S.no | Article Details | Pg.no |
---|---|---|
1 | Title GENERAL INSURANCE INDUSTRY IN INDIA-ISSUE AND CHALLENGE Authors
Dr.S.ANANDARAJAN, M.Com,M.Phil,Ph.D
Assistant Professor and Head
PG and Research Department of Commerce,
SrimathSivagnanaBalayaSwamigal Tamil Arts and Science College,
Mailam, Tamilnadu-604304.
Abstract The earlier traces of insurance are in the form of Marine Trade Losses and at the time bonds were used to cover accidental losses. After Marine Insurance, there was augmentation in the field of Fire Insurance. It is started Germany in the beginning of16th century and great fire in England in 1666 which resulted is burning of 85 percentages of the houses to ashes injected life, strength and continuity to the concept of Fire Insurance. Within the colonial augmentation of England the Fire Insurance spread all over the global. In IndiaGeneral Insurance started working 1850 and credit for the identical goes to the Triton Insurance,Calcutta. DOI : 10.46528/DRSRJ.2020.V06I01N01.01 |
1-7 |
2 | Title A STUDY ON EFFECTIVENESS OF EMPLOYEE TRAINING AND DEVELOPMENT AT NATURAL CAPSULES LIMITED IN PONDICHERRY Authors
Mr.Y.TAMAZHIANMSW,MPhil,NET,SET
Assistant Professor,
Department of Social Work,
BWDA Arts and Science College,
Kolliyangunam
Abstract Training can be introduced simply as a process of assisting a person for enhancing his efficiency and effectiveness to a particular work area by getting more knowledge and practices. Also training is important to establish specific skills,abilities and knowledge to an employee. The researcher adopted descriptive design for the study and fifty selected for the study. DOI : 10.46528/DRSRJ.2020.V06I01N01.02 |
8-16 |
3 | Title A STUDY ON EMPLOYEE COMPENSATION IN PALMETTO INDUSTRIES INDIA PRIVATE LIMITED, PUDUCHERRY Authors
Mr.N.ELAVARASAN
M.Com. M.Phil., B.Ed.,
Assistant Professor,
PG & Research Department of Commerce
SrimathSivagnanaBalayaSwamigal Tamil
Arts & Science College, Mailam, Tamil Nadu, India
Abstract Compensation is a systematic approach to providing monetary value to employees in exchange for work performed. Compensation may achieve several purposes assisting in recruitment, job performance, and job satisfaction. An ideal compensation management system will help you significantly boost the performance of your employees and create a more engaged workforce that’s willing to go to the extra mile for your organization. Such a system should be well – defined and uniform and should apply to all levels of the organization as a general system. Plus you’ll enjoy clearer visibility into individual employee performance when it comes time to make critical compensation planning decisions. With effective compensation management you‘ll also enjoy clearer visibility into individual employee performance when it comes time to make critical compensation planning decisions. With effective compensation management you’ll also enjoy clearer visibility into individual employee performance when it comes time to make critical compensation planning decisions. These performance appraisals assist in determining compensation and benefits, but they are also instrumental in identifying ways to help individuals improve their current positions and prepare for future opportunities. Human resource is the most vital resource for any organization. It is responsible for each and every decision taken, each and every work done and each and every result. Employees should be managed properly and motivated by providing best remuneration and compensation as per the industry standards. The lucrative compensation will also serve the need for attracting and retaining the best employees. DOI : 10.46528/DRSRJ.2020.V06I01N01.03 |
17-24 |
4 | Title A CASE STUDY OF DEMONETIZATION IN INDIA Authors
J. Anitha M.Com., M.Phil., (Ph.D.).,
Assistant Professor,
Department of Commerce,
Arakkonam Arts & Science College,
Arakkonam
Abstract Demonetization is the act of decorticate a currency unit of its status as legal tender. It occurs whenever there is a change in national currency. Withdrawing units of money from circulation is demonetization; units of money are denied the status of legal tender. Demonetizations are defined as a process by which currency units will not remain legal tender. The currency notes will not be taken as valid currency. Demonetizations are a step taken by the government where currency units are ceased of its status as legal tender. Demonetization is a basic condition to change national currency. In other words, demonetization can be said a change of currency where new units of currency replace the old one. It may involve the introduction of new notes or coins of the same denomination or completely new denomination. The currency has been demonetized thrice in India. The first demonetization was on 12th January 1946 (Saturday), second on 16th January 1978 (Monday) and the third was on 8th November 2016 (Tuesday). The study attempts to understand meaning and reasons of demonetization, the sector wise impact of demonetization. This study also gives an insight into the positive and negative impact of demonetization on Indian economy DOI : 10.46528/DRSRJ.2020.V06I01N01.04 |
25-30 |
5 | Title A STUDY ON CORDIAL LABELING OF GRAPHS Authors
BABU.A,
Dept of Mathematics
Srimath Sivagnana Balaya Swamigal Tamil,Arts And Science College, Mailam.
Abstract In this topic assortment projects in graph theory, the most part for rocket controlling code, design exact radar compose codes and convolution codes with most appropriate auto correlation residences. Labeling performs crucial stage within observe of correspondence organize and we decide ideal circuit formats. DOI : 10.46528/DRSRJ.2020.V06I01N01.05 |
31-38 |
6 | Title AN OVERVIEW OF GST LAW - AN INDIRECT TAX OF INDIA Authors
S.SELLADOURAITCHY,
Assistant professor of Economics,
Bharathidhasan Govt.College for Women,
Puducherry - 605 001
Abstract Goods and services Tax (GST) is an Indirect tax which has replaced many Indirect Taxes in India. The Goods and Service Tax (GST) Act was passed in the Parliament on 29th March 2017. The Act came into effect on 1st July 2017; Goods & Services Tax Law in India is a comprehensive, multi-stage, destination-based tax that is levied on every value addition. In simple words, Goods and Service Tax (GST) is an indirect tax levied on the supply of goods and services. This paper provides on overview of the goods and services tax of India. DOI : 10.46528/DRSRJ.2020.V06I01N01.06 |
39-47 |
7 | Title RETAIL INVESTOR’S PREFERENCES TOWARDS INVESTMENT IN MUTUAL FUNDS Authors
Mr.K.SASIKUMAR
RESEARCH SCHOLAR
PERIYAR GOVT. ARTS COLLEGE
CUDDALORE – 607 001
Abstract This research aims to study retail investors’ preferences towards mutual funds. India is one of the fastest growing economies in the world with rising incomes, but also savings and investments. The main sector of emerging financial markets is investment in mutual funds. The mutual fund sector plays a key role in the development of financial markets, business sector and growth of financial intermediaries. The regulatory measures to develop mutual fund industry and to protect the interests of MF investors are also important. This study required to examine theoretical aspects of Indian mutual fund industry and retail investor’s preferences towards investment DOI : 10.46528/DRSRJ.2020.V06I01N01.07 |
48-55 |
8 | Title SATISFACTION LEVEL OF TEXTILE INDUSTRY EMPLOYEES IN CHENNAI Authors
Dr.M.VETRIVEL,
Associate Professor & Research Guide
Department of Commerce
VISTAS, Chennai-600117
Abstract Employee loyalty can be defined as employees being committed to the success of the organization and believing that working for this organization is their best option. The aim of the study was to find the impact of job satisfaction and organizational commitment on employee loyalty. This study also finds out the relationship between job satisfaction and organizational commitment. Further the study will also find the comparison of employee loyalty in manufacturing and service industry. At last the factors affecting satisfaction level of employee was also determined. To achieve the aim of the study the questionnaire survey was used. The results show that there is an impact of employee loyalty and organizational commitment on jobsatisfaction. DOI : 10.46528/DRSRJ.2020.V06I01N01.08 |
48-55 |
9 | Title Customer Satisfaction of E-Commerce and Online Shopping: A Study with Reference to Online Customers at Kallakurichi City Authors
Dr. P. Veeralakshmi,
Department of Commerce,
Thiruvalluvar University Constituent Arts and Science College,
Kallakurichi
Abstract Online shopping is basically a process of selling and buying of goods using World Wide Web (WWW). In the era of globalization, e-commerce is a great revolution and offering online shopping which gives more beneficial to the customers (such as convenience, better price, more variety and privacy, etc.,). Even though, some people fear that they might get addicted to online shopping and the following are some of the disadvantages during online shopping: delay in delivery, frauds, lack of close examinations, etc. This paper focuses the study of customer satisfaction level and attitude at the time of online shopping at Kallakurichi city DOI : 10.46528/DRSRJ.2020.V06I01N01.09 |
65-71 |
9 | Title Customer Satisfaction of E-Commerce and Online Shopping: A Study with Reference to Online Customers at Kallakurichi City Authors
Dr. P. Veeralakshmi,
Department of Commerce,
Thiruvalluvar University Constituent Arts and Science College,
Kallakurichi
Abstract Online shopping is basically a process of selling and buying of goods using World Wide Web (WWW). In the era of globalization, e-commerce is a great revolution and offering online shopping which gives more beneficial to the customers (such as convenience, better price, more variety and privacy, etc.,). Even though, some people fear that they might get addicted to online shopping and the following are some of the disadvantages during online shopping: delay in delivery, frauds, lack of close examinations, etc. This paper focuses the study of customer satisfaction level and attitude at the time of online shopping at Kallakurichi city DOI : 10.46528/DRSRJ.2020.V06I01N01.09 |
65-71 |
10 | Title An effectiveness of misleading advertisement for new product Launch in Food Corporation Authors
L.PRABURAJ
Senior faculty & HOD-RFM
FDDI,Sriperumpudur,
Chennail.
Abstract The present era is of mass production and mass distribution .Similar products are taken to the market. This involves stiff competition amongst the producers .Many firms adopt the vigorous means to maintain their existence in the market, as there are many substitutes in the market. This tendency is a struggle for the producers for their survival in the modern business world. All businessmen aim to make profit by increasing the sales at a remunerative price policy support by the advertisement DOI : 10.46528/DRSRJ.2020.V06I01N01.10 |
72-77 |
11 | Title Financial Performance and Growth of Indian Software Companies Authors
Dr. Gyanendra B. S. Johri, Associate Professor, Indira Gandhi National Tribal University, Amarkantak, M.P
Abstract The software industry of India has evolved on the basis of increasing its place in the value chain and providing tailor made solutions to the respective customers. Customer satisfaction can also be included in the list of reasons. The NASSCOM has announced in 2018 that the future of Indian software companies is very bright in the next decade if the industry keeps on growing at the rate 11% CAGR, which is exactly the current rate of growth. This present study will evaluate the financial results of the selected 20 companies for the period of 10 years i.e. 2010 to 2019 and try to find the dependency of operating profit and inconsistency (if any) in the financial performance of the selected companies. DOI : 10.46528/DRSRJ.2020.V06I01N01.11 |
78-88 |
12 | Title AAHAAR- AGNI- VYAADHI TRIAD IN GARBHINEE Authors
DR ANJANA SAXENA, Asst. Prof. Prasuti Tantra and Stree roga, Govt. PG Ayurvedic College and Hospital Varanasi UP India
Abstract Pregnancy is one of the most important stages of the womanhood. It has two facets like a coin, one has a cause to live the most desirable moment of life ahead while other has a lot of apprehension, anxiety and discomfort. The would be mother has to nourish not only herself but her most welcomed guest in her womb too and for this her Gastrointestinal tract must has to be fit; coincidently the whole tract has to accommodate rather compromise with its space of its free movement. Due to this and so many other physiological causes this system has to face a lot of discomfort. The Great thinkers of Ayurveda have already narrated about the whole Digestive system as Anna Vaha Srotas and Agni associated to this Srotasa plays major role in digestion and assimilation. DOI : 10.46528/DRSRJ.2020.V06I01N01.12 |
89-92 |
13 | Title A STUDY OF MANJU KAPUR’S DIFFICULT DAUGHTERS FROM A FEMINIST PERSPECTIVE Authors
S. Manimekalai
Assistant Professor
PSNA College of Engineering & Technology Dindigul.
Abstract Since it is patriarchal by nature, the Indian society has been ruthless in subjecting women to several social, physical and psychological harassments. The women have been treated as pleasure giving objects. Though they are expected to fulfill roles like a mother, wife, daughter and so on, they are forbidden from maintaining an identity of their own. From this traditional archetypal background, there has been a slow shift in the Indian women sensibility due to the influence of the revolutionary process taking place in the western countries against the social taboos and practices. Due to their extra-ordinary perception regarding men and matters, the women writers in India have brought newer dimensions . Their works form a major constituent of contemporary writing in English. Their novels talk about the place and position of women in Indian society and the challenges and plights from time to time. The modern Indian women are vociferous in their demand. The protagonists depicted in the latest English novels are all educated intellectuals. They venture to seek self realization by analyzing their lives. The novelists of the present era take conscious efforts to cultivate a female selfhood which claims immunity from guilt and social stigma. This paper attempts to study Manju Kapur’s Difficult Daughters novel from feminist perspective through the protagonist Virmati and the female characters she comes across in the novel DOI : 10.46528/DRSRJ.2020.V06I01N01.13 |
93-104 |
14 | Title HMM Approach for Semantic Image Retrieval on Content Sharing Sites Authors V. Lingamaiah & Yarava Rokesh Kumar Assistant Professor, Department of Computer Science and Engineering Malla Reddy Engineering College (A), Hyderabad, Telangana, India. Abstract Social Network is an emerging E-service for content sharing sites (CSS). It is efficient service user’s communication new attack ground for data hackers they can easily unused the data in the media. Some users over CSS affect user’s security on their personal data. An Adaptive Privacy Policy Prediction (A3P) model helps users to compose security model for their data. We put forward this model consisting Adaptive Privacy Policy Prediction (A3P) framework to help users create security model for their data. To provide security for the data automated annotation of images is create the meta data information about the images by using the new model is called Semantic annotated Markova Semantic Indexing(SMSI) for take the data The proposed model automatically annotates the data using hidden Markov model and features extracted is using color histogram and scale invariant feature transform data sharing. We further propose many functions to uses in system recommended functions and provide security models. For user-specified functions We change secret small functions in which security is modify by hiding secret functions/algorithms. DOI : 10.46528/DRSRJ.2020.V06I01N01.14 |
105-111 | 15 | Title Remote Data Unity Checking with Privacy Enhancement for Cloud Data Storage Authors
P. V. Ramana Murthy Associate Professor, Department of Computer Science and Engineering
Malla Reddy Engineering College (A), Hyderabad, Telangana, India
Abstract Remote data unity checking (RDUC) permits checking the data integrity for the data put away on cloud. There are number of RDUC conventions have been proposed in the writing, however they experience the ill effects of issue of a mind-boggling key administration. In this venture, we propose another development of identity-based (ID-based) RDUC convention by making utilization of security key natives to diminish the framework many-sided quality and the expense for building up and dealing with the general population enter confirmation structure in PKI based RDUC plans. In our venture there are three principle ideas that are cloud server, user and third-party auditor (TPA). TPA gives the evidence that our data integrity is keep up or not, likewise we are additionally giving the security components. on the off chance that if the data is gets adjusted by the cloud server or unapproved individual then user gets their unique data from the fake server. Third Party Auditor (TPA) is in charge of checking the integrity of the cloud data in the interest of the cloud users in the event that if cloud user does not have room schedule-wise to screen their assets and integrity of data and returns the examining report to the cloud user. DOI : 10.46528/DRSRJ.2020.V06I01N01.15 |
112-118 | 16 | Title An Effective Approach for the Detection of Packet Dropping Attacks in MANETs Authors Pottapinjara Babu, Bhagavathy Thiraviam Assistant Professor, Department of Computer Science and Engineering Malla Reddy Engineering College (A), Hyderabad, Telangana, India Abstract Mobility and security location of Mobile Ad hoc Networks (MANET) is developed major domains. MANETs is commonly used network applications. Linkage error and small packet precede two sources for packet losses in mobile ad hoc network. A sequence of packet losses is present in the network. A distributed packet dropping attack (PDA) detection method is known as NAODV is proposed. Detection is small node is based on cooperative participation of many nodes’ communication based on TRUST level. Conventional algorithm is used detecting packet loss rate and detection efficient the packet dropping rate is comparable to the channel error rate. The implement detection efficient correlations number of packets is finding. The packets are transmitted in the nodes with high trust value. Our experiment use NS2 with better performance. SAODV is detecting number of nodes identifying dropping of network and data packet. Packet dropping is link error and presence of small nodes is detected by SAODV. It also uses importance to security services of data and reduce the computation overhead a packet-block based on detection truthfulness for lower computation complexity. The proposed model is uses better detection and efficient to conventional methods. DOI : 10.46528/DRSRJ.2020.V06I01N01.16 |
119-127 | 17 | Title Spying of Malicious Applications in OSN: A New and Efficient Framework Authors Racharla Ramya, Gudepu Sai Krishna Assistant Professor, Department of IT Malla Reddy Engineering College (A), Hyderabad, Telangana, India Abstract The owners also resort and fraudulent model to deployment the ranking of the apps in the popularity list. There is limited understanding in the evolvement though the prevention of fraud has been widely is finding. We implement Firefox users to the number of installed applications on their Facebook profiles. We present the temporal analysis of the Facebook applications’ stating and removal dataset take user requirements. Online social networks (OSNs) are new vectors for cybercrime and hackers are finding new ways. We present results in the perspective of over 12K users to install. Our purpose system is creating a Facebook application and user goal is to develop a FRAppE Face book’s Rigorous Application. Online Social Networks (OSN) takes third party apps to changes the user experience on the platforms. Such modifications are interesting communicating number of online friends and new models such as playing games. We take facebook provides to developers an API that facilities app applied into Facebook user experience. Present Ackers to started taking advantage of the resource of this third-party apps platform and deploying small applications and small apps will give a profitable business for hackers given the recognition of OSNs. It is safe and secure data is added in our wall. Thus, the Offensive words and posts are blocked with the help of dictionary using filters and it is not publicly posted to user wall. DOI : 10.46528/DRSRJ.2020.V06I01N01.17 |
128-132 | 18 | Title A New Cross Layer Design for Efficient Routing Protocol using Ant Colony Optimization Authors Gudepu Sai Krishna, P. Swapna Assistant Professor, Department of IT Malla Reddy Engineering College (A), Hyderabad, Telangana, India Abstract In military applications mobile ad-hoc network plays very important role because it is specifically designed network for on demand requirement and in situations where set up of physical network is not possible. This special type of network which takes control in infrastructure less communication handles serious challenges tactfully such as highly robust and dynamic military workstations, devices and smaller sub-networks in the battlefield. Therefore, there is a high demand of designing efficient routing protocols ensuring security and reliability for successful transmission of highly sensitive and confidential military information in defence networks. With this objective, a power efficient network layer routing protocol in the network for military application is designed and simulated using a new cross layer approach of design to increase reliability and network lifetime up. But here PDO-AODV approach does not support to optimal path selection. So, we propose a new ACO-DAEE (Ant colony optimization with delay aware energy efficient) for optimal path selection and mitigating the delay time in network system. The main goal is to maintain the optimal routes in network, during data transmission in an efficient manner. Our simulation results indicate that ACO-ADEE performs extremely well in terms of packet delivery ratio, end to end delay, and throughput. Simulation results through NS2 software to verify the effectiveness of our method. DOI : 10.46528/DRSRJ.2020.V06I01N01.18 |
133-139 | 19 | Title Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving Authors Ailuri Venkatrami Reddy, Racharla Ramya Assistant Professor, Department of IT Malla Reddy Engineering College (A), Hyderabad, Telangana, India Abstract In the present scenario businesses and people are outsourcing database to accomplish helpful administrations and minimal effort applications. These are buried in the cloud server, which is outside the ability to control of the data proprietor. The SQL Queries require a few secure database schemes for its undeniable working, yet this at long last prompts privacy spillage to the cloud server. For numerical range inquiry (>,< , and so forth.) these neglect to give adequate security insurance. A portion of the difficulties faced are privacy leakage of statistical attributes, access patterns and so on. Likewise, increased number of queries will release more information to the cloud server. Thus, regarding these issues numerous works have been done by various researchers. We have studied some of these research works and analyzed the best possible ways to come to the desired level of privacy preservation in the case of cloud computing. Some of the works studied are the fuzzy logic, range queries, CryptDB order preserving encryption and multi-cloud architecture. DOI : 10.46528/DRSRJ.2020.V06I01N01.19 |
140-144 | 20 | Title An Efficient Framework for Secured Proxy-based Multi-cloud Computing Composition Authors
Dr. Shanmugam Kannan Associate Professor, Department of IT
Malla Reddy Engineering College (A), Hyderabad, Telangana, India
Abstract Today expanding cloud computing services take great opportunities for consumers to take better service and security conveniently new challenges to select the best service reporter out of the huge pool. In the proposed system the trust value is finding with the interaction between the users and the reporter. With the help of the ratings reporter to the cloud service providers by the users trust worthiness is estimated at different level, which is determined by the present interaction and the interaction. Oriented by requirement of trust management in number of cloud environment this paper presents T-broker a trust total service brokering method for efficient matching cloud services to satisfy different user requests. Trustworthiness is computed from personal work gained in direct interactions. Competence is assessed based on transparency in provider’s SLA guarantees. We proposed secured proxy-based multi-cloud computing composition take dynamic, on the- fly collaborations and resource sharing many cloud-based services, addressing trust, policy, and security models. We integrate cloud with data confidentiality and the possibility of executing concurrent operations on encrypted data The prototype is implements the proposed cloud scheduler. The trusted Scheduler component it is important to analysis clouds is managed. The Scheduler trusted input trust status of the cloud infrastructure and provides cover new properties the foundation for planned future work. Cloud Trust Management, which provides the scheduler entry in the trust status of the cloud infrastructure DOI : 10.46528/DRSRJ.2020.V06I01N01.20 |
145-153 | 21 | Title Cryptographic Approaches for Data Assurance in Cloud Authors B Saritha, More Praveen Assistant Professor, Department of Computer Science and Engineering Malla Reddy Engineering College (A), Hyderabad, Telangana, India Abstract The main objective of this system is to develop an experimental model to store the data securely in cloud computing environment and provides high level of trustworthy data maintenance scheme to its users with Advanced Cryptographic Standards (ACS) scheme. In this system a novel proof based trustworthy data management scheme to upload the data into the server with proper cryptographic principles such as Advanced Cryptographic Standards (ACS), with these systems the data owner and data users is successfully maintain and retrieve the data to and from the server. Authentication is the procedure to ensure the cloud data in a secured manner. The strong user authentication is the main requirement for cloud computing that reduces the unauthorized user access of data on cloud. Data security is most important issue of cloud computing. Role-based access control (RBAC) method controls access to computer or network environmental based on the roles given to individual users within an organization. Roles are defined according to job skill, authority, and responsibility within an organization. In RBAC roles can be easily created, changed, or discontinued as the needs of an organization involve, without updating the privileges for every user. We propose a new Secure Cloud Data to enhancement the framework model in data security and cloud storage model by integrating the dual system encryption technology with selective proof technique. DOI : 10.46528/DRSRJ.2020.V06I01N01.21 |
154-158 | 22 | Title Trade Policy and Trade Development in Nepal via Terms of Trade: A Testing of Hypotheses Authors Rohit Kumar Singh Research Scholar, Department of Economics, FSS, BHU, Varanasi-5, Abstract Trade policy of a country comprises several instruments, such as, tariff/quota and devaluation, etc. Here, in this paper only the effects of tariff/quota and devaluation are taken into account on terms of trade of a country. Tariff and quota improve the terms of trade whereby imports increase and exports decrease, resulting into deficit in BOT. On the other hand, devaluation reduces the terms of trade creating more exports and small imports. It creates surplus in the balance of payments. Thus, two hypotheses can be formulated first, imposition of tariff and quota, generally, improves the terms of trade, resulting into deficit in balance of trade. Second, devaluation reduces terms of trade, resulting into more exports and less imports, creating a surplus in BOT of a country. An attempt has been made to test these two hypotheses in case of Nepal’s foreign trade/BOT. Result has been that these two hypotheses are not proved in case of Nepal’s terms of trade and BOT position DOI : 10.46528/DRSRJ.2020.V06I01N01.22 |
159-164 | 23 | Title TRIBAL WOMEN IN LOCAL GOVERNANCE: A STUDY OF PROBLEMS AND PROSPECTS Authors Mrs. Baijayanti Ghosh Assistant professor Dept. of Political Science Krishnagar Women's College, Krishnagar, Dist. Nadia. Pin code 741101 (West Bengal) Abstract The main objective of this paper is to study problem and pros¬pects of schedule Tribe Women in local governance with reference to Village- Kuchut, Dist. Burdwan district of West Bengal state. This paper is based on prima¬ry data; the data have been collected from interview schedule method. The study covers total 300 respondents as sample size across Village- Kuchut, Dist. Burdwan District of West Bengal State. Finaly the study reveals that, it has opened many opportunities to them in terms of participation and to fight against negative impact of patriarchy. Though, schedule tribe women facing problems still she has so many opportunities to grow. So, here participatory democracy has great sig¬nificance in the process of women empowerment. DOI : 10.46528/DRSRJ.2020.V06I01N01.23 |
165-175 | 24 | Title A STUDY ON AGRICULTURAL CREDIT IN GUNTUR DURING 2008-2018 Authors Dr. Aravind Maddali, Professor & HoD, Department MBA, Narasaraopeta Institute of Technology, Narasaraopet, Guntur District, Andhra Pradesh, India. Abstract Prerequisite for agriculture growth is one of the important parts of agriculture credit. There is a need to review agricultural policies on timely basis for providing adequate finance availability. Most of the Indian rural families and their savings are inadequate for formation of other economic activities lead to importance for rural credit system. These activities are coupled with substitution between realization of income and expenditure and insufficient investments towards agricultural capital. Liberalized economic environment and agricultural development is highly influenced by the institutional credit system. In India agricultural rural development banks, regional rural banks, scheduled commercial banks and cooperative banks comprises multi-agency approach for allowing credit to the agriculture sector. Apart from other points of interaction between the organized and unorganized sectors of the rural money market in India, overdue of institutional credit forge the link between them. It has serious implication in regard to flow of funds, liquidity, risks that confront the lenders and borrowers in the segments of the Indian money market which needs to be continuously explored. DOI : 10.46528/DRSRJ.2020.V06I01N01.24 |
176-190 | 25 | Title AN AUTOMATED RESEARCH FOR ANALYSING AND VISUALISING THE DATA USED MACHINE LEARNING ANALYTICS Authors Dr. P. Harini Professor & HOD, Department of Computer Science and Engineering, St. Ann’s College of Engineering and Technology, Chirala, Andhra Pradesh, India Abstract Advances in data analytics have been a transformative force in various fields; their effect has shaped and converted into technology-dependent the dynamics that historically sustain technology fields. Health care is one such area where it is also at an emerging level. Artificial intelligence trends have realized their ability only with the necessary datasets supported, since machine learning algorithms have a data hungry existence. The importance of recent progress in data analytics and their use in the health sector, with a particular focus on predictive and simulation applications, is discussed in our paper. DOI : 10.46528/DRSRJ.2020.V06I01N01.25 |
191-198 | 26 | Title EFFECT OF STRESS ON EXECUTIVE PERFORMANCE Authors SAATHWIK CHANDAN NUNE IIM KOZHIKODE Abstract Stress is an inevitable reality of life. But stress isn’t always a bad thing. It’s a natural, physical response that can generate our fight-or-flight response. Stress can increase our awareness in difficult or treacherous situations, allowing us to act hastily in the moment. Without it, humans wouldn’t have survived this long. But if stress is invariable over time, it can be unfavourable to health. So, stress prevention and management are important, and will help cope with the many things going on in life. The goal of preventing and managing stress isn’t to completely get liberate of stress, but to eliminate unnecessary stress and help you cope with inevitable stress DOI : 10.46528/DRSRJ.2020.V06I01N01.26 |
199-206 |