VOLUME 2, ISSUE 2, FEBRUARY 2015
THE RELATIONSHIP BETWEEN THE ADEQUACY OF REWARDS AND EMPLOYEE PERFORMANCE IN LARGE BEVERAGE COMPANIES: A COMPARATIVE STUDY
Felicidad A. Dy Kam, DBA
EVALUATION OF DWT BASED IMAGE FUSION WITH THREE DIFFERENT RESAMPLING METHODS
G. Mamatha, M.V. Lakshmaiah, V. Sumalatha
SURVEY OF ALGORITHMS ON MAXIMUM CLIQUE PROBLEM
Krishna Kumar Singh, Dr. Ajeet Kumar Pandey
STUDY OF SECURING COMPUTER FOLDERS WITH BLUETOOTH
Asst. Prof. A.V.Nadargi, Apurva Dalmiya, Sonali Jadhav, Gajendra Singh Solanki
CUSTOMIZATION OF AN ENTERPRISE REQUEST MANAGEMENT SYSTEM
Ashna Shah, Chinmay Balutkar, Bhargavee Singh, Rajesh. B. Singh
CONCISE SURVEY ON PRIVACY PRESERVING TECHNIQUES IN CLOUD
B.Banu priya, V.Sobhana, Prof.Mishmala Sushith
EFFICIENT FAULT TOLERANT STRATEGIES IN CLOUD COMPUTING SYSTEMS
Siddharth Shyamsunder, Kunal Varkhede, Shirish Bhuruk, Rasika Vibhute, Prof R.P. Karande
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES
Prajakta Jagtap, Atharva Joshi, Shamsundar Vyas
COMPARATIVE EXPERIMENTAL PERFORMANCE STUDY OF DIFFERENT TYPES OF SOLAR WATER HEATING SYSTEMS IN A TYPICAL CLIMATE
Rahul Gupta, Sahil Kesar, Jyoti Lalotra
Abstract
THE RELATIONSHIP BETWEEN THE ADEQUACY OF REWARDS AND EMPLOYEE PERFORMANCE IN LARGE BEVERAGE COMPANIES: A COMPARATIVE STUDY
Felicidad A. Dy Kam, DBA
DOI: 10.17148/IARJSET.2015.2201
Abstract: This research study aimed to look into the relationship between the adequacy of company rewards and employee performance as perceived by the employees of Coca-Cola Bottlers Phils., Inc. in Meycauayan, Bulacan and Cosmos bottling Corporation in Valenzuela Metro Manila. The respondents of the study were the 35 employees of Cosmos Bottling Corporation and 22 employees Coca-Cola Bottling Corporation. The researcher extensively used the survey questionnaire for data gathering and employed statistical tools such as Weighted Mean, T-test and Pearson R. The findings revealed that the adequacy of rewards between the two groups of employees ranged from barely adequate to adequate. There was a significant difference in the adequacy of rewards as perceived by the two groups of respondents. The findings also disclosed that there was a significant relationship in the adequacy of rewards and employee performance as revealed by the respondents of the two beverage companies
Keywords: Adequacy, reward, Coca-cola employees, Cosmos employees
Abstract
EVALUATION OF DWT BASED IMAGE FUSION WITH THREE DIFFERENT RESAMPLING METHODS
G. Mamatha, M.V. Lakshmaiah, V. Sumalatha
DOI: 10.17148/IARJSET.2015.2202
Abstract: The science of satellite observation is called remote sensing. In optical remote sensing, the multispectral (MS) image which contains color information is produced by three sensors covering the red, green and blue spectral wavelengths. Because of the trade-off imposed by the physical constraint between spatial and spectral resolutions, the MS image has poor spatial resolution. On the contrast, the panchromatic (PAN) images has high spatial resolution but without color information. Image fusion can combine the geometric detail of the PAN image and the color information of the MS image to produce a high-resolution MS image. - Image fusion is powerful tool to include the detail information into single image from many images taken from different sensors at different instants This study is carried out using Cartosat-2 Panchromatic image with 1m spatial resolution and Resource sat-1 Liss-IV sensor of 3 bands b2 , b3 and b4 with 5.8 m spectral resolution. The images are to be pre-processed to accommodate the fusion algorithm requirements. This pre-processing may include registration and resampling of the MS and PAN images. Image Resampling is the mathematical technique used to alter the scale of an image. Popularly known basic interpolation techniques are nearest neighbor, bilinear and bicubic. These resampled MS and PAN images are fused by using Discrete Wavelet Transformations (DWT) technique. Fusion results are evaluated numerically; and quality metrix are calculated between the fused image and MS image.
Keywords: Resampling, DWT, Image Fusion, Image Processing
Abstract
SURVEY OF ALGORITHMS ON MAXIMUM CLIQUE PROBLEM
Krishna Kumar Singh, Dr. Ajeet Kumar Pandey
DOI: 10.17148/IARJSET.2015.2203
Abstract: The maximum clique problem (MCP) is to determine a sub graph of maximum cardinality. A clique is a sub graph in which all pairs of vertices are mutually adjacent. Based on existing surveys, the main goal of this paper is to provide a simplified version and comprehensive review on Maximum clique problem. This review intends to encourage and motivate new researchers in this area. Though capturing the complete literature in this regard is beyond scope of the paper, but it is tried to capture most of the representative papers from similar approaches.
Keywords: Maximum Clique problem, Exact Algorithms, Approximation Algorithms, Heuristic Approach, Local search.
Abstract
STUDY OF SECURING COMPUTER FOLDERS WITH BLUETOOTH
Asst. Prof. A.V.Nadargi, Apurva Dalmiya, Sonali Jadhav, Gajendra Singh Solanki
DOI: 10.17148/IARJSET.2015.2204
Abstract: We are presenting a system to keep your data prevented against unauthorized access by using symmetric key. In order to keep this symmetric key secret the proposed system encrypts this confidential symmetric key with the public cryptographic function and the key stored into the window's registry. This system also uses the Bluetooth technology as the main technique for communication between elements of the system. The use of Bluetooth device's MAC address which is stored in the registry of our personal computer plays a major role in securing the data. The system focuses on to ensure data confidentiality to the authorized users only.
Keywords: Bluetooth communication, Rijndael algorithm, MAC addresses, Windows Registry.
Abstract
CUSTOMIZATION OF AN ENTERPRISE REQUEST MANAGEMENT SYSTEM
Ashna Shah, Chinmay Balutkar, Bhargavee Singh, Rajesh. B. Singh
DOI: 10.17148/IARJSET.2015.2205
Abstract: Information provided in issue reports are relevant and complete in order to help resolve issues quickly. However, often such information trickles to developers after several iterations of communication between End user and reporters. This paper addresses the concerns of Customization of an Enterprise management system by proposing for handling of the issues such as bugs, query and enhancements. As a proof-of-concept, we also demonstrate a prototype interactive enterprise request management system that gathers relevant information from the user and identifies files that need to be fixed to resolve the issues. The main contribution of this application is in the domain of business as we are developing Enterprise request Management System.
Keywords: Bugs, Issues, query, enhancement.
Abstract
CONCISE SURVEY ON PRIVACY PRESERVING TECHNIQUES IN CLOUD
B.Banu priya, V.Sobhana, Prof.Mishmala Sushith
DOI: 10.17148/IARJSET.2015.2206
Abstract: In this paper we have made a concise survey on various privacy preserving techniques in cloud. Homomorphic Authenticable Ring Signature (HARS), privacy-preserving public auditing System for data storage security are discussed. Public key cryptosystem, the MD5 Message-Digest Algorithm are depicted. Proof-Of-Retrievability system for public verifiability is described. Dynamic Provable Data Possession (DPDP) to enlarge the PDP model is discussed in detail. LT codes based cloud storage service (LTCS) to empower efficient decoding, Merkle Hash Tree (MHT) for the block tag Authentication is discussed.
Keywords: Privacy Preserving, Public Auditing, DPDP, PDP, Cloud Computing.
Abstract
LOSS OF SIGNIFICANCE IN NUMERICAL COMPUTING AND POLYNOMIAL FORM
Ashu Vij
DOI: 10.17148/IARJSET.2015.2207
Abstract: One of the most common and often avoidable peculiarity of using normalized floating point representation of numbers in arithmetic operations is Loss of Significance. Use of normalized floating point representation of numbers in arithmetic operations lead to some unexpected and unfortunate consequences. There is a loss of significance due to subtraction of a number from nearly equal number. In this paper, the loss of significance in various numerical computations including its effect in polynomial form is discussed. Further, the alternatives to minimize its effect on final result are also discussed.
Keywords: normalized floating point, arithmetic operations, loss of significance, polynomial form.
Abstract
EFFICIENT FAULT TOLERANT STRATEGIES IN CLOUD COMPUTING SYSTEMS
Siddharth Shyamsunder, Kunal Varkhede, Shirish Bhuruk, Rasika Vibhute, Prof R.P. Karande
DOI: 10.17148/IARJSET.2015.2208
Abstract: To handle the large amount of incoming data, cloud computing has emerged as a very efficient technology. Cloud computing makes use of strategies that involve the use of an on-demand service of providing multiple virtual servers. As cloud computing serves many techniques for handling big data, a need arises to detect the faults that occur and to manage those faults in such a way as to keep the fault tolerant measures, abstract from the user. Here we are going to provide various fault tolerance techniques by making use of a service layer. The responsibility that is given to the service layer will be to detect the faults that occur at the server and to accurately find a solution keeping the internal details hidden from the user.
Keywords: Introduction, Basic concepts, Related work in the area of cloud computing fault tolerance, functionality of our proposed system, future scope and conclusion, references
Abstract
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES
Prajakta Jagtap, Atharva Joshi, Shamsundar Vyas
DOI: 10.17148/IARJSET.2015.2209
Abstract: The following paper proposes a novel scheme of data hiding in encrypted images based on lossless compression of encrypted data. In encryption phase, the original content is encrypted into images. As majority of the encrypted data is kept unchanged, the quality of the decrypted image is satisfactory. In the receiver phase, the data is successfully extracted from the image with the help of a public key. The receiver can further recover the original plaintext image without any error.
Keywords: Encryption, Decryption, lossless data
Abstract
INTERNET THROUGH THE EXPLOITATION OF DIGITAL TERRESTRIAL TV NETWORKS
S.Venkatesh
DOI: 10.17148/IARJSET.2015.2210
Abstract: The Internet is paramount of modern life. As technology advances, our demand for bigger, better and faster Internet connections. Current Digital TVs (DTVs) which is universally growing across the world have the ability to connect to Internet. So, Digital Terrestrial TV network that also carry Internet data is the objective of this paper. This is another feasible advantage that digital terrestrial TV can offer customers .It would be a user-friendly method just to plug the computers to set-top boxes to access Internet. Consumers can find it convenient to pay for TV content and Internet usage separately. With several technologies like ATSC, DMB, DVB-T2 and ISDB-T already in existence, it is from this background that a concept to improve bandwidth, compression, source coding and line coding is suggested for maximum network exploitation.
Keywords: Digital Terrestrial TV (DTT), Advance Television System Committee (ATSC), Digital Multimedia Broadcasting (DMB), Digital Video Broadcasting- Terrestrial 2 (DVB-T2), Integrated Services Digital Broadcasting (ISDB), Orthogonal Frequency Division Multiplexing (OFDM), Digital Subscriber Line (DSL), Inverse Fourier Fast Fourier Transform (IFFT), Single Carrier (SC) and Multi Carrier(MC).
Abstract
COMPARATIVE EXPERIMENTAL PERFORMANCE STUDY OF DIFFERENT TYPES OF SOLAR WATER HEATING SYSTEMS IN A TYPICAL CLIMATE
Rahul Gupta, Sahil Kesar, Jyoti Lalotra
DOI: 10.17148/IARJSET.2015.2211
Abstract: This paper present the concept of saving the energy in domestic heating system. In this paper we compare the three different types of domestic solar water heating system with different collectors are flat plate collector without heat exchanger (FPC), flat plate collector with heat exchanger (FPCHE) and evacuated tube type collector (ETC). The first system consists of FPC (2.07m2) connected to a 100 liters of storage tank. The other system consists of FPCHE having an area of (1.836m2) and the ETC having an area of (1.358m2) are both connected to 100 liters of storage tank, corresponding to several nice sunny days at Solar Energy Centre. The average temperature in the tank of FPC reached to a maximum of 58oC starting from an initial temperature of 25oC in the morning, while the average tank temperature in the FPCHE is 48oC starting from the same initial temperature. Similarly in the ETC the average temperature in the tank is 49oC with the same initial temperature. The efficiency of the FPC was observed to be around 40% and for FPCHE, it was observed to be around 48% while it was observed to be around 51% for the ETC.
Keywords: Flat plate collector without heat exchanger, flat plate collector with heat exchanger, evacuated tube collector, efficiency.
