Professional Documents
Culture Documents
PAGE
S.NO TITLE
NO.
EFFICIENT CLUSTERING ALGORITHM USING BIRCH
1 1
CLUSTERS
A VOLTAGE CONTROLLED DSTATCOM FOR POWER
2 2
QUALITY IMPROVEMENT
MONITORING AND CONTROLLING OF POWER LOSS IN
3 3
A TRANSFORMER
PERFORMANCE ASSESSMENT (DECEMBER TO
4 4
FEBRUARY ) OF 15KW SOLAR PHOTO VOLTAIC PLANT
EFFICIENT ENERGY CONSERVATION TECHNIQUE FOR
5 5
WSN
RELIABLE AND ENERGY EFFICIENT FOR STATIC
6 WIRELESS AD-HOC NETWORKS WITH UNRELIABLE 5
LINKS
JOINT ACCESS POINT AND USER LOCALIZATION
7 6
USING UNLABELED WIFI RSS DATA
MULTISPECTRALIMAGE RESTORATION
23 17
FOR IMAGE PAIR FUSION
ABSTRACT
The search for useful patterns in large data sets has recently attracted considerable
interest, and one of the most common problems in this area is the identification of clusters or
densely populated regions in a multidimensional data set. Premature work does not
adequately address the problem of large data sets and minimize 1/0 costs. Clustering is a
widely used technique in data mining. At present, there are many clustering algorithms, but
most existing clustering algorithms are either limited to handle the single attribute or can
handle both types of data, but are not efficient when clustering large data sets. Only a few
algorithms can do both well. Clustering is the process of grouping of data, where the
grouping is established by finding similarities between data based on their characteristics.
Such groups are termed as Clusters. A comparative study of clustering algorithms across
different data items is performed here. The performance of the various clustering algorithms
is compared based on the time taken to form the estimated clusters. The experimental results
of various clustering algorithms to form clusters are depicted as a graph. Thus it can be
concluded as the time taken to form the clusters increases as the number of cluster increases.
The BIRCH clustering algorithm takes very few seconds to cluster the data items whereas the
simple KMeans takes the longest time to perform clustering. The experimental results suggest
that the BIRCH algorithm is effective when compared to k-means algorithm.The results show
that the BIRCH algorithm is efficient and produces better quality of clusters.
Keywords – Clustering, Clustering algorithms, K-means, BIRCH (Balanced Iterative
Reducing and Clustering using Hierarchies)
Mahesh K. Mishra
ABSTRACT
This paper proposes a new algorithm to generate reference voltage for a distribution
static compensator (DSTATCOM) operating in voltage-control mode. The proposed scheme
exhibits several advantages compared to traditional voltage-controlled DSTATCOM where
the reference voltage is arbitrarily taken as 1.0 p.u. The proposed scheme ensures that unity
power factor (UPF) is achieved at the load terminal during nominal operation, which is not
possible in the traditional method. Also, the compensator injects lower currents and,
therefore, reduces losses in the feeder and voltage-source inverter. Further, a saving in the
rating of DSTATCOM is achieved which increases its capacity to mitigate voltage sag.
Nearly UPF is maintained, while regulating voltage at the load terminal, during load change.
The state-space model of DSTATCOM is incorporated with the deadbeat predictive
controller for fast load voltage regulation during voltage disturbances. With these features,
this scheme allows DSTATCOM to tackle power-quality issues by providing power factor
correction, harmonic elimination, load balancing, and voltage regulation based on the load
requirement. Simulation and experimental results are presented to demonstrate the efficacy of
the proposed algorithm
ABSTRACT
In this paper, power transformer has to keep the temperature within limits according
to international agreement standards. Two of the limits are a maximum temperature rise and
a maximum oil temperature. The main purpose of this study was to learn about the
temperature distributions and oil velocity inside the coil of the power transformer and to
model and develop a program using MATLAB that can modulate the suitable parameter that
not exceeds maximum temperature rise in disk coil transformer. Two methods have been
used to study the velocity and temperature parameters affecting the oil flow through the
transformer. The first approach focused on equation derived from previous worked about oil
flow and temperature distribution. The second approach was to handle the problem as a
global optimization problem solved by numerical methods. The optimization was done
using predictions from a program used for velocity and temperature calculation. The
numerical method result was successful; on all the designs tested. It gave a lower
temperature rise value according to international agreement standards. The study has shown
that a geometrical detail approach provided for better design solutions in reasonable time
and therefore it has shown its potential for practical use. Both the methods could be
combined and used for further investigation. Large power transformers belong to the most
valuable and important assets in electrical power systems. The ageing of the used oil/paper-
insulation primarily depends on the hot-spot temperature of the solid insulation system.
Hence it is the dominant factor limiting the lifetime of the transformer. Therefore a
prototype of a stand alone thermal monitoring system was developed and installed on a 350
MVA transformer to observe the hot-spot temperature. The experiences of successfully
operation during the last years encouraged us to update the system to the newest stage. The
paper describes the state-of-the-art of the thermal transformer monitoring system based on
new field bus technology The advantages of a networked system and the usage of a
centrally managed data base shared between multiple monitoring systems are exposed. The
intention to implement new features exceeding the conventional monitoring system
philosophy is discussed on an intelligent multifunction criteria Fuzzy algorithm for the
control of fans of the heat exchanger units. It permits a more cost-effective long-time
transformer operation management.
B.Vijay, C.Bhuvaneswari,
Priyadarshini Engineering College, Vaniyambadi,
ABSTRACT
The objective of this paper is to assess the performance of 15KW solar power plant
installed in Priyadarshini Engineering College (PEC) campus, Vaniyambadi, Vellore District,
Tamil Nadu. A 15 KW solar PV plant is installed on the library roof top building in PEC and
the load is connected to internet laboratory, library (Lighting Load). The total capacity of the
plant is 15kW. There are 60 solar PV panels each one can produce 250 Watts, 24V capacity.
Sun is the main source of energy which convert light energy to electrical energy without
using of additional energy. This electrical energy can be stored in battery for their utilization
during the change of climate.The performance characteristics can be assess from 9.00AM to
4.30PM for 6days a week from Monday to Saturday(Dec-Feb2016) and the characteristics
has been plotted in graph. The graph is drawn between Generated power vs consumed power.
Key words: Off grid connected SPV System,solar photovoltaic energy.
G.Yazhini
Department of Communication system,
Varuvan Vadivelan Institute Of Technology College, Dharmapuri, Tamilnadu, India.
ABSTRACT
In recent years, the main research challenge is the issues in wireless sensor networks
(WSN). Energy conservation and coverage of the sensor nodes considered as major metrics
for the long time survival of sensor networks. In this paper work, proposed an efficient
energy conservation routing technique for WSN. Furthermore, in this proposed routing
technique, two algorithms developed. Namely, Selectively Turning ON/OFF the Sensors
(STOS) and Ongoing Routing Table (ORT). Moreover, in STOS, the sensor nodes divided
into several sets of scheduling modes (active, standby, hibernate) and let them to perform
alternatively, by which conserves extra energy. Consequently, in ORT Ongoing (up to date)
data maintained to update and know the detailed information regarding mobile sensor nodes
including the factors such as hop count, residual energy (current energy level), threshold
energy with the status of the sensor nodes. In connection with ORT, the next sensor node will
identified for forwarding the information. Herein concentrated on dynamic network, where
all the deployed sensor nodes are in-mobile except base station (BS) or sink node.
Nevertheless, the absence or failure of BS, nearest mobile sensor node to the BS will act as
BS. Provided, Simulation result shows that the proposed technique will be enough competent
for maximizing the energy conservation.
Key words: Wireless Sensor Networks (WSN) Ongoing Routing Table (ORT).
Generation of electricity from renewable energy sources like wind, sun, fuel cell,
biomass etc., are increased day by day due to the increase in demand. To interface these
green energy sources with the utility grid, power electronics based converter is needed. In
this article 19 level modular multilevel converter is used and each inverter use DC as its
source. This DC source can be obtained from photovoltaic cell.The proposed 19 level
modular multi Level Inverter (MMI) can be switched on either for 50 HZ or for 60 Hz
frequency. The proposed system is investigated using MATLAB/Simulink environment.
The results proven that there is an increase in the RMS value of output voltages, so total
required Volt Ampere ratings of the inverters is reduced greatly over wide load conditions.
This paper presents a new resonant dual active bridge (DAB) topology, which uses a
tuned inductor-capacitor-inductor (LCL) network. In comparison to conventional DAB
topologies, the proposed topology significantly reduces the bridge currents, lowering both
conduction and switching losses and the VA rating associated with the bridges. The
performance of the DAB is investigated using a mathematical model under various operating
conditions.
Mr.D.Alaguraj
Department of Civil Engineering
P.S.V College of Engineering and Technology
ABSTRACT
Mr. B.Annadurai
Department of Civil Engineering
P.S.V College of Engineering and Technology
ABSTRACT
Key words: splicing, bar coupler, Mechanical Splice, Reinforcing Bar, RCC beam
Keywords:
Comparison, Flexural Member, Composite Flexural Member, Structural Engineering
ABSTRACT
ABSTRACT
Key words: ZigBee, tree routing, shortcut tree routing (STR), neighbor table,
MANET, WSN, IEEE 802.15.4
ABSTRACT
The security and authenticity issues of images are becoming popular then ever, due to
the rapid growth of multimedia and internet technology For many cases, the delivered
information may contain secret image such as confidential personal information, military
satellite images, etc. The mainstay of this project is to investigate the use of the least square
prediction in different expansion reversible watermarking for hiding secret image. Reversible
watermarking not only extracts the embedded data from the watermarking but also retrieve
exactly the original image from that watermarking without any distortion. For each pixel least
square predictor is computed on square blocks.
The proposed system is to hide two secret images, when an Image is sent to un trusted
third parties, the image should not be visible. The original secret image is accessed only by
trusted parties by using least square prediction method .The result of least square prediction
is to provide quality such as reduction in image distortion , improvement in quality and
efficiency .In this paper, a set of basic pixels is employed to improve the prediction accuracy,
thereby increasing the payload. To further improve the image quality, a threshold is used to
select only low-variance blocks to join embedding process.
ABSTRACT
In the existing system, Unfortunately, most smart phone users tend to choose simple
and weak pass codes for the sake of convenience and memorability, In the proposed system,
investigates the reliability and applicability on the usage of users’ touch-interaction behavior
for active authentication on smart phones. Smartphone users have their own unique
behavioral characteristics when performing touch operations. These personal characteristics
are reflected on different rhythm, strength, and angle preferences of touch interaction
behavior. Android Application is developed in which user’s Hand Waving Pattern is recorded
& Stored as User’s Pattern. We are using SVM Algorithm for User Identification.
MODIFICATION of the project which is our implementation, is same waving pattern is used.
We deploy three applications based on the android device mobility pattern. 1st one is normal
phone unlocking, 2nd is Girls / children safety application, 3rd is Emergency support to the
user. Girl’s safety / emergency Pattern is matched both GPS & Camera are initiated to fetch
Location and Photos. Voice is Recorded and uploaded to the Server. Both GPS & Audio Link
are sent as SMS Alert to both Police & Guardian.
This paper investigates the problem of joint estimation of a pedestrian user path
and the available Wi-Fi access point locations. The observations are limited to unlabeled
Wi-Fi received signal strength (RSS) values. The problem is formed as a partially observable
Markov decision process and RSS gradients are integrated to estimate and update the
user locations along the path. The RSS data is modelled as a Gaussian process and gradient
vectors are updated for each step based on the motion dynamics. Realistic assumptions and
constraints are introduced to model the user’s movement and reduce the computational
complexity.
Keywords: Personal Management, Evaluation, Effectiveness, Verification Activities,
External Consultant.
MULTISPECTRALIMAGE RESTORATION
FOR IMAGE PAIR FUSION
M.Anitha
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT
The full dynamic range of a real world scene is generally much large than that of the
sensing devices used to capture it, as well as the imaging devices used to reproduce it. When
a large dynamic range must be processed using a limited range device, one is forced to split
the dynamic range into several smaller “strips”, and handle each of them separately. This
process produces a sequence of images of the same scene, covering different portions of the
dynamic range. When capturing a high dynamic range (HDR) scene, the sequence is obtained
by varying the exposure settings of the sensor. When reproducing an HDR scene, the
sequence is obtained by splitting the full range of the image into several sub-ranges, and
displaying each separately.
Mrs.M.Sowmiya Mrs.E.Punitha,M.E.,
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT
In this project present a concept for a compact ultra-wideband multi element antenna
(MEA) for massive MIMO indoor base stations. The antenna concept is based on the
simultaneous excitation of different characteristic modes on each element of the MEA. This
enables an effective 484 port antenna using only 121 physical antenna elements. Thereby, a
size reduction of 54%compared to a generic MEA based on crossed dipoles is achieved. The
antenna operates in the ultra-wide frequency band of 6–8.5 GHz with a reflection coefficient
of sii < −10 dB and the inter element and intra element mutual coupling of the antenna ports
is sji ≤ −20 dB.
Ms.M.Bhuvana Priya
Department of Electronics and Communication Engineering
P.S.V College of Engineering & Technology
ABSTRACT
Portable electronic device times which can only be obtained by utilizing low-power
require long battery life components. Recently, low-power design has become quite critical in
synchronous application specific integrated circuits (ASICs)and system-on-chips (SOCs)
because interconnect in scaled technologies is consuming an increasingly significant amount
of power. Researchers have demonstrated that the major consumers of this power are global
buses, clock distribution networks.
The main concept of the project here is to generate a high voltage DC from a single
phase AC with the help of the capacitors and diodes connected in a ladder network. This
concept is often used in electronic appliances like the CRTs, TV picture tube, and
oscilloscope and also in industrial appliances.It is also possible to generate up to 10KV DC
from this single phase supply, but owing to safety concerns and reasons, this system limits
the generating voltage to a 2KV output by limiting the capacitor and diode multiplication
factor to about 9. This project uses a number of silicon diodes and a set of electrolytic
capacitors wherein each stage, 1 capacitor is connected in series to withstand the peak
voltage. Thus, the output from a 9-stage voltage multiplier can generate up to 2KV. With the
help of standard multi-meter, it is not possible to measure the output, therefore, we are using
a potential divider of 10:1 for measuring the output make some change based on the meaning
eg: with that such as 230V low voltage AC reading will get the 2KV high voltage DC. The
project can be implemented by generating a high voltage DC up to the range of 30-50 KV by
increasing the number of stages. Then it can be used for the required industrial and medical
applications.
In traditional method of farming, human labors were required to visit the green house
at specific time need to check the humidity level, CO2 and temperature level manually.
Therefore this project focuses on developing a system that can automatically monitor and
predict changes of temperature , and CO2 level in the greenhouse. The objective of the
research is to develop automatic temperature monitoring system using sensors and short
message service (SMS) technology. This system also has a mechanism to alert farmers
regarding the parameter changes in the green house so that early precautions steps can taken.
This project is implemented using ARDUINO UNO Controller.
ABSTRACT
In our city many times we see that the garbage bins or dustbins placed at public places
are overflowing. It creates unhygienic conditions for people. Also it creates pollution to the
atmosphere. At the same time bad smell is also spread. To avoid all such situations we are
going to implement a project called Automatic waste disposer. In this project we are going to
place a weight sensor under the dustbin chamber. When the weight reaches to the threshold
value, automatically the dustbin burns the waste and spread water to clean the ash. By using
the heat developed in it, a considerable amount of electric power can be generated and it can
be used to operate the same disposer. We have thus proposed an automatic waste disposer
that aims at segregating and burning the waste at the disposal level itself.
This paper presents a high step-up converter for solar energy source applications. The
proposed high step-up dc–dc converter is devised for boosting the voltage generated from
solar cell to be a 400-V dc-bus voltage. Through the three-winding coupled inductor and
voltage doubled circuit, the proposed converter achieve high step-up voltage gain without
large duty cycle. Finally, the fuel cell as input voltage source 60–90 V integrated into a 2-kW
prototype converter was implemented for performance verification. Under output voltage
400-V operation, the highest efficiency is up to 96.81% , and the full-load efficiency is
91.32%
Wireless charging system described by using the method of inductive coupling. In this
project, oscillation circuit converts DC energy to AC energy(transmitter coil) to transmit
magnetic field by passing frequency and then induce the receiver coil. The properties of
Induction coupling are wave(magnetic field-wideband), range(very short~cm),
efficiency(hight) and operation frequency(LF-band~several handred kHz).The project shows
as a small charging for 5V battery of phone in this method. The system bases on coupling
magnetic field, then designed and constructed as two parts. There are transmitter part and
receiver part. The transmitter coil (transmitter part) transmits coupling magnetic field to
receiver coil (receiver part) by passing frequency at about 1.67MHz. The Ampere’s law,
Biot-Savart law and Faraday law are used to calculate the inductive coupling between the
transmitter coil and the receiver coil. The calculation of this law shows how many power
transfer in receiver part when how many distance between the transmitter coil and the
receiver coil. The system is safe for users and neighbouring electronic devices.
This paper per pose a family of hybrid converter topologies which can supply
simultaneous dc and ac loads from a single dc input .The resulting hybrid converters
require lesser number of switches to provides dc and ac output with an increased
reliability, resulting from its inherent shoot – through protection in the inverter stage .
the proposed converter is able to sopply dc and ac load 100v and 110v (rms)
,respectively from a 48.v dc input .The performance of the converter is demonstrated
with inductive and non liner loads.
This project aims to design and modeling of Dynamic Voltage Restorer (VOLTAGE
INJECTOR) for maintaining the Power quality of the system. Power quality problem is an
occurrence standard voltage, current or frequency that result in a failure of end use
equipment. One of the major problems Deal the reis the power sag and swell. To solve this
problem, custom power devices are used. One of those devices is the Dynamic Voltage
Restorer (VOLTAGE INJECTOR), which is the most efficient and effective modern
custom power device used in power distribution networks. In this project fuzzy optimized PI
controller with integrated function of active power transfer, reactive power compensation
and voltage conversion is proposed as an hybrid system. A new control technique is
proposed to control the capacitor-supported VOLTAGE INJECTOR. The control of a
VOLTAGE INJECTOR is demonstrated with a reduced-rating VSC. The reference load
voltage is estimated using the unit vectors. The synchronous reference frame theory is used
for the conversion of voltages from rotating vectors to the stationary frame. The
compensation of the voltage sag, swell, and harmonics is demonstrated using a reduced-
rating VOLTAGE INJECTOR.The proposed hybrid system can effectively suppress the
voltage fluctuation. The simulation of proposed work is carried out using MATLAB.
Hardware implementation has been done with a micro controller 89s52, whose assembly
programming had been done with ASEM 5113 software and flashed using willar software
and downloaded the hex files using a flash programmer connected to a personal computer
via USB port. Both simulation and hardware implementation shows the compensation well.
The following objectives need to be fulfilled in this research work.
P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 32
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)
G.Srilaka
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT
S.Bharathi
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT
This project proposes a unified distributed control strategy for DC micro grid
operating modes, without bus voltage signaling or mode detection mechanisms that are
normally required for decentralized control strategies. The proposed control strategy is based
on the novel integration of distributed controllers for energy balancing between DC micro
grid energy storage systems with distributed controllers used to regulate the average DC
micro grid bus voltage, and a new method for controlling the grid connected rectifier that
maintains the distributed control structure. Under the proposed control strategy, seamless
mode transitions are achieved between qualitatively different operating modes, namely, 1)
grid connected operation with the rectifier providing load balancing, 2) grid connected
operation with the rectifier charging the energy storage systems, and 3) islanded operation. In
all operating modes, the average DC micro grid bus voltage is regulated to the micro grid
voltage reference, and the energy storage systems are controlled independently of the
operating mode to achieve and maintain a balanced energy level. Simulations are presented
demonstrating the performance of the proposed control strategy for a 380 VDC datacenter
with intermittent photovoltaic generation and communication delays expected from a Wi-Fi
control network implementation.
M.MUTHUKUMAR
Vijayakumar.S
Department of Electrical and Electronics Engineering
P.S.V College of Engineering and Technology
ABSTRACT
A general platform is introduced to study the dynamics of power systems with high
voltage dc (HVDC) transmission links. Small-signal stability, voltage stability, and
interaction phenomena of power systems with both line-commutated-converter HVDC (LCC-
HVDC) and voltage-source-converter HVDC (VSC-HVDC) are addressed using the
proposed platform. In this platform, the entire power system is modeled as a multivariable
feedback control system (FCS) which consists of three interconnected blocks. The contents as
well as the inputs and outputs of the blocks are selected such that the conventional analysis
tools for power system stability are applicable, both in the time and frequency domains. In
the FCS model, the relationships between different instabilities are clear, and participant
agents of each instability can be determined. The model is developed in a modular and hybrid
style, to make it feasible for a large power system. The proposed model is validated using
MATLAB simulation using a data mining method of ICA (Independent component analysis)
In this paper a new single phase cascaded multilevel inverter is proposed. In order
to generate all voltage levels (even and odd) at the output, four different algorithms are
proposed reduction in the number of power switches, driver circuits and dc voltage sources is
the advantage of the developed single – phase cascaded multilevel inverter the ability of the
proposed inverter to generate all voltage is again conformed by using the experimental results
of a is level inverter
This paper presents a new resonant dual active bridge (DAB) topology, which uses a
tuned inductor-capacitor-inductor (LCL) network. In comparison to conventional DAB
topologies, the proposed topology significantly reduces the bridge currents, lowering both
conduction and switching losses and the VA rating associated with the bridges. The
performance of the DAB is investigated using a mathematical model under various operating
conditions.
This paper deals with a power factor correction (PFC) based cuk converter fed
brushless DC motor (bldc)drive. A diode bridge rectifier followed by a cuk converter
working in a discontinuous conduction mode (DCM) is used for control of dc-link voltage
with unity power factor at ac mains.the performance of the proposed system is simulation and
a hardware prototype to validate its performance over a wide range of speed.
System efficiency and cost effectiveness are critical importance for photovoltaic (pv)
system. This paper addresses the two issues by developing a novel three port dc .dc converter
for stand-alone pv system based on improved fly back- forward topology. This paper is
focused on a comprehensive modulation strategy utilizing both pwm and phase – shifted
control that satisfies the requirement of pv power system to achieve mppt and output voltage
regulation.
ABSTRACT
ABSTRACT
In recent years, big data have become a hot research topic. The increasing amount of
big data also increases the chance of breaching the privacy of individuals. Since big data
require high computational power and large storage, distributed systems are used. As multiple
parties are involved in these systems, the risk of privacy violation is increased. There have
been a number of privacy-preserving mechanisms developed for privacy protection at
different stages.
This paper focus on big data concepts, characteristics and to how to protect big data.
and how to accesses of big data. Big data is a term for huge data sets having large, varied and
complex structure with challenges, such as difficulties in data capture, data storage, data
analysis and data visualizing for further processing. It requires new technologies and
architectures so that it becomes possible to extract valuable data from it by capturing and
analysis process. Big Data is a collection of massive data sets with a great diversity of types
and it is difficult to process by using traditional data processing platforms. We analyze the
challenges, tools and techniques for big data analysis and design. In particular, in this paper,
we illustrate the infrastructure of big data and the state-of-the-art privacy-preserving
mechanisms in each stage of the big data life cycle.
Now a day’s Big data is most preferably used in enterprises, organizations, companies
and business etc…So Big data as so much of applications in various fields such as banking,
agriculture, chemistry, data mining, cloud computing, finance, marketing, stocks, BDA,
health care etc…This paper presents the detailed explanation of these applications. In these
fields every field has their concept and gave their usage related to big data. These are more
efficiently used in various sectors like government sectors, corporate sectors like that. This
paper presents an overview of both cloud and big data technologies describing the current
issues with these technologies.
Key words: Colud Computing, Hadoop, Big Data Issuses, Big Data Characteristics.
ABSTRACT
The rapid advances in high-throughput technologies, such as microarrays have
revolutionizing the knowledge and understanding of biological systems and genetic
signatures of human diseases. This has led to the generation and accumulation of a large
amount of genomic data that need to be adequately integrated to obtain more reliable and
valid results than those from individual experiments. Meta-analysis of microarray data is one
of the most common statistical techniques used for combining multiple data sets. Despite its
remarkable successes in discovering molecular subtypes, underlying pathways and
biomarkers for the pathological process of interest, this method possesses several limitations.
Here, we provided a briefly overview of current meta-analytic approaches together with the
basic critical issues in performing meta-analysis of genomic data, with the aim of helping
researchers to evaluate the quality of existing, published data and obtain more detailed
information on what will be the best strategy to adopt to execute a good meta-analysis.
ABSTRACT
The usage of credit card has increased the credit card fraud has also increased
dramatically. Instead of carrying huge amount in hand it is easier to keep credit card. But now
a days that too becomes unsafe. Existing fraud detection techniques are not capable to detect
fraud at the time when transaction is in progress. Improvement in existing fraud detection is
necessary. In this paper Hidden Markov model is used to detect the fraud when transaction is
in progress. Here is shown that hidden markov model is used to detect credit card fraud with
reduced false positive transaction.
HMM categorizes customers profile as low, medium and high and based on spending
profile set of probability for amount of transaction is assigned to each cardholder. Amount of
new transaction is checked against the profile of card holder, if it justifies a predefined
threshold value then transaction is accepted else it is considered fraudulent. But still HMM is
not secured for initial some transaction during training so HOTP is used as secured approach
with HMM to reduce the fraud and to increase the security. HOTP is one time password
which is used one once and it is send to the client mobile when HMM detects that amount is
more than threshold value if the user enters valid HOTP then only transaction is allowed to
progress else it is detected as fraud.
ABSTRACT
ABSTRACT
Honeypots are decoy computer resources set up for the purpose of monitoring and
logging the activities of entities that probe, attack or compromise them. Honeypot does work
as an Intrusion Detection System which detect the attacker in a network. Activities on
honeypots can be considered suspicious by definition, as there is no point for users to interact
with these systems. In this paper, we proposed a honeypot system in the wireless network to
attract the attackers. We have used different fake websites to do so. Honeypot helps in
detecting intrusion attacking on the system. The information gathered by watching a
honeypot being probed is invaluable. The honeypot act as a normal system in the network
having fake detail or invaluable information. It gives information about attacks and attack
patterns. The Honeypot will make the attacker to attack the particular sites and side by side
monitor its illegal steps to confirm about its identity. This proposed work will make the IP
address of attacker to be blocked for further access of any site in the network. The proposed
model has more advantages that can response accurately and swiftly to unknown attacks and
lifetime safer for the network security. In future the network can be preserved by getting the
information regarding the attacker from the Honeypot system
KEY BASED POLICY FOR SECURE DATA DISTRIBUTION OVER THE CLOUD
ABSTRACT
ABSTRACT
Blindness is more feared by the public than any other ailment. Artificial vision for the
blind was once the stuff of science fiction. But now, a limited form of artificial vision is a
reality .Now we are at the beginning of the end of blindness with this type of technology. In
an effort to illuminate the perpetually dark world of the blind, researchers are turning to
technology. They are investigating several electronic-based strategies designed to bypass
various defects or missing links along the brain's image processing pathway and provide
some form of artificial sight. This paper is about curing blindness. Linking electronics and
biotechnology, the scientists has made the commitment to the development of technology that
will provide or restore vision for the visually impaired around the world. This paper describes
the development of artificial vision system, which cures blindness to some extent. This paper
explains the process involved in it and explains the concepts of artificial silicon retina,
cortical implants etc. The roadblocks that are created are also explained clearly. Finally the
advancements made in this system and scope of this in the future is also presented clearly.
Keywords: Blindness, Artificial Vision, Biotechnology, Restore Vision, Visually Impaired.
ABSTRACT
The latest technology that provide broadband access with large coverage area is
Worldwide Interoperability for Microwave Access (WiMAX), Since Mobile WiMAX has an
important advantage to serve large coverage areas per base station, Mobile WiMAX has
become a popular technology for handling mobile users. As we know that for serving a large
number of Mobile Users in practice requires an efficient handover scheme. Currently, mobile
WiMAX has a long handover delay that contributes to the overall end-to-end communication
delay. Recent research is focusing on increasing the efficiency of handover schemes. In
existing system whenever stations are out of range of all APs and BSs then there is no
communication for that particular stations. In this paper we present whenever stations is out
of range of all APs and BSs, then it can communicate through any other station which are in
range based on ad-hoc network technology.
ABSTRACT
One issue in wireless sensor organize innovation is confinement issue. In the most
applications, the information gathered by the system without area data isn't helpful. Area data
has an imperative part in both systems administration and application spaces of wireless
sensor arrange. This paper overviews the confinement calculations what's more, proposes an
alternate scientific categorization in light of key components. In extra, it acquaints the vital
variables with approve the execution of confinement systems.
ABSTRACT
The IPv6 over low power wireless personal area network (6LoWPAN) has attracted
lots of attention recently because it can be used for the communications of Internet of things.
In this paper, the concept of group-based network roaming in proxy mobile IPv6 (PMIPv6)
domain is considered in the 6LoWPAN-based wireless body area networks. PMIPv6 is a
standard to manage the network-based mobility in all-IP wireless network. However, it does
not perform well in group-based body area networks. To further reduce the handoff delay and
signaling cost, an enhanced group mobility scheme is proposed in this paper to reduce the
number of control messages, including router solicitation and router advertisement messages
as opposed to the group-based PMIPv6 protocol. Simulation results illustrate that the
proposed handoff scheme can reduce the handoff delay and signaling cost. The packet loss
ratio and the overhead can also be reduced.
ABSTRACT
In recent years, face recognition has often been proposed for personal identification.
However, there are many difficulties with face recognition systems. For example, an imposter
could login the face recognition system by stealing the facial photograph of a person
registered on the facial recognition system. The security of the face recognition system
requires a live detection system to prevent system login using photographs of a human face.
This paper describes an effective, efficient face live detection method which uses
physiological motion detected by estimating the eye blinks from a captured video sequence
and an eye contour extraction algorithm. This technique uses the conventional active shape
model with a random forest classifier trained to recognize the local appearance around each
landmark. This local match provides more robustness for optimizing the fitting procedure.
Tests show that this face live detection approach successfully discriminates a live human face
from a photograph of the registered person's face to increase the face recognition system
reliability.
Keywords: Face Live Detection; Eye Contour Extraction; Eye Blink Estimation.
P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 47
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)
ABSTRACT
ABSTRACT
Recently, social media is playing a vital role in social networking and sharing of data.
Social media is favored by many users as it is available to millions of people without any
limitations to share their opinions, educational learning experience and concerns via their
status. Twitter API is processed to search for the tweets based on the geo-location. Student’s
posts on social network gives us a better concern to take decision about the particular
education systems learning process of the system. Evaluating such data in social network is
quite a challenging process.
In the proposed system, there will be a workflow to mine the data which integrates
both qualitative analysis and large scale data mining technique. Based on the different
prominent themes tweets will be categorized into different groups. Naïve Bayes classifier will
be implemented on mined data for qualitative analysis purpose to get the deeper
understanding of the data. It uses multi label classification technique as each label falls into
different categories and all the attributes are independent to each other. Label based measures
will be taken to analyze the results and comparing them with the existing sentiment analysis
technique.
ABSTRACT
The project shows the study of energy conservation in the Internet. It observe the
different traffic volumes on a link can result in different energy consumption; this is mainly
due to such technologies as trunking (IEEE 802.1AX), adaptive link rates, etc. It designs a
green Internet routing scheme, where the routing can lead traffic in a way that is green. It
differ from previous studies where they switch network components, such as line cards and
routers, into sleep mode. They do not prune the Internet topology and it develop a power
model, and validate it using real commercial routers. Instead of developing a centralized
optimization algorithm, which requires additional protocols such as MPLS to materialize in
the Internet, thus hop-by-hop approach has been chosen. It is thus much easier to integrate the
scheme into the current Internet. Therefore it progressively develops three algorithms, which
are loop-free, substantially reduce energy consumption, and jointly consider green and QoS
requirements such as path stretch.
To further analyze the power saving ratio, the routing dynamics, and the relationship
between hop-by-hop green routing and QoS requirements. It comprehensively evaluate the
algorithms through simulations on synthetic, measured, and real topologies, with synthetic
and real traffic traces. We show that the power saving in the line cards can be as much as 50
percent.
ABSTRACT
With the increasing volume of images users share through social sites, maintaining
privacy has become a major problem, as demonstrated by a recent wave of publicized
incidents where users inadvertently shared personal information. In light of these incidents,
the need of tools to help users control access to their shared content is apparent. Toward
addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help
users compose privacy settings for their images. We examine the role of social context, image
content, and metadata as possible indicators of users’ privacy preferences.In this system
propose a two-level framework which according to the user’s available history on the site,
determines the best available privacy policy for the user’s images being uploaded. Our
solution relies on an image classification framework for image categories which may be
associated with similar policies, and on a policy prediction algorithm to automatically
generate a policy for each newly uploaded image, also according to users’ social features.
Over time, the generated policies will follow the evolution of users’ privacy attitude. We
provide the results of our extensive evaluation over 5,000 policies, which demonstrate the
effectiveness of our system, with prediction accuracies over 90 percent.
ABSTRACT
Ranking fraud in the mobile App market refers to fraudulent or deceptive activities
which have a purpose of bumping up the Apps in the popularity list. Indeed, it becomes more
and more frequent for App developers to use shady means, such as inflating their Apps’ sales
or posting phony App ratings, to commit ranking fraud. While the importance of preventing
ranking fraud has been widely recognized, there is limited understanding and research in this
area. To this end, in this paper, a holistic view of ranking fraud and a ranking fraud detection
system for mobile Apps is proposed. Specifically, accurate location of the ranking fraud by
mining the active periods, namely leading sessions, of mobile Apps is proposed first. Such
leading sessions can be leveraged for detecting the local anomaly instead of global anomaly
of App rankings. Furthermore, three types of evidences, i.e., ranking based evidences, rating
based evidences and review based evidences are investigated, by modeling Apps’ ranking,
rating and review behaviors through statistical hypotheses tests. In addition, an optimization
based aggregation method is proposed to integrate all the evidences for fraud detection.
Finally, the proposed system is evaluated with real-world App data collected from the iOS
App Store for a long time period. In the experiments, the effectiveness of the proposed
system, and show the scalability of the detection algorithm as well as some regularity of
ranking fraud activities is evaluated.
ABSTRACT
The primary objective of this project is to hide the secret information in an image file
without disturbing it’s originality. In the literature lot of algorithms are there to hide the
information in an image file but most of it consumes high resource for completing the task
which is not suitable for light weight mobile devices. Few basic algorithms like 1LSB, 2LSB
and 3LSB methods in the literature are suitable for mobile devices since the computational
complexity is very low. But, these methods either lack in maintaining the originality of the
source image or in increasing the number of bits to be embedded.
The proposed project reduces the detectable distortion in an image file during data
hiding process, by introducing new bit embedding scheme. Based on the frequency of the
characters in the English dictionary the plain text is encrypted and the resultant cipher text is
then embedded in JPEG image. Before embedding the cipher text, each pixel in the image
can be multiplied in to four pixels (Zoom) and every pixel is classified in to three groups
namely dark range, light range and mid range. The light range pixel can be decremented, the
dark range pixels can be incremented and the midrange can be incremented or decremented to
represent a cipher text. The experimental result says that, the proposed system hides 65%
(approximately) of secret information in addition to the existing legacy methods without
affecting the originality of the image and without increasing the computational complexity.
ABSTRACT
Classification and patterns extraction from customer data is very important for
business support and decision making. Timely identification of newly emerging trends is very
important in business process. Large companies are having huge volume of data but starving
for knowledge. To overcome the organization current issue, the new breed of technique is
required that has intelligence and capability to solve the knowledge scarcity and the
technique is called Data mining. The objectives of this work are to identify the high-profit,
high-value and low-risk customers by one of the data mining technique - customer clustering.
In the first phase, cleansing the data and developed the patterns via demographic clustering
algorithm using IBM I-Miner. In the second phase, profiling the data, develop the clusters
and identify the high-value low-risk customers. This cluster typically represents the 10-20
percent of customers which yields 80% of the revenue.
ABSTRACT
Aluminium is one of the less weight Metal having 1:3 weight ratio to mild steel taken
as a base metal and one of the famous ceramic metal Aluminium oxide having high hardness
and melting temperature is chosen as a reinforcing material. Aluminium Alloy (LM4)
reinforced with 1 and 1.5 Wt. % of nano particle aluminium oxide (Al2O3) were fabricated by
using stir casting method in two different preheated temperatures.Nano composites preheated
into two different temperatures like 8500C and 9500C then combined with aluminium alloy
(LM4) and the Al-composites are casted to analysis the Al-Al2O3 nano composite
microstructure, Strength and the tribological properties. To fabricate the Al-Al2o3 matrix
composites reinforced with various proportions of nano particle are fabricated using stir
casting method. To analysis the fabricated nano composites using the following test
Pin on disc wear test
Rockwell hardness test
Strength Analysis Using ANSYS 10.0
P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 54
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)
ABSTRACT
Reverse engineering using Coordinate measuring machines (CMMs) deals with the
critical evaluation for Reverse Engineering (RE) technique using Coordinate Measuring
Machine (CMMs) by using a mechanical artefact for demonstrating the scanning and
designing in the software CREO. A part is physically examined with the help of Coordinate
Measuring Machine (CMM) & Point data of a part is generated through scanning. Point data
is then exported to CAD software CREO to generate CAD model of a part. Thus, this report
describes the processes of Reverse Engineering, from object digitization to CAD model
reconstruction and error analysis. This project also investigates the applications,
developments, advantages and the limitation of this technique.
ABSTRACT
Springs are generally used in automobile industry for different applications. Foremost
requirements of the spring material are high yield strength, high proportional limit, and high
fatigue strength. Steel springs are used in hard & high strength condition. To attain these
properties, springs are shot peening and nitriding. During the manufacturing process of
springs, high tensile residual stresses are generated which reduces considerably the spring
strength and service life. In the present study, the effect of shot peening with nitriding on
fatigue strength of high
out on a plane –N curves were established for shot peened with
nitriding and shot peened with out nitrogen conditions. The major results were as follows:
the surface layer of the workpieces was suitably deformed by shot peening with nitriding.
The residual stress was added in the surface locality on all shot peened with nitriding spring
.As the peening time increased, the region with residual stress extends in the intensity
direction.At a large number of cycles to fracture, shot peening with nitriding could more
effectively enhance the fatigue strength As a result of combining the simplified processes, a
new technology was developed guaranteeing to accomplishment of the fatigue strength. The
project describes the methodology and the experimental work, as fine as the obtained values
of fatigue strength. Other surface parameters are also given, such as roughness, hardness,
state and distribution of residual stresses.
P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 55
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)
ABSTRACT
There are many devices access wireless network , clogged airwaves are going to make
it. One German physicist ,Harald Hass has come up with a solution he calls “data through
illumination”-taking the fibber out of fiber optics by sending data through and LED light bulb
that varies in intensity faster than the human eye can follow. Li-Fi is a VLS , visible light
communication ,technology developed by a team of scientists including Dr Gordon Povey ,
Prof . Harald Hass and Dr Mostafa Afgani at the university of Edinburgh . The term Li-Fi
was coined by Prof . when he amazed people by streaming high -definition video from a
standard LED lamp . Li-fi is typically implemented using white LED bulbs . Unseen by the
human eye ,this variation is used to carry high speed data.
Human resource audit also called personnel management audit is well practiced in
western developed countries. Audit is evaluation, examination, review and verification of
complete activities, to see whether they represent a true state of affairs of the activities in the
department audit. Human resources audit is an important management control device it is a
tool to judge comprehensive method (or means) to review current human resources policies,
procedures documentation and system to identify need for improvement and enhancement of
the HR function as well as to assess compliance with ever changing rules and regulation.The
purpose of a Human Resources audit is to assess the effectiveness of the Human Resources
function and to ensure regulatory compliance. The audit can be conducted by anyone with
sufficient Human Resources experience.There's an advantage to having the audit conducted
by an external consultant. Because the external consultant has fewer biases about the
organization and has less personal interest in the outcome than an employee of the company,
the external consultant may be more objective.
Keywords: Personal Management, Evaluation, Effectiveness, Verification Activities,
Training has implications for productivity, health and safety at work and personal
development. The global competition and swiftness of changes emphasize the importance
of human capital within organizations, as well as the swiftness and ways of knowledge
gaining of that capital. In the economy where uncertainty is the only certainty,
knowledge is becoming a reliable source of sustained competitive advantage. Knowledge
is becoming basic capital and the trigger of development. Modern organizations therefore use
their resources (money, time, energy, information, etc.) for permanent training and
advancement of their employees. Organizations which are constantly creating new
knowledge, extending it through the entire organization and implementing it quickly
inside the new technologies, develop good products and excellent services. These
activities determine the company as a learning organization with constant innovation being
its sole business. These are organizations which realize that learning and new knowledge
are becoming the key of success, and that education is crucial for abundance.
Employees tends to become absolute, and therefore making the need to adapt to the
continuous learning and updating of the skill and knowledge invaluable, due to the
organizational, technological and social dynamics. Thus, in order for organizations to achieve
optimum returns from their investment, there is imperative need to effectively manage
training and development programmers. Training and development is an instrument that aid
human capital in exploring their dexterity. Therefore training and development is vital to the
productivity of organization’s workforce. Instruments: performance appraisal, potential
appraisal, feedback counseling, career planning, training, organization development, rewards,
employee welfare and quality of work life .
Key words: Employee Training, Employee Development, employee Productivity.
Any employee who has a complaint arising out of his or her employment should seek to
have that complaint addressed by using the appropriate university's procedure for his or her
staff group. It is expected that the majority of such complaints will not develop into formal
grievances but will be dealt with and satisfactorily resolved through informal discussion, as
described below. However, whenever the formal procedures are used, the employee has a
right to have his or her complaint carefully and impartially considered and to receive, after
appropriate consideration and discussion, to provide details of an alternative solution which is
acceptable to the employee and which is considered by his or her line manager and
department to be appropriate, taking account of the complaint raised and the impact of the
proposed solution on any other affected party. Where two or more employees within the same
department have identical complaints about a particular situation, their complaints should be
dealt with simultaneously by means of the individual grievance procedure described below.
This procedure is not available where employees have a grievance affecting more than one
department. As explained in the specialty doctrine, procedures form the set of principles and
rules from and with the help of which, employment relations should be conducted, but they
also represent operational mechanisms used by the parties in treating various problems that
arise every day. It is common that large organization have a set of procedures which draw
most, if not, all areas of interest for both parties, such as: union recognition, individual
representation, negotiation and dispute settling procedures, consulting procedures, settling
grievances procedures, dismissal procedures, disciplinary procedures, performance appraisal
procedures, promotion and transfer procedures, also. In many countries there are laws that
require the existence of such procedures, although it is unlikely that the law will apply in all
cases mentioned above. This material addresses only one of these procedures and that is
forming and solving employee complaints procedure and a practical review for this procedure
applied in some Romanian organizations.
Key Word: Nature of grievances, scopes of grievances, objectives of grievances, grievances
handling procedure.
The study of IDBI Federal Life Insurance, its origin and history provides glimpse
about company growth and expansion. This training provides an in depth study about the
company‘s policy, procedure and processes. It also provides the practical knowledge about
the functioning of various departments. As we come across the Personnel Department,
Marketing Department, we learnt number of things related to these departments. My training
is focusing on the area of Brand Awareness in competitive Market. I have made the survey on
―Brand Awareness”. I have done project in IDBI Federal Life Insurance, which is one of the
famous Insurance Company in India. IDBI Federal Life Insurance is covering huge market
share in the Insurance Market. Insurance market of Rajkot is very huge and continuous
growing. It is leading in insurance market and doing continuous growth.
Key words : Life insurance, child insurance ,income insurances , micro insurance
The general objective of the research was to study the impact of rewards and
recognition on employee motivation of Titan Company Limited. And the specific objectives
were to identify the most effective means of rewards and recognition, to study the
behavioural differences between appreciated and non-appreciated employees, to understand
the extent to which motivation enhances employee’s performance, to identify if the
motivation has an effect on individual and organizational growth and to study if rewards and
recognition results in emotional conflicts between employees. The descriptive research
design was adopted for this rewards and recognition. Various employees from the companies
were the respondents. It is evident from Titan Company Limitedthat a variety of factors
influence employee motivation and satisfaction. It was also significant to discover that there
is a direct and positive relationship between rewards and recognition and job satisfaction and
motivation. The direct translation of this could be that the better the rewards and recognition,
the higher the levels of motivation and satisfaction, and possibly therefore, the greater the
levels of performance and productivity. In the event of major inconsistencies, especially for
emotional conflicts between performers and non- performers, the organisation should make
an effort to reassess and rectify this situation. In the event that the organisation does not re-
assess this situation, it could have a resultant negative impact on job performance and
productivity as well as on the retention of minorities. In accordance with Maslow’s hierarchy
of needs, the lower level needs such as salary and benefits must first be met before the higher
level needs, which impacts motivation can be satisfied. The research study has shown that
managers can employ different strategies to motivate employees, but that it is important that
managers keep in mind that different strategies would have a different motivational impact on
different people. To get optimum results from a motivational strategy, the manager has to
realise and understand issues, which requires recognition of each individual’s unique values,
beliefs and practices.
Keywords: Rewards, Recognition, Employee, motivation, Work performance, Incentive,
Recognition Awards, Promotional marketing, Global solutions.
Cash is the important current asset for the operations of the business. Cash
management is a broad term that refers to the collection, concentration, and disbursement of
cash. The goal is to manage the cash balances of an enterprise in such a way as to maximize
the availability of cash not invested in fixed asset or inventories and to do so in such a way as
to avoid the risk of insolvency. Factors monitored as a part of cash management include a
company’s level of liquidity, its management of cash balances, and its short-term investment
strategies. Through this analysis Cash managements concerned with the managing of: (i)
Cash flows into and out of the firm, (ii) Cash flows within the firm, and (iii) Cash balances
held by the firm at a point of time by financing deficit or investing surplus cash. The firm’s
need tohold cash may be attributed to the following three motives are transactions motive,
precautionary motive and speculative motive. Cash planning protects the financial condition
of the firm by developing a projected cash statement from a forecast of expected cash inflows
and outflows for a given period. Cash plans are very crucial in developing the overall
operating plans of the firm.
Keywords: Cash Flow, Firm, Concentration, Operation Plan, Current Asset, Motives,
Investment, Liquidity, Inventories, Collection, Enterprise, Disbursement and Forecast.
Digital media is so pervasive that consumers have access to information any time and
any place they want it. Gone are the days when the messages people got about your products
or services came from you and consisted of only what you wanted them to know. Digital
Marketing is so important and gives us so many benefits, because via electronic channels and
by posting positive comments, feedbacks about company/product can attract new customers
and build long-lasting relationship. SEM is a type of Internet marketing associated with the
researching, submitting and positioning of a website within search engines to achieve
maximum visibility and increase your share of paid and/or organic traffic referrals from
search engines. Search engine optimization (SEO) is the process of affecting the visibility of
a website or a web page in a search engine's "natural" or un-paid ("organic") search results.
SEO may target different kinds of search, including image search, local search, video search,
academic search, news search and industry-specific vertical search engines. Pay per
click (PPC), also called cost per click, is an internet advertising model used to direct traffic to
websites, in which advertisers pay the publisher (typically a website owner) when the ad is
clicked. It is defined simply as “the amount spent to get an advertisement clicked”. Social
media has become a platform that is easily accessible to anyone with internet access.
Increased communication for organizations fosters brand awareness and often, improved
customer service. Additionally, social media serves as a relatively inexpensive platform for
organizations to implement marketing campaigns. Broadly, the term is usually used to refer
to sending email messages with the purpose of enhancing the relationship of a merchant with
its current or previous customers, to encourage customer loyalty and repeat business,
acquiring new customers or convincing current customers to purchase something
immediately, and adding advertisements to email messages sent by other companies to their
customers.
Keywords: Search engine marketing, Digital marketing, Search engine optimization, Pay-per
click, Social media marketing, E-mail marketing:
The purpose of this paper is to identify the factors that effects employee
motivation and examining the relationship between organizational effectiveness and
employee motivation. A model was designed based on the literature, linking factors of
employee motivation with employee motivation and organizational effectiveness.
Motivation implies that one person, in organization context a manager includes another, say
on employee, to engage in action by ensuring that a channel to satisfy those needs and
aspirations become available to the person. In addition to this, the strong needs in a
direction that is satisfying to the latent needs in employees and harness them that would be
functional for the organization. Empowerment and recognition have positive effect on
employee motivation training. More the empowerment and recognition of employees in an
organization is increased. More will their motivation to work will enhance. Also there
exists a positive relationship between employee motivation and organizational
effectiveness. The more the employees are motive to tasks accomplishment higher will the
organizational performance and success. The study focuses on the practice and observance
the two central factors, empowerment and employee recognition for enhancing employee
motivation which leads to organizational effectiveness of the training program. The
organizations should design their rules, policies and organizational structures that give
space to the employee to work well and appreciate them on their tasks fulfillment and
achievements.
Key words: Employee Motivation, Relationship, Empowerment, Recognition
Effectiveness, Accomplishment, Structures, Achievements
The career planning process is often illustrated as the last step in an ever-changing
work environment. The technical, professional, managerial, and interpersonal skills to
successfully perform and succeed in this rapidly changing work environment are essential.
There is a very real and immediate threat that many of the professional skills that we have
learned yesterday and today will be obsolete and insufficient to cope with the inevitable
changes in the future. This paper addresses specific questions on career planning, activity
which plays an increasingly representative role in the human resources management. People
were always concerned about choosing and building careers to meet their needs and
aspirations. Career planning process involves both individual and organization responsibility.
In the contemporary business environment, highly competitive, we find that career
management responsibility rests increasingly on the individuals. This study helps to
understand the career planning and development and measure the current level of career
planning and development in service sectors industry and to measure and improve career
planning and development of among employees and to understand the techniques used for
career planning and development across the industry.
KEY WORDS: Planning activities; Career management; Human resource; System
The present study is made an attempt to identity the employee welfare measures
adopted in electronic industries. Employee welfare means anything done for the comfort and
improvement of the employees over and above the wages paid which is not a necessity of the
industry. The basic purpose of the employee welfare is to enrich the life of employee and
keep them happy. Employees spend at least half their time at work or getting to it or leaving
it. They know that they contribute to the organization when they are reasonably free from
worry and they feel that when they are trouble/ problems they are due to get something back
from the organization. People are entitled to be treated as fully human being with personal
needs hopes and anxieties. To know that whether welfare facilities play an important role on
working of employees and need to know the employees are dissatisfied welfare facilities will
help them to get motivated. Employees play an important role in the industrial production of
the country. Hence, organizations have to source the cooperation of employees in order to
increase the production and to earn high profits. The cooperation of employees is possible
only when they are fully satisfied with their employer and the working condition on the job.
Keywords: Welfare measures, Safety, Human relationship
ABSTRACT
Manufacturing cost is the aggregate amount of cost incurred by a business to produce
goods in a reporting period. The term can then be defined in two ways, which are. The entire
amount of this cost is charged to expense in the reporting period, which means that
manufacturing cost is the same as the cost of goods sold; or. A portion of this cost is charged
to expense in the period, and some of it is allocated to goods produced in the period, but not
sold. Thus, a portion of total manufacturing cost may be assigned to the inventory asset, as
stated in the balance sheet. Manufacturing cost definition and calculation. The more common
usage of the term is that manufacturing cost follows the first definition, and so is the amount
charged to expense in the reporting period. This includes such costs as production.
Manufacturing cost is the aggregate amount of cost incurred by a business to produce goods
in a reporting period. The calculation of this cost is somewhat different if we use the second
definition, where some of the cost may be assigned to goods that are produced, but not sold.
In this case, use the following steps (assuming that standard costing is used). Assign a
standard materials cost to each unit produced. Assign a standard direct labor cost to each unit
produced. Aggregate all factory overhead costs for the period into a cost pool, and allocate
the contents of this cost pool to the number of units produced during the period. When a unit
is sold, charge to the cost of goods sold the associated standard materials cost, standard direct
labor cost, and allocated factory overhead.
Key words: Direct materials, Direct labor, overhead
Mental health is an important component of the total positive health and is interwoven
closely with the physical and psychological dynamics of the human body. Worldwide about
500 million people are believed to be suffering from neurotic stress related and psychological
problems. Although stress is unavoidable but minor stress can have an impact. Stress can be
experienced from four basic sources Social stressors: Some examples of social stressors
include deadlines, financial problems, jobs interview, presentation, disagreements, demands
for your time and attention, loss of a loved one, divorce and co-parenting. Environmental
Stressor; It includes weather, noise, crowding, pollution, traffic, and crime. Physiological;
Examples of physiological stressors include illness, giving birth, accidents, lack of exercise,
poor nutrition and sleep disturbances. Every person has a unique response to stress, so there
is no one fixed solution to managing it. No single method works for everyone or in every
situation, so experiment with different techniques and strategies and focus on what makes
you feel calm and in control. Change the situation: Avoid the stressor, alter the stressor.
Change your reaction adapt to the stressor, accept the stressor. Keep a check on your state of
mind throughout the day. Whenever you feel stressed. Build strong relationship exercise
physical activities. Stress is a fact of everyday life, we’ve all felt it. Sometimes it acts as a
positive force and sometimes as a negative force. If you experience stress over a prolonged
period of time, it could become chronic, till you take some action about 500 million people
worldwide are believed to suffering from neurotic, stress related physical problems. The
challenge can however, be tackled by joint action between life science, social science urban
planning, architecture and politics.
KEY WORD: Architecture, neurotic problems, physical problems, stress .
A study on financial leverage in co operative spinning mills Ltd. Uthangarai, One of the ways
to increase the value of impact of resource is to use leverage. Traditionally, discussion on
leverage was view from the perspective of financial leverage which arises from financial
activities. However, operating leverage arising from the operating activities of business is
also used extensively these days. Operating leverage increases the return to limit equity funds
by using the money to control asset rather than own. Financial leverage as well as operating
leverage on the profitability of the selected company. The study investigating the impact of
degree of financial leverage and operating leverage on correlation analysis the finding
suggest that financial leverage had no significant relationship on profitability while operating
leverage had significant relationship on profitability which the exception of few. The
operating &financial leverage from perspective of the financial manager accenting the
relationship to stockholder wealth maximization (SWM), risk & return potential agency
problems. It also covers some of the potential literature related specifically to the implication
of operating & financial risk association measurement dilemmas .the little effect on the
dynamics of stock return volatility of at the market level . Financial leverage contributes
more to the dynamics of stock return volatility for a small firm.
Keywords: Operating Leverage, Financial Leverage, Profitability.
ABSTRACT
Motivated and engaged employees tend to contribute more in terms of organizational
productivity and support in maintaining a higher commitment level leading to the higher
customer satisfaction. Proper attention on engagement strategies will increase the
organizational effectiveness in terms of higher productivity, profits, quality, customer
satisfaction, employee retention and increased adaptability to achieve evaluated life style.
This project focuses on the need for such employees, how their presence can improve the
progress, work efficiency of the organization as a whole, various factors which lead to
employee engagement and what should company do to make the employees engaged This
study helps to understand the perception and to measure the current level of employee
engagement in service sector industry and to measure & improve perception of employee
engagement among employees and to understand the techniques used for employee
engagement across the industry. Also focuses on the challenges faced by the HR managers to
improve employee engagement for the organization’s survival. The dissertation aims to
measure engagement and look at the areas where management interventions can be
implemented to increase the overall level of employee engagement.
This report has been designed to discuss the Performance Appraisal system of IDBI
Federal Life Insurance Co. Ltd. It also discusses about the various ways and methods of
Appraisal systems being followed in the company. The report discusses about the satisfactory
level of the employees of the company, with the existing system. It also highlights on some
of the merits and demerits of this Appraisal system, and also tries to find out if the current
system has helped them improve in the overall productivity of the company. In this paper, I
basically tried to explain why Performance Appraisal system is important in an insurance
industry as such. In the present company, IDBI Federal Life Insurance Co. Ltd. They have
been following an old traditional method of Appraisal System, since their inception. So,
through this paper, I studied about the entire process in detail, and got feedback and
responses from the employees themselves about how they feel about the system. It is also
observed that, though there are several ways, in which the employees are being appraised,
their satisfaction levels as well as motivation levels were not that high. This could be due to
various factors. On the other hand, through this paper I have also tried to figure out if there
are any kinds of errors associated with this kind of system. It is seen that there are a few
loopholes associated with the entire Appraisal process. But on the other hand, there are a
number of merits associated with the Appraisal system as well. In my study, I also tried to
highlight the kind of correlation existing between the Attrition rate as well as the sales
turnover of the company, year by year. This reveals the fact that, the Appraisal system does
play major role in determining the overall productivity of the company. As my primary
objective is to try and develop a new Appraisal System for the company, before proposing a
whole new method of Performance Appraisal System for IDBI Federal Life Insurance Co.
Ltd. Through this paper, I have recommended a new Performance Appraisal System for IDBI
Federal Life Insurance Co. Ltd., and it is likely to reduce the errors and biasness, in contrast
to the current system. This could likely improve on the overall productivity of the company
as well as increase the satisfaction of employees, thus reducing the Attrition rate, for the
upcoming financial year.
The main research that followed is to know consumer satisfaction, the survey
involved gathering in wide information about the company it is products customer
satisfactions and impact of various competitive forms on the company from the information
collected various abstracts where identified where the needed to focused more to improved
efficiency of marketing . The research was conducted through collection of primary and
secondary data was collected through visiting various website about fruit product. Good
services and consumer satisfaction are very important for companies for both of small and
big companies, but especially for small companion’s .today competition between companies
growing the time of why good service is becoming more and important. When a company
manager survey it is customer well enough and market them happy company can create long
term customer relations and possibly get free marketing at the same time and satisfied.
Customer tell about the goods and services got the satisfied customer have possible impact on
the company result. it is important and an interesting to investigate. When measuring
customer satisfaction it is possible to get useful information customer and result can be used
to improve a company and it is services. You get an exact idea what your customer want and
you can start developing services measuring to customer satisfaction should be a continuous
process that is carried out regularly not just one if is done regularly result will be more
beneficial.
P.S.V. College of Engineering and Technology, Krishnagiri, Tamilnadu 74
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)
76
National Conference on Innovative Research in Science, Engineering & Management (NCIRSEM’17)
77