International Journal

  • S. No. Research Paper

    1.         Development of an Inventory Model for Perishable Items with Selling Price Dependent
                Demand and Time Dependent Holding Cost

                 Dr Sandeep Kumarpage. no. 01 to 09
    Abstract

    In this paper an inventory model is developed for perishable items, where holding cost is a function of time and demand rate is taken as selling price dependent. The model is developed by allowing shortages and constant deterioration in inventory. A numerical example is given to illustrate the associated model.

    Keywords: Inventory, model, selling price.

    [Click here to Download Full Paper]



    S. No. Research Paper

    2.         Issues, Challenges and Reasons for Privacy Threats in E-Governance in INDIA
                 Dr. Anil K Kapil & Mr Sachin Kumarpage. no. 01 to 05
    Abstract

    This Paper highlights some of the issues, challenges and reason for privacy threats in E-governance. We also suggest some of the point that keeps in mind while privacy technology is adopted. E-governance performs various communications directly from the government to the people in which there is high level of transparency and accuracy. Four major interaction targeted in e-Governance Government to Customer (G2C) Government to Business (G2B) Government to Employees (G2E) Government to Government (G2G) . The first and foremost reason is the low security for the data; this covers the improper collection and storage of the personal data of an individual. Secondly the way of collecting the data also has a vital role. When any data is to be collected from the citizens for entering in to the e-governance project, most of the data will be transferred from the existing records and some of the latest and important information will be collected in person, thus this way of collecting the information will become insecure when the person who is recording uses it in a wrong manner. The next privacy threat that most of the developing countries face is due to the lack of knowledge. The persons who are not well versed in providing their information seeks some external private agencies for help and again from those agencies if there is leakage of information, privacy issue starts there.

    Keywords: e-Governance, G2C, G2B, G2E, G2G

    [Click here to Download Full Paper]



    S. No. Research Paper

    3.         भावी उच्च शिक्षा का विकास एव भावी शिक्षा नीति
                 डॉ. वि. के. शर्मा page. no. 01 to 04
    सारांश:



    [Click here to Download Full Paper]



    S. No. Research Paper

    4.         Load Balancing Techniques, Challenges & Performance Metrics
                 Dr. Atul Garg & Shilpa Dang page. no. 01 to 09
    Abstract

    The growth in the popularity of the web has increased. There is need for high availability computer systems which are capable of processing the client request as quickly as possible. As a result the use of distributed systems is growing rapidly, so the area of load balancing has gained higher attention and importance. Load balancing is crucial for managing various operations proficiently in distributed atmosphere. Load balancing is an activity that circulates the workload equitably over every node of the system. It accomplishes higher user fulfillment and resource usage, henceforth enhancing the general execution and adaptability of the system. Many algorithms were suggested that provide efficient mechanism to execute client request at minimal cost. The inspiration of the work is to urge the researchers in developing more efficient load balancing algorithms.

    Keywords: Distributed Systems, Load Balancing, Load Index, Performance Matrices.

    [Click here to Download Full Paper]



    S. No. Research Paper

    5.         An Efficient Approach for Tranmission of Secure Clouds Using Encrypted & Decrypted
                Image

                 Dr.Rajender Bathla, Dr.Anil Kapil & Dr.Parveen Sharma page. no. 01 to 09
    Abstract

    Process of transforming from simple text to cipher text is known as enciphering or encryption; restoring the plain text from the cipher text is deciphering or decryption. Various scheme used for encryption constitute the area of study known as cryptography. To ensure information and data privacy over the cloud, application is encrypting the user data before sending it over the cloud. In our research work we propose a new scheme which encrypts the text or image message by executing some steps and then decrypt that text/image at other side using descriptor. We get that result of this technique which is fruitful in case of time saving and near about 85 % accurate.

    Keywords:Encryption, Decryption, Cloud, Transmission, Image

    [Click here to Download Full Paper]



    S. No. Research Paper

    6.         Rules about National Holidays in India
                 Dr. Ashutosh Sheel page. no. 01 to 05
    Abstract

    India has a large geographic land mass area where approximately 1.25 billion population resides having divergent believes, culture etc. National holidays play important role in public life of any nation. This is a common cause for all Indian nationals to celebrate the day so is the basis for national integration. In India there are three national holidays, i.e. on January 26, August 15 and October 2. The aim of present study is to find brief history and legal angle about national holidays in India. This article will instill awareness about national holidays to those who are unaware about this.

    Keywords:National holidays, India

    [Click here to Download Full Paper]

Admission Helplines

+91 - 7060 800156

+91 - 7060 800 157