May - 2019 (Volume-9 ~ Issue-5 ~ Series-15)

Paper Type :: Research Paper
Title :: A Study on Ratio Analysis of Yamaha Motors At Tajshree Motors Pvt. Ltd" Nagpur
Country :: India
Authors :: Nisha R. Ghode
Page No. :: 01-04

Yamaha Motor Company Limited is a Japanese manufacturer of motorcycles, marine products such as boats and outboard motors, and other motorized products. The company was established in 1955 upon separation from Yamaha Corporation (however Yamaha Corporation is still the largest shareholder with 12.21%, as of June 30, 2014), and is headquartered in Iwata, Shizuoka, Japan. The company conducts development, production and marketing operations through 109 consolidated subsidiaries as of 2012. Led by Genichi Kawakami, the company's first president, Yamaha Motor began production of its first product, the YA-1, in 1955. The 125cc motorcycle won the 3rd Mount Fuji Ascent Race in its class.........

Key words: Software Interface Computer-Aided Light Duty System Energy Recovery

[1]. I.M.Pandey : Financial management
[2]. S.P. Jain & K.L. Narang : Cost & Management A/c
[3]. K. Rajeswararao& G. Prasad : Accounting & Finance

Paper Type :: Research Paper
Title :: A Study of Sales Promotion Stratgies of Jio Mobile
Country :: India
Authors :: Sonali.P.Bhoyate
Page No. :: 05-07

The launch of Jio is likely to transform the Indian telecom sector but at the same time put pressure on multiple fronts on the current telecom operator such as Bharti Airtel, Idea & Vodafone. The entrance of the Jio has brought as tor my revolution in the Telecom market and Jio has emerged into a brand new world of innovations and upgradation. This article discusses the features of the Jio and the edge it would have over its rivals once operational The objective of this research paper is to find whether the company will become a Star or will remain a question mark

Key words: Software Interface Computer-Aided Light Duty System Energy Recovery

[1]. I.M.Pandey : Financial management
[2]. S.P. Jain & K.L. Narang: Cost & Management A/c
[3]. K. Rajeswararao& G. Prasad : Accounting & Finance

Paper Type :: Research Paper
Title :: Comparative study of S&P BSE Sensex with 10 Sectoral Indices for a period of 5 years 2014-19
Country :: India
Authors :: Geetika Bhutani
Page No. :: 08-21

Bombay Stock Exchange (BSE) is an Indian stock exchange located in Mumbai, Maharashtra, India. Established in 1875 and is considered to be one of Asia' s fastest stock exchanges, with a speed of 200 microseconds and one of India' s leading exchange groups and the oldest stock exchange in the South Asia region. Bombay Stock Exchange is the world's 10th largest stock market by market capitalization at $1.7 trillion as of 23 Jan 2015. More than 5,000 companies are listed on BSE, making it the world's top exchange in terms of listed members. The main objective of study is To perform comparative study of S&P BSE Sensex with 10 Sectoral Indices, To identify whether there is a difference in risk factors across the sectoral indices.

Keywords: Study of S&P BSE Sensex with 10 Sectoral Indices,.

[1]. Books:
[2]. Book by Prasanna Chandra
[3]. Book by C R Kothari
[4]. Book by R M Joshi
[5]. Websites:
[7]. Wikipedia
[8]. Investopedia

Paper Type :: Research Paper
Title :: To Study of Risk Inventory Generation and Control at Future Supply Chain Solution Ltd
Country :: India
Authors :: Santosh kumar bisen
Page No. :: 22-25

Inventory risk is the potential for a loss due to inventory planning and control failures. I nventory risk is managed with a standard risk management process of identifying, analyzing ,treating and risk that's why the we need to study about the minimization of risk inventory. This research paper is prepared on the overall activities observation of all department of warehouse namely inward, put away, picking, sorter, PTL, outward of Future Supply Chain solution ltd for completion of risk inventory project.During my 3-month project I visited to all department and understand the process of all departments and observe why risk inventory generate and what control measure use to reduce risk inventory generation. For this risk inventory I observed every department and try to find some solution on risk inventory generation. This research aims at to study of risk inventory generation and control. The main objective of this research is study why risk inventory generate and what control measure use to reduce risk inventory generation For this research a interview taken of employee of Future Supply Chain Ltd Nagpur .

Key words: risk inventory, inventory management system,Production-inventory, supply chain, risk management.

[1]. Lewis, B. M. (2005). Inventory Control with Risk of Major Supply Chain Disruptions.
[2]. Punam Khobragade*, R. S. (2018). Research paper on Inventory management system. International Research Journal of Engineering and Technology (IRJET).
[3]. Sanjoy Kumar Paul, R. S. (2016). Managing risk and disruption in production-inventory and supply chain systems: a review. Journal of Industrial and Management Optimization.
[4]. Singhal, V. (2005). Excess Inventory and Long-Term Stock Price Performance, Working Paper, GeorgiaInstitute of Technology, 10.07.2014.
[5]. Wang, X. (2010). Inventory Management in a Pharmaceutical Company: Minimizing Discard Practices,National University of Singapore, Singapore, 12.07.2014.

Paper Type :: Research Paper
Title :: Comparative Study of Markting Strategies Adopted By Amazon & Flipkart
Country :: India
Authors :: Ajay Balaji Dhomne
Page No. :: 26-29

The Present Study of Research entitled COMPARATIVE STUDY OF MARKTING STRATEGIES ADOPTED BY AMAZON & FLIPKART" E- commerce is the buying and selling of good and services on the internet, especially the World Wide Web. Variousinnovation companies have set up system for taking customer order, facilitate making of payments, customer service, collection of marketing data, and online feedback respectively. Grocery could be a game changer, for both marketplaces as Amazon is planning for more focus on grocery but Flipkart acquitted Mantra also have a good approach. Flipkart is planning to launch its Grocery business in 10 metropolitan cities. So, Grocery is a section which keeps an eye deserves in the upcoming strategy of Amazon & Flipkart.

Key words: Marketing strategy, online shopping, e-commerce, customer service

[4]. Digital Marketing Jerry Wind & Vijay Mahajan
[5]. Digital media Dave Chaffey
[6]. Direct Digital Marketing Drayton Bird

Paper Type :: Research Paper
Title :: A Comparative Study of Marketing Mix Strategy of Suruchi Spices with Everest Masale
Country :: India
Authors :: Shalaka Mate
Page No. :: 30-32

The term marketing concept holds that achieving organizational goals depends on knowing the needs and wants of target markets and delivering the desired satisfactions. It proposes that in order to satisfy its organizational objectives, an organization should anticipate the needs and wants of consumers and satisfy these more effectively than competitors. Marketing develops as a society and its economy develops. The need for marketing arises and grows as a society moves from an economy of agriculture and self-sufficiently to an economy built around division of labour, industrialization and urbanization.

Key words: Suruchi Masale , , Marketing, Products, Quality, Taste

Book Material
[1]. Marketing Management by Philip Kotler
[2]. Sales & Distribution Management by Tapan K Panda & Sunil Sahadev
[3]. Service marketing, Pearson Education Pvt Ltd., New Delhi by Lovelock, Christopher
Company Visits
[4]. Mr. K KGoyal (Sales Manager) Corporate Office
[5]. Suruchi Marketing Pvt. Ltd. B-1/H-8,
[6]. Mohan Co-Operative Ind. Estate,

Paper Type :: Research Paper
Title :: An Approach for Integration of IT Services for a Big Enterprise Application
Country :: India
Authors :: Ashish Ravindra Soni || Dr. U. A. Lanjewar
Page No. :: 33-40

Enterprise Application Integration (EAI) and Business-to-Business coordination (B2B) influence a few key advances including middleware and message merchants. Notwithstanding, a viable reconciliation arrangement to a great extent relies upon the correct blend of advances that give the paste between divergent applications. To manufacture an innovation foundation that can adjust to changes as the combination engineering develops is urgent. The answer for the reconciliation issue is constraining organizations to think in disseminated terms. In this paper we talked about The natural estimation of EAI is the expanded dimension of mechanization brought into the framework, giving better effectiveness and less support. EAI is the course to an as good as ever business arrangement as shown by the reliance of data frameworks and innovation in the present undertakings.

Key words: EAI, Business, Application, IT Servics.

[1]. Paul Johannesson, Erik Perjons(2001). "Design principles for process modeling in enterprise application integration". Information Systems, vol. 26, no. 3, pp 165–184.
[2]. Eric Roch(2007-10-12). "EAI Technology Trends 2002". 1544.html. 956
[3]. S.J.Paheerathan, Paul Johannesson, Prasad Jayaweera, et al (2007-10-2). "A Process Broker Architecture for Systems Integration". / whitepaper.pdf.
[4]. Mariano Cilia, Christof Bornh, Alejandro P.Buchmann (2001). "Moving Active Functionality from Centralized to Open Distributed Heterogeneous Environments". Proceedings of the 9th International Conference on Cooperative Information Systems, pp. 195-211.
[5]. D.S. Linthicum(2000). "Enterprise Application Integration". Addision-Wesley.

Paper Type :: Research Paper
Title :: Feasibility Study for Developing a Manufacturing Industry for Activated Carbon and Bio Oil from Coconut Shell
Country :: India
Authors :: Mr. Mohsin I A R Sheikh || Mrs. Ankita Yadav
Page No. :: 41-44

The production process consists of a pyrolysis stage and an activation stage. A downdraft gasifier was utilized as the pyrolysis reactor in order to maximize the energy efficiency of the process, and a separate cyclone and condenser were added to capture and purify the valuable byproducts of the pyrolysis reaction. A An extensive heat exchanger network is implemented to capture and recycle the heat and water produced by the activation reaction, in order to minimize the plant's thermal and water footprint. With a profit of 8% per month, the production unit is expected to have recovered the whole investment at the end of 4 to 5 years. Due to the expected high product demand and anticipated profits, construction of the plant is strongly recommended

Key words: Pyrolysis, Activated Carbon, Bio-oil, Coconut Shell, recovery, investment, profit.etc.

[1]. ParthInternational,D14,pt.58,Umrer Industrial Area , Umred, dist. Nagpur
[2]. International Journal for Service Learning in Engineering Vol. 7, No. 1, pp. 93-104, Spring 2012 ISSN 1555-9033
[3]. The University of Arizona Electronic Theses and Dissertations Reproduction and Distribution Rights
[4]. Department of Energy Engineering and Science, Graduate School of Engineering, Nagoya University, Furo-cho, Chikusa-ku, Nagoya-shi, Aichi 464-8603, Japan
[5]. Research Institute for Industrial Technology, Aichi Institute of Technology, 1247 Yachigusa, Yakusa-cho, Toyota-shi, Aichi 470- 0392, Japan

Paper Type :: Research Paper
Title :: CSR and Competitive advantage: Thrust on green HRM
Country :: India
Authors :: Swati N.Rahate
Page No. :: 45-50

The effectiveness and productivity of an organization is always been of great concern to all business organizations . Many variables such as infrastructure, budgets and employee work attitudes in organizational structure encompasses in a wider aspect of organizational life.Organizations are exploring new areas for infrastructure development and better institutional climate for their employees to sustain their profits in strong competition.Corporate social responsibility (CSR) is an effective management tool to strengthen the organizations' performance through a better image in stakeholder's mind and also because of their responsible behavior toward society and environment. Although CSR has been more prevalent in those organizations that are more exposed to environment and are more prone toward creating contamination, the interest in using CSR as a strategy is increasing in every type of business............

Key words: Corporate social responsibility (CSR), competition, effective management, organizations' performance, quality management, business role

[1]. John M. T. Balmer, J.M.T., Stuart, H., &Greyser, G. (2008). Corporate Identity and Corporate Brand Alignment
[2]. Porter, M. E., & Kramer, M. R. (2002). The competitive advantage of corporate philanthropy
[3]. Porter, M. E., & Kramer, M. R. (2006). Strategy and society

Paper Type :: Research Paper
Title :: Fake Data Mining: Face Annotation
Country :: India
Authors :: Pankaj Wankhede || Dr. Sachin Chaudhari || Ashish Kumbhare
Page No. :: 51-54

A face annotation can be used applications which is based annotation of face is to compare the facial images and their weak data labels. This problem, different method are adopted. The effectiveness of this systems are upgraded by using these system. This paper proposes a review on various techniques used for detection and analysis of each technique. Mixing the techniques are used getting facial images data based on requirements. The effective for that data with the images with their exact contents. The accurate face recognition method can annotate the faces with exact data contents which will give an edge enhance the detection more efficiently. For a set of semantically similar images Annotations from them............

Key words: Face Annotation, Content Based, face data, association, face-name.

[1]. X.-J. Wang, L. Zhang, F. Jing, and W.-Y. Ma, "AnnoSearch: ImageAuto-Annotation by Search," Proc. IEEE CS Conf, 2006.
[2]. D. Wang, S.C.H. Hoi, Y. He, and J. Zhu, "Retrieval-Based Face Annotation by Weak Label Regularized Local Coordinate Coding," 2011.
[3]. A.W.M. Smeulders, M. Worring, S. Santini, A. Gupta, and R. Jain,"Content-Based Image Retrieval at the End of the Early Years," IEEE Trans. Pattern Analysis and Machine
[4]. Dayong Wang, Steven C.H. Hoi, Ying He, and Jianke Zhu," Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation" IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 1, January 2014
[5]. W. Dong, Z. Wang, W. Josephson, M. Charikar, and K. Li, "Modeling LSH for Performance Tuning," Proc. 17th ACM Conf.2008.

Paper Type :: Research Paper
Title :: "Secured Data Retrieval Disruption Tolerent Network"
Country :: India
Authors :: Pushpraj Deshkar || Mr. Amit Pampatwar || Ms. Raana Syeda
Page No. :: 55-61

The information leak of sensitive data on systems has a serious threat to organization data security. Statistics show that the improper encryption on files and communications due to human errors is one of the leading causes of information loss. So there a need tools to identify the exposure of sensitive data by monitoring the content in storage and transmission. However, detecting the exposure of sensitive data information is challenging due to data transformation in the content. Transformations result in highly unpredictable leak patterns. In this paper, the sequence alignment method used for detecting data leak patterns. This algorithm is designed for detecting long and inexact sensitive data patterns............

Key words: Information leak detection, content inspection, sampling, alignment, dynamic programming, sensitive data patterns.

[1]. Hiroki Nishiyama, Desmond Fomo, Zubair Md. Fadlullah,, and NeiKato,Fellow," Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks" IEEE Transaction on Parallel and Distributed System , Volume 25, No 2 Feb 2014
[2]. K. Ramya, D. RamyaDorai, Dr. M. Rajaram "Tracing Illegal Redistributors of Streaming Contents using Traffic Patterns" IJC A 2011
[3]. A. Asano, H. Nishiyama, and N. Kato, "The Effect of Packet Reordering and Encrypted Traffic on Streaming Content Leakage Detection" Proc. Int'l Conf. Computer Comm. Networks (ICCCN '10), pp. 1 6, Aug. 2010.
[4]. Y. Chu, S.G. Rao, S. Seshan, and H. Zhang, "Enabling Conferencing Applications on the Internet Using an Overlay Multicast Architecture," Proc.ACM SIGCOMM, pp. 55 67,Aug. 2010
[5]. O. Adeyinka, "Analysis of IPSec VPNs Performance in a Multimedia Environment," Proc. Fourth Int'l Conf. Intell igent Environments, pp. 25 - 30, 2008

Paper Type :: Research Paper
Title :: Sharing Memory before Encryption for Defended Reversible Data Hiding In Encrypted Images
Country :: India
Authors :: Sonali Jambhulkar || Mona Mulchandani || Priyanka Dudhe
Page No. :: 62-67

RDH is a high-protection technology used to hide secret information inside the image and can recover the original image and secret information completely. Bitmap image and injected information scheme have a number of collective media applications that are needed. Now a days, the more attraction is towards reversible data hiding (RDH) in encoded images, as it continues to have the highest quality property that the original cover can be recovered without distortion after the injected information has been removed while protecting the privacy of the image content. All earlier methods inject information by emptying room from the encrypted images reversibly, which may result in distortion of information withdrawal or image restoration. In this paper, we planned another strategy in which, using our new technique, we simply encode an image without its header. It is simple for the information hider to reversibly inject information into the encoded image by using this new technique. The proposed technique can obtain real reversibility, i.e. withdrawal of information and restoration of images is free of distortion..

Key words: Encryption, Decryption and Reversible Data hiding

[1]. T. Kalker and F.M.Willems, "Capacity bounds and code constructions for reversible data-hiding," in Proc. 14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71–76.
[2]. W. Zhang, B. Chen, and N. Yu, "Capacity-approaching codes for reversible data hiding," in Proc 13th Information Hiding (IH'2011),LNCS 6958, 2011, pp. 255–269, Springer-Verlag.
[3]. W. Zhang, B. Chen, and N. Yu, "Improving various reversible data hiding schemes via optimal codes for binary covers," IEEE Trans.
[4]. J. Fridrich and M. Goljan, "Lossless data embedding for all image formats," in Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 572–583.
[5]. Z. Ni, Y. Shi, N. Ansari, and S. Wei, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354– 362, Mar. 2006.

Paper Type :: Research Paper
Title :: Implementing Data Storage Security in Cloud Computing
Country :: India
Authors :: Nayana Bnasod || Mr. Pranjal Dhore || Ms. Nisha Balani
Page No. :: 68-71

Anti Crime branch maintain huge data related to criminals and crimes done. They use manual system to maintain individual file. They need a space to maintain these files digitally. So cloud is best solution for it and that too be maintained with security. Cloud computing provides on demand services to its clients. Data storage is among one of the primary services provided by cloud computing. The goal of cloud computing is to allow users to take benefit from all these technologies[5]. Many organizations are moving into cloud because it allows the users to store their data on clouds and can access at anytime from anywhere. Cloud service provider hosts the data of data owner on their server and user can............

Key words: Cloud computing, Data storage, Cloud storage server, Cryptography, TwoWay Security.

[1]. Naresh Vurukonda, B.Thirumala Rao, "A Study on Data Storage Security Issues in Cloud Computing",2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016).
[2]. Monjur Ahmed and Mohammad Ashraf Hossain, "Cloud Computing and Security Issues in the Cloud" International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014.
[3]. V.S. Varnika, "Cloud Computing Advantage and Challenges for Developing Nations", International Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.3, pp.51-55 , June (2018).
[4]. Dr. Ramalingam Sugumar, K.Raja, "A Study on Enhancing Data Security in Cloud Computing Environment", Dr. Ramalingam Sugumar et al, International Journal of Computer Science and Mobile Applications, Vol.6 Issue. 3, March- 2018, pg. 44-49.
[5]. Eesa Alsolami, "Security threats and legal issues related to Cloud based solutions", IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.5, May 2018.

Paper Type :: Research Paper
Title :: Cross-Platform Educational Mobile Application Using React-Native
Country :: India
Authors :: Faisal A. Amdani || Dr. S. A. Bhura
Page No. :: 72-76

Cross Creating a versatile application regularly requires the engineers to make one for Android and one for iOS, the two driving working frameworks for cell phones. The two applications may have a similar design and rationale yet a few parts of the (UI) will vary and the applications themselves should be created in two distinct dialects. This procedure is horrifying since it is tedious to make two applications and it requires two distinct arrangements of learning. There have been endeavors to make systems, administrations or structures so as to tackle this issue however these crossovers have not had the option to give a local sentiment of the subsequent applications. This proposal has assessed the recently discharged system React Native and Ionic that can make the two iOS and Android applications. The subsequent applications can share code and comprises of the UI parts which are interesting for every stage.

Key words: Cross-Platform Mobile application development, React-Native,Ionic,Android development, iOS development, Cross-Platform.

[1]. Cider: Native Execution of iOS Apps on Android, Jeremy Andrus, Alexander Vant Hof, NaserAlDuaij, Christof-fer Dall, Nicolas Viennot, and Jason Nieh, IEEE Micro, 2008,Vol.1.
[2]. Andreas Arnesson. "Codename one and PhoneGap, a performance comparison".MA thesis.Blekinge Institute of Technology, Department of Software Engineering, June 2015.
[3]. L. Zhang et al. "Accurate online power estimation and automatic battery behaviorbased power model generation for smartphones". In: Hardware/Software CodesignandSystemSynthesis (CODES+ISSS), 2010 IEEE/ACM/IFIP International Conference on. Oct.2010, pp. 105–114.
[4]. Robert B. Grady and Deborah L. Caswell. Software Metrics: Establishing a Company-wideProgram. Prentice-Hall, Inc., 1987. ISBN: 0-13-821844-7.
[5]. Andreas Sommer. Comparison and evaluation of cross-platform frameworks for thedevelopment of mobile business applications.TechnischeUniversitätMünchen. 2012.

Paper Type :: Research Paper
Title :: Path Planning Techniques for Navigation of Mobile Robot: A survey
Country :: India
Authors :: Samir. N. Ajani || Dr. Salim. Y. Amdani
Page No. :: 77-84

In this survey we have presented the detailed survey of path planning algorithms and techniques available so far. All the available methods and techniques are systematically understand and presented in the proper manner in order to make a research gap in the available techniques. The path planning algorithms are applied on static as well as in the dynamic environment. We also present the techniques based on these environments. The Approaches are classified into classical and reactive approaches. The classical approaches such as cell decomposition (CD), roadmap approach (RA), artificial potential field (APF); reactive approaches such as genetic algorithm (GA), fuzzy logic (FL), neural network (NN), firefly algorithm (FA), particle swarm optimization (PSO), ant colony optimization (ACO), bacterial foraging optimization (BFO), artificial bee colony (ABC), cuckoo search (CS), shuffled frog leaping algorithm (SFLA) and other miscellaneous algorithms (OMA) are considered for study. The navigational algorithms are applied on static as well as in the dynamic environment for analysis and it has been conclude that the reactive methods are more suitable for path planning and navigation of mobile robot.

[1]. Patle BK. intelligent naigational strategies for multiple wheeled mobilerobots using artificial hybrid methodologies. Thesis NIT Rourkela; 2016.
[2]. Hoy M, Matveev AS, Savkin AV. Algorithms for collision free navigation ofmobile robots in complex cluttered environments: a survey. Robotica2015;33(Issue 03):463e97.
[3]. Yang L, Qi J, Song D, Xiao J, Han J, Xia Y. Survey of robot 3D path planningalgorithms. J Control SciEng 2016:5.
[4]. Seda Milos. Roadmap methods vs. cell decomposition in robot motionplanning. In: Proceeding of the 6th WSEAS international conference on signalprocessing, robotics and automation. World Scientific and EngineeringAcademy and Society (WSEAS); 2007.p. 127e32.
[5]. Regli W. "Robot Lab: robot path planning," Lecture notes of department ofcomputer science. Drexel University; Oct 2007.