Browse Items (1473 total)
Sort by:
-
Current status of e-governance in healthcare in the large hospitals of Bangalore /
Healthcare industry has seen a lot of transformation and innovation over the years. It is coming forward as a recognised sector in India after Information Technology and Pharmaceutical. But despite this Indias healthcare infrastructure has not kept pace with the economies and the sectorial growth. Enormous amount of resources have been spent but very little change on actual health status is noticed. This study is undertaken to assess the current status of e-governance (ICT) in large hospitals and try and find out the awareness and accessibility of e-governance to the patients. The survey conducted in hospitals involved the patients responses and responses from the Healthcare Professionals (HCPs). An attempt has been made to find out the effectiveness of various ICT applications in the healthcare like EHR/ EMR or Telehealthcare. Majority of the research on e-governance focussed on overall effective governance and administration but very few studies have been done to highlight the status of e-governance in healthcare in India. -
Customer Perception and Receptivity to Loyalty Programs offered by Organised Retailers
The Indian Retail Industry is growing at a fast pace. This growth to a large extent is driven by the organised retail market, with more and larger retail organisations investing heavily in increasing their store networks and improving in-store offerings. Apparel, accessories and related merchandise form a considerable chunk of the organised retail space and is in the ambit of a handful of established players vying to capture & increase larger portions of the available market using new strategies. Increased customer satisfaction and service is one of the means through which they will be able to fulfill their goals. The use and implementation of Customer Relation Management tools like Loyalty Programs is one of the ways in which they can achieve customer satisfaction. According to Sharp and Sharp (1997) loyalty programs are structured marketing efforts, which reward and encourage the loyal behaviour of their members. Capizzi et al (2004) defined it as the business process of identifying, maintaining and increasing the yield from best customers through interactive,value-added relationships.Loyalty programs are thereby are a rhetoric of relationship marketing in gaining customer loyalty.(Minami & Dawson ,2008) . Loyalty programs, however serve dual purposes of the organisation ?? acquisition of customer spending related information and ensuring that they patronise their store. According to Peters (1988) the costs of retaining customers are about 80 percent lower than acquiring new customers. This explains why there is a high degree of proliferation of retailer loyalty programs. Loyalty Programs today have become an inseparable part of the Customer Relationship Management (CRM) strategy of todays retailers. It is vital to gauge how successful these programs are as CRM tools. This study is concerned with how customers perceive such programs and how receptive they are towards these programs. The sample size consisted of 168 usable samples of member customers of loyalty programs of four competing departmental stores who were members of the stores. The study was confined to the city of Bangalore. Convenience sampling was used for the purpose of data collection. Data was collected through questionnaires and was subjected to descriptive analysis and inferential analysis. The reliability of the perceptual scale was found to be 0.766. The major findings of the research are: ? Lifestyle is the most frequented store and Shoppers Stop has the most attractive loyalty program. ? Customers have more important reasons for preference of a store than holding membership to the stores loyalty program ? Customers perceive that a loyalty program membership makes them enjoy monetary benefits. Offers and discounts followed by redeemable points are the most popular form of monetary benefits. ? Customers seek ??real and value creating benefits from loyalty programs ? There is a significant relationship between customer perception of loyalty program benefits and purchase behaviour. ? There is a significant relationship between customer perception of loyalty program benefits and store attractiveness and loyalty. The study will help retail organisations understand their customers better and help them in designing and implementing more satisfying, value creating and differentiated programs as a CRM tool to retain customers and build loyalty. -
Cyber security laws in civil aviation in India: A critical analysis /
Cybersecurity in civil aviation is becoming increasingly critical as the aviation industry in India continues to grow and evolve. With the increasing use of technology and automation in aviation, there is a growing risk of cyber threats that can affect the safety and security of civil aviation operations. This paper provides a critical analysis of the current state of cybersecurity in civil aviation in India. It examines the various cyber threats facing the aviation industry, the legal and regulatory framework for cybersecurity in India, and the measures that can be taken to enhance cybersecurity in civil aviation. The analysis highlights the need for a comprehensive and proactive approach to cybersecurity in civil aviation in India, including the implementation of robust cybersecurity policies and procedures, the adoption of international best practices, and the establishment of a dedicated cybersecurity framework for the aviation industry. -
Data Encryption Algorithm for Local Area Network (LAN)
The volume of traffic moving over the Internet is expanding exponentially every day due to increase in communication through Emails, branch offices remotely connect to their corporate network and commercial transactions. Hence protection of networks and their services from unauthorized modification and destruction is very much needed. TCPIP is the most commonly used communication protocol in the Internet domain. IP packets are exchanged between the end hosts as plain text (without any encryption). As Internet uses PSDN (Packet Switching Data Network) anybody who has access to PSDN can access/modify the data. Hence securing data over the network is difficult. The goal of network security is to provide, authenticity, confidentiality and integrity. Confidentiality is making sure that no body other than the receiver will be able to read the data. Integrity is making sure that the data didnt get modified by intruder or by some other means while it is getting transmitted. Authenticity is making sure that the data is coming from the right sender. In this paper we propose a new data encryption algorithm based on private key (symmetric key) cryptography method. Keys are shared between two end hosts using simple algorithm. Cyber block chaining method is used while encrypting/decrypting the data. Large prime numbers are generated well in advance and kept for further key refreshments. The keys were refreshed periodically, so it gives very minimal time for the hackers to attack the system. As simple operations are used, we will be able to achieve fast and secure data encryption/decryption using this method. The behavior of the proposed approach is verified through various tests. -
Data Structure Based Loss-less Image Compression Algorithm
Working capital in any organizations has a significant role in driving the business forward. Hence, there is an imminent need for the management of the working capital. The efficiency with which working capital is managed in a business or organization determines the health of the business or the organization. On having an effective working capital management firms tend to be successful and while ineffective working management leads to the failure of the business. Hence, the management of working capital is of great importance. The research study is to evaluate the effectiveness of working capital management in maximizing the profitability of construction companies in Bangalore. The research will analyze the construction companies to establish an understanding of the significance of effective WCM for maximizing the profitability. The working capital is the life blood of a business and an important function of finance that defines and deals with the liquidity of the firm. Also, profitability of firms is another major aspect of business. The research explores the correlation between the working capital and profitability to understand the effectiveness of working capital management in maximizing the profitability. The construction industry is the second largest industry of the country after agriculture. Construction activity is an integral part of a countrys infrastructure and industrial development. It includes hospitals, schools, townships, offices, houses and other buildings; urban infrastructure (including water supply, sewerage, drainage); highways, roads, ports, railways, airports; power systems; irrigation and agriculture systems; telecommunications etc. Covering as it does such a wide spectrum, construction becomes the basic input for socio-economic development. The construction industry generates substantial employment and provides a growth impetus to other sectors through backward and forward linkages. It is, essential therefore, that, this vital activity is nurtured for the healthy growth of the economy. With the present emphasis on creating physical infrastructure, massive investment is planned during the Tenth Plan. The construction industry would play a crucial role in this regard and has to gear itself to meet the challenges. In order to meet the intended investment targets in time, the current capacity of the domestic construction industry would need considerable strengthening. The construction sector has major linkages with the building material industry since construction material accounts for sizeable share of the construction costs these include cement, steel, bricks/tiles, sand/aggregates, fixtures/fittings, paints and chemicals, construction equipment, petro-products, timber, mineral products, aluminum, glass and plastics. The construction sector is one of the largest employers in the country. In 1999-2000, it employed 17.62 million workers, a rise of 6 million over 1993-94. The sector also recorded the highest growth rate in generation of jobs in the last two decades, doubling its share in total employment. -
DECLINE OF TIBETAN MUSIC AND THE INVASION OF CHINA
This study explores the forms and features of Tibetan music that existed in the past and its gradual change to the present. It looks at the traditional music that Tibetans followed and the amalgamation of the same with other forms and genres of music as it altered during and after the Chinese invasion of 1949. The study will be working under the idea that the Tibetan music has lost its traditional trace as the prominence of commercial marketing of music have escalated and how this was brought on by the mentioned invasion: the political, social, cultural and economical aspects which directly or indirectly changed the musical culture of Tibet. It envelopes the idea that the musical tradition of Tibet has been lost due to the strong administrative control of the Chinese government and how that led to the failure of the native Tibetans to safeguard the Tibetan traditional forms and genres of music. -
Deconstruction of representation of working women in Indian femvertisements /
Femvertisements are advertisements wherein brands use the concepts of feminism, women empowerment etc. These advertisements talk about breaking the stereotypes that women are confined to in our society. The irony comes when these empowering advertisements themselves have hidden stereotypes that invariably end up doing more harm than good. -
Demographic Variables Influence on Work Engagement of Nurses and Doctors in Hospitals.
It has been foreseen that the healthcare sector in India will be at par with the IT services as well as education in terms of revenue, and would largely contribute to the countrys economy. The health-care industry is presently worth $ 7 Billion dollars (USD), and is predicted to grow at the rate of 13% every year. At this pace, work levels in hospitals have increased, and an employees contribution towards work has decreased. The psychological connection of employees towards their work has gained critical importance; as organizations find that their employees are not giving their best in these times when the demand is on its rise. Work engagement is a positive-fulfilling work-related state of mind characterized by vigor, dedication and absorption, where vigor being high energy levels and mental resilience, dedication being a state of mind where an individual is strongly involved in ones work, and absorption is characterized by engrossment and concentration towards ones work. Literature review on work engagement from the last decade has focused on the relationship of engagement with job satisfaction, employee turnover, performance, and other human resource related constructs. A sample of 372 respondents comprising of doctors and nurses form 20 hospitals (corporate, government and private/trust) of 150 beds and above. Respondents were chosen by using judgmental sampling technique. The variables under investigation were Work engagement and eight demographic characteristics of the respondents. Utrecht Work engagement scale (UWES), by Wilmar Schaufeli and Arnold Baker, (2003), and based on the objectives the eight demographics were included. Fourteen hypotheses were tested and the major findings were that the overall work engagement for doctors was significantly high, and for nurses it was found to be moderate. Significant difference on work engagement levels on doctors was found across gender, educational qualification, age of the respondents, marital status, number of children, and types of hospitals. No significant difference on work engagement levels was found across work experience for doctors. Significant difference on work engagement levels on nurses was found across educational qualification, age of the respondents, work experience, marital status, number of children, and type of hospitals for nurses. No significant difference on work engagement levels was found across gender for nurses. Implications suggested that hospitals develop a flexible training, and therapeutic program for men and women to manage stress customized to their requirement. Focus should be given on encouraging employees to continue higher education. Younger and less experienced employees should be encouraged to interact with senior staff as their sharing of ideas and thoughts would be beneficial to both older and younger employees. Hospitals should imbibe values and ethics which are based on compassion, love for mankind and development of society through good leadership which would inspire them to go that extra mile. Key words: Work engagement, Demographic influence, Doctors, Nurses. -
Design an efficient protocol for secured energy efficient routing in large scale wireless sensor networks
Wireless Sensor Network has played a significant role in enabling communication and connectivity to human unreachable area since more than a last decade. Apart from its newlinebeneficial features, it also suffers from various problems that have yet not been solved till date in spite of massive research work in this area. The proposed work jointly addresses the problems of energy efficiency and secure routing in wireless sensor network. The existing literatures are found to provide a less scope of an effective solution to address such issues jointly. Hence, the prime goal of the proposed work is to introduce a mechanism that uses lightweight cryptosystem as a part of new hierarchical routing protocol. The mechanism of the proposed work is discussed in three different modules. Where each module is enhanced version of the previous module. The first module is named as Secured Tree Based Routing with Energy Efficiency (STREE), which newlineintroduces a new energy efficient selection of cluster head along with a very simple and newlinelightweight encryption mechanism for routing message using keccak, a newly launched newlinecryptographic hash function. The second module is named as Secured Authentication Based Routing (SABR) introduces node-to-node authentication along with identification newlineand compensation of network related delay owing to incorporated cryptography. The newlinethird module is named as Secured Anonymous Routing with Digital Signature (SARDS) newlinewhich introduces a distinct mechanism of using enhanced elliptical curve cryptography newlineand a new usage of digital signature. The modelling of proposed study is done using newlineanalytical research methodology and the outcome of the study has been compared with newlineexisting standard routing protocol SecLeach to find that proposed system presents a newlinesuperior mechanism of balancing security, energy efficiency, and communication newlineperformance in wireless sensor network. -
Design and Development of A Generic Framework for Surface Water Delineation and Monitoring Using a Hybrid Level Set Algorithm on Landsat Multi-Spectral Data
Surface water bodies are critical to the existence and sustenance of civilizations. Water bodies in urban cities across the world have undergone drastic decline in quality and quantity. This has been the result of a multitude of reasons like increase in population, urbanization and encroachment. Monitoring changes to water bodies is a newlinenecessary requirement in devising strategies to conserve them. This thesis proposes newlinea generic framework for monitoring and forecasting changes in the surface area of newlinelakes using a hybrid level set algorithm for water body delineation followed by a double exponential smoothing model for forecasting. The proposed hybrid level set algorithm combines the advantages of edge based and region based level sets. An edge detection term is introduced into the formulation which improves the delineation accuracy by forcing the level set evolution to stop at the boundaries of the region of interest. The performance of the algorithm was analyzed using Pearson s Correlation Co-effcient (PCC), Structural Similarity Index (SSIM) and Dice Similarity index and found to have superior performance compared to established methods in the literature. The study uses Landsat multi-spectral data for the last 30 years to build the proposed framework for forecasting the changes in the surface area of water bodies. The experiments were conducted for nine lakes in Bangalore, a fast growing city in India, and a steady decrease in the surface area is observed for most of the lakes that were studied. The city s renovation attempts have also seen that the some of the lakes are sustaining the rapid urbanization. The proposed forecast model has yielded acceptable results with an average error of 0.22% and a correlation coeffcient of 0.94 between the actual surface area and the forecasted surface area. The framework can be customized in the future to study specifc water bodies by plugging in external newlineparameters to improve the forecasting accuracy. -
Design and Development of Adaptive Authentication Model to Detect User Behavior Anomalies
The password-based authentication system has recently become more secure as the riskbased authentication system(RBA) is indentured. Recent research in the area has shown the significant use of 2 Factor Authentication (2FA) and Multi-Factor Authentication(MFA) in many commercial applications using Risk Based newlineAuthentication(RBA). The RBA system monitors the parameters extracted during the user login process, and based on the proposed model, the system raises a multi-factor newlineauthentication to the user. As the vulnerability has increased concerning passwords, fingerprints easy access to any web application may result in a security flow; the reason can be the existing methodology of the RBA system and also the unavailability of the data of the users during the initial login process, which hinders the authentication system during the initial login process as there is no standard method to incorporate RBA in the authentication system. Few researchers have proposed novel approaches to improve the authentication system. Still, to the best of our knowledge, no research has suggested methods to address the authentication system during the initial login process and also provide a robust way, a combination of Machine Learning (ML) and statistical newlineapproaches. Hence, a novel method is proposed for the RBA system during the initial newlinelogin phase using a Hierarchical Sub-Feature Based Model -(HSFBM) for different user newlinecategories. The FAR is comparatively better in our proposed model against the standard newlinemodel, with minimal re-authentication requests for the user. -
Design and development of an efficient model for handwritten modi script recognition
Machine simulation of human reading has caught the attention of computer science newlineresearchers since the introduction of digital computers. Character recognition, a branch of pattern recognition and computer vision, is the process of identifying either printed or handwritten text from document images and converting it into machinecoded text. Character recognition has been successfully implemented for various foreign language scripts like English, Chinese and Latin. In the case of Indian language scripts, the character recognition process is comparatively difficult due to various complexities such as the presence of the vowel modifiers and a large number of characters (class). MODI script is a shorthand form of Devanagari script and it was used as an official script for writing Marathi until 1952. Presently the script is not used officially, but has historical importance. MODI script is a cursive script and the character recognition task is difficult due to various reasons such as variations in the shapes of a character with different individuals and the presence of identical looking characters. MODI documents do not have any word demarcation symbols and that adds to the complexity of the task. The advances in various Machine Learning newlinetechniques have greatly contributed to the success of optical character recognition. newlineThe proposed work is aimed at exploring various Machine Learning techniques/ newlinemethods which can be effectively used in(to) recognizing(recognize) MODI script and newlinebuild a reliable and robust character recognition model for handwritten MODI script. This research work also aims at the development of a Machine Transliteration and text recognition system for MODI manuscripts. -
Design And Development Of Artificial Intelligence Based Knowledge Management System For Managing Software Security Vulnerabilities
Software development practices play a signifcant role in building the world s future. It is the place where exciting technological evolution begins in the world. Exploration of critical challenges in the area of software development plays a signifcant role in fueling the pace of technological progression in the industry. This work focuses on exploring important areas of software development practices and problems faced by the industry. Understanding the critical parts of the software system development eco-system and the stakeholders associated with those will be important. Customers of software development teams, the software development industry and knowledge newlinesources, and the software development internal eco-system are the broad focus areas of study. Leveraging the data already spread across the eco-system and facilitating easy newlineaccess to practitioners as and when there is a need will be one of the primary focuses. newlineThe software development landscape module, customer landscape module, and industry landscape module are the key modules that will be explored in this work. The core aspiration of the work will be to integrate all the possible data across the industry newlineand process the same and make it easily accessible to the practitioners as and when they are needed. The process also makes the data smarter and more insightful over time. -
Design and Development of Dual Fuzzy Technique to Optimize Job Scheduling and Execution Time in Cloud Environment
Cloud computing is a type of computing that relies on sharing a pool of computing resources, rather than deploying local or personal hardware and software. It enables convenient, on-demand network access to a shared pool of configurable computing re- sources (e.g., applications, storage, networks, services, and servers) that can be swiftly provisioned and released with minimal management control or through the interaction of the cloud service provider. The increasing demand for computing resources in the cloud has made elasticity an important issue in the cloud. The availability of extending the resources pool for the user provides an effective alternative to deploying applications with high scalability and processing requirements. Providing a satisfactory Quality of Service (QoS) is an important objective in cloud data centers. The QoS is measured in terms of response time, job completion time and reliability. If the user jobs cannot be executed in high load and the job is crashed, it will enormously increase the response time and also push up the job completion time. Also due to load, the jobs may be still in the waiting queue and could not find a resource to execute. In such a situation, the user notices a big response delay and it will affect the QoS. Towards ensuring QoS, this research proposes the following solution - Dual Fuzzy Load Balancing for jobs. Dual Fuzzy Load Balancing balances the load in the data center with an overall goal of reduction of response and execution time for tasks. The proposed solutions were simulated in the Cloudsim simulator and performance metrics in terms of job response time, job completion time, resource utilization, a number of SLA violations, and along with the cost comparison to the existing algorithms of Load Balancing. The proposed solutions are also implemented in a real cloud environment and the effectiveness of the solution is evaluated.