Manuscripts

Recent Papers

Research Paper

Customer Perception: Technology Based Banking and its Impact on Financial Inclusion

In the banking sector, digital technology offers an unprecedented opportunity to connect people to services such as savings, loans, insurance, and payments. India remains among the most cash-intensive economies in the world, with a cash-to GDP ratio of around 12 percent. Around 97 percent of all transactions in the country are carried out in cash, and India remains amongst the countries with the lowest access to digital payments. The digital mode of payments gathered momentum in 2016-17, according to RBIs annual report. Technology has proved to be an effective tool to expand financial inclusion. With the Government initiatives, RBI has recommended banks to move towards greater technology adoption to drive financial inclusion. In this paper, the authors analyze the pattern of usage of technology by customers for banking operations and investigate the linkages between the customer satisfaction factors and the factors that influence a customer to move towards technology for various banking services. The study brings out various attributes and factors that influence a customer decision towards using technology tools for banking, makes a quality assessment and brings out the impact on customers’ satisfaction. Finally, with the help of exploratory factor analysis, the paper identifies the factors that attract customers mostly to use the technology tools in banking operations.

Published by: Umar Farook .A, Dr. S. Sudalaimuthu

Author: Umar Farook .A

Paper ID: V3I6-1484

Paper Status: published

Published: December 27, 2017

Full Details
Review Paper

Graphical Authentication for Web Based Application

User authentication is an important topic in the field of information security. To enforce security of information, passwords were introduced. Text-based password is a popular authentication method used from ancient times. However, text based passwords are prone to various attacks. Strong text-based password schemes could provide with a certain degree of security. However, the fact that strong passwords are difficult to memorize often leads their users to write them down on papers or even save them in a computer file. Human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as the weakest link in the authentication chain. A graphical password is one of the alternative solution to alphanumeric password as it is a very simple process to remember the alphanumeric password. One of the major reasons behind this method implementation is that, according to psychological studies human mind can easily remember images than alphabets or digits. Graphical authentication has been proposed as a possible alternative solution to text-based authentication. A new technique of captcha and OTP is being used for the verification purpose. Three times a person is given chance to try for login if the person fails then he is blocked till the session expires.

Published by: Aditya Badhe, Dhananjay Dahake, Prajakta Rokade, Arati Dhakane, D. M. Ujlambkar

Author: Aditya Badhe

Paper ID: V3I6-1480

Paper Status: published

Published: December 27, 2017

Full Details
Research Paper

Prevalence of Overweight/Obesity among School Children in Selected Private Schools at Erode, Tamil Nadu

The present study was undertaken to determine the prevalence of overweight and obesity among children studying in private schools in the age group of 11-14 years. Total enumeration sampling method was used and the total of 2291 children was included in the present study. Height and weight were measured and then BMI was calculated. Based on the BMI children were categorized as overweight and obese. Results showed that the prevalence of overweight and obesity were comparable with national level.

Published by: Kavimani .M, Dr. Helen Predita .M, Dr. Janani Sankar

Author: Kavimani .M

Paper ID: V3I6-1481

Paper Status: published

Published: December 27, 2017

Full Details
Technical Notes

Implementation of Image Steganography using LabVIEW

Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography. This technique is applicable for image data type. The main aim of this technique is to encode the data image within cover image such that the data image's existence is concealed. Here we use the data as image for Steganography. It deals with the encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW graphical programming environment is a tool for realizing the image acquisition and processing. This software has several advantages: simple implementation, modularity, flexibility, attractive user interface and possibility to develop very easy new features.

Published by: Shanthamma .K, Sanket N. Shettar, Senthilkumar .S

Author: Shanthamma .K

Paper ID: V3I6-1479

Paper Status: published

Published: December 27, 2017

Full Details
Research Paper

Bio Metrics in Secure E-transaction

Information security is concerned with the assurance of confidentially, integrity and availability of information in all forms. This is the ancient Greek word: bios = “life” and metron = “measure.” In the present day world, online shopping using WAP enabled mobile phone has widely come into use. Credit cards serve as the currency during e-business and e-Shopping. As the Hacking or Spoofing or the Misuse of the credit card is continuously increasing even you are using a secure network. Also, some Spam software is sent to your system or device through the internet that helps spammers to get the desires relevant information about your credit card and financial data. To solve these problems or get out of these insecurities the Bio-metric System that provides the secure E-transaction by improving the prevention of data spoofing. So in this paper, we have proposed a multi-biometric model (integrating voice, fingerprint and facial scanning) that can be embedded in a mobile phone, this making e-transactions more secure.

Published by: Siddhi Raviraj Awadhut

Author: Siddhi Raviraj Awadhut

Paper ID: V3I6-1462

Paper Status: published

Published: December 27, 2017

Full Details
Research Paper

A Survey on Medical Data by using Data Mining Techniques

Data mining is a vital region of research and is practically utilized as a part of various areas like back, clinical research, instruction, human services and so on. Data mining is an imperative zone of research and is even-mindedly utilized as a part of various areas like the fund, clinical research, training, social insurance and so forth. Truth be told, the assignment of data extraction from the medicinal information is a testing attempt and it is a perplexing errand. The principle intention of this audit paper is to give a survey of data mining in the domain of medicinal services. In fact, the task of knowledge extraction from the medical data is a challenging endeavor and it is a complex task. The main motive of this review paper is to give a review of data mining in the purview of healthcare. Moreover, intertwining and interrelation of previous researchers have been presented in a novel manner. Furthermore, merits and demerits of frequently used data mining techniques in the domain of healthcare and medical data have been compared. The use of different data mining tasks in health care is also discussed. An analytical approach regarding the uniqueness of medical data in healthcare is also presented.

Published by: Pradeep Nayak, Sayeesh

Author: Pradeep Nayak

Paper ID: V3I6-1452

Paper Status: published

Published: December 27, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X