Employee attrition prediction
The success of major corporations/organizations depends on the employees working in it. These employees leave the jobs due to a variety of reasons ranging from personal problems, unsatisfactory working conditions to being fired for not meeting the requirements of the job. This leaving of employees is affecting the organizations in terms of cost as well as lost productivity. In this paper, we attempt to develop a system to predict employee attrition dependent on the data within the organization.
Published by: Varshit Jain, Ansh Aya, Dhairya Desai
Author: Varshit Jain
Paper ID: V7I3-1431
Paper Status: published
Published: May 24, 2021
Pivot influence: CEO change and their focal domain
The paper assesses how a CEO change of a firm and his/her respective focal domain influences the intensity of the firm’s pivot. During the research, we derive two hypotheses based on a pivot and the various associated parameters. The first hypothesis is that a CEO change in the firm will create higher intensity to pivot within the firm. The second being that a higher intensity to pivot will occur if the CEO of a firm is a domain outsider rather than a domain insider. Furthermore, in examining the United States (US) photovoltaic (PV) industry, we found that contrary to the first hypothesis, there is a lower intensity to pivot for a firm when a CEO change occurs. For the second hypothesis, if the CEO is categorized into a focal domain (domain insider and domain outsider), we find that a firm has higher intensity to pivot if the CEO is a domain outsider.
Published by: Aryan Tanwar, Prem Sagar
Author: Aryan Tanwar
Paper ID: V7I3-1451
Paper Status: published
Published: May 24, 2021
Cell Phone detector and its design
The utilization of phones is broad on the planet. In spite of the fact that individuals should be connected to each other, there are times and areas where this is prohibited, either for security reasons or in light of the fact that it represents a wellbeing hazard. There is a squeezing need to confine cell phone use in explicit areas and at explicit occasions. Thus, the utilization of a brilliant cell indicator is guaranteed. Regardless of whether the telephone is in quiet mode, the circuit will identify approaching and active calls, SMS, and video transmission. At the point when the Bug detects a functioning phone's RF transmission signal, it sounds a blare cautioning and the LED squints. In The production of techniques to take out assessment place negligence in all instructive establishments is a significant field of study. At the point when a GSM recurrence signal is distinguished, the gadget would have the option to stick it, keeping the communicated signal from arriving at the client's cell phone.
Published by: Suchetana Sarkar, Rimpi Datta, Trisha Ghatak, Anirban Saha, Susmita Deb
Author: Suchetana Sarkar
Paper ID: V7I3-1446
Paper Status: published
Published: May 24, 2021
Remote Work Monitoring and Work Submission System
In this modern era of technology to enhance performance, many electronic organizations have started increasingly using electronic performance monitoring systems. Efficient surveillance is the use of real-time images of ongoing construction sites. This paper based on 'remote work monitoring and submission system'. In today's world monitoring and surveillance system plays a vital role to increase productivity and efficiency of employees; the main objective of the proposed system is to reduce the number of employees that required only for surveillance purpose, this will give the ability to monitor various work sites from one place using this system and also reduce the company's expenditure. The proposed system is made for employees of an electrical company, this system provides a platform to submit their work from the remote site to the server from which the supervisor of that particular organization can monitor actual work. This system is useful for collecting data from the owner of the company. By satisfaction of this gathered information/data owners can decide how much work and which type of work/jobs are requested in particular dates of the year, they can even make a good schedule by which they can use their manpower more effectively.
Published by: Komal S. Hatagare, Krutika R. Thombre, Mrunali R. Meshram, Neha S. Ramteke, Aman A. Lingayat, Nilesh J. Deshbhratar, Dr. Snehal Golait
Author: Komal S. Hatagare
Paper ID: V7I3-1443
Paper Status: published
Published: May 24, 2021
Web development architectural design and its components
Intergroup and terms of inter collaborations have arisen from the exponential development of e-commerce and production systems. Orthodox software products seem unable in able to keep pace only with the entropy development of the new ERP system platform. A web framework (WF) or web application framework (WAF) is an engineering platform that assists developers in the building of interactive services such as internet applications, browser plugins, and web APIs. Social networks are a mandatory document for developing and implementing internet software. Network architectures seek to minimize the downtime involved with traditional digital marketing practices. Many design patterns, for starters, offer repositories including memory management, encapsulation protocols, and security configuration, and they also encourage development time. While they are often used to create unique postings, there often are useful to web blogs.
Published by: Anusha D., Vanishree K.
Author: Anusha D.
Paper ID: V7I3-1436
Paper Status: published
Published: May 24, 2021
Digital door lock system using OTP
Nowadays providing security to houses is necessary. securing houses became one of the concerning issues that facing many people. This paper aims to propose a security door lock system based on raspberry pi technology where cameras, keyboards are used to providing authorization and notification to the owner. In this system, the authorized person is the only one who will get permission to access the door. This system generates an OTP and sends it to the owner which can be shared by the owner to the unauthorized person by which he/she will get access. The proposed system can be extended to be used for different areas like banks, offices.
Published by: Saloni Samal, Shriniwas Narayan, Rupali Chaudhari, Kashinath Rathod, Saloni Samal
Author: Saloni Samal
Paper ID: V7I3-1435
Paper Status: published
Published: May 24, 2021