A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sharma, Saurabh
- Is PEG Ratio a Better Tool for Valuing the Companies as Compared to P/E Ratio? (A Case Study on Selected Automobile Companies)
Authors
1 School of Business & Commerce, Manipal University, Jaipur, Rajasthan, IN
Source
International Journal of Banking, Risk and Insurance, Vol 3, No 2 (2015), Pagination: 48-52Abstract
The securities in the capital markets can be analysed with the help of Fundamental Analysis or Technical Analysis or both. As for many small investors, technical analysis is a complex tool to be used for analysing the securities; they basically use fundamental analysis in formulating their effective investment strategies. Fundamental Analysis includes various tools and techniques for making analysis of various securities in which Ratio Analysis is one of them. Investors emphasize on one important ratio i.e. P/E Ratio to have a better understanding on the future growth of a company. P/E i.e. Price Earnings Ratio is calculated by dividing market(stock) price per share by its earning per share. This research paper represents a brief note about P/E and its application in making certain investment decisions. This paper also attempts to focus on a new ratio i.e. PEG innovated by some financial analysts to analyse the growth position of various automobile companies and again a critical analysis of financial statements of selected automobile companies is done to assess its P/E and PEG Ratio. To conclude this paper a comparison is made between the P/E and PEG Ratio to determine whether the newly innovated PEG Ratio is more effective over P/E Ratio.Keywords
EPS, P/E Ratio, PEG Ratio, Valuation.References
- Gotwald, R. (2012). The use of the P/E ratio to stock valuation” in Grant journal ISSN 1805-062X, 1805-0638 (online), ETTN072-11-00002-09
- Prasanna, C. (2011). Financial management: Theory and practice paperback.
- Solanki,.A. H. (2014). Relationship between P/E ratio and stock return” with Reference to BSE 100 in Global Journal for Reseach Analysis, 3(8). ISSN No 2277 - 8160
- Shen, Pu. The P/E ratio and stock market performance.
- www.buffettsecrets.com
- www.businesstoday.intoday.in
- www.economictimes.indiatimes.com
- www.investopedia.com
- www.timesofindia.indiatimes.com
- www.valuepickr.com
- www.wikipedia.org
- www.zigwheels.com
- Superstitions in Urban Community Affecting Health: Assessment and Interventional study in Meerut, India
Authors
1 Department of Community Medicine, Subharti Medical College, Meerut, IN
Source
SMU Medical Journal, Vol 3, No 1 (2016), Pagination: 606-616Abstract
Superstition refers to any belief or practice which is explained by supernatural causality, and is in contraindication to modern science. Objectives of this study were, (i) To assess the Superstitions and blind believes prevalent in the urban community,(ii) To provide knowledge about social and health related Superstitions through focus group discussion, audio visuals equipments and role play ( Nukkad natak ) and (iii) To assess the outcome after intervention. The study was a questionnaire-based survey, 20 subjects from each ethnic group were selected by cluster sampling of residential areas where that particular group has its highest concentration, making a total of 100 subjects. It was found that most people do have some superstitious beliefs which can be corrected by intervention if done in community. It was thus concluded that majority of our population believes in superstitions, which are more common in illiterates. These superstitions not only predict health seeking behaviour of a person but also play a major role in shaping the response of a community to any health intervention program. Without the knowledge of these superstitions, effective community participation cannot be achieved.Keywords
Superstitions, General Believes, Health Intervention.- Security Model for Cloud Computing by using Data Classification Methodology
Authors
1 Department of CSE, Gyan Ganga College of Technology, Jabalpur, Madhya Pradesh, IN
Source
International Journal of Innovative Research and Development, Vol 5, No 2Sp (2016), Pagination: 54-57Abstract
In Cloud Computing data is stored in the remote server and user access their data from the server. As increasing years, users on the Cloud also rapidly increasing and more users are deploying their data on the cloud. So storing data in the trust of 3rd party is mainly focus on the privacy and security of Data. Data can be a financial transactions, personal documents or files, multimedia etc. in cloud security is still a major concern. So existing solution for the problem is classifying the data and provide encryption according to that. The proposed framework is classifying the data according to its sensitiveness and for different category of data this framework provides different authentication technique and according to the level of sensitiveness it also provide required protection scheme. As compared to other solutions for the problem of security to the data present on the Cloud, this framework is more secure as it provides different level of authentication also. The data present on the cloud is secure by two ways firstly by the Encryption which is basic element of providing security and secondly with Authentication scheme.
Keywords
Cloud Computing, Cloud Storage Security, Data Classification.- Detection Mechanism of DDoS Attack in Cloud Computing
Authors
1 Gyan Ganga College of Technology, Jabalpur, M.P, IN
Source
International Journal of Innovative Research and Development, Vol 5, No 2Sp (2016), Pagination: 58-64Abstract
The Cloud Computing is a distributed computing model that was built to meet increasing demand for memory, storage and power due to industrialization and scientific research. In cloud environment, entire data resides over set of resources, which enables data to be accessed from Virtual Machines (VM). Availability of the cloud services is key security issues. Recently Distributed Denial of Service (DDoS) attacks are among one of the top threats to cloud environment and its being distributed in nature makes it simpler to launch. During DDoS, a program mostly occupies lots of computing resources, which prevents legitimate users from using services. This can be serious penalty for companies relying on cloud for their business. Thus, it becomes very important to reduce the impact of DDoS. This paper explains DDoS attack, & its effect in cloud computing and the important things which are to be needed while selecting defense mechanism for DDoS.
Keywords
Cloud Computing, Cloud Security, DDoS.- Trust, Security and Governance in Cloud Computing
Authors
Source
International Journal of Innovative Research and Development, Vol 2, No 1 (2013), Pagination: 749-764Abstract
One of the most important aspect refers to security: while some cloud computing security issues are inherited from the solutions adopted to create such services, many new security questions that are particular to these solutions also arise, including those related to how the services are organized and which kind of service/data can be placed in the cloud. Aiming to give a better understanding of this complex scenario, in this article we identify and classify the main security concerns and solutions in cloud computing, and propose a taxonomy of security in cloud computing, giving an overview of the current status of security in this emerging technology. In this highly competitive and distributed service environment, the assurances are insufficient for the consumers to identify the dependable and trustworthy Cloud providers. Governance with cloud computing offers integration management with automated problem resolution, manages security end to end, and helps budget based on actual usage of data. Governance is not yet mature enough to consistently and reliably protect their data. As the trend toward cloud-based services continues to grow, it has become clear that one of the key barriers to rapid adoption of enterprise cloud services is customer concern over data security (confidentiality, integrity, and availability). This paper introduces the concept of transparent security and makes the case that the intelligent disclosure of security design, practices, and procedures can help improve customer confidence while protecting critical security features and data, thereby improving overall governance. Cloud Computing is better for medium and small sized enterprises as compared to large enterprises in terms of both cost and data security.Keywords
Cloud Computing, Security, Trust, Governance- Hybrid System Generation of IRIS With High Accuracy
Authors
1 Department of CSE, SSU Palampur, Palampur - 176101, Himachal Pradesh, IN