Manuscripts

Recent Papers

Equity Analysis of Automobile Industry in Indian Stock Market

Every individual always wishes to get a decent return on his/her investments because investor makes the investment from the hard earned savings. Among the various schemes of investment, equity market is considered to be one of the most rewarding avenues even though it involves more risk. Since the risk is very high in equity investment, the investors need to make equity analysis that helps them to know about the risk return characteristics of those equity shares and those industries in which he/she wishes to park the savings. In this outlook a study has been undertaken to analyse the equity shares of companies in automobile industry of Indian stock market. Indian automobile industry is one of the largest in the world and considered to be one of the fastest growing sectors. In order to maintain the growing demand many auto makers have started to invest in this industry. So the study on equity analysis of this industry will help the potential investors in taking informed and rational investment decision. This study is conducted for a period of 5 years, covering from 2012 to 2017. It takes only 50% of the total companies forming NIFTY Auto index as on 21st April 2017. That is 8 companies. From the analysis, it is found that among all other companies Mahindra & Mahindra Ltd is the best company to invest because its beta value is less than one (0.9082) and it has a positive alpha value (0.0073).

Published by: Akarsh P. K, Dr. M. Muthu Gopalakrishnan

Author: Akarsh P. K

Paper ID: V2I5-1215

Paper Status: published

Published: May 29, 2017

Full Details

E commerce

Over the last two decades, rising internet and mobile phone penetration has changed the way we communicate and do business. E-commerce is relatively a novel concept. It is, at present, heavily leaning on the internet and mobile phone revolution to fundamentally alter the way businesses reach their customersThis paper deals the conceptual knowledge of ecommerce, literature review, current and future aspects of e-commerce in Indian context. The present development would be a valuable addition to researcher and academicians; and useful theory for practitioners, advertisers, and entrepreneurs.

Published by: Vineeta, Akanksha Bharti

Author: Vineeta

Paper ID: V2I5-1209

Paper Status: published

Published: May 29, 2017

Full Details

Towards A Healthier Nation: Organic Farming and Government Policies in India

In the words of shri Bankim Chand Chatterji, we have nature’s bounties in form of “vandematram ! Sujalam, suphalm, malayaja shitalam, Shasyashyalam mataram !” In the rapid pace of development we have inflicted serious damage to the natural resources and consequently we are now faced the question as where is that sujalam (clean water); where is that suphlam (health crop) and where is that malayaj shitalam (refreshing air). These questions have given rise to a procedure of serious thinking to safe guard the environment and natural resources for sustainability. As a result more and more emphasis being given towards returning to nature and adoption of organic agriculture. This paper discusses the concept, aims and scope of organic farming in the context of Indian subcontinent. Government policies to encourage the task of practicing organic farming on a wider scale have also been discussed in wider context. A number of books, journals, newspapers etc have been extensively studied for this purpose.

Published by: Dr. Manju Yadav

Author: Dr. Manju Yadav

Paper ID: V2I5-1208

Paper Status: published

Published: May 29, 2017

Full Details

A Quick Re-Route Procedure

We approach to find an redundant route, after having a web page link failure, from source node to a destination node, prior to Interior Entrance Method (Open Shortest Path First) has had to be able to re-converge throughout a reaction to your failure. The markup is usually a modest (up in order to tens of nodes) regional accessibility sub network of a support provider’s multilevel, the usual accessibility level found in practice. We underscore the process along with verify it can get a route when just one prevails.

Published by: P. Shyam Kumar, A. Swathi

Author: P. Shyam Kumar

Paper ID: V2I5-1198

Paper Status: published

Published: May 29, 2017

Full Details

Prevention of MANETs from Malicious Nodes Performing FNA using OLSR

In MANETs, it is effective for mobile nodes to retrieve data items using top-k queries, in which data items are ordered according to a particular attribute score, and the query-issuing node acquires the data items with the k highest scores. However, accurate results may not be acquired in environments where malicious nodes are present. In top-k queries, it is important to neutralize the Data Replacement Attack (DRA). The DRA is defined as the malicious nodes attempt to replace necessary data items with unnecessary ones. The proposed method addresses top-k query processing and malicious node identification against data replacement attack in MANETs. In the top-k query processing method, in order to maintain accuracy of the query result, nodes reply with data items with the k highest scores, along multiple routes. Moreover, to enable detection of data replacement attacks, reply messages include information on the route along which reply messages are forwarded, and thus the query-issuing node can know the data items that properly belong to the message. In the malicious node identification method, the query-issuing node first narrows down the malicious node candidates, using the received message information, and then requests information on the data items sent by these candidates. In this way, the query-issuing node can identify the malicious node. When multiple malicious nodes are present, the query-issuing node may not be able to identify all malicious nodes at a single query. It is effective for a node to share information about the identified malicious nodes with other nodes. In the proposed method, each node divides all nodes into groups by using the similarity of the information about the identified malicious nodes. Then, it identifies malicious nodes based on the information on the groups. In this case, however, a malicious node may declare fake information that claims normal nodes as the malicious nodes. This type of attack is called as false notification attack (FNA) and the node who is performing FNA only called as Liar Nodes (LN). Identification of the LN is also based on the information on the groups itself. By using Optimized Link State Routing Protocol (OLSR) designing a message authentication method to prevent malicious nodes from performing FNA.

Published by: Jayasudha k, Mr. Scaria Alex

Author: Jayasudha k

Paper ID: V2I5-1196

Paper Status: published

Published: May 29, 2017

Full Details

Corporate Governance Mechanisms in India

This paper is about making good mechanism for company’s corporate governance. This article further helps in examining the relationship between the two parts of mechanism i.e. internal and external mechanisms of corporate governance. The need for proper governance is to create a culture of transparency, awareness and clearness in the working and operations of corporation. Having a healthy corporate governance, it ensures a company in achieving long term goals and maximising long term company value as well as goodwill. In this paper we further put focus on how to keep the stakeholders interest safe and assist in reducing agency costs and clear by providing statutory provisions created by different regulatory bodies for the company. Regulatory framework assist the firm in improving their practices as well helps in creating better output and performance.

Published by: Nidhi Sharma

Author: Nidhi Sharma

Paper ID: V2I5-1195

Paper Status: published

Published: May 29, 2017

Full Details

Employee Functions and regulations act in TirumalaTirupati Devasthanams

In organization functions and regulations act of employee is very important role. The fact there is no clear deterred papers of employee function and regulations act of T.T.D in the past. The Present paper given the clear information employee related functions and regulation in the T.T.D. The employee related functions and regulation in the T.T.D. The employees who render service to the pilgrims are expected to be well informed about all aspects of administration and details of various Sri Vari Seva. Accommodating etc. They must be able to serve the pilgrims with devotion and maintain moral and Spiritual values. So, here the pilgrims should know the employees functions in T.T.D.

Published by: S.B Sowjanya Kumar, Sardar Guglothh

Author: S.B Sowjanya Kumar

Paper ID: V2I5-1191

Paper Status: published

Published: May 29, 2017

Full Details

Social Freedom of Female Teachers

A survey type research has been conducted on secondary level at Jaunpur districts to study the social freedom of Female teachers. Sample size 400 were selected on the basis of subject and locality based on random technique. For measuring the social freedom of female teachers has taken standardized tool which is developed by L.I Bhushan. In order to analyze the data statistical technique has used mean, S.D and CR values. Findings were rural & urban and science & art related female teachers are similar in social freedom.

Published by: Dr. Narendra Kumar Singh

Author: Dr. Narendra Kumar Singh

Paper ID: V2I5-1185

Paper Status: withdrawn

Submitted: May 26, 2017

Full Details Track Status

Preponderating Against Un-Validation Utilizing Hybrid Labyrinth Era Calculation

Uncover of countersign documents or dead bonafide security issues that have impacted incalculable. The customer name and watchword see a key part in a security structure. So shield that from untouchable authentication. This proposition begins the examination of online security based astound enter reinforce in passed on structure. Nectar words based watchword support is one of the sensational security instruments to anchor the countersign. The critical overwhelm key which speaks to the nectar words a robotized assailant who takes a watchword can’t ensure the way and co-ordinate motivation driving the relating watchword. So the request gives a Hybrid Labyrinth Era Calculation (HLEC).

Published by: Shamili .R, T. Sathya, J. Jeyaram, K. Sudha Devi

Author: Shamili .R

Paper ID: V2I5-1182

Paper Status: published

Published: May 26, 2017

Full Details

European Union’s Eastern Enlargement

European Union’s Eastward Expansion Is a Matter of Great International Business Scheme. The Enlargement of the European Union Can Shape the World Economy

Published by: Akash Kundu

Author: Akash Kundu

Paper ID: V2I5-1181

Paper Status: published

Published: May 26, 2017

Full Details