PARTICULAR
|
Page No.
|
A Study on the Job Stress in Association with Personal Attributes of University Employees in Nepal. Dr. Shyam Bahadur Katuwal
Abstract:
The study attempts to examine the association of the perceived job stress with some demographic, economic and job attributes of the university employees in Nepal. The analysis of data collected from the sample of 44 employees of both teaching and administrative group reveals that teaching faculties were performing their job with comparatively greater level of job stress than the administrative counterparts were. Overall, the study reveals negligible presence of respondents in high and low level of perceived job stress group (i.e one in high and two in low stressed group), indicating heavy concentration of employees (41 persons) in moderate level of stress. It indicates that the university may be converted into the dangerous zone of job stress prone behaviors of employees unless it has been managed properly in right time. Download full Length Paper......
|
1-23
|
A Comparative study of the Relationships between Multiple Intelligences and General Self Efficacy among Public and Private Organizations in Maragheh. Mohammad Reza Noruzi and Gholam Reza Rahimi
Abstract:
Multiple Intelligences is closely related to the organizational affairs. By developing Multiple Intelligences and studying its effects on General Self-Efficacy we will have employees more compatible in every sophisticated and complicated issue. By investigating these kinds of relationships, managers will consider the importance of multiple intelligences and general Self Efficacy. This paper will review the literature of both in general because of its importance.
Download full Length Paper......
|
24-39
|
A Study Towards Overcoming Employee Resistance Towards TIMESHEET. B. Koteswara Rao Naik and M. Kameshwara Rao
Abstract:
The monetary value of any project is intrinsically linked to the use of time, and also to the management accounting process. Utilizing the time efficiently equates with producing much surplus and profits as possible. The point is not to grow a business, but rather to grow it into a rewarding one, for which the business needs strong firm foundation, inspirational motives, strategy to associate and execute. The implementation of an electronic timesheet can streamline the business process, cut down on administrative time, gaining grounds on accuracy and efficiency by integrating with HR leaders, accounting and payroll systems. But timesheets don't get the attention they deserve..Approximately 150 users in a leading commercial vehicle manufacturing company were given access for this web timesheet application to login their efforts towards their project. But within two quarters of its implementation, a decline has been observed in number of users of time sheet. This study has been aimed to find the rationale as to why there is resistance from the employees towards filling timesheet, by employing a quantitative research method. What emerged from the Pearson co-efficient correlation, will throw light on the positives of timesheet, most probable reasons for the employee�s resistance and the correlation between the various factors that leads to the resistance. Download full Length Paper......
|
40-55
|
An Integrated Cryptographic Algorithm based on Biometric Features. S. Sathyavathi and P. Krishnakumari
Abstract:
Biometric cryptography is a technique using biometric features to encrypt the data which can improve the security of the encrypted data and can overcome the shortcomings of the traditional cryptography. Biometric features are integrated with the cryptographic techniques for better security and authentication. The proposed work concentrates on the integration of the retinal biometric features with the cryptographic techniques. Reed-Solomon (RS) error correcting algorithm is employed directly to encrypt and decrypt the data. The encrypted data generated using RS code is added to the retinal feature to obtain more secured encrypted data. To decrypt the data, the encrypted data is subtracted from retinal features to get the original data. The performance of the proposed approach is compared with the existing Iris features and the experimental results shows that FAR (False Acceptance Ratio) and FRR (False Rejection Ratio) of the proposed system has been very much reduced. In future, Multimodal Biometrics can be implemented and their performance measures like Failure to Enroll, System throughput and fraud prevention level can be estimated. Download full Length Paper......
|
56-71
|
An Efficient Model to Improve Software Development Process and Quality Assurance. Mr. Ajay Jangra and Mr. Sachin Gupta
Abstract:
Software Process Improvement is a systematic approach and continuous improvement of software development organization's ability to produce and deliver quality software within time and budget constraints. This paper work concentrates on improvement in process as well as in organization so as to assure a quality product. The paper covers assessment, software process improvement, factors that influence the software process improvement. The aim is to develop a model which would be useful in practice for software development companies. It describes how this model can be used to guide software organizations in process improvement in a way to find out the problems in current process and then also give solution to the problem which can give guarantee of quality. We can say that this technique is the replacement of existed standards like CMM, Ideal model, etc which work is just to give a stamp but not to solve. Download full Length Paper......
|
72-89
|
Reliability Prediction of Fault-Tolerant Multicomputer Interconnection Networks. N. K. Barpanda, R. K. Dash and C. R. Tripathy
Abstract:
This paper proposes a new method to identify all the maximal incomplete sub cubes present in a faulty cube taking maximum fault tolerance level i.e. number of faulty nodes is equal to the system dimension. The procedure is a distributed one, as every healthy node next to a failed one performs the same procedure independently and concurrently. Then the reliability expression for the maximal incomplete sub cube is derived. This method is well supported by an efficient algorithm which runs polynomially. The proposed method is found to be simple, general and efficient and thus is applicable to all the cube based topologies. The reliability of some important cube based topologies are evaluated and compared under the same condition. Download full Length Paper......
|
90-109
|
The Moderating Role of Supporting Technology on the Relationship between Firm Integration and Supply Chain Orientation: An Emperical Investigation of Consumer Goods Industry in South Sumatera Indonesia. Inda Sukati, Abu Bakar Abdul Hamid, Rohaizat Baharun and Huam Hon Tat
Abstract:
The purpose of this research is to present the relationship between firm integration and supply chain orientation and supporting technology as moderating that relationship. The data collection instrument used was a questionnaire which was administrated to a total sample of 400 executive officers, directors, presidents, vice presidents, managers, and senior staff in fourteen South Sumatra areas. The response rate was 71% while 62% was usable questionnaires. Sample selection was based on convenience sampling. The data were analyzed using mean, standard deviation and correlation between independent and dependent variables. The analyses involved statistical methods such as reliability and validity tests and multiple regressions. The results indicated that internal firm integration is related to customer orientation, competitor orientation, supplier orientation and logistic orientation. Firm-supplier integration is related to logistic orientation, operation orientation and value chain coordination. Firm-customer integration is also found to be related to all supply chain orientation components. Download full Length Paper......
|
110-142
|
Searching and Integrating Query Interfaces using Domain Ontology. Anuradha and A. K. Sharma
Abstract:
In addition to billions of Web pages indexed by search engines, the Web also contains a large number of databases whose contents is 500 times larger than Surface Web and are only accessible through query interfaces. This type of web is known as Hidden Web. Its content is out of reach of traditional search engines and its growth is increasing at extraordinary rate. To search the hidden web data, one has to fill these HTML forms manually. That�s why Search query interfaces are considered as entrance to Hidden web databases. So, to explore the Hidden Web, we must explore its entrance first. Many different integration solutions have been proposed so far. This paper proposes a technique to detect and construct an integrated query interface that integrates a set of web interfaces over a given domain of interest. This interface is used to fire the queries over various search interfaces of hidden web sites. The proposed strategy does that by focusing the crawl on a given topic i.e by wisely looking at domain ontology which leads to pages that contain domain specific search forms. Download full Length Paper......
|
143-161
|
Identification of Paraphrasing in the context of Plagiarism. Nidhi Kushwaha, Deepak Kumar and Dr. P. R. Gupta
Abstract:
Paraphrasing is a very important form of processing for natural language processing (NLP). A
characteristic property of natural language is that various expressions can exist to expre
ss a single concept. The aim of this project is to generate and identify the paraphra
se which is type of plagiarism. For this firstly pre-processing of the text is necessary after tha
t with the knowledge of their synonyms & related words generation of multiple text Natural language Generation with the help of WordNet (online dictionary) and Simp
leNLG ( NLG) is necessary for generating the paraphrase texts from a single text. That me
ans we have an original text and it�s possible paraphrase texts to check the submitted paragraph is semantically similar or not. Download full Length Paper......
|
162-175
|
An efficient implementation of Triple DES (Data Encryption Standard) through Hash function. N. Venkatesan
Abstract:
Cryptography, being one of the techniques that is handed out for securing a network. It is utilized by implementing many different algorithms. DES (Data Encryption Standard) is one of the most popular algorithms. But a network implementing DES can be attacked. Hence Triple DES and AES (Advanced Encryption Standard) were formulated to overcome some of the shortcomings of DES. Even then loop holes were found in Triple DES too. In order to plug these loop holes, the new approach Triple DES in a secured way by injecting message digest to it. This paper uses the conventional EDE (Encryption Decryption Encryption) technique as used in triple DES. With the help of two keys transmission, network itself processes with three keys each of 56 bits in length internally and also describes the effectiveness of new approach. Download full Length Paper......
|
176-200
|
Health Education and Quality of Life: The Santal Community in Bengal. DR. SHARMISTHA BHATTACHARJEE
Abstract:
The Santals of Bengal are a Scheduled Tribe. The tribe is characterized by a clan �lineage based segmentary social system. The interpersonal and intergroup relationships of the people are primarily based on their kinship status. Kinship plays a dominant role in material transactions. The clans are autonomous yet complementary to one another. Households are the primary production and consumption units of the Santal. But agricultural and most other productive activities of the individual households are tied to the socio-political and ritual institutions of the village community. The people do not perceive any social stratification among them; ideologically they are egalitarian. They are partilineal and patrilocal. Monogamy is the rule among the Santal. Women have freedom to choose their partners. There is also a custom of bride-price among these people. This paper attempts to throw light on the Santal community in India focusing on the parameter of health, education and standard of living. Download full Length Paper......
|
201-218
|
Police observations of the durable and temporary spatial division of residential burglary. M. Vijaya Kumar and Dr. C. Chandrasekar
Abstract:
This paper seeks to explore police perception of the spatial distribution of residential burglary over different time periods. Using a survey of police department across three police basic command units (BCUs), it examines the accuracy of their impressions of the locations of crime over the preceding year and the preceding two weeks. It also explores how these perceptions might affect the deployment of resources and police action. The results suggest that at the same time as police have a good idea of where burglary occurred over the preceding year, they are less accurate for the recent distribution of risk because temporary hotspots are indeed significantly more unstable than durable hotspots. The temporary predictive power of both one-year and two-week retrospective observations is very limited. Tactical advantages will only be afforded by the swift and routine identification of emerging temporary hotspots. Download full Length Paper......
|
219-240
|
Frequency Control in Interconnected A.C. Systems through HVDC Link Using Artificial Intelligence. Dr. Anil Kumar Sharma and Dr. G. K. Joshi
Abstract:
The Load frequency control in HVDC system has gained importance with the growth of interconnected systems. Hence greater reliance is being placed on the use of special control aids to enhance system security, facilities and economical design, and to provide greater flexibility of the system operation. Hence the need for bulk power transmission has shifted the interest to the HVDC transmission system viz-a-viz the EHV-AC system. Further it possesses the art of smart and useful application of controlled rectifiers and inverters. The controlled inverter operation can successfully modulate the power flow in HVDC link, leading to fulfillment of power demand in A.C. network, caused by sudden rise in loads. This in turn enables the restoration of power frequency in A.C. network. Due to frequent sudden loading and unloading of A.C. networks the frequency in the network continues to be always away from standard power frequency value. In this paper we have developed a controller which maintains the power frequency in A.C. network. Download full Length Paper......
|
241-255
|
Challenges and the Future Perspectives of labor Related Issues in Internationalization. Farhad Nezhad Haji Ali Irani, Sirous Fakhimi-Azar and Mohammad Reza Noruzi
Abstract:
Multinational corporations manufacture products in many countries and sell to consumers
around the world. Money, technology and raw materials move ever more swiftly across national borders. Along with products and finances, ideas and cultures circulate more freely. As a result, laws, economies, and social movements are forming at the international level (Global Policy Forum, 2011). This paper aims to study some effects of labor related issues in globalization in general. Download full Length Paper......
|
256-271
|
WOMEN EMPOWERMENT THROUGH COOPERATIVE DAIRYING IN UTTAR PRADESH
DR. KAUSHAL KISHORE SHUKLA
Abstract:
Multinational corporations manufacture products in many countries and sell to consumers around the world.
Money, technology and raw materials move ever more swiftly across national borders. Along with products and finances,
ideas and cultures circulate more freely. As a result,
laws, economies, and social movements are forming at the international
level (Global Policy Forum, 2011). This paper aims to study some effects of labor
related issues in globalization in general. Download full Length Paper......
|
272-276
|
Physics Education: Scope and Career
Sarveshwar Kasarla
Abstract:
Students offer Physics as one of the majar subject in Science discipline to plan and
develop theircareer.In India the university curriculum offers three majar subjects at
graduation level.Few Universities offer Honourary programs for few subjects.This article
mainly deals with the Scope of the Physics subject and Career opportunites after graduation.
Download full Length Paper......
|
277-282
|