|VOLUME 3 : SESSION 2014-2015|
|Paper Title : Student Safe Commute System holding
Paper If: WAIMS/031/201
Abstract: Nowadays, the number of crime over children is increasing day by day. Security of students is vital to parents as well as school administrations. The implementation of Student Safe Commute System via Radio Frequency Identification Device (RFID) to avoid crimes against school kids, illegal activities by students and reduce worries among parents is done to alleviate this problem. The project is the combination of latest technology using RFID, GPS/GPRS module, web based and android application based tracker. By using RFID technology it is easy track students and thus enhances the security and safety in selected zone. The information about students such as in time and out time from bus and campus will be recorded to web based system and the GPS/GSM system automatically sends information (SMS / Phone Call) to their parents. The information may also be accessed through internet or a smart phone application. Thus information regarding safety of the student upon arrival to bus or campus may be recorded and sent to parents, as well as authorities, so that in case of any emergency swift action may be taken.
Affiliation: Rekha Gautam, Shifa Khan, Mrs. Renuka Bhandari Army Institute of Technology, Department of Electronics and Telecommunication, Pune, India
Keyword: School bus, RFID, child safety, GPS tracking system
|Paper Title : Cloud Based Diabetes Management and Research – Blue Circled Cloud
Paper Id: WAIMS/031/202
Abstract: Genetic Algorithm (GAs) is used to solve optimization problems. It is depended on the selection operator, crossover and mutation rates. In this paper Roulette Wheel Selection (RWS) operator with different crossover and mutation probabilities, is used to solve well known optimization problem Traveling Salesmen Problem (TSP). We have compared the results of RWS with another selection method Stochastic Universal Selection (SUS), which demonstrate that the SUS is better for small number of cities; but as the number of cities increases RWS is much better than SUS. We have also compared the results with a variation between mutation & crossover probability, which concludes that mutation, is more effective for decimal chromosome. We have proposed a new crossover operator which is variation of Order Crossover (OX) and found results are better than existing crossover operator.
Affiliation: Kanchan rani1, vikas kumar2 Banasthali University, Computer Science Department, Moradabad Institute of technology.
Keyword: TSP, GAs, SUS, RWS
|Paper title : Solving Travelling Salesman Problem Using Genetic Algorithm Based on Heuristic Crossover and Mutation Operator
Paper title :WAIMS/031/203
Abstract: This paper deals with the concept of Cloud Based, Centralized Diabetes Treatment and Research Strategy and is written in particular ,but not limited to, taking into consideration a nationwide diabetes policy, and can be adopted by any subsidiary, or even can be extended for an intra regional scenario. Diabetes is considered as one of the killing chronic disease of the current era. Right treatment at right time is very crucial for managing diabetes and the diabetologists always require complete patient information and treatment history to offer suitable treatment plan. The current scenario is lacking the centralized diabetes management facilities as different hospitals and clinics have their own Hospital Information Systems(HIS) for the treatment and interaction or sharing of critical patient information among these isolated HISs are limited or even null . If information can be shared in an effective manner, it will definitely enhance the Diabetes Treatment patterns and thus the patient outcome. The advantages of cloud computing power can be used to achieve this common goal. Since diabetes management requires a long term treatment plan and commitment from the patients, analysis of treatment outcome is equally important to treatment. Researchers need adequate data to carry out monitoring on various entities and once we have the proposed concept implemented, they can make use of the system very efficiently to do various advanced studies. Self care management for patients via mobile platforms is also integrated with this concept ,which in turn provides more insight into the disease behavior during the patient’s time away from the healthcare provider.
Affiliation: Joseph George, Anuradha G.B, Dr.Madiajagan,BITS Pilani-Dubai,Rashid Centre for Diabetes and Research,BITS Pilani – Dubai
Keyword: Cloud for Diabetes Management,National Diabetes Register,Cloud Computing in Healthcare e-diabetes management,e-healthcare
|Paper Title : Experimental Investigations of Double Condensing Solar Still Using Fuzzy Logic
Paper Id : WAIMS/031/204
Abstract: The performance of solar still is dependent on a number of transient variables. Artificial intelligence has the capability of simulating complex systems. The rule based approach of fuzzy models makes it handy for analysis. This paper presents the fuzzy logic modeling of a double condensing solar still. Using available fuzzy rules a fuzzy logic model is formed by connecting the changes in solar radiation intensity and chamber temperature to the yield of distilled water. Simulation results are in good agreement with those obtained using experiments for different values of solar radiation and chamber temperature.
Affiliation: R.Manivannan,S.P.Asok, Affiliation of Anna University and Mechanical department
Keyword: solar still, fuzzy logic
|Paper Title : Design 0f High Speed Low Power Multiplier using Reversible logic: a Vedic Mathematical Approach
Paper Id :WAIMS/031/210
Abstract: Multipliers are vital components of any processor or computing machine. More often than not, performance of micro controllers and Digital signal processors are evaluated on the basis of number of multiplications performed in unit time. Hence better multiplier architectures are bound to increase the efficiency of the system. Vedic multiplier is one such promising solution. Its simple architecture coupled with increased speed forms an unparalleled combination for serving any complex multiplication computations. Tagged with these highlights, implementing this with reversible logic further reduces power dissipation. Power dissipation is another important constraint in an embedded system which cannot be neglected. In this paper we bring out a Vedic multiplier known as “Urdhva Tiryakbhayam” meaning vertical and crosswise, implemented using reversible logic, which is the first of its kind. This multiplier may find applications in Fast Fourier Transforms (FFTs), and other applications of DSP like imaging, software defined radios, wireless communications.Affiliation: P.Sri Lakshmi
Keyword: Vedic Multiplier, Reversible Logic, Urdhva Tiryakbhayam, Quantum Cost, Total Reversible Logic Implementation Cost.
|Paper Title : An efficient IBPBS without Bilinear pairings
Paper Id :WAIMS/031/211
Abstract: Proxy blind signature is a digital signature where an original signer delegates his/her signing capability to a proxy signer who performs message signing blindly on behalf of original signer but he can not make a linkage between the blind signature and the identity of the message’s owner. Using bilinear pairings, so many id-based proxy blind signature (IBPBS) schemes have been proposed. But the relative computation cost of a pairing is approximately more than ten times of the scalar multiplication over elliptic curve group. Therefore we propose an efficient IBPBS scheme with-out pairings.
Affiliation: Anuranjan Misra,Akanksha Bana CSE, Department ,Bhagwant Institute of Technology, Ghaziabad, India
Keyword: Digital signature, Identity-based cryptography, Proxy-blind signature, Elliptic curve discrete log problem
|Paper Title : On Image Categorization using Genetic Programming and Multiple Kernel Support Vector Machine
Paper Id :WAIMS/031/202Abstract: In Computer Vision, problem of identifying or classifying the objects present in an image is called Image Categorization. It is challenging problem, especially when the images have clutter background, occlusions or different lighting conditions. Many vision features have been proposed which aid image categorization even in such adverse conditions. Past research has shown that, employing multiple features rather than any single features leads to better recognition. Multiple Kernel Learning (MKL) framework shave been developed for learning an optimal combination of features for object categorization. MKL on Support Vector Machines (SVMs) has been a popular front of research in recent times due to its success in application problems like Object Categorization. Main disadvantage with MKL methods of SVM is that only linear combination of base kernels can be learned efficiently, which may not be optimal for object categorization. Real-world object categorization may need to consider complex combination of kernels(non-linear) and not only linear combination. In this paper we do extensive comparative study of SVM MKL with Genetic Programming based MKL. Experiment results show that non-kernel generated using genetic programming gives good accuracy as compared to linear combination of kernels.
Affiliation: Jyothi Korra Computer Science and Engineering Christ University Faculty of Engineering Bangalore, India
Keyword: genetic programming; non-linear kernel combination; object categorization; support vector machine; multiple kernel learning
|Paper Title :Scheduling The Task and Maximum Profit Service on Cloud Computing
Paper Id : (WAIMS/031/205)Abstract: Scheduling the activity based costing is the main theme of this project. Traditional way for task scheduling cannot measure the cost of cloud resources accurately by reason that each of the tasks on cloud systems is totally different between each other. This leads to overhead cost of resources in cloud systems. Because of the Activity based algorithm, environmental based cloud computing service usage is performed. Based on profit driven scheduling algorithms, profit for each process is calculated using pricing mode .Six-resilient scheduling algorithms are being proposed to secure under different risk conditions. Risk-resilient strategies help to upgrade cloud performance. Keywords: Task scheduling, Activity Based Costing, the MaxProfit Algorithm, and Genetic Algorithm I. Introduction In task scheduling the assignment of start and end times to a set of tasks is processed. Task scheduling may subject to certain constraints, such as time constraints or resource constraints. ABC uses cost drivers that directly link performed activities to tasks made. The Cost Drivers measure the average demand on each activity.For every task, the activity cost pools are assigned in proportion to the way that they consume each activity in system resources. MaxProfit takes into account not only the profit achievable from the current service, but also the profit from other services being processed on the same service instance. A service queue maintained by MaxProfit containing yet-to-be dispatched services are according to their precedence constraints.
Affiliation: P.Deepavathi, P.Regitha Mr.T.Manikandan, Assistant Professor of ECE K.Ramakrishnan college of Technology, Trichy
Keyword: Task scheduling, Activity Based Costing, The MaxProfit Algorithm, Genetic Algorithm
|Paper Title : Occupational Stress and Its Impact on Competence : A Sample Study
Paper Id: WAIMS/032/309
Abstract: The purpose of the paper is to study the occupational stress in selected public and private sector industrial units of Southern Rajasthan. Twenty seven stress variables are identified through a literature search and interviews with managers as well as with academicians. Data are obtained from questionnaires completed by 100 executives. Also, sample is deliberately chosen to include different hierarchical levels, genders, different functional departments, total years of experience, marital status. The results indicate that occupational stress has impact on competence.
Affiliation: Dr. Payal Mehta Visiting Faculty, Department of Economics and Finance, BITS Pilani-Hyderabad Campus, HyderabadKeyword: Occupational stress, Employee competence
|Paper Title : An Implementation of Ontology for User Friendly Patent Search
Paper Id : WAIMS/032/302
Abstract: Patent search is a tool that can help the patent examiners to find previously published relevant patents and validate or invalidate new patent applications. Now days Patent-search users use a try-and-see approach to repeatedly issue queries and check answers, which is a very tedious process. Existing system improves the system by implementing three effective techniques, error correction, topic-based query suggestion, and query expansion. We may need to expand the keyword with different and semantic meaning accurately. In this paper, Ontology based User patent search system expand the user queries result with semantic meaning. It can be customized to provide domain-friendly support for creating knowledge models and entering data. In fact, this approach shows how ontology can be effectively exploited to rewrite a user query into another one such that the new query provides more meaningful results satisfying the intention of the user. Proposed system is to determine the main subtopics of the article of interest. This is achieved by comparing the words of articles with terms in the ontology.Affiliation: Vidya K.R,Prof.R.G Sakthivelan, Dr.T.Ravi Department of Computer Science and Engineering, Anna University Mahendra Engineering College, Mallasamudram, Salem,Principal, Srinivasa Institute of Engineering and Technology, Chennai 600056
Keyword: Search, Ontology, Query Processing, Ontology based Query, Patent Partition Selection
|Paper Title : Comparative Analysis of The Theory of Sentiments in Indian & Western Criticism
Paper Id : WAIMS/032/303
Abstract: Before presenting a parallel study of the Indian concept of Sentiments and Western theories, it is essential for us to know the true meaning and function of art and literature. Encyclopedia Britannica (edition 1951) thus defines art, “All great art, being emphatically personal, is accompanied by variations from previously existing standards of excellence. This personal variation is marked by a new intensity of feeling, by a new sense of vitality and by a new rhythm of pattern. All great artists are pioneers possessing these characteristics. Emotion is the key stone of painting as it is of poetry” (Encyclopedia Britannica, 1951 page 243)
Affiliation : Dr. Minu Kashyap, Department of English, Shri Lal Bahadur Shastri Rastirya Sanskrit Vidyapeetha , Katwaria Sarai, New Delhi
|Paper Title : Web Service Based Intelligent Vehicle Tracking System
Paper Id : WAIMS/032/308
Abstract: The development of satellite communication technology is easy to identify the vehicle locations. Vehicle tracking systems have brought this technology to the day-to-day life of the common man. Today GPS fitted cars; ambulances, fleets and police vehicles are common sights on the roads of developed countries. All the existing technology can support only tracking the vehicle place and status. No such tracking system implemented using centralized web service and cloud computing. The proposed technology based on GPS technology, GSM and cloud computing infrastructure. The vehicles are fitted with specialized embedded device, GPS device and GSM enabled device. This all stimulus data are transferred to cloud server through GSM enabled device. The GPS device used to track the vehicle locations. All the data’s are stored in centralized server which is maintained in cloud. Each licenced vehicle owner can access the cloud using web portal. From the web portal the user can retrieve all the real time data. Proposed system may allow for the stability, equilibrium, efficient resource use, and sustainability of a tracking system.
Affiliation: A.ALBERT ALEXE,BRITTO.J, RAJKUMAR.A,RAJBARATH.P, 5HARIHARAN.P Assistant Professor,Achariya College of Engineering Technology, Pondicherry, India
Keyword: GPS, GSM, sensors, cloud infrastructures, web portal.
|Paper Title : Social Media Engagement among-est today’s Youth between the Age Group of 18-25 Years with a Specific Reference to Both Government and Private College Students in Bangalore City – A Comparative Study
Paper Id : WAIMS/033/301
Abstract: Social media engagement is the degree of indulgence in various Social media platforms. Today’s youth spend most of their time browsing, chatting and communicating on social media sites like Facebook, Twitter, Instgram etc., Social Media is slowly replacing Television as the medium of entertainment or engagement. Youth of today needs social media like how their parents needed televisions when they were in their youthful days. Indian youths are no exception to this. They are fast accepting the world trend in spending a mojor chunk of their time hooking up to the social media sites. This research paper has made an attempt to explore the driving forces behind the Indian youth to get involved in social media. Besides, it also tries to assess the impact of social media on Indian youths.
Affiliation: N.SWETHA,Assistant Professor,Community Institute of Management Studies, Bangalore University, Bangalore RATH JAYASMITA,Associate Professor,NITTE Meenakshi Institute of Technoloy,Visvesvaraya Technological University Yelahanka, Bangalore
Keyword: Bangalore, Social Media, Engagement, Today’s Youth
|Paper Title : Performance evaluation of Block and Stream Cipher encryption algorithms
Paper Id :WAIMS/032/306
Abstract: Encryption algorithms play a main role in information security systems. On the other side, these algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. A data encryption algorithm would not be much use if it is secure enough but slow in performance because it is a common practice to embed encryption algorithms in other applications such as e-commerce, banking, and online transaction processing applications. Embedding of encryption algorithms in other applications also precludes a hardware implementation, and is thus a major cause of degraded overall performance of the system. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. In this project work an attempt has been made to implement four encryption algorithms and bring out comparison between them based on CPU execution time.Affiliation: 1M.V.Ramana Murth , 2S. Jeelani ,3Kishan Dharavathu, 1,3Dept. Of Mathematics&CompterScience , Osmania University, Hyderabad 500007, India 2Director, Centre for Distance and Virtual Learning, University of Hyderabad, Hyderabad 500046, India.
Keyword: Embedding of encryption, algorithms
|Paper Title : Knowledge Management Enablers, Process and Organizational performance : A Comparative Study of Manufacturing and Services SME’s In Bangalore Region
Paper Id: WAIMS/033/303)
Abstract: Purpose: With the growing importance of knowledge management in Small and Medium Scale Enterprises (SMEs), the present study focused on identifying important knowledge management enablers, use of SECI (Socialization-Externalization-Combination-Internalization) model in knowledge processing, and studying the effect of knowledge management in improving intellectual capital of SMEs. The study is carried out on a selected set of manufacturing and service SMEs situated in Bangalore region, Karnataka, India. Design/methodology/approach: The study was conducted using carefully drafted questionnaire, with sections to understand the present status of knowledge management in SME, employee motivation towards knowledge management, organizational interest and encouragement, possible impact of having and not having knowledge management, and so on. The respondents were asked to give their response ratings based on a five point Likert scale ranging from strongly disagree to strongly agree. Findings: The outcome of the study indicates enablers such as organizational culture, structure, and technology plays important role in enabling knowledge management in SMEs. The SECI model is highly relevant to implement various functionalities of the knowledge management process in SMEs. There is strong opinion of the respondents that the successful implementation of knowledge management could improve the organizational performance with respect to improved intellectual property. Detailed analysis has been presented. Originality/value: The findings from the study provide a strong motivation for SME managers, to thick on implementing the culture of knowledge management in their day-to-day activities, and minimize the knowledge loss due to employee turnovers.
Affiliation: 1 P. Bhanumathi, 2 Dr. Jayasmita Rath 1 Research Scholar, Mysore University, Assistant Professor, M. S. Ramaiah Institute of Management Studies, Bangalore, India 2 Associate Professor, Department of Management Studies, Nitte Meenakshi Institute of Technology, Bangalore, India
Keyword: Knowledge Management, Knowledge Management Enablers, Knowledge Creation Process, SECI (Socialization-Externalization-Combination-Internalization), SMEs.
|Paper Title : Design of Structured framework Framework of Cyber Laws for Phishing attacks Detection,Prevention and Recovery : The ” PHIS-LAW”
Paper Id :WAIMS/033/311
Abstract: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Cyber law (also referred to as cyberlaw) is a term used to describe the legal issues related to use of communications technology, particularly “cyberspace”, i.e. the Internet. It is less a distinct field of law in the way that property or contract are as it is an intersection of many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction. In essence, cyber law is an attempt to integrate the challenges presented by human activity on the Internet with legacy system of laws applicable to the physical world
Affiliation: 1KUSUM RAJAWAT, 2DR. AMAN JAIN, 3DR. VIJAY SINGH RATHORE 1Research Scholar, Singhania University Jhunjhunu (Raj) 2Principal, Deepshikha College of Technical Education Jaipur 3Director, Shree Karni College Jaipur
Keyword: Phishing,cyber Law
|Paper Title : Corporate Social Responsibility – Analytical Study
Paper Id : waims/034/101
Abstract: A company’s sense of accountability towards the society and surroundings (both ecological and social) in which it operates is known as corporate social responsibility. The term “corporate social responsibility” became admired in the 1960s and has remained a term used indiscriminately by many to cover legal and moral responsibility more narrowly construed. CSR aims to embrace responsibility for corporate actions and to encourage a positive impact on the environment and stakeholders including consumers, employees, investors, communities, and others. CSR is aristocratic to aid an organization’s mission as well as a guide to what the company stands for to its consumers. Some sociologists viewed CSR as a form of entrepreneur authenticity and in particular point out that what began as a social movement against outgoing corporate power was transformed by corporations into a ‘business model’ and a ‘risk management’ device, often with dubious results. In this we presented a deep study in corporate social responsibility and its consumer perspectives
Affiliation: Tripti,scholar ICSI
|Paper Title : Corporate Restructuring – Globally Accepted Business Strategy
Paper Id : waims/034/102
Abstract: Corporate restructuring is the route of radically changing a company’s business model, Management team or fiscal structure to tackle challenges and increase investor value.Restructuring may involve major layoffs or bankruptcy, though restructuring is usually designed to restrain the impact on employees, if possible. Restructuring may involve the company’s sale or a merger with another company. Companies use restructuring as a business strategy to ensure their long-standing viability. Shareholders or creditors might force a restructuring if they observe the company’s existing business strategies as inadequate to check a loss on their investments. The nature of this intimidation can vary, but common catalysts for restructuring involve a loss of market share, the reduction of profit margins or declines in the power of their corporate brand. Other motivators of restructuring include the incapability to keep endowed professionals and major changes to the market place that directly impacts the corporation’s business model.In this paper we presented a deep study on corporate restructuring, process, its various kinds and its importance as business strategy
Affiliation: priyanka sinha,schlor MBA ,VIT University, Jaipur,Tripti ,scholar ,ICSI
Keyword: corporate restructuring, business model, organic growth, inorganic growth
|Paper Title : Due Diligence- Need and Practice
Paper Id: waims/034/103
Abstract: The term “due diligence” first came into common use as a result of the United States’ Securities Act of 1933. Due diligence is an examination of a business or person prior to signing a contract, or an act with a certain standard of care. It can be a legal obligation, but the term will more commonly apply to voluntary investigations. A common example of due diligence in various industries is the process through which a potential acquirer evaluates a target company or its assets for an acquisition. The theory behind due diligence holds that performing this type of investigation contributes significantly to informed decision making by enhancing the amount and quality of information available to decision makers and by ensuring that this information is systematically used to deliberate in a reflexive manner on the decision at hand and all its costs, benefits, and risks.
Affiliation: Tripti, Scholar ICSI , Preeti Scholar ICSI
Keyword: Due diligence
|Paper Title : Issue, Challenges and Opportunity for Research in Software Engineering
Abstract: The impact and importance of software has come a long way. And yet, a new generation of software developers must meet many of the same challenges that faced earlier generations. This paper aims to identify some of the most fundamental issues, challenges and opportunities for research in Software Engineering. The paper starts by examining the past, current, and future states of software engineering. The paper then examines the critical technical issues in software engineering including complexity, structure, and evolution of software systems; economics of software engineering, and measurement of software engineering products and processes, as well as the critical people and organizational issues including learning, motivation and performance improvement. This result can serve as a repository of valuable information for the people who are aspiring to do research in this discipline. This will be valuable aid for many future researcher and academicians of software engineering.
Affiliation: Manish K Anand International Institute of Information Technology, Hyderabad, India
Keyword: Software complexity, economics, measurement, peoplerelated issues, organization issues, process improvement
|Paper Title : A Systematic Review of Software Development Cost Estimation Studies
Paper Title : waims/035/102
Abstract: This paper aims to provide a basis for the improvement of software estimation research through a systematic review of previous work. The review identifies 304 software cost estimation papers in 76 journals and classifies the papers according to research topic, estimation approach, research approach, study context and data set. Based on the review, we provide recommendations for future software cost estimation research: 1) Increase the breadth of the search for relevant studies, 2) Search manually for relevant papers within a carefully selected set of journals when completeness is essential, 3) Conduct more research on basic software cost estimation topics, 4) Conduct more studies of software cost estimation in real-life settings, 5) Conduct more studies on estimation methods commonly used by the software industry, and, 6) Conduct fewer studies that evaluate methods based on arbitrarily chosen data sets.
Affiliation: Magne Jørgensen, Simula Research Laboratory Martin Shepperd, Brunel University
Keyword: systematic review, software cost estimation, software effort estimation, software cost prediction, software effort prediction, research methods
|Paper Title : Implementing Effective School Achievement Reform: Four Principles
Paper Id :WAIMS /035/103
Abstract: This paper provides an overview of four principles of school reform as it relates to improving student achievement as measured by scores on standardized tests of basic skills. These principles address issues regarding the need to: (1) focus classroom practice on objectives that will be measured; (2) take into account research showing that variance in test scores is the result of multiple factors, including the home and community; (3) treat the school as the level of change in education; and (4) provide incentives for teachers and schools that add value to student achievement beyond that provided by other social institutions.
Affiliation: William G. Huitt
|Paper Title : software Development Cost Estimation Approaches – A Survey1
Paper Id : waims/036/102)
Abstract: This paper summarizes several classes of software cost estimation models and techniques: parametric models, expertise-based techniques, learning-oriented techniques, dynamics-based models, regression-based models, and composite-Bayesian techniques for integrating expertise based and regression-based models. Experience to date indicates that neural-net and dynamics-based techniques are less mature than the other classes of techniques, but that all classes of techniques are challenged by the rapid pace of change in software technology. The primary conclusion is that no single technique is best for all situations, and that a careful comparison of the results of several approaches is most likely to produce realistic estimates.
Affiliation: Barry Boehm, Chris Abts University of Southern California Los Angeles, CA 90089-0781 Sunita Chulani IBM Research 650 Harry Road, San Jose, CA 95120
|Paper Title : Supply chain management: theory, practice and future challenges
Paper Id : waims/036/101
Abstract: The purpose of this paper is to critically assess current developments in the theory and practice of supply management and through such an assessment to identify barriers, possibilities and key trends. Design/methodology/approach – The paper is based on a three-year detailed study of six supply chains which encompassed 72 companies in Europe. The focal firms in each instance were sophisticated, blue-chip corporations operating on an international scale. Managers across at least four echelons of the supply chain were interviewed and the supply chains were traced and observed. Findings – The paper reveals that supply management is, at best, still emergent in terms of both theory and practice. Few practitioners were able – or even seriously aspired – to extend their reach across the supply chain in the manner prescribed in much modern theory. The paper identifies the range of key barriers and enablers to supply management and it concludes with an assessment of the main trends. Research limitations/implications – The research presents a number of challenges to existing thinking about supply strategy and supply chain management. It reveals the substantial gaps between theory and practice. A number of trends are identified which it is argued may work in favour of better prospects for SCM in the future and for the future of supply management as a discipline. Practical implications – A central challenge concerns who could or should manage the supply chain. Barriers to effective supply management are identified and some practical steps to surmount them are suggested. Originality/value – The paper is original in the way in which it draws on an extensive systematic study to critically assess current theory and current developments. The paper points the way for theorists and practitioners to meet future challenges.
Affiliation: John Storey and Caroline Emberson The Open University Business School, Milton Keynes, UK, and Janet Godsell and Alan Harrison Cranfield School of Management, Cranfield, UK
Keyword: Supply chain management, Suppliers, Strategic management
|Paper Title : Convergence of Artificial Intelligence, Emotional Intelligence, Neural Network and Evolutionary Computing
Paper Id: waims/036/103
Abstract: This paper presents a new perspective of Artificial Intelligence (AI). Although, number of attempts has been made to make an artifact intelligent, including evolution theory, neural network etc and a number of problems have been solved using these concepts but each of this theory covers only some aspect of human intelligence. Still there is a large gap between artificial intelligence agent and human being. In this paper I have discuss the extended version of Artificial Intelligence by augmenting it with emotions, and inheritance of neural architecture from parent generation to child generation that can make an artificial agent to match the intelligence and behaviour of a human being. At the same time it adds the power of two well knows Artificial Intelligence techniques viz. Neural Computing and Genetic Computing or Evolutionary Computing. The paper gives an idea of an artefact which is supposed to match the intelligence and behaviour of a human being. Paper also discusses some natural phenomenon and how they can be confirmed by the revised definition of artificial intelligence. The paper does not claim that existing definition of artificial intelligence has some faults. The paper just augments the existing definition by some other features that can make it more close to natural intelligence. The features augmented are naturally inspired similarly as AI, Neural Network and genetics all are naturally
Affiliation: Sandeep Kumar Tata Consultancy Services Limited Medha Sharma Tata Consultancy Services Limited
Keyword: Neural Computing, Evolutionary Computing, Intelligence, Emotions, Soft Computing