International Association of Engineering and Management Education (IAEME)

Displaying 1-40 of 286 results

  • White Papers // Mar 2015

    Towards the Conceptualization of an Ethnic Web Site a Literature Review

    The factors of atmosphere of the Website such as colors, images, character of writing and the sound factors are considered as very important variables in behavior of the consumer whether it is in a real context or in a virtual environment. In this paper, this research suggests studying the role...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Mar 2015

    CAN Protocol Implementation Using CANoe and Flex-Devel Boards

    With the increase in demand for safety in automobiles, the use of ECU's (Electronic Control Unit) are also increasing day-by-day. CAN serves the purpose of efficient communication between these ECU's, as it has high transmission efficiency, high reliability and being event triggered. Firstly, a method of how to use CANoe...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2015

    Study of SRAM and Its Low Power Techniques

    Static Random Access Memories (SRAMs) are an important component of microprocessors and system-on-chips. SRAMs are used as large caches in microprocessor cores and serve as storage in various IPs on a system-on-chip. SRAMs used in high performance microprocessors and graphics chips have high speed requirements. This paper discusses the basic...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2015

    Data Transmission Through Power Line

    In this paper, an attempt is made to transmit data over power line. Now-a-days, power line is getting wide acceptance for sending control signals and communication signals. It has the advantage of less initial expenses to establish a communication network. In this paper, it is demonstrated power line can be...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2015

    Fashion Retail Marketing - An Overview

    Fashion involves change, accepted change, as a succession of short-term trends or fads. Styles do not become fashion unless they win acceptance among customers. Fashion is not just about clothing, something which is demand in the market is called as fashion. Fashion marketing is the process of managing the flow...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2015

    Role of Marketing in Modern Organizations

    Marketing is a process that affects the people lives. The users are consumers, but many of them are part of marketing like sales persons, wholesalers, rivals, raw material suppliers and so force. As all know, the concept of marketing is constantly redefined. Marketing defines activities that create value through exchange...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2015

    Design of High Speed Reconfigurable Coprocessor for Interleaver and De-Interleaver Operations

    In this paper, the authors present the high speed reconfigurable co-processor for interleaver and de-interleaver system. Today's communication systems have to perform in the midst of extreme signal, complex depth and diversity. With help of reconfigurable co-processor they can ensure the communications systems are ready for next generation operations. The...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2015

    Real Time Filter and Fusion of Multi-Sensor Data for Localization of Mobile Robot

    In this paper, the authors present the sensor fusion of Global Positioning System (GPS), Inertial Measurement Unit (IMU) and Odometry data from wheel encoders which is used to estimate localization of mobile robot. GPS, IMU, wheel encoders are interfaced with MBED. Filters are used to remove erroneous noise from the...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2015

    Visual Merchandising - The Idiom of Smart Retailers

    Visual merchandising refers to the art of showcasing or presenting the products. It also educates the customers, creates desire and finally augments the selling process. Similar to the use of language to communicate, retailers use visual merchandising techniques to communicate with customers. And just like language follows its own grammar...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2015

    Performance Analysis of Data Mining Algorithms with Neural Network

    Data mining has evolved into an active and important area of research because of previously unknown and interesting knowledge from very large real world database. Data mining methods have been successfully applied in a wide range of unsupervised and supervised learning applications. Classification is one of the data mining problems...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    A Secure Alert Messaging for Vehicular Ad Hoc Networks

    Safety applications provided by vehicular ad hoc network is very crucial. The vehicles in the road form a network enabling the passengers with infotainment and security. Emergency messages can be disseminated in the VANET scenario for securing the lives of people by avoiding the situations like chain collisions. The main...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Evaluating Android Antimalware Against Transformation Attacks

    Mobile malware threats (e.g., on Android) have recently become a real concern. In this paper, the authors evaluate the state of the art commercial mobile antimalware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluation is important for...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    A Survey on Weighted Clustering Techniques in MANETs

    Ad hoc networks are dynamic in nature due to the mobility of nodes. The routing in ad-hoc networks is a tedious process because of the link breakage between the mobile nodes. Clustering is the process of grouping the nodes into different groups known as clusters. A cluster head is a...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Integrated Honeypot

    The primary goal of computer security is to defend computers against attacks launched by malicious users. There are a number of ways in which researchers and developers can work to protect the network they use; one class of these tools are honeypots. A honeypot is a computer which has been...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Effectiveness of Various User Authentication Techniques

    Text passwords are the most popular form of user authentication on the internet due to simplicity of the passwords. The internet users are required to remember many passwords to access their online accounts. These user passwords are prone to be stolen and compromised under different vulnerabilities. Passwords are compromised due...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Detection and Prevention Method of Rooting Attack on the Android Phones

    As the people all know e-banking transactions are increasing day-by-day with their needs. Developers develop new applications for e-banking transactions. But do not provide any perfect securities in these applications. E-transaction plays a vital role in their day-to-day life, everyone is emerge from the pc to smart phone devices. Smartphone's...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Detection and Prevention of Keylogger Spyware Attacks

    In cyber world the detection and prevention of malware attack is an important issue since malwares can disrupt computer operation, gather sensitive information, or gain access to private computer systems. The keylogger spyware is extremely harmful for system which are used in daily transaction processes. The keylogger records the key...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Exposing Transient Secrets and Detecting Malware Variants Using Control and Data Flow Analysis

    Malware is one of the major threats faced by distributed computing system. Malware authors use cryptographic algorithms to protect themselves from being analyzed. The use of cryptographic algorithms and transient secrets inside the malware binary provides a key obstacle to effective malware analysis and defense. CipherXRay - a novel binary...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    SecuredSMS: A Protocol for SMS Security

    Short Message Service (SMS) has become common in many of the peoples' daily life applications. Sometimes SMS is used to send confidential information like password, passcode, banking details etc. But in traditional SMS service, information content is transmitted as plain text which is not at all secure. It's because when...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Architectural Study of Littoral Zone Sensing Using Underwater Acoustic Wireless Sensor Network

    The development in Wireless Sensor Network (WSN) technology and its widespread application pay way for the development of Underwater Wireless Sensor Network (UWSN). In UWSN, sensor nodes are deployed under water or its surface for sensing information. These sensor nodes which are inexpensive & portable in nature; normally with limited...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Study of Various Techniques for Driver Behavior Monitoring and Recognition System

    A wireless ad-hoc network is a decentralized type of wireless network. In VANET, or intelligent vehicular ad-hoc networking, defines an intelligent way of using vehicular networking. In VANET combines different ad-hoc networking technologies for easy, accurate, effective and simple communication between vehicles on dynamic environment. Vehicular ad-hoc networks are expected...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    An Energy Efficient Protocol Based Study of WSN to Increase the Lifetime

    Wireless sensor network is an emerging area having wide applicability and deployment in coming era. They can be used in different areas like industry, under water, health, etc. WSN is a network of sensor nodes, which can be used for sensing or collecting physical as well as environmental information. Each...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Controller Area Network as the Security of the Vehicles

    Automobile industry is buzzing about avoiding vehicle theft in the present. By making use of the GPS feature in the mobile phone the design and development of a theft control system for an automobile can be achieved. In this system mobile phone used is embedded in the vehicle with an...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Security in MANET Via Different Intrusion Detection Techniques

    MANET which means Mobile Ad hoc NETwork is popular because it requires no network infrastructure for the mobile nodes within the network to communicate. Any node can join or leave the network independently. The important features of MANET are dynamic topology, self-configuring, peer to peer architecture, use of wireless medium...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Congestion Management Through MVCM and Congestion Control Based on Mobile Agents

    Contention between several packets trying to use the same link/channel in a network is the major cause for congestion. When congestion appears, the network will come to a state where a node or link carries so much data that it may deteriorate network service quality; resulting in queuing delay, frame...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    A Survey on Various Time Synchronization Techniques in Underwater Sensor Networks

    Time synchronization is an important task in Wireless Sensor Networks (WSNs), because in most of the applications in WSNs need accurate time in nodes. A WSN consists of sensor nodes, which have the capability sense the data from its neighboring area and process the data and forward it to other...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Impact of Electronic Commerce in Marketing and Brand Developing

    Electronic Commerce (E-Commerce) is the conduct of business activities using electronic data transmission technologies such as those used in the Internet and World Wide Web (WWW). There are different aspects of doing E-commerce such as Business-to-Customer (B-C), Business-to-Business (B-B), Business-to-Government (B-G) and Customer-to-Customer (C-C). Now-a-days, more and more people participate...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Modified Leach Protocol in Wireless Sensor Network - A Survey

    Advances in wireless technology, digital electronics, and MEMS (Micro-Electro Mechanical-Systems) have enabled the deployment of large scale Wireless Sensor Networks (WSNs). The main problem in WSN is limited battery life. So the efficient use of available battery power is one of the major factors to be considered. Studies on WSNs...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Auto Depannage Digital System with Endocrine Cellular Communication

    Auto Depannage digital system offers the most promising automatically fault recovering bioinspired model for digital circuits. In this paper, biological concept translates into hardware and finds an equivalent concept in the world of silicon. Adopting the endocrine cellular communication, the proposed system isolates the faulty cells and replaces with proper...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    A Survey on Energy Aware Routing Issues and Cross Layering in MANETs

    In the next generation of wireless communication systems, there will be a great need for the rapid deployment of independent mobile users. Such network scenarios cannot depend on centralized and organized connectivity. In such applications Mobile Ad hoc NETworks (MANETs) play an important role. MANETs is a collection of wireless...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    A Study on Performance Comparison of DYMO with AODV and DSR

    Mobile Ad hoc NETworks (MANETs) or simply ad hoc network, comprises of nodes that freely and dynamically self - organize into arbitrary and temporary network topology without any infrastructure support. So a routing procedure is always needed to find a path to forward the packets appropriately between the source and...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Hardware Efficient Singular Value Decomposition in MIMO-OFDM System

    In this paper, the authors present an adaptive hardware design for computing Singular Value Decomposition (SVD) of the radio communication channel characteristic matrix and is suitable for computing the SVD of a maximum of 4

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    AES Encryption Engine for Many Core Processor Arrays for Enhanced Security

    With the development of networking technology, Hardware encryption technology will become an irreplaceable safety technology become an irreplaceable safety technology. In this paper, the author presents the design of a very high throughput AES processor with 128 bit key on an FPGA. In order to protect the encrypted data from...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Remote-Control System of High Efficiency and Intelligent Street Lighting Using Power Line Communication and Sensors

    The proposed remote-control system uses DALI protocol to optimize management and efficiency of street lighting systems using TDA5051A modem IC for power line communication. This system enables more efficient street lamp-system management. It uses a sensor combination to control and guarantee the desired system parameters; the information is transferred point...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    A Prototyping of Software Defined Radio Using QPSK Modulation

    In this paper, the authors design and implement a software defined radio based wireless communication system. Software defined radio is a feasible solution for reconfigurable radios, which can perform different functions at different times on the same hardware. The design of the transmission side of a SDR (Software Defined Radio)...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Modified Montgomery Modular Multiplier for Cryptosystems

    RSA is one of the most widely adopted public key algorithms at present and it requires repeated modular multiplications to accomplish the computation of modular exponentiation. A famous approach to implement modular multiplication in hardware circuits is based on the Montgomery modular multiplication algorithm since it has many advantages. To...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Reversible Encrypted Data Concealment in Images by Reserving Room Approach

    Recently, more and more attention is paid to Reversible Data Hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly vacating room from...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    FPGA Implementation of Power Efficient All Digital Phase Locked Loop

    In many electronic circuits components are not receiving the clock at the exact same time. The clock generated by oscillators when reaching internal components may get distorted and require a phase locked loop to address this problem. The pure digital phase locked loop is attractive because it is less sensitive...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    Investigative Analysis of Security Issues and Challenges in Cloud Computing and Their Counter Measures

    Cloud computing is a recent technology paradigm that enables organizations or individuals to share various services in a seamless, flexible and cost-effective manner. In the modern era of business operation, the technical adoption of cloud services are high on rise by the large scale to small scale business establishment on...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2014

    An Automatic Filtering Task in OSN Using Content Based Approach

    In online social network, information filtering can be used for different and more responsive functions. This is owing to the fact that in OSN there is the possibility of posting or commenting other posts on particular public or private regions called general walls. Information filtering can be used to give...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    Load Balancing - Server Availability Issue

    Recent research works done on various load balancing techniques on web servers has disclosed that the load balancing mechanisms used by most of the popular websites and web applications which are always overloaded with huge volumes of user requests, fail to provide fast and reliable services to its users. There...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    Private Cloud Data Security: Secured User Authentication by Using Enhanced Hybrid Algorithms

    Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of data storage and maintenance and costs. However, the authors must provide security guarantees not only on authentication but...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    Privacy and Security Issues in RFID Technology

    Radio Frequency IDentification (RFID) systems are a common and useful in, supply chain management, asset tracking, animal tracking and retail inventory control. Due to hectic research and developments, in the near future, low-cost RFID tags may be a practical replacement candidate for optical barcodes on consumer items. Shockingly, the widespread...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    An Optimistic Sector Oriented Approach to Mitigate Broadcast Storm Problem in MANETs

    In Mobile Ad hoc NETworks (MANETs), due to frequent changes in topology there exist more link breakages which lead to high rate of path failures and route discoveries, which cause an increased routing control overhead. Thus, it is necessary to reduce the overhead of route discovery in the design of...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    A Survey on Wireless Mesh Network and Its Challenges at the Transport Layer

    Wireless Mesh Network (WMN) is a very promising and novel communication technology. The scope of wireless mesh networks is significantly wide both in terms of architecture and applicability. But as the technology is new and has a rather complex set of architectures, it possesses quite a few challenges in every...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jul 2014

    Ontology Based Java Platform Personalization to Host Environment

    In this paper, the authors present a personalization platform to adapt Java based applications to host environment; this is to converge the performance and reliability toward platform dependant (e.g., like C++). Intelligent Java agent is designed to perceive Host Environment and embed Java Native Interfaces (JNI) to Java program at...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jul 2014

    Hybrid Cryptography Algorithms for Secure EAAC in MANET

    Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes along with wireless transmitter and receiver that with each other via a bi-directional links either directly or indirectly. A new intrusion detection system...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2014

    Review of Different Routing Protocol for MANET

    Wireless channel link quality is the difference a challenging problem was until recently data communication Use this attribute in a similar exploration. Broadcast transmission can be regarded as quite different, and usually independently on the receiver by different geographic locations. In addition, even the same stable receiver may over time,...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2014

    Anomaly Based Detection and Prevention to Provide Secure MANET Using Dual Head Cluster in Hierarchical Cooperative IDS

    A purely wireless network wherein each device itself acts as a node and also performs the task of router is called as Mobile Ad-hoc NETwork (MANET). A MANET has become a need of today's fastest developing era. A measure issue in MANET is security as it is an autonomous system...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2014

    Coalitional Game Theoretic Approach for IEEE 802.11E Standard Based on Incentive and Credit

    Vehicular ad hoc network (IEEE 802.11e) is dynamic network where independent identity node helps each other to forward the message. But some time node may not be interested in forwarding the message. Thus it is essential to give node some incentive to participate in message forwarding game on the basis...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2014

    An Enhanced IP Traceback Mechanism for Tracking the Attack Source Using Packet Marking and Path Reconstruction

    The Distributed Denial of Service (DDoS) attacks are launched synchronously from multiple locations and they are extremely harder to detect and stop. Identifying the true origin of the attacker along with the necessary preventive measures helps in blocking further occurrences these types of attacks. The issue of tracing the source...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2014

    Robust Wireless Reprogramming Method Using Differential Approach for Wireless Sensor Networks

    The concept of software reprogramming in wireless sensor networks allows end users to improve the overall functionality of sensor network. The main aim of software reprogramming in WSN is to improve the energy utilization performance with low cost. In this paper, the authors are discussing the overall research categories of...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    RFID a Smart Technology

    RFID is only one of numerous technologies grouped under the term Automatic IDentification (Auto ID), such as bar code, magnetic inks, optical character recognition, voice recognition, touch memory, smart cards and biometrics etc. Auto ID technologies are a new way of controlling information and material flow, especially suitable for large...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    Modelling of Secured Video Streaming Application Using RFC 3711 in P2P Network

    The most important aspect of delivering multimedia services or applications over Internet protocol is not only meeting its optimized QoS objectives, rather see that how exactly the intellectual property is preserved. In this paper, encapsulation of IPTV system along with security protocol have been presented in order to ensure that...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Mar 2015

    Towards the Conceptualization of an Ethnic Web Site a Literature Review

    The factors of atmosphere of the Website such as colors, images, character of writing and the sound factors are considered as very important variables in behavior of the consumer whether it is in a real context or in a virtual environment. In this paper, this research suggests studying the role...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2014

    Critical Success Factors of the E-Recruitment System

    People are at the core of every organization, they are integral part of any organization today. Organizations cannot exist without staff to complete the production cycle. Therefore the organizations do not take their staff for granted. Choosing the right candidate at the right place has implications for an organization's goals....

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    HR Initiatives for Organizational Effectiveness With Special Focus on Employee Engagement

    Employee engagement is the level of commitment and involvement an employee has towards the organization and its values, employee engagement remains a critical concern for organizations, and with good reason. Engaged employees are those who are productive, active and connected, in other words indispensable. Over the past decade, and particularly...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    The Importance of HRD Practices in Educational Institutions at All Standards

    Globalization has forced the competition among the organizations which led to the revolutionary changes in all sectors of private and public. Human resource development practices have been observed only in limited organizations to satisfy the globalization standards. But these practices haven't been implemented in lot many existing and upcoming organizations...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    The Colours of Marketing

    To develop a successful business, the businessman need to identify the people or businesses they are aiming to sell their products or services to; it is therefore important that they identify and understand the colors that will attract their specific market. Color psychology is not an exact science and there...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    HR Outsourcing

    Outsourcing is the process of getting services or products from an outside service provider with a view to cut the costs, to avail capabilities which are not available in house, and cutting down time period for project completion. It is delegating some or all functions of management or some operations...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Assessment of Service Quality-A Conceptual Framework

    The concept of service quality has been widely explored but the literature indicates towards the development of industry specific tools for measuring service quality. SERVQUAL, though a very widely used tool, is insufficient in explaining the quality constructs of all the units within the service industry. To understand the factors...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    New Strategy in Today Banking Sector: Bank Customer Relationship Management (CRM) & Marketing Mix in World

    Bank marketing in general and Customer Relationship Management (CRM) in particular are of vital importance for banks, particularly in the current context when banks are facing tough competition from other agencies, both local and foreign, that offer value-added services. The role of marketing in the banking industry continues to change....

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    Soft Skills: A Theoretical Perspective

    Corporate organizations too, have their long and tough recruitment and selection process, from resume-screening, aptitude tests and multi-level of interview. The aim is just not only to filter out inappropriate candidates but is also to find out people who have 'Something' to make them highly effective and efficient. Such employees...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    Six Sigma: Some Marketing Essentials

    Six sigma is considered to be one of the best quality improvement methodology applied successfully to organizational areas like manufacturing, production, accounting and finance, sales and marketing, information systems, human resource management etc. In this era of economic slowdown organizations expect high Return On Investment (ROI) form every business function....

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Mar 2014

    Review of Strategies to Improve the Effectiveness of Marketing and Sales

    Marketing means finding out what people wants, why they want it. Marketing is not advertising. Marketing determines future needs and also have a strategy to meet that needs. Sales mean converting enquiry into contract. Using effective marketing strategies it is possible to increase sales revenue and sell more and more...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2012

    Efficient M-Commerce Marketing Application based Internet of Things using Near Field Communication

    Accessing product information for the targeted client is one of the prime requirements of marketing. The advent of internet has made the communication must faster and effective. This revolution has leaded the introduction of mobile commerce as fast and portable means of communication. This area is highly researched on in...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jul 2011

    Creation of Loyal Customers with Relationship Marketing

    Relationship marketing is designed to create, maintain and enhance strong relationships with profitable customers and other stakeholders and customer loyalty is a process, a program or a group of programs geared toward keeping clients happy so they will provide more business. The term customer loyalty is used to describe the...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Web Marketing: Emerging and Growing Trend for Marketers and Firms Globally

    In this paper, the authors emphasize on the growing shift to web based marketing for greater convenience, access, control, lesser cost, time saving and thereby helps the marketers to expand customer base. With the growth in internet users and shift from traditional brick and mortar firms to brick and click...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2011

    Network Marketing through Buzz Marketing Strategy

    'Buzz marketing' is known as 'Word of mouth' or 'Viral' marketing. Word Of Mouth Marketing Association (WOMMA) defined word-of-mouth as "Giving people a reason to talk about the products and services and making it easier for the conversation to take place". Buzz or viral marketing strategy means spreading positive information...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    Marketing Strategy for Profit Maximization and Increase in Market Share

    Profit maximization is the fundamental need of every company but the way in which this objective can be achieved is quite underrated till date. In this paper, the authors analyze the business strategy of a toothbrush producing company and demonstrate a case study regarding profit maximization by initially reaching the...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    Social Media: A New Marketing Strategy

    Social media has become a platform that is easily accessible to anyone with internet access. It is growing at an explosive rate with millions of people all over the world generating and sharing content on a scale hardly imaginable a few years ago. Increased communication for organizations fosters brand awareness...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2015

    Fashion Retail Marketing - An Overview

    Fashion involves change, accepted change, as a succession of short-term trends or fads. Styles do not become fashion unless they win acceptance among customers. Fashion is not just about clothing, something which is demand in the market is called as fashion. Fashion marketing is the process of managing the flow...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    Use of Social Media to Attract and Engage New Customer Base

    Social media is a continually evolving realm with an amazing potential for attracting and engaging customers which is very vital for any business. The social media mix consists of social networks, network feeds and social networking websites. Social media integrates technology, social interaction and content creation to collaboratively connect online...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2015

    Role of Marketing in Modern Organizations

    Marketing is a process that affects the people lives. The users are consumers, but many of them are part of marketing like sales persons, wholesalers, rivals, raw material suppliers and so force. As all know, the concept of marketing is constantly redefined. Marketing defines activities that create value through exchange...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Mar 2014

    The Effect of Digital Marketing Communication on Consumer Buying

    In this paper, the authors attempt to analyze the features related to the buying behavior of digital shoppers. Consumer buying behavior in respect of digital shopping was studied using different socio-economic variables. It also provides a support that helps researchers understand the drivers of consumers' attitude and goal to shop...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2013

    A Study on E-Commerce and Online Shopping: Issues and Influences

    With the changing market scenario and economic growth, the demand for online shopping has increased. Explosion of e-commerce has changed the buying patterns and preferences of customers. The important brands are also moving towards e commerce technology for increased sale of their products. There is no doubt about it that...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jul 2014

    International Branding and Performance Implications in Emerging Markets

    The central role of branding in establishing the firm's identity and building its position in the global marketplace among customers, retailers and other marketplace participants makes it increasingly imperative for firms to establish a clear cut international branding strategy. This paper examines the impact of branding aspects on firm performance...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    An Exploratory Study on Brand Management: Current Trends and Future Directions

    Brands are perceived as valuable assets from both consumer and company perspectives. Business leaders are fully aware of the importance of brand, branding and brand management for their survival and maintaining sustainable development in competitive and globalized world. The importance of brand, branding and brand management is not only felt...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2012

    A Survey on Trust Based Routing in MANET

    A Mobile Ad-hoc NETwork (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. Nodes can join and leave the network at anytime and are free to move randomly and organize themselves arbitrarily. In MANETs,...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    Implementation of Public Key Cryptography in Kerberos with Prevention of Security Attacks

    Use of Public key cryptography is the limitation of Kerberos and by using symmetric key cryptography there is some attacks, Replay attack and password attacks are serious issues in the Kerberos authentication protocol. Public Key cryptography for INITial authentication (PKINIT) is the way of using public key cryptography in Kerberos...

    Provided By International Association of Engineering and Management Education (IAEME)