S.no Article Details Pg.no
1

Title


GENERAL INSURANCE INDUSTRY IN INDIA-ISSUE AND CHALLENGE

Authors


Dr.S.ANANDARAJAN, M.Com,M.Phil,Ph.D Assistant Professor and Head PG and Research Department of Commerce, SrimathSivagnanaBalayaSwamigal Tamil Arts and Science College, Mailam, Tamilnadu-604304.
N. Saraswathi, M.Com, SrimathSivagnanaBalayaSwamigal Tamil Arts and Science College, Mailam, Tamilnadu-604304.

Abstract


The earlier traces of insurance are in the form of Marine Trade Losses and at the time bonds were used to cover accidental losses. After Marine Insurance, there was augmentation in the field of Fire Insurance. It is started Germany in the beginning of16th century and great fire in England in 1666 which resulted is burning of 85 percentages of the houses to ashes injected life, strength and continuity to the concept of Fire Insurance. Within the colonial augmentation of England the Fire Insurance spread all over the global. In IndiaGeneral Insurance started working 1850 and credit for the identical goes to the Triton Insurance,Calcutta.


DOI : 10.46528/DRSRJ.2020.V06I01N01.01

1-7
2

Title


A STUDY ON EFFECTIVENESS OF EMPLOYEE TRAINING AND DEVELOPMENT AT NATURAL CAPSULES LIMITED IN PONDICHERRY

Authors


Mr.Y.TAMAZHIANMSW,MPhil,NET,SET Assistant Professor, Department of Social Work, BWDA Arts and Science College, Kolliyangunam

Abstract


Training can be introduced simply as a process of assisting a person for enhancing his efficiency and effectiveness to a particular work area by getting more knowledge and practices. Also training is important to establish specific skills,abilities and knowledge to an employee. The researcher adopted descriptive design for the study and fifty selected for the study.


DOI : 10.46528/DRSRJ.2020.V06I01N01.02

8-16
3

Title


A STUDY ON EMPLOYEE COMPENSATION IN PALMETTO INDUSTRIES INDIA PRIVATE LIMITED, PUDUCHERRY

Authors


Mr.N.ELAVARASAN M.Com. M.Phil., B.Ed., Assistant Professor, PG & Research Department of Commerce SrimathSivagnanaBalayaSwamigal Tamil Arts & Science College, Mailam, Tamil Nadu, India
R.SUBHASHINI SrimathSivagnanaBalayaSwamigal Tamil Arts & Science College, Mailam, Tamil Nadu, India

Abstract


Compensation is a systematic approach to providing monetary value to employees in exchange for work performed. Compensation may achieve several purposes assisting in recruitment, job performance, and job satisfaction. An ideal compensation management system will help you significantly boost the performance of your employees and create a more engaged workforce that’s willing to go to the extra mile for your organization. Such a system should be well – defined and uniform and should apply to all levels of the organization as a general system. Plus you’ll enjoy clearer visibility into individual employee performance when it comes time to make critical compensation planning decisions. With effective compensation management you‘ll also enjoy clearer visibility into individual employee performance when it comes time to make critical compensation planning decisions. With effective compensation management you’ll also enjoy clearer visibility into individual employee performance when it comes time to make critical compensation planning decisions. These performance appraisals assist in determining compensation and benefits, but they are also instrumental in identifying ways to help individuals improve their current positions and prepare for future opportunities. Human resource is the most vital resource for any organization. It is responsible for each and every decision taken, each and every work done and each and every result. Employees should be managed properly and motivated by providing best remuneration and compensation as per the industry standards. The lucrative compensation will also serve the need for attracting and retaining the best employees.


DOI : 10.46528/DRSRJ.2020.V06I01N01.03

17-24
4

Title


A CASE STUDY OF DEMONETIZATION IN INDIA

Authors


J. Anitha M.Com., M.Phil., (Ph.D.)., Assistant Professor, Department of Commerce, Arakkonam Arts & Science College, Arakkonam
K.T. Kamesh M.Com., B.Ed., (Ph.D.) Assistant Professor, Department of Commerce, Arakkonam Arts & Science College, Arakkonam

Abstract


Demonetization is the act of decorticate a currency unit of its status as legal tender. It occurs whenever there is a change in national currency. Withdrawing units of money from circulation is demonetization; units of money are denied the status of legal tender. Demonetizations are defined as a process by which currency units will not remain legal tender. The currency notes will not be taken as valid currency. Demonetizations are a step taken by the government where currency units are ceased of its status as legal tender. Demonetization is a basic condition to change national currency. In other words, demonetization can be said a change of currency where new units of currency replace the old one. It may involve the introduction of new notes or coins of the same denomination or completely new denomination. The currency has been demonetized thrice in India. The first demonetization was on 12th January 1946 (Saturday), second on 16th January 1978 (Monday) and the third was on 8th November 2016 (Tuesday). The study attempts to understand meaning and reasons of demonetization, the sector wise impact of demonetization. This study also gives an insight into the positive and negative impact of demonetization on Indian economy


DOI : 10.46528/DRSRJ.2020.V06I01N01.04

25-30
5

Title


A STUDY ON CORDIAL LABELING OF GRAPHS

Authors


BABU.A, Dept of Mathematics Srimath Sivagnana Balaya Swamigal Tamil,Arts And Science College, Mailam.
BHATHMANABAN.P 2Bharath Institute of Higher Education and Research, Chennai-73,

Abstract


In this topic assortment projects in graph theory, the most part for rocket controlling code, design exact radar compose codes and convolution codes with most appropriate auto correlation residences. Labeling performs crucial stage within observe of correspondence organize and we decide ideal circuit formats.


DOI : 10.46528/DRSRJ.2020.V06I01N01.05

31-38
6

Title


AN OVERVIEW OF GST LAW - AN INDIRECT TAX OF INDIA

Authors


S.SELLADOURAITCHY, Assistant professor of Economics, Bharathidhasan Govt.College for Women, Puducherry - 605 001

Abstract


Goods and services Tax (GST) is an Indirect tax which has replaced many Indirect Taxes in India. The Goods and Service Tax (GST) Act was passed in the Parliament on 29th March 2017. The Act came into effect on 1st July 2017; Goods & Services Tax Law in India is a comprehensive, multi-stage, destination-based tax that is levied on every value addition. In simple words, Goods and Service Tax (GST) is an indirect tax levied on the supply of goods and services. This paper provides on overview of the goods and services tax of India.


DOI : 10.46528/DRSRJ.2020.V06I01N01.06

39-47
7

Title


RETAIL INVESTOR’S PREFERENCES TOWARDS INVESTMENT IN MUTUAL FUNDS

Authors


Mr.K.SASIKUMAR RESEARCH SCHOLAR PERIYAR GOVT. ARTS COLLEGE CUDDALORE – 607 001
Dr.K.KRISHNAMURTHY RESEARCHGUIDE & SUPERVISOIR DEPARTMENT OF COMMERCEDEPARTMENT OF COMMERCE PERIYAR GOVT. ARTS COLLEGE CUDDALORE – 607 001

Abstract


This research aims to study retail investors’ preferences towards mutual funds. India is one of the fastest growing economies in the world with rising incomes, but also savings and investments. The main sector of emerging financial markets is investment in mutual funds. The mutual fund sector plays a key role in the development of financial markets, business sector and growth of financial intermediaries. The regulatory measures to develop mutual fund industry and to protect the interests of MF investors are also important. This study required to examine theoretical aspects of Indian mutual fund industry and retail investor’s preferences towards investment


DOI : 10.46528/DRSRJ.2020.V06I01N01.07

48-55
8

Title


SATISFACTION LEVEL OF TEXTILE INDUSTRY EMPLOYEES IN CHENNAI

Authors


Dr.M.VETRIVEL, Associate Professor & Research Guide Department of Commerce VISTAS, Chennai-600117
Mr. S. RAKESH, Ph.D Research Scholar Department of Commerce VISTAS, Chennai-600117

Abstract


Employee loyalty can be defined as employees being committed to the success of the organization and believing that working for this organization is their best option. The aim of the study was to find the impact of job satisfaction and organizational commitment on employee loyalty. This study also finds out the relationship between job satisfaction and organizational commitment. Further the study will also find the comparison of employee loyalty in manufacturing and service industry. At last the factors affecting satisfaction level of employee was also determined. To achieve the aim of the study the questionnaire survey was used. The results show that there is an impact of employee loyalty and organizational commitment on jobsatisfaction.


DOI : 10.46528/DRSRJ.2020.V06I01N01.08

48-55
9

Title


Customer Satisfaction of E-Commerce and Online Shopping: A Study with Reference to Online Customers at Kallakurichi City

Authors


Dr. P. Veeralakshmi, Department of Commerce, Thiruvalluvar University Constituent Arts and Science College, Kallakurichi
Dr. P. Prema, Department of Computer Science, Thiruvalluvar University Constituent Arts and Science College, Kallakurichi

Abstract


Online shopping is basically a process of selling and buying of goods using World Wide Web (WWW). In the era of globalization, e-commerce is a great revolution and offering online shopping which gives more beneficial to the customers (such as convenience, better price, more variety and privacy, etc.,). Even though, some people fear that they might get addicted to online shopping and the following are some of the disadvantages during online shopping: delay in delivery, frauds, lack of close examinations, etc. This paper focuses the study of customer satisfaction level and attitude at the time of online shopping at Kallakurichi city


DOI : 10.46528/DRSRJ.2020.V06I01N01.09

65-71
9

Title


Customer Satisfaction of E-Commerce and Online Shopping: A Study with Reference to Online Customers at Kallakurichi City

Authors


Dr. P. Veeralakshmi, Department of Commerce, Thiruvalluvar University Constituent Arts and Science College, Kallakurichi
Dr. P. Prema, Department of Computer Science, Thiruvalluvar University Constituent Arts and Science College, Kallakurichi

Abstract


Online shopping is basically a process of selling and buying of goods using World Wide Web (WWW). In the era of globalization, e-commerce is a great revolution and offering online shopping which gives more beneficial to the customers (such as convenience, better price, more variety and privacy, etc.,). Even though, some people fear that they might get addicted to online shopping and the following are some of the disadvantages during online shopping: delay in delivery, frauds, lack of close examinations, etc. This paper focuses the study of customer satisfaction level and attitude at the time of online shopping at Kallakurichi city


DOI : 10.46528/DRSRJ.2020.V06I01N01.09

65-71
10

Title


An effectiveness of misleading advertisement for new product Launch in Food Corporation

Authors


L.PRABURAJ Senior faculty & HOD-RFM FDDI,Sriperumpudur, Chennail.
B. SANJEEVAN, M. Com, MBA, M.Phil, (Ph.D) Research Scholar, Department of commerce, Tamilnadu Open University, Chennai, Tamilnadu.

Abstract


The present era is of mass production and mass distribution .Similar products are taken to the market. This involves stiff competition amongst the producers .Many firms adopt the vigorous means to maintain their existence in the market, as there are many substitutes in the market. This tendency is a struggle for the producers for their survival in the modern business world. All businessmen aim to make profit by increasing the sales at a remunerative price policy support by the advertisement


DOI : 10.46528/DRSRJ.2020.V06I01N01.10

72-77
11

Title


Financial Performance and Growth of Indian Software Companies

Authors


Dr. Gyanendra B. S. Johri, Associate Professor, Indira Gandhi National Tribal University, Amarkantak, M.P

Abstract


The software industry of India has evolved on the basis of increasing its place in the value chain and providing tailor made solutions to the respective customers. Customer satisfaction can also be included in the list of reasons. The NASSCOM has announced in 2018 that the future of Indian software companies is very bright in the next decade if the industry keeps on growing at the rate 11% CAGR, which is exactly the current rate of growth. This present study will evaluate the financial results of the selected 20 companies for the period of 10 years i.e. 2010 to 2019 and try to find the dependency of operating profit and inconsistency (if any) in the financial performance of the selected companies.


DOI : 10.46528/DRSRJ.2020.V06I01N01.11

78-88
12

Title


AAHAAR- AGNI- VYAADHI TRIAD IN GARBHINEE

Authors


DR ANJANA SAXENA, Asst. Prof. Prasuti Tantra and Stree roga, Govt. PG Ayurvedic College and Hospital Varanasi UP India
DR VIRENDRA KUMAR, Associate Prof.Kaumarbhritya, Govt. PG Ayurvedic College and Hospital Varanasi UP India

Abstract


Pregnancy is one of the most important stages of the womanhood. It has two facets like a coin, one has a cause to live the most desirable moment of life ahead while other has a lot of apprehension, anxiety and discomfort. The would be mother has to nourish not only herself but her most welcomed guest in her womb too and for this her Gastrointestinal tract must has to be fit; coincidently the whole tract has to accommodate rather compromise with its space of its free movement. Due to this and so many other physiological causes this system has to face a lot of discomfort. The Great thinkers of Ayurveda have already narrated about the whole Digestive system as Anna Vaha Srotas and Agni associated to this Srotasa plays major role in digestion and assimilation.


DOI : 10.46528/DRSRJ.2020.V06I01N01.12

89-92
13

Title


A STUDY OF MANJU KAPUR’S DIFFICULT DAUGHTERS FROM A FEMINIST PERSPECTIVE

Authors


S. Manimekalai Assistant Professor PSNA College of Engineering & Technology Dindigul.
Dr. V. Vimala Assistant Professor Cardamom Planter’s College Theni

Abstract


Since it is patriarchal by nature, the Indian society has been ruthless in subjecting women to several social, physical and psychological harassments. The women have been treated as pleasure giving objects. Though they are expected to fulfill roles like a mother, wife, daughter and so on, they are forbidden from maintaining an identity of their own. From this traditional archetypal background, there has been a slow shift in the Indian women sensibility due to the influence of the revolutionary process taking place in the western countries against the social taboos and practices. Due to their extra-ordinary perception regarding men and matters, the women writers in India have brought newer dimensions . Their works form a major constituent of contemporary writing in English. Their novels talk about the place and position of women in Indian society and the challenges and plights from time to time. The modern Indian women are vociferous in their demand. The protagonists depicted in the latest English novels are all educated intellectuals. They venture to seek self realization by analyzing their lives. The novelists of the present era take conscious efforts to cultivate a female selfhood which claims immunity from guilt and social stigma. This paper attempts to study Manju Kapur’s Difficult Daughters novel from feminist perspective through the protagonist Virmati and the female characters she comes across in the novel


DOI : 10.46528/DRSRJ.2020.V06I01N01.13

93-104
14

Title


HMM Approach for Semantic Image Retrieval on Content Sharing Sites

Authors


V. Lingamaiah & Yarava Rokesh Kumar Assistant Professor, Department of Computer Science and Engineering Malla Reddy Engineering College (A), Hyderabad, Telangana, India.

Abstract


Social Network is an emerging E-service for content sharing sites (CSS). It is efficient service user’s communication new attack ground for data hackers they can easily unused the data in the media. Some users over CSS affect user’s security on their personal data. An Adaptive Privacy Policy Prediction (A3P) model helps users to compose security model for their data. We put forward this model consisting Adaptive Privacy Policy Prediction (A3P) framework to help users create security model for their data. To provide security for the data automated annotation of images is create the meta data information about the images by using the new model is called Semantic annotated Markova Semantic Indexing(SMSI) for take the data The proposed model automatically annotates the data using hidden Markov model and features extracted is using color histogram and scale invariant feature transform data sharing. We further propose many functions to uses in system recommended functions and provide security models. For user-specified functions We change secret small functions in which security is modify by hiding secret functions/algorithms.


DOI : 10.46528/DRSRJ.2020.V06I01N01.14

105-111
15

Title


Remote Data Unity Checking with Privacy Enhancement for Cloud Data Storage

Authors


P. V. Ramana Murthy Associate Professor, Department of Computer Science and Engineering Malla Reddy Engineering College (A), Hyderabad, Telangana, India
G. Venu Gopal Rao Assistant Professor, Department of Computer Science and Engineering Malla Reddy Engineering College (A), Hyderabad, Telangana, India

Abstract


Remote data unity checking (RDUC) permits checking the data integrity for the data put away on cloud. There are number of RDUC conventions have been proposed in the writing, however they experience the ill effects of issue of a mind-boggling key administration. In this venture, we propose another development of identity-based (ID-based) RDUC convention by making utilization of security key natives to diminish the framework many-sided quality and the expense for building up and dealing with the general population enter confirmation structure in PKI based RDUC plans. In our venture there are three principle ideas that are cloud server, user and third-party auditor (TPA). TPA gives the evidence that our data integrity is keep up or not, likewise we are additionally giving the security components. on the off chance that if the data is gets adjusted by the cloud server or unapproved individual then user gets their unique data from the fake server. Third Party Auditor (TPA) is in charge of checking the integrity of the cloud data in the interest of the cloud users in the event that if cloud user does not have room schedule-wise to screen their assets and integrity of data and returns the examining report to the cloud user.


DOI : 10.46528/DRSRJ.2020.V06I01N01.15

112-118
16

Title


An Effective Approach for the Detection of Packet Dropping Attacks in MANETs

Authors


Pottapinjara Babu, Bhagavathy Thiraviam Assistant Professor, Department of Computer Science and Engineering Malla Reddy Engineering College (A), Hyderabad, Telangana, India

Abstract


Mobility and security location of Mobile Ad hoc Networks (MANET) is developed major domains. MANETs is commonly used network applications. Linkage error and small packet precede two sources for packet losses in mobile ad hoc network. A sequence of packet losses is present in the network. A distributed packet dropping attack (PDA) detection method is known as NAODV is proposed. Detection is small node is based on cooperative participation of many nodes’ communication based on TRUST level. Conventional algorithm is used detecting packet loss rate and detection efficient the packet dropping rate is comparable to the channel error rate. The implement detection efficient correlations number of packets is finding. The packets are transmitted in the nodes with high trust value. Our experiment use NS2 with better performance. SAODV is detecting number of nodes identifying dropping of network and data packet. Packet dropping is link error and presence of small nodes is detected by SAODV. It also uses importance to security services of data and reduce the computation overhead a packet-block based on detection truthfulness for lower computation complexity. The proposed model is uses better detection and efficient to conventional methods.


DOI : 10.46528/DRSRJ.2020.V06I01N01.16

119-127
17

Title


Spying of Malicious Applications in OSN: A New and Efficient Framework

Authors


Racharla Ramya, Gudepu Sai Krishna Assistant Professor, Department of IT Malla Reddy Engineering College (A), Hyderabad, Telangana, India

Abstract


The owners also resort and fraudulent model to deployment the ranking of the apps in the popularity list. There is limited understanding in the evolvement though the prevention of fraud has been widely is finding. We implement Firefox users to the number of installed applications on their Facebook profiles. We present the temporal analysis of the Facebook applications’ stating and removal dataset take user requirements. Online social networks (OSNs) are new vectors for cybercrime and hackers are finding new ways. We present results in the perspective of over 12K users to install. Our purpose system is creating a Facebook application and user goal is to develop a FRAppE Face book’s Rigorous Application. Online Social Networks (OSN) takes third party apps to changes the user experience on the platforms. Such modifications are interesting communicating number of online friends and new models such as playing games. We take facebook provides to developers an API that facilities app applied into Facebook user experience. Present Ackers to started taking advantage of the resource of this third-party apps platform and deploying small applications and small apps will give a profitable business for hackers given the recognition of OSNs. It is safe and secure data is added in our wall. Thus, the Offensive words and posts are blocked with the help of dictionary using filters and it is not publicly posted to user wall.


DOI : 10.46528/DRSRJ.2020.V06I01N01.17

128-132
18

Title


A New Cross Layer Design for Efficient Routing Protocol using Ant Colony Optimization

Authors


Gudepu Sai Krishna, P. Swapna Assistant Professor, Department of IT Malla Reddy Engineering College (A), Hyderabad, Telangana, India

Abstract


In military applications mobile ad-hoc network plays very important role because it is specifically designed network for on demand requirement and in situations where set up of physical network is not possible. This special type of network which takes control in infrastructure less communication handles serious challenges tactfully such as highly robust and dynamic military workstations, devices and smaller sub-networks in the battlefield. Therefore, there is a high demand of designing efficient routing protocols ensuring security and reliability for successful transmission of highly sensitive and confidential military information in defence networks. With this objective, a power efficient network layer routing protocol in the network for military application is designed and simulated using a new cross layer approach of design to increase reliability and network lifetime up. But here PDO-AODV approach does not support to optimal path selection. So, we propose a new ACO-DAEE (Ant colony optimization with delay aware energy efficient) for optimal path selection and mitigating the delay time in network system. The main goal is to maintain the optimal routes in network, during data transmission in an efficient manner. Our simulation results indicate that ACO-ADEE performs extremely well in terms of packet delivery ratio, end to end delay, and throughput. Simulation results through NS2 software to verify the effectiveness of our method.


DOI : 10.46528/DRSRJ.2020.V06I01N01.18

133-139
19

Title


Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving

Authors


Ailuri Venkatrami Reddy, Racharla Ramya Assistant Professor, Department of IT Malla Reddy Engineering College (A), Hyderabad, Telangana, India

Abstract


In the present scenario businesses and people are outsourcing database to accomplish helpful administrations and minimal effort applications. These are buried in the cloud server, which is outside the ability to control of the data proprietor. The SQL Queries require a few secure database schemes for its undeniable working, yet this at long last prompts privacy spillage to the cloud server. For numerical range inquiry (>,< , and so forth.) these neglect to give adequate security insurance. A portion of the difficulties faced are privacy leakage of statistical attributes, access patterns and so on. Likewise, increased number of queries will release more information to the cloud server. Thus, regarding these issues numerous works have been done by various researchers. We have studied some of these research works and analyzed the best possible ways to come to the desired level of privacy preservation in the case of cloud computing. Some of the works studied are the fuzzy logic, range queries, CryptDB order preserving encryption and multi-cloud architecture.


DOI : 10.46528/DRSRJ.2020.V06I01N01.19

140-144
20

Title


An Efficient Framework for Secured Proxy-based Multi-cloud Computing Composition

Authors


Dr. Shanmugam Kannan Associate Professor, Department of IT Malla Reddy Engineering College (A), Hyderabad, Telangana, India
Goski Sathish Assistant Professor, Department of IT Malla Reddy Engineering College (A), Hyderabad, Telangana, India

Abstract


Today expanding cloud computing services take great opportunities for consumers to take better service and security conveniently new challenges to select the best service reporter out of the huge pool. In the proposed system the trust value is finding with the interaction between the users and the reporter. With the help of the ratings reporter to the cloud service providers by the users trust worthiness is estimated at different level, which is determined by the present interaction and the interaction. Oriented by requirement of trust management in number of cloud environment this paper presents T-broker a trust total service brokering method for efficient matching cloud services to satisfy different user requests. Trustworthiness is computed from personal work gained in direct interactions. Competence is assessed based on transparency in provider’s SLA guarantees. We proposed secured proxy-based multi-cloud computing composition take dynamic, on the- fly collaborations and resource sharing many cloud-based services, addressing trust, policy, and security models. We integrate cloud with data confidentiality and the possibility of executing concurrent operations on encrypted data The prototype is implements the proposed cloud scheduler. The trusted Scheduler component it is important to analysis clouds is managed. The Scheduler trusted input trust status of the cloud infrastructure and provides cover new properties the foundation for planned future work. Cloud Trust Management, which provides the scheduler entry in the trust status of the cloud infrastructure


DOI : 10.46528/DRSRJ.2020.V06I01N01.20

145-153
21

Title


Cryptographic Approaches for Data Assurance in Cloud

Authors


B Saritha, More Praveen Assistant Professor, Department of Computer Science and Engineering Malla Reddy Engineering College (A), Hyderabad, Telangana, India

Abstract


The main objective of this system is to develop an experimental model to store the data securely in cloud computing environment and provides high level of trustworthy data maintenance scheme to its users with Advanced Cryptographic Standards (ACS) scheme. In this system a novel proof based trustworthy data management scheme to upload the data into the server with proper cryptographic principles such as Advanced Cryptographic Standards (ACS), with these systems the data owner and data users is successfully maintain and retrieve the data to and from the server. Authentication is the procedure to ensure the cloud data in a secured manner. The strong user authentication is the main requirement for cloud computing that reduces the unauthorized user access of data on cloud. Data security is most important issue of cloud computing. Role-based access control (RBAC) method controls access to computer or network environmental based on the roles given to individual users within an organization. Roles are defined according to job skill, authority, and responsibility within an organization. In RBAC roles can be easily created, changed, or discontinued as the needs of an organization involve, without updating the privileges for every user. We propose a new Secure Cloud Data to enhancement the framework model in data security and cloud storage model by integrating the dual system encryption technology with selective proof technique.


DOI : 10.46528/DRSRJ.2020.V06I01N01.21

154-158
22

Title


Trade Policy and Trade Development in Nepal via Terms of Trade: A Testing of Hypotheses

Authors


Rohit Kumar Singh Research Scholar, Department of Economics, FSS, BHU, Varanasi-5,

Abstract


Trade policy of a country comprises several instruments, such as, tariff/quota and devaluation, etc. Here, in this paper only the effects of tariff/quota and devaluation are taken into account on terms of trade of a country. Tariff and quota improve the terms of trade whereby imports increase and exports decrease, resulting into deficit in BOT. On the other hand, devaluation reduces the terms of trade creating more exports and small imports. It creates surplus in the balance of payments. Thus, two hypotheses can be formulated first, imposition of tariff and quota, generally, improves the terms of trade, resulting into deficit in balance of trade. Second, devaluation reduces terms of trade, resulting into more exports and less imports, creating a surplus in BOT of a country. An attempt has been made to test these two hypotheses in case of Nepal’s foreign trade/BOT. Result has been that these two hypotheses are not proved in case of Nepal’s terms of trade and BOT position


DOI : 10.46528/DRSRJ.2020.V06I01N01.22

159-164
23

Title


TRIBAL WOMEN IN LOCAL GOVERNANCE: A STUDY OF PROBLEMS AND PROSPECTS

Authors


Mrs. Baijayanti Ghosh Assistant professor Dept. of Political Science Krishnagar Women's College, Krishnagar, Dist. Nadia. Pin code 741101 (West Bengal)

Abstract


The main objective of this paper is to study problem and pros¬pects of schedule Tribe Women in local governance with reference to Village- Kuchut, Dist. Burdwan district of West Bengal state. This paper is based on prima¬ry data; the data have been collected from interview schedule method. The study covers total 300 respondents as sample size across Village- Kuchut, Dist. Burdwan District of West Bengal State. Finaly the study reveals that, it has opened many opportunities to them in terms of participation and to fight against negative impact of patriarchy. Though, schedule tribe women facing problems still she has so many opportunities to grow. So, here participatory democracy has great sig¬nificance in the process of women empowerment.


DOI : 10.46528/DRSRJ.2020.V06I01N01.23

165-175
24

Title


A STUDY ON AGRICULTURAL CREDIT IN GUNTUR DURING 2008-2018

Authors


Dr. Aravind Maddali, Professor & HoD, Department MBA, Narasaraopeta Institute of Technology, Narasaraopet, Guntur District, Andhra Pradesh, India.

Abstract


Prerequisite for agriculture growth is one of the important parts of agriculture credit. There is a need to review agricultural policies on timely basis for providing adequate finance availability. Most of the Indian rural families and their savings are inadequate for formation of other economic activities lead to importance for rural credit system. These activities are coupled with substitution between realization of income and expenditure and insufficient investments towards agricultural capital. Liberalized economic environment and agricultural development is highly influenced by the institutional credit system. In India agricultural rural development banks, regional rural banks, scheduled commercial banks and cooperative banks comprises multi-agency approach for allowing credit to the agriculture sector. Apart from other points of interaction between the organized and unorganized sectors of the rural money market in India, overdue of institutional credit forge the link between them. It has serious implication in regard to flow of funds, liquidity, risks that confront the lenders and borrowers in the segments of the Indian money market which needs to be continuously explored.


DOI : 10.46528/DRSRJ.2020.V06I01N01.24

176-190
25

Title


AN AUTOMATED RESEARCH FOR ANALYSING AND VISUALISING THE DATA USED MACHINE LEARNING ANALYTICS

Authors


Dr. P. Harini Professor & HOD, Department of Computer Science and Engineering, St. Ann’s College of Engineering and Technology, Chirala, Andhra Pradesh, India

Abstract


Advances in data analytics have been a transformative force in various fields; their effect has shaped and converted into technology-dependent the dynamics that historically sustain technology fields. Health care is one such area where it is also at an emerging level. Artificial intelligence trends have realized their ability only with the necessary datasets supported, since machine learning algorithms have a data hungry existence. The importance of recent progress in data analytics and their use in the health sector, with a particular focus on predictive and simulation applications, is discussed in our paper.


DOI : 10.46528/DRSRJ.2020.V06I01N01.25

191-198
26

Title


EFFECT OF STRESS ON EXECUTIVE PERFORMANCE

Authors


SAATHWIK CHANDAN NUNE IIM KOZHIKODE

Abstract


Stress is an inevitable reality of life. But stress isn’t always a bad thing. It’s a natural, physical response that can generate our fight-or-flight response. Stress can increase our awareness in difficult or treacherous situations, allowing us to act hastily in the moment. Without it, humans wouldn’t have survived this long. But if stress is invariable over time, it can be unfavourable to health. So, stress prevention and management are important, and will help cope with the many things going on in life. The goal of preventing and managing stress isn’t to completely get liberate of stress, but to eliminate unnecessary stress and help you cope with inevitable stress


DOI : 10.46528/DRSRJ.2020.V06I01N01.26

199-206