{"title":"A STUDY ON FOREIGN INSTITUTIONAL INVESTMENT FLOWS AND STOCK INDEX","authors":"N. Gopinathan, S. Rau","doi":"10.18000/IJISAC.50053","DOIUrl":"https://doi.org/10.18000/IJISAC.50053","url":null,"abstract":"FIIs are institutions established or incorporated outside India, which proposes to make investment in Indian securities. The Indian economic reforms have led to fast growth in economy, corporate restructuring and improved Forex reserve, making India an attractive destination for investment. Sensex is an \"index” of BSE stocks. It gives an idea of the stocks market movement. The Sensex is an indicator of all the major companies of the BSE whereas Nifty is an indicator of all the major companies of the NSE. The present study makes an analyse of trading of FII and stock index during the period June 2000- March 2007 giving emphasis on quarterly data on FII flows and corresponding stock indices such as Sensex and Nifty. Statistical tools like Regression Analysis, Correlation Analysis and Trend Analysis have been used in the study.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121051852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CONCISE RANGE QUERIES","authors":"Srikanth, Madialagan M.K","doi":"10.18000/IJISAC.50132","DOIUrl":"https://doi.org/10.18000/IJISAC.50132","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129231566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SATISFIED RURAL CONSUMERS PAY MORE FOR THEIR FMCG PRODUCTS - A SPECIAL REFERENCE TO PUDHUCHERRY REGION","authors":"A. Gopinath, M. Arul","doi":"10.18000/IJISAC.50116","DOIUrl":"https://doi.org/10.18000/IJISAC.50116","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ESCORTING DATA FROM CCA2 ATTACK ON SAC","authors":"S. Balaji, R. Jeeva, M. Ayyamperumal, P. Mano","doi":"10.18000/ijisac.50098","DOIUrl":"https://doi.org/10.18000/ijisac.50098","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115971289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsteady Stokes Flow of Viscous Fluid between Two Parallel Porous Plates","authors":"S. Ganesh, .. S.Krishnambal","doi":"10.18000/IJISAC.50012","DOIUrl":"https://doi.org/10.18000/IJISAC.50012","url":null,"abstract":"Berman(1953) was the first researcher who studied the problem of steady flow of an incompressible viscous fluid through a porous channel with rectangular crosssection, when the Reynolds number is low. He obtained a perturbation solution assuming normal wall velocities to be equal. Then Sellars(1955) extended the problem studied by Berman when the Reynolds number is very high. Afterwards Yuan(1956) and Terill(1964) studied the problem for various values of suction and injection Reynolds numbers. Terill and Shrestha(1965) have analysed the same problem, assuming different normal velocities at the walls.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117136034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of ANN for Solution of PDE in RF Engineering","authors":"S. Pattanaik, M. R.K.","doi":"10.18000/IJISAC.50028","DOIUrl":"https://doi.org/10.18000/IJISAC.50028","url":null,"abstract":"Artificial Neural Network (ANN) is used to solve the differential equation used in RF Engineering. Solution of Poisson’s equation and wave equation are illustrated as example with different boundary conditions like pure Dirichlet, pure Neumann and mixed boundary condition. The formulation considers it as an optimization problem and therefore proposes solutions for both constrained and unconstrained optimization. The results are compared with the analytical results computed using standard established methods and found to be in good agreement.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BEYOND SIMULATED ANNEALING FOR GRID SCHEDULING","authors":"Joshua Samuel, R. Raj, V. Vasudevan","doi":"10.18000/IJISAC.50083","DOIUrl":"https://doi.org/10.18000/IJISAC.50083","url":null,"abstract":"In Grid Environment the number of resources and tasks to be scheduled is usually variable and dynamic in nature. This characteristic emphasizes the scheduling approach as a complex optimization problem. Scheduling is a key issue which must be solved in grid computing study and a better scheduling scheme can greatly improve the efficiency.The objective of this paper is to explore and investigate Simulated Annealing with limited iterations to promote compute intensive grid applications to maximize the Job Completion Ratio based on the comprehensive understanding of the challenges and the state of the art of current research. Experimental results demonstrate the effectiveness and robustness of the proposed algorithm. Further the comparative evaluation with other scheduling algorithms such as First Come First Serve (FCFS), Earliest Deadline First (EDF) is plotted.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121563677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"USER'S PERCEPTION ON SMALL CAR SEGMENT: A STUDY WITH REFERENCE TO CHENNAI","authors":"H. L. Manohar","doi":"10.18000/IJISAC.50022","DOIUrl":"https://doi.org/10.18000/IJISAC.50022","url":null,"abstract":"The first motorcar on the streets of India was seen in 1898. Mumbai had its first taxicabs in the early 1900. After fifty years, cars were imported to satisfy the domestic demands. From 1910 to 1920, the automobile industry made a humble beginning by setting-up assembly plants in Mumbai, Kolkatta and Chennai. The imported/assembly of vehicles grew consistently after 1920's, crossing 30,000 marks in 1930. In 1954, the decision of the Government marked a turning point in the history of the Indian Car Industry. The Govt. of India instructed what type of vehicle each manufacturer should make. Therefore, each product was safety cocooned in its own segment with no fears of any impending competition. In 1985, after the entry of Maruti Udyog, the Car makers were given a free hand to fix the prices of Cars, thus, effectively abolishing all controls relating to the pricing of the end product. The importance of the small car segment emerges from the fact that it serves the common man, middle class of India. The small car has become the most common and become popular. The main objective of the survey is to evaluate users opinion, and also to identify the overall capability of small cars. A note of caution when interpreting these findings, which are based on perception of and opinion of small car owners.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125654388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INCORPORATING SOCIAL MEDIA IN RESEARCH AND ACADEMICS","authors":"S Mercy Gnana Gandhi","doi":"10.18000/IJISAC.50146","DOIUrl":"https://doi.org/10.18000/IJISAC.50146","url":null,"abstract":"The evolution of internet technology and subsequent increase in the use of online social networking applications have been undeniably considered as a milestone in the web history. Recent advances in web science allow users to create websites, manage their identities and stay connected with others, providing comprehensive digital traces of social actions, interactions and transactions. With its profound impact on our daily lives, social media has become the most important conduit for brands to build loyalty, empowering the consumers with a wealth of information at finger tips. No doubt, online social networks have revolutionized the practice of interaction among the researchers, who demand new methods and tools for collecting, processing and mining the data. Being a bundle of techniques and technologies, these networks are really an extensive attempt to promote the researchers to render the ideas of communication, collaboration and collection. Such networking resources help us in developing collaboration among different organizations, universities around the world by exploring the benefits of research activities and also by extending the promotion of academics. Organizations find it an advantage for reaching a large pool of potential consumers with less time and effort. Now, with the effective display of online web based tools, collaborative working ambience is the need of the hour, for any academic institution, for enhancing the productivity and for promoting the results. However, this type of socializing has raised concerns about the privacy and security of internet users. The present paper briefly discusses the task of social media in research and academics, the various networking resources and tools and also their impacts on researchers and students.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129918106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A SELECTIVE SURVEY OF DISTRIBUTED DENIAL-OF-SERVICE (DDOS) ATTACKS AND DEFENSE MECHANISMS","authors":"Gupta Bb","doi":"10.18000/IJISAC.50019","DOIUrl":"https://doi.org/10.18000/IJISAC.50019","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks, one of the latest and most powerful threats that have appeared to the Internet can disrupt the availability of Internet services completely, by eating either computational or communication resources through sheer volume of packets sent from distributed locations in a coordinated manner or graceful degradation of network performance by sending attack traffic at low rate. An overview of DDoS problem, Vulnerabilities in Internet Architecture, Attack: Modus Operandi, different types of DDoS attacks, recent defense mechanisms and their effectiveness are presented. This provides better understanding of the problem, current solution space and future to defend against DDoS attacks.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132076286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}