Compression ratio is the ratio of the size of the compressed file to the size of the source file. According to the differences in the compression time, the Shannon Fano algorithm is faster than the Huffman coding algorithm.
RESEARCH OBJECTIVES
The majority of researchers confirmed that female staff exhibited more stress than men (Burke &. While a single study found that female IT professionals had less self-perceived occupational stress than men, i.e.
DATA AND METHODOLOGY
DATA
We have conclusive evidence about these differences between men and women as, in Jick & Mitz, 1985; Martocchio & O'Leary, 1989;. While others insist that there are no differences between the sexes on the issue of technostress (Martocchio & O'Leary 1989, and Hamilton & Fagot, 1988).
METHODOLOGY
ANOVA
ANALYSIS AND INTERPRETATION
Gender differences on stress stemming from Work-Home conflict did not reach statistical significance when the above covariates were introduced; thus it is excluded from the analysis. This result is quite surprising since previous studies have revealed that women tend to be more likely to report stress arising from this interface than men and this result is consistent with a study conducted by Lim V. 1996) which generates the same output as there is no effect on stress through work-home conflict.
FACTOR BASED ANALYSIS
INTERNAL FACTORS TO THE JOB
Based on this, supervisors become biased in their opinion and reaffirm the fact that IT professionals are less knowledgeable and competent than their male counterparts.
MANAGERIAL ROLE
RELATIONSHIP WITHIN OFFICE
CAREER AND ACHIEVEMENT
ORGANIZATIONAL ENVIRONMENT
The reason for why men prefer to seek such jobs could be that men have a greater preference for autonomy and independence, so male IT staff are likely to report less stress and see this as an opportunity to work independently. . Thus, it is not surprising that female IT staff reported significantly higher scores on stress due to the organizational environment than male IT staff.
CONCLUSION
To cope with and avoid this situation, managers must ensure that female IT staff are well equipped with interpersonal skills to enable them to cope with office politics. Due to gender discrimination in the organization, female IT personnel may limit access to career opportunities for them and many hinder their career ambitions (Lim V. & Teo T., 1996).
Martocchio & O'Leary, (1989), "Sex Differences in Occupational Stress: A Meta-Analytic Review", Journal of Applied Psychology, nr. Sumner & Niederman, (2003), "The impact of Gender Differences on Job Satisfaction, Job Omsætning og karriereerfaringer for professionelle informationssystemer”, The Journal of Computer Information Systems, Vol.
KEYWORDS
Online news executive Online news executive Online news executive Online news executive level and management level and management level and management level and management level.
ABSTRACT
The Future of Online News Business: Executive and Management Level Online News Perspective Page 23. This situation is very interesting to explore because the mass media will change and predict the online news business.
LITERATURELITERATURE
The Pew Research Center's Internet & American Life Project surveyed Internet users who received a marked increase in online news. The trend of online news and how to improve the organization of online news are defined in this article.
LITERATURE REVIEW REVIEW REVIEW REVIEW
It is therefore not surprising that, as part of this process, online news has grown in importance in the media systems of most countries (Mitchelstein & . Boczkowski, 2009). To establish the online news department, many companies need to establish technology for computer system development, staff skill and content (Albarren, 2002).
THE DIRECTION OF ONLINE NEWS BUSINESS THE DIRECTION OF ONLINE NEWS BUSINESS
This feature supported the convenience of online news users and can link to other related news outlets. Online news organizations try to create separate information from traditional news and not duplicate the same content.
BUSINESS MODEL OF ONLINE NEWSBUSINESS MODEL OF ONLINE NEWS
The Future of the Online News Business: An Executive-Level and Managerial-Level View of Online News Page 25 Similarly, other researchers predict news. On the Internet, text is "content," the design and nature of which is determined by various factors, including: (1) the intended audience (2) the purpose of the display (3) the nature of the web project (4) the nature of interface design paradigm (5) target technology base.
CONVERGENCECONVERGENCE
To find the effect of influential factors on the trend of online news, the researcher adopted the qualitative approach as it leads the researchers to better understand and understand the perspective of directors and executives of online news on how the management, operation and the factors that influence online news. media between technologically changing conditions and globalization. The secondary data was searched from recent reports, dissertations, articles, journals, online resources, databases and others, which were useful for informing the primary data collection process, and also used to interrogate the findings.
PARTICIPANTS AND SETTING PARTICIPANTS AND SETTING
RESEARCH FINDING RESEARCH FINDING
THE ONLINE NEWS CONTENT PREDICTION THE ONLINE NEWS CONTENT PREDICTION
In addition, the online news sector will benefit from citizen reporters, who are the main news sources for each incident area. The online news industry also sent breaking news to the public by email and through a social network to inform important news.
THE CONVERGENCE OF ONLINE NEWSTHE CONVERGENCE OF ONLINE NEWS
The online news producers will support devices and budget for the citizen reporters to send information, video and photo. Sometimes the online news webmaster will send the campaign to the audience to increase the frequency access.
CONCLUSIONS CONCLUSIONS
The Future of Online News Business: Online News Executive Level and Management Level Perspective Page 29 xxxiv. The Indian oil and gas sector is one of the core industries in India and has very significant forward linkages with the entire economy.
EYWORDS
Supply chain management can be defined as the configuration, coordination and continuous improvement of an organized set of operations. Few industries can benefit more from maximizing supply chain efficiency than oil and gas companies.
OIL SECTOR IN INDIA: AN OVERVIEWOIL SECTOR IN INDIA: AN OVERVIEW
This factor, together with other advantages, has led to a sharp increase in the demand for natural gas. Demand for natural gas comes from industries such as power, fertiliser, sponge iron and glass/ceramics.
SECTORSECTOR
The demand for natural gas (allocated so far) in India at about 120 mmscmd is more than one and a half times the current gas supply of about 70 mmscmd. Moreover, according to the India Hydrocarbon Vision 2025 Report, the demand for natural gas is expected to rise sharply in the future due to its environmental friendliness and cost competitiveness.
RESEARCH MODEL AND HYPOTHESISRESEARCH MODEL AND HYPOTHESIS
RESEARCH METHODOLOGYRESEARCH METHODOLOGY
QUESTIONNAIRE RESPONSE RATEQUESTIONNAIRE RESPONSE RATE
MODEL IDENTIFICATIONMODEL IDENTIFICATIONMODEL IDENTIFICATION
RESULTS ANALYSISRESULTS ANALYSIS
CONCLUSIONCONCLUSION
Impact of Different Dimensions of SCM Practices in Indian Oil & Gas Sector Page 35. Eric Spiegel, Mathew MC Kenna, Andrew steinhubl, booz & co, Looking to the Future Procurement and Supply Chain Management in a New Environment for oil and gas.
EXTRACTION METHOD: PRINCIPAL COMPONENT EXTRACTION METHOD: PRINCIPAL COMPONENT
D'Silva, Senior Graphic Designer. 2009 KPMG, an Indian partnership a member firm of the KPMG Network of independent firm affiliated with a Swiss cooperative. Moura, 'The planning of the petroleum derivative transportation by pipelines as a distributed constraint optimization problem', in IJCAI-DCR 2007, Hyderabad, India, (2007).
ANALYSIS.TABLE 6 ANALYSIS.TABLE 6
Component
APPENDIX AAPPENDIX A
N Purohit
M Sherry
KEYWORD
PREAMBLEPREAMBLE
MODELING TRAFFIC EMULATOR
COLLISION AVOIDANCE
MODELING TRAFFIC CONTROL PROBLEM
PROPOSED SOLUTION TO THE PROBLEM
Time optimization for real-time traffic signal control system using genetic algorithm Page 39 Fig:2: implemented genetic algorithm. If the termination criteria in step (iii) is satisfied, get the solution (i.e., the current generation).
SIMULATION RESULT
Shalaby, E-H Chung, "Real-Time Optimization for Adaptive Traffic Signal Control Using Genetic Algorithms" Journal of Intelligent Transportation System, Volume 9, Issue 3, s. 6] Tidsoptimering for Traffic Signal Control Using Genetic Algorithm Leena Singh, Sudhanshu Tripathi, Himakshi Arora.
HISTORICAHISTORICA
BANCASSURANCEBANCASSURANCE
L DEVELOPMENTS OF L DEVELOPMENTS OF
WHY SHOULD BANKS ENTER INSURANCE?
WHY SHOULD BANKS ENTER INSURANCE? WHY SHOULD BANKS ENTER INSURANCE?
FACTORS FACTORS
FACTORS INFLUENCING THE DEVELOPMENT INFLUENCING THE DEVELOPMENT INFLUENCING THE DEVELOPMENT INFLUENCING THE DEVELOPMENT OF BANCASSURANCE
OF BANCASSURANCEOF BANCASSURANCE
INFLUENCING THE DEVELOPMENT INFLUENCING THE DEVELOPMENT INFLUENCING THE DEVELOPMENT
DISTRIBUDISTRIBUDISTRIBU
DISTRIBUTION CHANNELS IN TION CHANNELS IN TION CHANNELS IN TION CHANNELS IN BANCASSURANCE
BANCASSURANCE BANCASSURANCEBANCASSURANCE
TION CHANNELS IN TION CHANNELS IN
Internet: Internet banking has already been securely established as an effective and profitable basis for conducting banking operations. Bancassurers can also feel confident that internet banking will also be an effective means of cross-selling insurance savings and protection products.
INTEGRATION OINTEGRATION O
The reasonable expectation is that personal banking services will increasingly be delivered through internet banking services. Online sales of insurance policies can be encouraged by designing special non-medical term policies, which are easy to understand and do not require expert advice from trained advisors.
INTEGRATION OF VARIOUS DISTRIBUTION F VARIOUS DISTRIBUTION F VARIOUS DISTRIBUTION F VARIOUS DISTRIBUTION CHANNELS
Now there is the Internet, which seems great as an effective source of information for selling financial products. The growth of broadband connections and personal computers will clearly drive the growth of online purchasing of insurance policies, especially by white-collar workers, for whom time and convenience are key factors in any purchasing decision.
CHANNELSCHANNELS
It seems likely that a growing segment of the affluent population, everyone's target market, will find banks with well-known brands and proven e-business capabilities a very acceptable source of non-banking products.
BANCASSURANCE MODELSBANCASSURANCE MODELS
Referral Model: Banks intending not to take risk could adopt ‘referral model’ wherein they merely
Insurance as Fully Integrated Financial Service/Joint Venture: As per the regulation of
PRODUCT PRODUCT
Blend of Insurance with Bank Products
RECENT SCENARIO RECENT SCENARIO
INDIA
There should be no 'linkage' either directly or indirectly between the provision of banking services offered by the bank to its customers and the use of the insurance products. The risks, if any, involved in insurance agency/referral arrangement should not be transferred to the business of the bank.
BANCASSURANCE IN INDIA SWOT ANALYSIS BANCASSURANCE IN INDIA SWOT ANALYSIS
The bank must comply with IRDA regulations to act as a "composite corporate agent" or referral arrangement with insurance companies. Since the bank's client's participation in the insurance products is purely voluntary, it must be stated in all publicity material distributed by the bank in a prominent way.
BANCASSURANCE CHALLENGES AHEADBANCASSURANCE CHALLENGES AHEAD
COMMERCE: BARRIERS OF SUCCESS IN THE
RETAIL INDUSTRY
These were both introduced in the late 1970s, enabling companies to send commercial documents such as purchase orders or invoices electronically. During the 1980s, online shopping was also used extensively in the UK by car manufacturers such as Ford, Peugeot-Talbot, General Motors and Nissan.
GROWTH RATE IN RETAILING GROWTH RATE IN RETAILING
The Comparison Chart of The total Retail and the e-Commerce Sales
In the 1980s, other forms of e-Commerce were introduced such as credit cards, automated teller machines (ATMs) telephone banking and airline reservation systems by Saber in the US and Travicom in the UK. Global Journal of Enterprise Information System Global Journal of Enterprise Information System Global Journal of Enterprise Information System Global Journal of Enterprise Information System October-December 2011 Volume-3 Issue-IV.
The percentage growth Comparison of Total and e-Commerce
Commerce Sales
This is C2C e-Commerce Company where sellers and buyers are contacting to sell and buy goods. Like Amazon.com for books and CDs, Halfway.com plays a major role in the used textbook and CD markets.
IMPORTANT FACTORS AFFECTING E IMPORTANT FACTORS AFFECTING E
THE TRANSACTION CHAIN IN E THE TRANSACTION CHAIN IN E THE TRANSACTION CHAIN IN E
COMMERCE RETAIL SALESCOMMERCE RETAIL SALES
The waiting period of 2-3 days or more is not desirable in most cases. The process of finding the intruder is very expensive and time-consuming, and in most cases it is not desirable.
SECURITY THREATS AND SECURITY THREATS AND
This transaction system has many vulnerable points that increase the security weakness of the system towards customers. For some products, it is very easy to match the ordered and delivered product, e.g. computers and products, books and magazines, vehicles and products, software and products, electronics and electrical household appliances and tools, etc.
COMMERCECOMMERCE
The customer selects a computer and places it in the shopping cart and makes a payment with a credit card. But in clothes, shoes and consumables it is very difficult to meet the expectations of the customer and as soon as the product is delivered to the customer and it does not match the expectations of the customer, the customer feels cheated.
2008 Top Ten IC3 Complaint Categories
The verification of the merchant's website: The first suspicion in the mind of the customer is whether the merchant on the web is authentic or not. The Later on Delivery System: In the mortar and brick sales in general, the purchased goods are delivered or handed over immediately, while in the e-Commerce sales they are always delivered to the customer after 2-3 days and sometimes more than 2- 3 days.
Percent on total complaint recieved
It is very easy to install such software on computers on the Internet using any intrusion technique. In all the security provisions, there is nothing that ensures the originality of the e-commerce business on the web.
CONCLUSION CONCLUSION
Website and computer security on the Internet can be achieved by installing and implementing a number of security tools and security techniques. All the above mentioned technologies/tools are useful for preventing intruders, for anti-theft, to protect data path redirection, to prevent data modification to maintain privacy, etc.
The card number and password can be easily stolen with the help of software by copying the signal sent from the keyboard to the processor. The main tools and techniques are as follows. iii) Network Security Protocols (iv) Virtual Private Networks (v) Tunneling. vi) Proxy/Agent Systems (vii) Access Controls (viii) Authentication (ix) Intrusion Detection (x) And many more.
Advanced Data Advanced Data Advanced Data
The purpose of this book is to describe some recent data mining tools that have proven effective in dealing with data sets that often involve uncertain description or other complexities that cause difficulties for the conventional approaches of logistic regression, neural network models, and decision trees. Among these traditional algorithms, neural network models often have a relative advantage when data is complex.
INTRODUCTION
Chapter 1 gives an overview of data mining, and provides a description of the data mining
Our intention is to cover the fundamental concepts of data mining, to demonstrate the potential of collecting large data sets and analyzing these data sets to gain useful business insight.
DATA MINING METHODS AS TOOLS Chapter 3 presents memory-based reasoning
Chapter 4 discusses association rule methods
Chapter 6 presents Rough Sets, a recently popularized data mining method
Chapter 9 describes methods to evaluate models in the process of data mining
APPLICATIONS
Chapter 10 presents a spectrum of successful applications of the data mining techniques,
Corporate Corporate
The 1 st chapter includes meaning, need, importance, principles and objectives of Corporate
Blockchain Federation of India [BFI]
BYLAWS OF BLOCKCHAIN FEDERATION OF INDIA
BLOCKCHAIN VIRTUAL UNIVERSITY
NAME
PURPOSE
RESTRICTIONS ON ACTIVITIES Section 1. No part of the earnings of the Federation
MEMBERSHIP
OFFICERS
BOARD OF DIRECTORS
BYLAWS OF THE BLOCKCHAIN FEDERATION OF INDIA
These appointed members must sit for the people they replace on the board. Members may be dismissed by a two-thirds vote of the entire board.
STANDING COMMITTEES
The special officer nomination committee must submit a list of candidates for each officer position to the head of the federation no later than November 1. The names of these individuals and such other supporting material as the Nominating Committee deems appropriate shall be posted on the password-protected Board website by November 7th.
MEMBERSHIP MEETINGS
Directors or Officers, the current Chair of the BFI Nominating Committee and 2 recent Past Presidents will be appointed to resolve any conflicts.
AMENDMENTS
INDEMNIFICATION
OTHER PROVISIONS
DISSOLUTION OF THE FEDERATION
MODE OF OPERATION
Please check appropriate registration fee for BFI
Student BFI Member Student Non BFI Member
SuBScrIPtIon Form
Blockchain Federation of India
Copyright Transfer Statement
COPYRIGHT TRANSFER FORM
GJEIS is a methodological journal focusing on articles on mixed methods research in enterprise, information, and systems. The purpose of VP is to share different opinions about the IT related products and what individuals think about them.
10 Incredible Years of GJEIS 2009-2019
The rationale behind the introduction of this QF is to provide an insight into the structure and pedagogy. The purpose behind this is to deliver the most visually powerful, immersive and engaging rich media applications on the web.
About New Submission Policy (NSP) 2019
When a submission is marked for fast tracking during a www.gjeis.com submission, it is reviewed regularly and a decision to publish is made quickly. GJEIS has developed rapid peer review capabilities to limit the few unnecessary cases that pass between a submitted manuscript and its journal publication.
FTBS
GJEIS has started a non-mandatory rapid examination for fast-track publications to draw attention to remarkable developments in the various fields of academic research without compromising excellence. Please note that we acknowledge a limited number of the article under fast track in a quarter due to its frequency and additional email journal's primary contact for the query.
Publication Service
Waiver from Cost Occurred under FTPS
The topics covered by the magazine are the connections of IT in business and management and other areas related to cyber and its economic fields. The journal provides an international forum for the exchange of ideas, principles and processes related to the application of various cybernetics topics in organizations, institutions and the world at large.
GJEIS Indexing Till 2018
GJEIS Indexing till 2019
XXXXXXXXXXXXX
Enterprise Information Systemclass of Machine Learning Algorithms