A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Gupta, Praveen
- Highly Effective Teams:A Regression Analysis of Group Potency and PerceivedManagerial Competencies
Authors
Source
AADYA -National Journal of Management and Technology, Vol 1 (2012), Pagination: 38-45Abstract
The current and future success of an enterprise is a reflection of the effectiveness of the senior management team, their vision and leadership, and the combined knowledge and skills of the organization's workforce. The study examines the factor structure and the reliability of a team effectiveness survey. Confirmatory factor analysis in two independent samples provided support for a model of team effectiveness. The study assessed at a group level of analysis predicted levels of group potency and team effectiveness. This study further investigates to identify the primary predictors of manager's competencies in facilitating group potency the relationship between managerial competencies, group potency and team effectiveness.Keywords
Group Potency, Managerial Competencies, Team Effectiveness.- Performance Estimates of Cryptographic Hash vis-à-vis Secret Key and Public/Private Key Operations
Authors
Source
AADYA -National Journal of Management and Technology, Vol 3 (2014), Pagination:Abstract
Cryptography is the lynchpin of data security- besides providing message confidentiality it facilitates message integrity, authentication and digital signatures. The design of a secure application is not possible without the use of some encryption and decryption techniques. An important task for cryptographers is the analysis and recommendation of parameters, crucially including key size and thus implying key strength, for cryptographic primitives.
Cryptographic hash functions are important tool in cryptography to achieve certain security goals such as authenticity, digital signature, and digital time stamping and entity authentication. This paper presents an analysis of the speed and the performance of various security algorithms by varying key size and file size. Comparative study is based on symmetric encryption algorithm Data Encryption Standard (DES), asymmetric encryption technique RSA proposed by Rivest, Shamir, and Adelman and the widely used cryptographic hash function Secure Hash algorithm (SHA1).
Keywords
Cryptography, Hashing, RSA, DES, SHA1, Performance Estimates.- Profiling of Android Phone Customers Using GPS Tracking System
Authors
1 YMT College of Management, Kharghar-Navi Mumbai, IN
2 YMT College of Management, Kharghar, IN
Source
AADYA -National Journal of Management and Technology, Vol 5 (2015), Pagination: 109-117Abstract
The Global Positioning System (GPS) is progressively being adopted by private and public businesses to track and monitor humans for location-based services (LBS).The enhancement of GPS technology enables the use of GPS devices not only as navigation and orientation tool, but also as an instrument used to capture travelled routes: as sensors that measure activity on a city scale or the regional scale. Some of these applications include personal locators for people using Android Phone especially between the age group of 15 to 60. This application target people who are food lovers by profiling the customers on their behavior and demographics. The main purpose of this research paper is to study the methodology that can be used to attract more food lovers and customers through GPS Tracking System.Keywords
GPS-Global Positioning System, Tracking, LBS-Location Based Services, Navigation.- Cloud Computing:Security Issues and Challenges
Authors
1 YMT College of Management, Kharghar, Navi Mumbai, IN
Source
AADYA -National Journal of Management and Technology, Vol 3, No 2 (2015), Pagination: 149-154Abstract
Today is the age of information technology. The facets of work and personal life are moving towards the concept of availability of everything online. The cloud makes it possible to access the information from anywhere at any time. Cloud computing is an internet based computing, where shared resources, software and information are provided to computers and devices on demand. In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Generally, cloud services are provided by a third-party supplier who possesses the arrangement. Cloud computing has completely transformed the way business organizations use IT both inside and outside of their organization. Cloud computing has many advantages like cost efficiency, convenience and continuous availability, scalability and performance, flexibility and increased storage capacity. However, Many enterprises are reluctant to move critical cloud applications out of their own data centers and into the public cloud due to security concerns. Security is a top concern for IT management because it is a most important requirement to protect the company information and to ensure system integrity. This paper mainly focuses on the security issues and challenges in cloud computing and enlightened the steps that an enterprise can take to reduce the security issues.Keywords
Cloud Computing, Information Security, Integrity, Challenges.- Open Academy an Online Dynamic Teaching and Learning Environment
Authors
1 YMT College of Management, Navi Mumbai, IN
2 YMT College of Management, IN
Source
AADYA -National Journal of Management and Technology, Vol 7, No 1 (2017), Pagination: 86-96Abstract
Now days learning and teaching has become internet based. Knowledge or information is distributed all over, means books will be available on one site and tutorials on another where as presentations are provided by different site. Sharing information with the help of videos requires channel on YouTube or dailymotion and to share presentations for eg. Slideshare or Google a/c is necessary. Due to the scattered learning resources there is need for more efficient online teaching and learning. That is all the type of learning or teaching media (video, presentation, theory and book) must be available at same place and also one should get a platform to teach a topic with help of all possible media. And there should be a way such as a person if he/she is a learner can also be able to share his/her knowledge with a group of people. Open Academy is a platform where anyone can learn and teach online. And both learner and teachers are given fair media (video, presentation, theory and book) to learn or teach. One can find all related stuff in under a particular classroom, Condition he/she is enrolled for that classroom. Open Academy is also giving ease to a user to create his/her own classroom irrespective of learner or teacher so that all users are given fair chance to share their knowledge with others.Keywords
Online Classrooms, Videos, Theories, Presentations.References
- www.php.net
- www.w3schools.com
- www.stackoverflow.com
- Analyzing the Mobile Phone Buying Behavior using SPSS
Authors
1 YMT College of Management, Kharghar, IN
Source
AADYA -National Journal of Management and Technology, Vol 8, No 0 (2018), Pagination: 30-37Abstract
Mobiles of different brands and configuration are available in the market. Generally consumers face the problem to select the suitable one according to his requirement. Here this paper uses the SPSS as data analysis tool/package for analyzing consumer behavior towards purchasing mobile phones based on certain parameters. Dataset is created using SPSS on data collected based on questionnaire from employees around Navi Mumbai. This study uses the correlation method to ascertain the impact of parameters on customer's mobile purchasing behavior.Keywords
Data Analysis, SPSS, Parameters, Purchasing Decision.References
- http://www.uvm.edu/~dhowell/fundamentals7/SPSSManual/SPSSLongerManual
- http://en.wikipedia.org/wiki/SPSS