Journal of Network and Information Security

Volume : 3 Issue : 2
Published : 2015
Locked
Subscribed
Open Access
Articles
An Empirical Study on Factors Affecting the Usage of Currency Derivatives with Reference to India
Ankita Srivastava | 1-9

Examining the Hedging Effectiveness of Futures Contracts over Pre and Post Financial Crisis Period: Evidence from National Stock Exchange of India
Kapil Gupta, Mandeep Kaur | 10-29

An Analysis of Web Home Page Disclosure Practices of Top Public and Private Indian Banks
Mandeep Kaur, Manpreet Kaur | 30-42

Mutual Funds in India: A Study on Select Equity-Oriented Hybrid Funds
Atanu Ghosh | 43-47

Is PEG Ratio a Better Tool for Valuing the Companies as Compared to P/E Ratio? (A Case Study on Selected Automobile Companies)
Bharat Kumar Meher, Saurabh Sharma | 48-52

Empirical Study on Price-Risk Perception of Investors in Stock Market
Sanjeev Chowdhury, Nitin Tiwari | 53-55

Interval-valued Data Analysis
Arnab Kumar Laha | 1-3

A Multiple Attribute Group Decision-making Model for Selecting the Best Supplier
Mohammad Azadfallah | 4-10

Ensemble Approach for Zoonotic Disease Forecasting Using Machine Learning Techniques
Vikash Chandra Sharma, David Frankenfield, Anupam Gupta, Rama Krishna Singh | 11-24

Use of Five Point Du Pont Model and Regression Tools to Study Information Technology Sector of India
Kartik Sachdev, Arushi Jamaiyar | 25-39

Analytics for Decision Making at Ports
Mrinal Kumar Dasgupta | 40-54

Applying Structural Equation Modeling for Green Supply Chain in Retail Domain
Aashima Sharma, Arun Rajan, Richard Jose, Purba Rao | 55-64

A Study on Effectiveness of Investment in Intellectual Capital of Indian Knowledge Companies
Amitava Mondal, Santanu Kumar Ghosh | 65-76

PureView Technology (Optimisation & Evaluation Techniques in Image Processing)
Jyoti Prakash Patra, Puru Agrawal | 1-6

M-Learning through Semantically Annotated Learning Objects and Ontologies
Reshmy Krishnan | 7-12

Research on Ranking Algorithms in Web Structure Mining
Suvarna Sharma, Amit Bhagat | 13-20

Applying MCDM Techniques for Ranking Products Based on Online Customer Feedback
J. Santhana Preethi, A.M. Abirami, A. Askarunisa, G. Sathya Priya, E. Sankaragomathy | 21-26

Maya: The Convergence of Open World Gaming and Virtual Reality Technologies
Abhay Saxena, Manan Singh | 27-33

An Overview of Active Database: Model, Architecture and Challenges
Gambhir Halse, Malakappa Shirdhonkar | 34-37

Impact of Technology on Information Seeking Behaviour of Digital Immigrants: A Comparative Study of Senior Academicians in J&K
Ashaq Hussain Wafaye | 1-7

A Study of Digital Archives of Leading News Papers of Kashmir
Rabia Noor, Suhail Ahmad | 8-11

Mapping the Research Output of University of Kashmir
Asifa Jan, Suhail Ahmed, Nahida Tun Nisa, Asiya Ahmed | 12-18

Journal of Taibah University of Science: A Bibliometric Study
Sheikh Shueb, Samina Mushtaq | 19-25

Status of Women Contribution in Political Research World: A Case Study of the Journal Political Analysis
Sumeer Gul, Sangita Gupta, Sumaira Jan, Sabha Ali | 26-39

E-Journal Culture among Medical Fraternity of Kashmir
Somaira Nabi | 40-46

Computational Approach of Molar Refraction, Molecular Radius and Internal Pressure of a Binary Mixture - Molecular Interaction Studies
Anil Kumar K., Srinivasu Ch., Siva Rama Krishna J., Jitendra M.S.N.V. | 1-8

A New MADM Approach in Building Consensus in Delphis Technique
Mohammad Azadfallah | 9-16

A Novel Algorithm for Predicting Valuable Items in Data Streams
S. Vijayarani Mohan | 17-23

Double Processing Information Extraction for User Queries
H. Balaji, A. Govardhan | 24-28

Graphene Oxide Based Dye-Sensitised Solar Cells Using Terminalia-Chebula
M. T. Ahmadi, Kambiz Golmohammadi, Adila Azman, Razali Ismail, Hasan Sedghi | 29-33

Demonstrating Responsible Leadership at SOS Villages- A Real Case
Ch. L. Hymavathi, Aditya Kasarabada, Sarma Avadhanam | 1-13

Customer Satisfaction as Basis for E- Marketing Leadership (A Study Based on Marital Diversity)
Bodh Raj Sharma, Saransh Gupta, Ankit Sharma | 14-19

Ascertaining the Role of Leadership on Employee Satisfaction in Market and Social Research Industries in Gauteng Province of South Africa Using Qualitative Research
Kingstone Mutsonziwa, Philip Serumaga-Zake | 20-31

The Making of Corporate Rishi
Sowmya C. S. | 32-39

Integral Leadership Style: A New Perspective
Damini Saini | 40-47

Towards Enhancing Employability of Young Indians
Parameswar Nayak | 01-11

Indias Economic Growth: Rural Transformation and Integration
Mohd. Tauqueer Khan, Zahra Afroz | 12-19

Understanding Rural Retailer at the Base of the Fortune Pyramid
Nilamadhab Mohanty | 20-23

Growth and Performance of Agriculture Sector in India
Naresh Singla, Mamandeep Kaur | 24-36

Managing Transformation of Rural India through Rural Non-Farm Economy
Sanjay Tiwari | 37-47

Unit-Wise Ranking of Inventory Control Techniques Used in Small Scale Cement Enterprises: A Small Scale Entrepreneurial Perspective
Vipul Chalotra | 48-53

Heart Monitoring System
Ashwini U. Patil, Sreedevi R. Nagarmunoli, Nandini S. Sidnal | 01-07

An Idea Towards Improving Design Pattern Detection
Arti Chaturvedi, Manjari Gupta, Sanjay Kumar Gupta | 08-13

A Complete Inter-Class Sharing During the Inheritance to Enhance Reusability of Public Data and Their Access Control Using Dominance
Jyoti Lakhani, Dharmesh Harwani | 14-18

An Optimisation Approach for Construction of a Distributed Minimum Spanning Tree (DMST) Using MPI
Md. Akkas Ali | 19-23

Information Technology Services Issues and Challenges with A Case Study in Small Medium Enterprises
Senthil Veerasamy | 24-30

Secure Watermarking using Diophantine Equations for Authentication and Recovery
Jayashree Nair, T. Padma | 01-09

Efficient Security Services of Honeypot using Kerberos for Detecting Intruders
Dinesh S. Kapse, Vijay Bagdi | 10-16

Application of Quaternion Numbers in Identification Scheme
Reza Alimoradi | 17-20

Mitigating Virtual Machine Denial of Service Attacks from Mobile APPS
Dennis Guster, Raqeeb Abdul, Erich Rice | 21-31

Restricted Constraints in the Problem of Maximum Attainable Flow in Minimum Cost in a Network
Nazimuddin Ahmed, Shobha Duttadeka | 32-50

About Cloud Forensics: Challenges and Solutions
Vaithianathan Geetha | 1-7

A System Architecture for Data Storage in the Cloud
Maryam Hammami, Hatem Bellaaj | 08-15

Big Data Privacy Preservation Using Two Phase Top-Down Specialization Algorithm with Multidimensional Map Reduce Framework on Hadoop
Shalin Eliabeth S., Sarju S. | 16-22

Using Cloud Computing in Software Firm:A Strategy to Improve Agility in the Current Financial Crisis
Subir Saha, Mohammad Maruf Hossain | 23-28

Patient Satisfaction towards The Service Marketing Mix: A Comparative Study of Public and Private Hospitals Operating in Udaipur Division
Dharmesh Motwani, Devendra Shrimali, Khushbu Agarwal | 01-10

Gender Diversity in E-Tailing Satisfaction
Bodh Raj Sharma, Saransh Gupta, Ankit Sharma, Nitika Sharma | 11-15

Customer Relationship Management- The Indian Perspective
Pankaj K. Trivedi | 16-20

Understanding the Customer Experience: An Exploratory Study of A Category Hotels
Jyoti Sharma, Raouf Ahmad Rather | 21-31

Buying Behavioural Pattern Regarding Smartphone Users
Mokhalles Mohammad Mehdi | 32-37