Home Blog

An Analytical Study of Problems Faced byStudent Entrepreneurs

I. SCOPE
Commerce is the faculty which is the
invisible thread between industry and students.
Students arewell aware about the enterprise and
entrepreneurial skills during their education.
II. RELEVANCE
The study is relevant where the students are
entrepreneurs. Education is not
Enough to push the students in industry and
study is applicable where the students are
Entrepreneurs engaged in their own business.
III. OBJECTIVES

  1. To know the functions of entrepreneurs.
  2. To know the problems of student entrepreneurs
    while functioning.
  3. To give suggestions for betterment of
    entrepreneurs.
    IV. IMPORTANT DEFINITIONS
    Entrepreneur is one who undertakes an
    enterprise – acting as intermediarybetween
    capital and labor. (Oxford Dictionary)
    Student : A student who enrolled in college,
    or institution.
    Student Entrepreneurs: Who started their
    business while studying or learn business skills
    from entrepreneurial activites in college.
    V. RESEARCH METHODOLOGY
    A structured questionnaire is framed to
    get the information and filled by10 student
    entrepreneur from different businesses. It is
    stratified sampling. Tables & charts are used for
    data analysis. Primary and secondary both type
    of data is used for the survey.

Cyber Security and Distributed Denial of Services(DDoS) Attack Prevention

Abstract – This paper discusses the role of
cyber security in our day-to-day life and explains
the DDoS (Distributed Denial of Service) Attack.
The legal provisions available to tackle the
DDoS attack are also elaborated.
Cyber security is a broad issue. The millions
of devices linked to the Internet have variable
levels of safety. There are many known and
unknown vulnerabilities in the hardware and
software on which these devices run. Technology
too is changing at a very high rate. Attackers
with poor intent need to be successful only once
defenders of cyber security have to be successful
all of the time.
With the increase in cyber attacks, there is a
growing need to increase skills in the concepts
and technology of cyber-security.
Keywords – DDoS attack, DoS attack.
INTRODUCTION
The World Wide Web provides the Internet
user to collect, accumulate, method, and
transfer huge amounts of data, which also
includes proprietary and responsive business,
transactional, and individual information [1].
With the digital age, businesses and customers
have to increasingly rely on such capability.
Security fears are evolving as the Internet is
expanding rapidly, and the associated risks are
becoming global.
Cyber security has a high dependency
under workstation network that are available
all the time and which have all the essential
security components required to give the
essentials of a trusted system, viz. privacy, data
integrity, transactional non-repudiation, and the
capability to recognize the cause of information
(validation).

Loading...

A Study of E-HRM Practices in the SmallOrganizations

Abstract : The old HRM activities done
manually which was very time consuming and
tedious work. When Information Technology
enters as a tool for HRM, activities become
easy with fast resulting outputs. Reporting
and Decision making are the most beneficial
things with the use of IT. We find some small
Organizations who are now using E-HRM
systems. E-HRM helps them for e-recruitment,
maintaining e-profile, maintaining e-database ,
online payroll activities , the concept called as
body shopping which means that a particular
skilled employee will work for a another
Organization which is geographically far from
employee and that organization will pay for
his work_hours in percentage to the company.
The employees attendance and performance
observed by e-HRM system for which he may get
some incentives also with his regular payment.
So the study has been conducted and we find
that e-HRM is beneficial for employees as well
as Organization. It reduces the cost because of
online and fast reporting activities.

  1. INTRODUCTION :
    Information Technology helps in routine
    activities to be done in innovative ways by
    decreasing paperwork. Today’s fast lifestyle
    and increasing use of E-Commerce as well as
    M-Commerce makes use of E-Human Resource
    Management (Online Systems). These systems
    provide innovative practices i.e. online HRM
    functions with the help of Web Technology. These
    E-HRM tools help in improving in performance
    of all HRM traditional activities. E-HRM is
    a different term than Information Technology
    used in the Organizations. IT or HRIS systems
    provides some tool which can increase efficiency
    of HRM activities.
Loading...

Crossing the Digital Divide -Can Teachers Bridge it?

The digital divide refers to the space
between people with efficient access to digital
and information technology and those with
inadequate or no access at all. It includes the
imbalance both in physical access to technology
and the resources and skills needed to effectively
participate as digital citizen. This gap arises due
to the fact that some sections of the society due
to advantages in income or social standing can
make better use of the internet and computers to
further their interests in work and education. The
digital divide may be also seen as an asymmetry
in information access and awareness.
The digital divide has to be minimized to
ensure that every individual irrespective of his
antecedents be at the same starting line in life.
Most of the new jobs being created now and in the
future involve some interaction with computers.
Teachers preparing PowerPoint slides for the
class, accountants completing budgets, engineers
using programmes for complex calculations,
sales clerks printing receipts or airlines booking
tickets and accepting payments online are just
some examples. Organizations will naturally
more readily hire those candidates who do not
have to be trained and can start working from the
joining date itself. This is assuming that computer
skills are the only differentiating factors between
the candidates in contention. But in fact lack
of ease with computers leads to differences in
educational attainments between students due
to unequal access to online resources such as
lectures, animations and academic news.

Loading...

Traditional Education through new Technology

In today’s world of Information Technology
Competition, computerization and globalization
different skills are required from students.
Modern technology, Education and
Fundamental research are the means of
knowledge creation and this is the main reason
of playing a significant role of Education and
Research in knowledge oriented development.
Therefore, it is necessary to increase the use of
Modern technology as per the changing time.
Economical, social, similarly political status is
changing very fast on global level. To think on
international level is the call of the time.
OBJECTIVES :

  • To increase the use of modern technology in
    the traditional education for increasing the
    students’ inclination towards the traditional
    education.
  • To understand the challenges against higher
    education by the social science teaching staff.
  • To take advantage on individual and
    organizational level, of the funds, those
  • Which are prescribed for the progress
    in technology of the University Grants
    Commission and Local University, and to
    bring it in use for the technology awareness,
    knowledge creation and Research.
Loading...

Biotaxonomic Study of Apanteles Prodeniae(Hymenoptera : Braconidae)

Abstract : The order Hymenoptera is extremely
important from the view of Biological control of
insect pests. Biology forms the basic information
for the workers involved in biological control
programmes for formulating mass rearing. The
Apanteles is an old, well known genus, initiated
by Foerster in 1862.
Keywords : Hymenoptera, Biological control,
Apanteles.
Materials and Methods : 30 females and 50
males, wings, antenna, legs were mounted and
studied. 50 early second instars of Spodoptera
litura were exposed to five mated females of
Apantelesprodeniae. Parasitoid eggs and larvae
were collected after 12h interval by dissecting
parasitized host larvae in saline, solution.
I. INTRODUCTION
The parasitic hymenoptera is an important
component in biological control programme.
Biological control and taxonomy are interrelated
and interdependent. Taxonomists need for
the identification of biological control agents,
understanding their evolutionary history,
compilation and to guide explorations for
native and exotic parasitoids.The detailed
taxonomical works on Indian species were those
of Wilkinson (1928, 1929), Bhatnagar (1948),
Rao (1961), Nixon (1967), Rao and Chalikwar
(1970), and Sathe and Inamdar (1988, 1989). In
assessments of parasitic hymenoptera a reliable
approach would be to study their lifecycle
stages. Biometrical data is helpful in separation
of different instars of the species. Fulton (1940),
Cardona and Oatman (1971), Rojas – Rouse and
Benoit (1977), and Sathe and Nikam (1985) have
attempted such type of studies. It is estimated
that there are about 250,000 species of parasitic
Hymenoptera in the world, of which only about
50,000 have been described (Gupta 1988).

Loading...

The Criminal Law Amendment 2013and Gender Equality

Criminal Law Amendment Act which came
into force in the year 2013 is the most significant
step as far as the protection of the women’s
rights is concerned. The issue of gender justice
in India is incomplete without the reference to
the Justice Verma Committee Report that led to
the Criminal Law Amendment Act of 2013. The
Report is very crucial and cannot be overlooked
as it dealt with the issues related to gender justice
and gender equality with such expertise that it
encompasses almost every important aspects
involved of the ideology. This article tries to
throw light on the perspectives of gender equality
and gender justice with special reference to the
contribution of Justice Verma Committee Report
in this regard.
The Committee was set up by the Government
in response to the long standing demand
from all parts of the society and triggered by
nationwide protest that erupted after Nirbhaya
Case that happened in Delhi, in December

  1. The Committee report in its preface itself,
    recognises and categorically states the reason for
    constituting the committee that,
    “…in response to the country-wide peaceful
    public outcry of civil society, led by the youth,
    against the failure of governance to provide a
    safe and dignified environment for the women
    of India, who are constantly exposed to sexual
    violence. The immediate cause was the brutal
    gang rape of a young woman in the heart of the
    nation’s capital in a public transport vehicle in
    the late evening of December 16, 2012.”
Loading...

Determination of Sample Size

Abstract : One of the crucial questions in
researchers mind is how big my sample should
be. There are several methods of estimation of
sample size. We classify them in two categories.
The first one is the forecasting, estimation or
prediction and the second is the testing of
hypotheses or comparison. In each case the
results are reliable or precise if sampling is
proper and the size of sample is adequate. We
give the formulae to determine the size of
sample in each of the situations which will be
of immense use to the researchers.
Keywords : Sample, population, margin of
error, confidence coefficient, hypothesis, level
of significance, power of test, ANOVA, normal
distribution, control chart, degrees of
freedom,chi-square test, contingency table.
I. INTRODUCTION
Many researchers conduct survey using
sampling techniques. One of the important
questions they face is the size of the sample.
The answer to the question is not so simple or
unique. The complexity of the answer is mainly
due to the lack of knowledge of population or
universe (Population is the group of objects
under study). The researchers are always
criticized that the size of sample is inadequate.
There are two misunderstandings about the
sample size. The first one is, larger the sample
size better are the results. The second one is,
the sample size should be at least 10% of the
population. However the results are reliable if
the sample is proper representative of
population rather than it is unexpectedly larger
in size. Merely increasing the size of sample,
we do not achieve the precision. It does not
increase proportionately as the sample size
increases.

Loading...

Case Report of Bilateral Ureteric Injury AndIts Management

ABSTRACT
Injury to the ureter is a potentially devastating
complication of modern surgery. The ureters are
most often injured in gynecologic, colorectal,
and vascular pelvic surgery. There is also
potential for considerable ureteral injury during
endoscopic procedures for ureteric pathology
such as tumor or stones. We are presenting this
case of bilateral ureteric injury in 50 years old
female on account of its rarity and its successful
management.
KEY WORDS :- Ureteric Injury.
INTRODUCTION
Iatrogenic trauma is the leading cause of
ureteric injuries. The single factor adversely
affecting the outcome of this rather uncommon
injury seems to be delayed diagnosis.
The frequency of ureteral injury following
gynecologic surgery is approximately 1%,
with a higher percentage of injuries occurring
during abdominal hysterectomies and partial
vaginectomies. Patients who have received
pelvic radiation or who have advanced pelvic
cancers requiring extensive surgical procedures
are more likely to experience a ureteral injury.
Laparoscopic procedures also have an equivalent
rate of ureteral stricture formation secondary to
ureteral injury, ureteral strictures is significantly
higher.[1, 2]
Latrogenic ureteral injury during gynecologic
surgery may present either intraoperatively
or post operatively. In post operative period,
ureteric injuries the patient may present with
flank pain, prolonged ileus, fever, watery vaginal
discharge, or elevated serum creatinine levels.
In cases of bilateral ureteral injury, anuria is the
first clinical sign.

Loading...