Manuscripts

Recent Papers

Research Paper

Employee attrition prediction

The success of major corporations/organizations depends on the employees working in it. These employees leave the jobs due to a variety of reasons ranging from personal problems, unsatisfactory working conditions to being fired for not meeting the requirements of the job. This leaving of employees is affecting the organizations in terms of cost as well as lost productivity. In this paper, we attempt to develop a system to predict employee attrition dependent on the data within the organization.

Published by: Varshit Jain, Ansh Aya, Dhairya Desai

Author: Varshit Jain

Paper ID: V7I3-1431

Paper Status: published

Published: May 24, 2021

Full Details
Research Paper

Pivot influence: CEO change and their focal domain

The paper assesses how a CEO change of a firm and his/her respective focal domain influences the intensity of the firm’s pivot. During the research, we derive two hypotheses based on a pivot and the various associated parameters. The first hypothesis is that a CEO change in the firm will create higher intensity to pivot within the firm. The second being that a higher intensity to pivot will occur if the CEO of a firm is a domain outsider rather than a domain insider. Furthermore, in examining the United States (US) photovoltaic (PV) industry, we found that contrary to the first hypothesis, there is a lower intensity to pivot for a firm when a CEO change occurs. For the second hypothesis, if the CEO is categorized into a focal domain (domain insider and domain outsider), we find that a firm has higher intensity to pivot if the CEO is a domain outsider.

Published by: Aryan Tanwar, Prem Sagar

Author: Aryan Tanwar

Paper ID: V7I3-1451

Paper Status: published

Published: May 24, 2021

Full Details
Research Paper

Cell Phone detector and its design

The utilization of phones is broad on the planet. In spite of the fact that individuals should be connected to each other, there are times and areas where this is prohibited, either for security reasons or in light of the fact that it represents a wellbeing hazard. There is a squeezing need to confine cell phone use in explicit areas and at explicit occasions. Thus, the utilization of a brilliant cell indicator is guaranteed. Regardless of whether the telephone is in quiet mode, the circuit will identify approaching and active calls, SMS, and video transmission. At the point when the Bug detects a functioning phone's RF transmission signal, it sounds a blare cautioning and the LED squints. In The production of techniques to take out assessment place negligence in all instructive establishments is a significant field of study. At the point when a GSM recurrence signal is distinguished, the gadget would have the option to stick it, keeping the communicated signal from arriving at the client's cell phone.

Published by: Suchetana Sarkar, Rimpi Datta, Trisha Ghatak, Anirban Saha, Susmita Deb

Author: Suchetana Sarkar

Paper ID: V7I3-1446

Paper Status: published

Published: May 24, 2021

Full Details
Research Paper

Remote Work Monitoring and Work Submission System

In this modern era of technology to enhance performance, many electronic organizations have started increasingly using electronic performance monitoring systems. Efficient surveillance is the use of real-time images of ongoing construction sites. This paper based on 'remote work monitoring and submission system'. In today's world monitoring and surveillance system plays a vital role to increase productivity and efficiency of employees; the main objective of the proposed system is to reduce the number of employees that required only for surveillance purpose, this will give the ability to monitor various work sites from one place using this system and also reduce the company's expenditure. The proposed system is made for employees of an electrical company, this system provides a platform to submit their work from the remote site to the server from which the supervisor of that particular organization can monitor actual work. This system is useful for collecting data from the owner of the company. By satisfaction of this gathered information/data owners can decide how much work and which type of work/jobs are requested in particular dates of the year, they can even make a good schedule by which they can use their manpower more effectively.

Published by: Komal S. Hatagare, Krutika R. Thombre, Mrunali R. Meshram, Neha S. Ramteke, Aman A. Lingayat, Nilesh J. Deshbhratar, Dr. Snehal Golait

Author: Komal S. Hatagare

Paper ID: V7I3-1443

Paper Status: published

Published: May 24, 2021

Full Details
Research Paper

Web development architectural design and its components

Intergroup and terms of inter collaborations have arisen from the exponential development of e-commerce and production systems. Orthodox software products seem unable in able to keep pace only with the entropy development of the new ERP system platform. A web framework (WF) or web application framework (WAF) is an engineering platform that assists developers in the building of interactive services such as internet applications, browser plugins, and web APIs. Social networks are a mandatory document for developing and implementing internet software. Network architectures seek to minimize the downtime involved with traditional digital marketing practices. Many design patterns, for starters, offer repositories including memory management, encapsulation protocols, and security configuration, and they also encourage development time. While they are often used to create unique postings, there often are useful to web blogs.

Published by: Anusha D., Vanishree K.

Author: Anusha D.

Paper ID: V7I3-1436

Paper Status: published

Published: May 24, 2021

Full Details
Others

Digital door lock system using OTP

Nowadays providing security to houses is necessary. securing houses became one of the concerning issues that facing many people. This paper aims to propose a security door lock system based on raspberry pi technology where cameras, keyboards are used to providing authorization and notification to the owner. In this system, the authorized person is the only one who will get permission to access the door. This system generates an OTP and sends it to the owner which can be shared by the owner to the unauthorized person by which he/she will get access. The proposed system can be extended to be used for different areas like banks, offices.

Published by: Saloni Samal, Shriniwas Narayan, Rupali Chaudhari, Kashinath Rathod, Saloni Samal

Author: Saloni Samal

Paper ID: V7I3-1435

Paper Status: published

Published: May 24, 2021

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X