MPGI-2014-Management Horizon in Changing Economic Environment

"MPGI-2014 Conference Papers "


Impact of Stock volatility on Mutual Fund Investment: An Empirical analysis[ ]


Mutual fund is the trend of investment option in current scenario to invest in securities and bonds. The Indian mutual fund industry has witnessed major transformation and structural changers during the past two decades . Any investment options involve business risk , financial risk and liquidity risk. Risk cannot be eliminated but it can be diversified with Portfolio management of investment at certain level. Though the past performance alone cannot be indicative of future performance, were it is only quantitative way to judge how good a fund is. Choosing from the various mutual funds selection with a systematic checklist to achieve the investment objectives is of utmost importance. A proper evaluation measure will remove confusion and help the investors to decide about the level of investment in various mutual funds schemes so as avoid losses and maximize returns the present study , the performance of various mutual schemes has been measured in terms of risk and return trade off . And to know the measures to minimize the effect of volatility on their investment which would help them to minimize the risk and earn good profits and use the volatility for their benefit.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Effective cloud computing service based models[ ]


Cloud computing is the service on an internet provided by cloud computing service providers. It providers various service models which are helpful to understand cloud computing task. Cloud Computing applications as being composed of a set of layers upon which distributed applications may be built. These services modules are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Identity as a Service (IDaaS), Compliance as a Service (CaaS).

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Face Recognition using Dynamic Inputs: A Review[ ]


Ideally a face detection system should be able to take a new face and return a name identifying that person. Mathematically, what possible approach would be robust and fairly computationally economical. If we have a database of people, every face has special features that define that person. One person may have a wider forehead, while another person has a scar on his right eyebrow from a rugby match as a young tuck. One technique may be to go through every person in the database and characterize it by these small features. Possible approach would be to take the face image as a whole identity. The goal of this paper is to extend the face recognition system to using dynamic inputs such as those obtained from CCTV cameras. This would involve detecting and tracking faces correctly in two or more cameras, pre-processing them and computing the disparity information prior to the identification stage.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automation: Advance Trends in Engineering and Technology[ ]


Due to automation the efforts of human decreased in high amount. Advantages of automation is not limited up to only efforts but also time, money etc. are affected. In this paper authors introduced the recent techniques of automation. In that seven to eight terms are discussed briefly, how was traditional methods and what recent technique ton that. Here marketing automation, banking automation is discussed which we experience in daily life.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Active User-Side Evil Twin Access Point Detection[ ]


Unauthorized or rogue access points (APs) produce security vulnerabilities in enterprise/campus networks by circumventing inherent security mechanisms. We propose to use the round trip time (RTT) of network traffic to distinguish between wired and wireless nodes. This information coupled with a standard wireless AP authorization policy allows the differentiation (at a central location) between wired nodes, authorized APs, and rogue APs. We show that the lower capacity and the higher variability in a wireless network can be used to effectively distinguish between wired and wireless nodes. Further, this detection is not dependent upon the wireless technology (802.11a, 802.11b, or 802.11g), is scalable, does not contain the inefficiencies of current solutions, remains valid as the capacity of wired and wireless links increase, and is independent of the signal range of the rogue APs.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ISOLATED-WORD AUTOMATIC SPEECH RECOGNITION (IWASR) TECHNIQUES AND ALGORITHMS[ ]


This system receives speech inputs from users, analyzes the speech inputs, searches and matches the input speech with the pre-recorded and stored speeches in the trained database/codebook, and returns the matching result to the users [1]. Developing this system is meant to assist customers calling a university’s telephone operator to respond to their enquiries in a fast and convenient way using their natural speech. Callers are assisted using their own speech inputs to select their language preference, faculty in a university and finally select the staff name they wish to contact [2]. To extract features from the speech signals the Mel-Frequency Cepstral Coefficients (MFCC) algorithm was applied. Subsequently, Vector Quantization (VQ) algorithm based on the principle of block coding was used for all feature vectors generated from the MFCC algorithm.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Dynamic time Warping using MATLAB & PRAAT[ ]


The Voice is a signal of infinite information. Digital processing of speech signal is very important for high and precise automatic voice recognition technology. Speech recognition has found its application on various aspects of our daily lives from automatic phone answering service to dictating text and issuing voice commands to computers. We focus mainly on two points 1. The pre-processing stage that extracts salient features of a speech signal and a technique called Dynamic Time Warping commonly used to compare the feature vectors of speech signals. These techniques are applied for recognition of isolated as well as connected spoken words. 2. In this case the experiment is conducted in MATLAB & PRAAT to verify these techniques. Using the Matlab statistical difference between two wave signals are calculated. & using PRAAT two wave signals are aligned. Statistical difference obtained by these two ways is noticeable i.e. using MATLAB average distance is calculated which is 3.2843 & using PRAAT average distance is calculated which is 0.002235.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Empowering E-Governance through Cloud & Biometrics[ ]


The amplified use of ICT has become a primary need for every individual. E-Governance is the application of Information and Communication Technology (ICT) for delivering Government Services, exchange of information, communication transactions, integration various stand-alone systems and services between Government and Citizens (G2C), Government and Business (G2B) as well as back office processes and interactions within the entire Government frame work. Through the e-Governance, the Government services will be made available to the citizens in a convenient, efficient and transparent manner. The Combination of Cloud and E-governance collective can be productive to provide citizens good & transparent services. In this paper, we would see the increased efficiency of e-governance through cloud and also the use of biometrics to overcome transparency & security aspects in order to function e-governance successfully.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Seismic Analysis of Reinforced Concrete Building with Soft First Storey[ ]


Open first storey is now a days unavoidable feature for most of the multistory buildings in urban areas for vehicle parking, shops etc. Many earthquakes in the past, have demonstrated the potential hazard associated with soft first storey buildings. The first storey become soft and weak relative to the upper stories, since the first storey is composed of only columns while the upper stories are divided by unreinforced masonry infills. Structurally those unbalances are unhealthy and the soft first storey buildings are well known for being susceptible to collapse through past big earthquakes.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Presentation of the 3-D world on web page by coalescing VRML and HTML: A small illustration[ ]


There are various different types of software’s are available which depends upon the different requirements and OS version In this paper our aim is to build some interactive 3d view of any object, we can express our vision or goal in terms of 3D model on World Wide Web. The initial requirements to build or to achieve our goal we require some plug-in software’s and tools and also we need to Implement VRML file and that VRML file includes coding to generate 3-D objects, this coding should follows syntax of VRML.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Measuring Financial Sustainability of Reliance Industries Limited by using ‘Z’- Score Model[ ]


Financial ratios are analysis tools, applied to financial data, which are used to identify positive and negative trends, strengths and weaknesses, investment attributes, financial health and other trends, which measure the viability of the business. Ratio analysis is typically used to measure liquidity, leverage, activity, profitability and growth. No single ratio calculation can provide a meaningful complete picture of a company’s financial position. Keeping the above point in mind, this study uses ‘Z’ – score model, which captures the predicate viability of a company’s financial health by using a combination of financial ratios that ultimately predicts a score, which are used to determine the financial health of a company. Reliance Industries is such a unique industry which shown its deep routed evolvement and commitment for the welfare of the country men on a big an scale it has clear cut target of improving the standard of living of millions of citizens of India’s and thus this industry is in forward with a banner of success and economic prosperity. The study attempts to assess the financial Sustainability of the Reliance Industries in terms of retained earnings to total assets, networking capital position, equity and debt position, Return on total assets position, and net sales turnover position of the company. The study has been done through data from the Reliance Industries financial statements for the period of 5 years i.e. 2003-04 to 2007-08

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
GLOBAL WARMING AND CARBON CREDIT[ ]


Climate change caused by human activities that emit greenhouse gases into the air has started showing its affect in the frequency of extreme weather events such as drought, extreme temperatures, flooding, high winds; and severe storms. Global surface temperature has also increased between the start and the end of the 20th century, caused by increasing concentrations of greenhouse gases resulting from Fossil fuels burning and deforestation

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Innovative Services Marketing[ ]


In this paper an attempt is made to explore the possibilities of managing services and its present status. Further, the paper describes how the services are difficult than marketing of goods with 8P's framework of services marketing and challenges before marketing of services innovatively.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study on Customer Purchase Behavior Pattern in Retail Market Place[ ]


A Study on Customer purchase behavior pattern in retail market place usually deals with (i) Identification of Customers and (ii) their purchasing behavior patterns. The aim of study is to ascertain who purchase where, what, when and how. In addition, study endeavor to learn about Customer response to sales promotion devices. The results of this study are useful in the solution of an array of marketing problems.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A revise of various Business disciplines with role of business intelligence & Analysis of various ethical practices to carry out these roles smoothly[ ]


Every entrepreneur wants do business in very much profitable manner. Actually business is nothing but an activity which always seeks a profit. If we understand what is our business? What factors are responsible to do a business very successfully? Then we must have to know about the concept of business intelligence. Business intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. Business decisions are strategic. They involved various parameters. The business decisions used by the entrepreneur, it might be based on moral values called as business ethics. This paper elucidates the several business decisions which is the part of business intelligence are strategically taken with the help of general moral values of a person. It also describes the contribution of these moral varues in business intelligence for performing any business functions is nothing but serving a corporate social responsibility towards society.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------