Just Received Articles
Paper ID IJIFR/V5/E5/009
Author Prakash Tripathi- Mahatma Gandhi Chitrakoot Gramodaya Vishwavidyalaya, Chitrakoot
Paper Title Global Digital Hindi – A Journey towards New Horizon
Subject Category Computer Science & Engineering
Abstract Today is digital technique age which every sector uses openly as agriculture, development, rural development, technology development, pollution, and safety and water resources. The use of these techniques the customer use computer and smart phone then downloading various application (apps) they are completing their works easily but due to not to expert in English language the customers do not search correct information in websites in their computer or smart phone devices. To removing this lacks many internet companies with Google that is gets achieved content in English. Now a time Hindi and other local languages are thinking to complete work because with Google it is finding to various surveys that internet users will be in rural Indian for next generation. The third great language of world in Hindi is global language in this business. Today Hindi has strong catch to online platform to start-ups. The India is diversitive country and there are different culture, language, religion and caste. Every person wants every kinds of internet’s information is in speaking language. Not in India but other Indian in the world wants to get proper information in his own language because many of the people who does not expert in English language have unknown fear to complete online platform based other important works. Now a time in India and other countries such a kind of citizen has hesitated online transaction of any bank website.
Keyword Native Speakers, C-DAC, internet’s information
Paper ID IJIFR/V5/E5/008
Author Manjunatha N., Dr. Ashwini Kumar B. J.
Paper Title The Impact of Auto Component Firms Internal Factors on Standardisation of Export Marketing Strategies in south India
Subject Category Management Studies
Abstract Purpose – The purpose of this paper is to study the influence of firm's internal factors on standardisation of export marketing strategies of south Indian auto component manufacturers. Design/methodology/approach – This is a survey approach for studying south Indian component manufacturing firms with respect to standardisation of marketing mix which suites operating in overseas market. Findings – the findings show that, there is a significant impact of firm's internal factors on product standardisation and price standardization promotion and distribution standardisation. Practical implications – firms can understand factors that need to be consider while standardising their marketing strategy to find better export path and to have economies of scale while operating globally. this article may help the auto component firms and managers to learn internationalising of their business operations through standardisation approach.
Keyword Firm Characteristics, Managerial Characteristics, Product Characteristics, Standardisation, Marketing Strategies
Paper ID IJIFR/V5/E5/007
Author juhi yadav
Paper Title “A Study on Performance Appraisal System at Shree cement ltd. Beawer.
Subject Category commerce
Abstract In this study the operative function in the human resource department are analyzed with the contribution of employees and their opinion about the function performed by the employees and their opinion about the function performed by the HR Department in Shree Cement Ltd, beawar. . The material and financial resources must be put to productive use and this is possible only when an organisation is able to attract and retain talented employees. Appropriate rewards must be instituted. Growth opportunities must be put in place. Best performers must be singled out for praise and their contributions must be rewarded in a proper way. All this could happen only when the organisation is able to set challenging targets, measure the actual performance, identify the gaps and find innumerable ways and means to improve employee productivity consistently.
Keyword performance apprasail,cement industry,motivation etc
Paper ID IJIFR/V5/E5/006
Author pravesh kumar
Paper Title Efficiency improvement of photovoltaic panels by design improvement of cooling system using back water cooling tubes
Subject Category Thermal Engineering
Abstract In this paper an experimental setup is designed in which array of water tube is fitted to back of solar panel to reduce its temperature and bring temperature to normal operating point. Before this both air-cooling model and water-cooling model conditions are investigated under normal operating condition. After getting result for various model we compared our back water cooling tube array results with the ordinary solar panel. A maximum photoelectric conversion efficiency difference is 2.6%, and the temperature decreases by 2-3 degree Celsius, the output power generation efficiency is increases by 2.3 % for the solar PV panel when using heat pipe for air-cooling, when the daily radiation value is 26.3 MJ. Compared with the solar panel with heat pipe using air-cooling, the maximum difference of the photoelectric conversion efficiency is 3%, the temperature reduces maximally by 8 %, the output power increases maximally by 13.9% for the solar panel with heat pipe using water-cooling, when the daily radiation value is 21.9 MJ.
Keyword Photoelectric conversion efficiency, Maximum allowable temperature, solar panel cooling, back water heat tube array
Paper ID IJIFR/V5/E5/005
Author Archana Reddy, Subi Lakshmi M, T. Vinitha Subashini, R. Senthil Prabhu, P S Suganya
Subject Category Computer Sciences
Abstract Cloud computing can provide major benefits to organisations from a cost, flexibility and scalability perspective, but serious concerns have been raised about the security measures used to protect Cloud environments. This is because the threat landscape associated with this form of IT provision is so different to that associated with traditional dedicated hosting. If organisations no longer have direct control over the hardware or physical locations of their servers, data segregation becomes harder to achieve and regulatory compliance far more difficult to guarantee. When Context reviewed the current publications covering this subject we found that very little factual information assessing and explaining the reality of these threats was available. We undertook a detailed research project, renting infrastructure nodes from various major Cloud providers and assessing these threats from a practical perspective, with the aim of bridging some of this information gap. The findings of this research reveal that at least some of the unease felt about securing the Cloud is justified. The major technical issue that must be resolved to secure the Cloud is the separation between nodes. In a traditional dedicated hosted environment any attacker from the Internet must start at the outer firewall and work their way through, onto the web server then an application server and so on. This attack model has existed for decades and most security systems are designed with the repulsion of an attack based on these principles in mind. Context was able to view data held on other service users‟ disks and to extract data including usernames and passwords, client data and database contents. Networks that service users might reasonably assume to be dedicated „internal‟ networks are in fact open to attack from other nodes; Context therefore concludes that serious concerns over the use of these Cloud services are justified and that the current technology used by these providers is lacking from a security perspective.
Paper ID IJIFR/V5/E5/004
Author Dr. P L Sumathi, Y T Mahananda, Surya K. Jayraaj,
Paper Title The Advanced Analysis And Design Capabilities To Optimize Performance For Cost Effective Automated Street Lighting Control
Subject Category Electrical Engineering
Abstract Roads and their lighting systems are important facilities of local municipals. Most conventional street lighting systems are switched on/off at regular intervals of time. The consequence is that a large portion of electrical energy consumed by the street lighting is wasted meaninglessly if the road traffic is low. With the increasing interest in the global energy consumption and green environment requirement, automated street lighting system raises much interest around the world. In this paper, a cost effective and energy efficient automated street light control based on microcontroller and ZigBee wireless network is proposed. This project represents a set of automated street lamps. A microcontroller will receive inputs from a set of two motion sensors that will detect an object 360 degrees around each lamp. Either of the sensors will provide an input condition that will illuminate the lamp if certain other conditions are met. Under normal operation environment, the lamp is then extinguished if the sensors do not detect motion. A photocell in the system will detect the level of the ambient light. If the light level does not require the lighting, a relay will be energized and cut electrical power to the output control circuit thus the lights won’t be on. The system will be fully automated and can be configured to suit various requirements. It can be initiated by the time of day or will be active according to the level of ambient light, and run automatically.
Keyword Automated, Cost Effective, Microcontroller, Energy Efficient Automated Street Light, Zigbee Wireless Network
Paper ID IJIFR/V5/E5/003
Author P. Gopalachandrashekhar, T. M. Selvara, Dr. J. V. Sivasamy, Ms.Padmini, T. Santhalakshm
Subject Category Cloud Computing
Abstract The growing trend in migrating systems to use Cloud infrastructure to take advantage of the cost savings and flexibility that this form of IT provision can offer has caused concern within the security community, because this virtual and dynamic environment creates a new threat landscape. This paper takes a technical approach to securing a node within a Cloud service infrastructure, however, there are a number of other considerations, primarily legal and procedural that should be taken into account when selecting a Cloud provider. The methodology, results, challenges and recommended mitigations are detailed in this paper, which sets out best practices for securing Cloud nodes as a client and will help clients to assess and reduce any associated risk to their systems. Information about the general security issues discovered in actual Cloud nodes has also been fed back to the providers to enable them to resolve these issues. Management of nodes should be done via a secure mechanism. The majority of providers use a web-based application or an API to manage nodes. These management methods should have undergone independent security assessments which should be available to clients on request. In addition, to regular security reviews, the use of two-factor authentication to the management interfaces is recommended.
Keyword Cloud Infrastructure, Web-Based Application, Cloud Nodes, Results, Challenges And Recommended Mitigations
Paper ID IJIFR/V5/E5/002
Subject Category Computer Sciences
Abstract Providing security for cloud environments that matches the levels found in internal data centers is essential for helping modern organizations compete and for allowing service providers to meet their customers’ needs. However, to match the levels of security that customers experience internally, service providers must make the proper investments in providing; proving and ensuring appropriate levels of security over time. This means building security and trust architectures that ensure each company’s applications and data are isolated and secure from those of other customers in a multitenant environment. By adhering to emerging security standards and leveraging encryption, obfuscation, virtual LANs and virtual data center technologies, service providers can not only provide security services that meet or exceed internal SLAs, but also provide trusted security, even from physically shared, multitenant environments. Companies should understand that public cloud providers must also adhere to the stringent security regulations of the countries in which they operate. Whether adopted in public, private or hybrid form, or delivered as IaaS, PaaS or SaaS, the cloud imposes unique and stringent security demands. But with appropriate levels of security, trust and governance, service providers can provide a secure environment for company data and applications. The cost and agility benefits of the cloud will continue to drive organizations to migrate more critical applications and services to these platforms. As they do so, they will choose cloud providers that deliver not only the required security but also the assurance of robust security and the governance capabilities to manage ongoing security needs in a cost-effective way. Companies that choose to work with service providers offering robust security, assurance and governance architectures will have powerful first mover advantage as competitors of all sizes move more of their business to the cloud.
Paper ID IJIFR/V5/E5/001
Author Vani Senthamilselvi, Ravindra T Reddy, Y .S.S. N Rajaluxmi, Archana Govindrajan
Subject Category Computer Sciences
Abstract we need an empirical approach to studying cybercrime that would include estimating the prevalence of cybercrime as accurately as possible, analyzing the patterns of cybercrime and the victimization resulting from cybercrime and developing models to explore the impacts of criminal justice policies for the prevention and control of cybercrime. A comprehensive study of this problem requires above all a multidisciplinary approach: one that includes knowledge of computer networks and telecommunications; an understanding of information systems and how systems are attacked; a criminal justice perspective; and an analytic approach to model the process, investigate the impacts of cybercrime and assess the effectiveness of preventive measures. It is this kind of multidisciplinary approach that we adopt in this paper.
Keyword information systems, cybercrime, computer networks,confidentiality and security of data
Important Dates
(Continuous 53rd Edition)
Till 7th, February 2018
After Online Submission of Paper
Within 7-10 Days After Peer Review Only
Final Paper Acceptance Notification
Till 5th, February 2018
Join Editorial Board
While submitting the manuscript to the journal authors should confirm that it is an original manuscript, unpublished work and is not under consideration elsewhere. Plagiarism, including duplicate publication of the author's own work, in whole or in part without proper citation is not tolerated by the journal. Manuscripts submitted to the journal may be checked for originality using anti-plagiarism software. Authors are advised to submit authentic research work only.
The authors should ensure that they have written entirely original works, and if the authors have used the work and/or words of others that this has been appropriately cited or quoted.Proper acknowledgment of the work of others must always be given. Authors should cite publications that have been influential in determining the nature of the reported work. Authors are informed to strictly follow ethical publishing policies and submit articles which are free from plagiarism. Authors are advised to fill their copyright prescribed performa along with their final camera ready paper through online submission only.
Index Copernicus International(2013),Eurasian Scientific Journal Index, Open J-Gate,ACADEMIA, Global Impact Factor,Scientific Journal Impact Factor(SJIF),Global Impact Factor(GIF), Google Scholar, Directory Of Research Journals Indexing,World Electronic Journal Library(ZDB-Number:2808009-9), Infobase Index, Scholar Article Impact Factor, Scholar Steer, Scientific Indexing Services, Worldcat, ZDB, Advanced Science Index, Citefactor, Citeulike, Figshare, LABII, Internet Archive, Jour Informatics, Journal Seek, GENAMICS, Scribd, Slidshare, Datazar, Community Research, Yudu, The Winnower, International Impact Factor Services, International Institute Of Organized Research (I2OR), International Innovative Journal Impact Factor (IIJIF), ISRA: Journal Impact Factor(3.779),ISSUU Digital Publishing, Journal Index, Open Academic Journals Index, ORCID, Quality Factor, Research Bible, ROAD: Directory Of Open Access Scholarly Resources
This journal is intended to publish only high level eminent papers which have originality and novelty in content. The journal strongly suggests not using or copying any part of the already published materials. The papers submitted to the journal first will undergo screening process for originality in content. If they satisfy this requirement the papers will be further sent to review.Otherwise the papers will be rejected at the first level. Team-IJIFR
All inconsistencies in the text and in the reference section and any typographical errors must be carefully checked and corrected before the submission of the manuscript. The article should not contain any such material or information that may be unlawful, defamatory, fabricated, plagiarized, or which would, if published, in any way whatsoever, violate the terms and conditions as laid down in the copyright agreement. This copyright form must be signed, dated and submitted to IJIFR before publishing of final camera ready paper. IJIFR will not publish any manuscript that is not accompanied by a corresponding author self-signed copyright form
It is required to obtain written confirmation from authors in order to acquire copyrights for papers published in the journal. We must need copyright form filled by corresponding author. We do not publish any paper without submission of copyright form. It is mandatory that a signed copyright letter should also be submitted along with the manuscript by the author to whom correspondence is to be addressed, delineating the scope of the submitted article declaring the potential competing interests, acknowledging contributions from authors and funding agencies, and certifying that the paper is prepared according to the 'Instructions for Authors .
Papers submitted for publication are selected on the basis of peer reviewed double - blind international refereeing process to ensure originality, relevance, and readability. We advice the authors to submit only authentic research work. Do not submit Plagiarized & others copied work. Enter your correct mobile numbers while online submission so that you can get status of your papers through our Automatic Mobile Information Service.
The authors who indulge in plagiarism or malpractice will be blacklisted. IJIFR publishers will judge any case of plagiarism on its limits.If plagiarism is detected by the editorial board member, reviewer, editor etc., in any stage of article process- before or after acceptance, during editing or at a page proof stage. We will alert the same to the author(s) and will ask them to rewrite the content or to cite the references from where the content has been taken. If more than 10% of the paper is plagiarized- the article may be rejected and the same is notified to the author & will not be acceptable in same issue after rejection.
Dear Friends / Scholars / Faculties, !!! Greetings from International Journal of Informative & Futuristic Research (IJIFR)!!! Successfully Completed 4TH Year of Research Publication The editorial board of IJIFR is very thankful for all the Research Contribution & support that you gave us during the last 4 year in making this International Journal one of the most prestigious , edifying & progressive research Journal . From last 4.7 years we have continuously published the superior & genuine work of researcher all around the world. Now, with this upcoming issue we are entering into our continuous 53RD EDITION, VOLUME - 5, ISSUE –5, JANUARY 2018
All the Author's whose papers are accepted are advised to fill the copyright form completely & submit it to IJIFR as an email attachment immediately. IJIFR will not publish any paper that is not accompanied by a Self signed copyright agreement.Final Camera ready paper must be prepared as per IJIFR Paper Template.
Papers submitted for publication are selected on the basis of peer reviewed double - blind international refereeing process to ensure originality, relevance, and readability. We advice the authors to submit only authentic research work. Do not submit Plagiarized & others copied work. Enter your correct mobile numbers while online submission so that you can get status of your papers through our Automatic Mobile Information Service.
Authors are advised to mention the names of all the authors while online submission so that all the names can appear on e certificate after publishing.The names must be mention in same order as that in submitted paper.
Authors are advised to mention the names of all the authors while online submission so that all the names can appear on e certificate after publishing.
IJIFR has earned an excellent impact factor after rigorous evaluation of year 2016 .The new impact factor (Scientific Journal Impact Factor) after evaluation is 6.051. Also, IJIFR has successfully achieved high Info base 2015 Value =4.40, Index Copernicus International (Poland) IC Score=6.62 Journal Master List 2013.
All the Author's whose papers will be accepted are advised to fill the copyright form completely & submit it to IJIFR as an email attachment immediately. IJIFR will not publish any paper that is not accompanied by a signed copyright agreement. OR Authors can submit copyright form alongwith their original paper submission to IJIFR.
IJIFR special issue welcomes the papers from the new and recurring National Conferences, International Conferences, Seminars, Workshops conducted by colleges, universities, engineering institutes etc.All the papers will be published within special issue database which will be given special link through website. We will provide hardcopy of papers, certificate of publication individually to all the authors & special cover page having all conference details. All the papers of conferences will be published with ISSN number & will be available to different online resources joint with IJIFR.
All inconsistencies in the text and in the reference section and any typographical errors must be carefully checked and corrected before the submission of the manuscript. The article should not contain any such material or information that may be unlawful, defamatory, fabricated, plagiarized, or which would, if published, in any way whatsoever, violate the terms and conditions as laid down in the submission guidelines.Papers should bear the abstract, introduction, rationale, review, research design, analysis and interpretation, findings and conclusion, and references in IJIFR paper template. Fabricated and plagiarized data in any form will not be acceptable. Authors are advised to read submission guidelines carefully before submitting the paper online. The papers submitted must be research oriented & analytical in nature.
Papers will be accepted/Rejected or ask for Re Submission purely on the reviewers satisfaction report.You can check your paper status with in 7 days after receiving the submission acknowledgement.
Authors are invited to submit their original unpublished research work for continuous 53RD Edition of IJIFR i.e. VOLUME-5, ISSUE-5 , JANUARY 2018. Last Date for Final Camera Ready Paper submission (without any further modifications) is upto 31ST JANUARY 2018. Finally, all accepted papers will be Published till 7TH, FEBRUARY 2018 online . Also, fill all the details while online submission correctly so that you can get status of your papers through email & our MOBILE SMS Service correctly.While Online submission fill the names of all authors . Do not submit plagiarized & false contents. IJIFR is strictly against Plagiarism.