{"title":"On the non-homogeneous quintic equation with five unknowns","authors":"Gopalan, G. Sumathi, S. Vidhyalakshmi","doi":"10.22457/jmi.v10a4","DOIUrl":"https://doi.org/10.22457/jmi.v10a4","url":null,"abstract":"The non-homogeneous quintic equation with five unknowns represented by x3 + y3 = z3 + w3 +6T5 is considered. Three different patterns of infinitely many non-zero integral solutions of the above the quintic equation are presented. Various interesting realations between the solutions and special number patterns,namely, Polygonal numbers, Star numbers, Centered Polygonal, Jacobsthal lucas numbers and Jacobsthal numbers are exhibited.","PeriodicalId":227898,"journal":{"name":"International Journal of Managment, IT and Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116334093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An evaluation of middle management skills in a private healthcare service in the Western Cape Province of South Africa","authors":"C. Chilanga, Cosmas Mwanza, A. Karodia","doi":"10.12816/0016573","DOIUrl":"https://doi.org/10.12816/0016573","url":null,"abstract":"The objectives of this study were to evaluate middle management skills in a healthcare and identify which skills the managers deemed to be important and also assess the self efficacy of the mangers in these skills. The study found that general managerial skills such as interpersonal relationships, patient management, quality management, leadership and human resources management were considered to be important by the middle managers. Furthermore, there is a skills deficit in financial management, niche marketing and risk management. It is concluded that although most hospital jobs are technical and specialized, it is important for those professionals that aspire to move into managerial positions to acquire managerial skills.","PeriodicalId":227898,"journal":{"name":"International Journal of Managment, IT and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129738786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recruitment and Selection","authors":"I. Chaneta","doi":"10.4324/9780203415740-7","DOIUrl":"https://doi.org/10.4324/9780203415740-7","url":null,"abstract":"The human resources of most organisations are properly viewed as their most important asset. The success and failures of the organisations are largely determined by the calibre of its work-force (starting with management) and by the efforts they exert. Therefore the policies and programmes an enterprise adopts to meet its manpower needs are of vital significance.","PeriodicalId":227898,"journal":{"name":"International Journal of Managment, IT and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130800400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human resource planning","authors":"I. Chaneta","doi":"10.4135/9781446251355.n28","DOIUrl":"https://doi.org/10.4135/9781446251355.n28","url":null,"abstract":"Human Resource Planning is also sometimes called manpower planning. It is a process for determining and assuring that the organization will have an adequate number of qualified persons, available at the proper times, performing jobs which meet the needs of the enterprise and which provide satisfaction for the individuals involved. Human resource planning is not static but ongoing. It involves many interrelated activities. The plan must be modified and updated as conditions require. It includes the planning and development of human resource programme, such as recruitment, performance appraisal and training to assure that people's needs of the organization are met.","PeriodicalId":227898,"journal":{"name":"International Journal of Managment, IT and Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124548752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encryption and Decryption","authors":"Samanvay Gupta","doi":"10.4018/978-1-4666-1649-3.ch002","DOIUrl":"https://doi.org/10.4018/978-1-4666-1649-3.ch002","url":null,"abstract":"The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel.Encryption is a well-established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches [15], [16], [17]. This paper will present some basic knowledge on about importance of encryption, different types of encryption, VoIP encryption and image encryption. VoIP (voice over internet protocol) is a one of the best technology available for voice communication which has the potential to completely rework the world's cellular systems.","PeriodicalId":227898,"journal":{"name":"International Journal of Managment, IT and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124827946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}