systems which provide efficient mechanisms for anonymous communication over internet. According to which these networks have various traffic analysis attacks which need to compromise the identities of users. The major objective of this paper is to present a diversity mix techniques against traffic analysis attacks, disclosure attack and spam attack. In this work, we propose traffic re-allocation which involves in varying the size as well as number of messages in the network. By means of enabling this bursting and blending of messages among the network nodes the attacker get confused with the varied message count and sizes. The performance of our proposed work is examined against the three attacks in order to check its security and anonymity. The obtained result proves the effectiveness of our proposed techniques.
Keywords: Mix networks; Disclosure attacks; Spam Attack; Traffic analysis attacks; Burst Mix and Blend Mix.
IMPACT OF TALENT MANAGEMENT PRACTICES ON EMPLOYEE RETENTION AN EMPIRICAL STUDY IN SELECT IT COMPANIES WITH SPECIAL REFERENCE TO CHENNAI
by RAVISHANKAR Sathasivam, S. KUPPUSAMY
Abstract: The major worldwide corporations have been rising to the challenge that the talent management is more complicated and entangled. This study is mainly emphasized on the success of organization due to obtain talent management and also retain the talent employees in the best way of highlighting selected IT companies. The aim of this research is mainly spotlight on retain the employees by the way of managing their talent in selected IT companies. The sample size has been taken as 150 by using simple random basis. For proofing the hypotheses setting, percentage analysis, mean score analysis, Anova analysis, Chi-square analysis and Correlation analysis have been used in this research. This study also emphasized regarding the employees are benefited and more equipped with the programmes related to talent management. And also in this research, the additional calculations are revealed the understanding of the programs helps to retain the employees. The analysis mainly focused that majority of the respondents are satisfied with the result of this program. Nearly all the employees stated that the programs related to talent management are enhancing the good working output and also decrease the employee turnover in the organization. The majority of the respondents are highly satisfied towards the talent management program helps to show out the strength and weakness of the employees.
Keywords: Talent Management Practices; IT companies; Retention; Satisfaction.
Authentication as a service in cloud from a fuzzy perspective
by S. Vijayalakshmi, G.R. Karpagam
Abstract: In a cloud based online voting system, the life cycle starts with voter registration, authentication, voting and counting. The election process is a secret process as whole democratic administration is centralised on voting. Authentication, confidentiality, integrity, scalability, speeds and accuracy these are few important criteria to be satisfied by an online voting system. Authentication can be considered as the most critical issue among all the above. So the voters should be kept at the highest priority to make the voting process fair and effective. Through some of the literatures that deal with the issue of authentication mechanisms, the proposed method conceals the original biometric template such that it is impossible to recover the biometric template even when the stored data in the system is open to an attacker. We assess the system with relativity matrix between security requirements, issues, techniques and mechanisms.
Keywords: authentication; cloud security; fuzzy commitment; online voting system.