Papers by Bonfring International Journal

Supply Chain Management techniques are mostly useful and relevant to the MSMEs to optimize produc... more Supply Chain Management techniques are mostly useful and relevant to the MSMEs to optimize production and distribution process of goods and services and minimize the cost of production and distribution costs at optimum level. It also very helpful to optimum utilization of scared resources But the Majority of FMCGs' MSMEs are functioning without internet facilities, lack of skilled and technical workers, lack of store rooms for inventories, lack of funds for modernization and etc, In this situation MSMEs do not able to install a separate software for Supply chain Management. The level of awareness for supply chain management is very low in traditional and rural MSMEs industries. In addition to it, Supply chain Management practices are not effectively followed by FMCGs' MSMEs. In this connection, The Quality Circles are also framed for each kind FMCGs producer to overcome the above said issues.
The organizational Commitment in IT companies is a result oriented phenomena. The organizational ... more The organizational Commitment in IT companies is a result oriented phenomena. The organizational Commitment is closely related to behvarioural perspectives of employees of IT companies. The right feelings and attitude produces the higher degree of organizational commitment which increases the efficiencies of services productivity of IT employees. There are the four kinds of outcomes of high level organizational Commitment of employees such as Desire to remain in same IT company, Intent to remain in same job of IT sector ,More job attachment and Better work performances. The negative factors such as job stress, heavy work load, lack of upward communication are adversely affecting the Organizational Commitment among the employees of IT sectors in Chennai city.
The worldwide increasing energy demand and the alarming situation of the depletion of fossil fuel... more The worldwide increasing energy demand and the alarming situation of the depletion of fossil fuel drive us to focus on deriving energy from renewable sources. The solar thermal power generation (STP) uses different types of solar concentrating technologies and many researches in this area have proven that the parabolic trough concentrator (PTC) technology is suitable for power generation. A PTC is a linefocus concentrator which focuses the solar irradiance to fall on the absorber tube and to transfer to the heat transfer fluid (HTF). The PTC work under the temperature range of 60° to 400 C°. The performance of the PTC can be improved by improving the optical and thermal efficiency. In this paper the recent researches on the thermal performance enhancement by using nano fluid and different absorber tube fluid are studied and presented.

Due to increased concern about emission, every source responsible for it should be eliminated or ... more Due to increased concern about emission, every source responsible for it should be eliminated or its influence reduced. In this respect the film formation over the wall region of a engine cylinder is analysed to understand the emission under adiabatic flow condition. The film on the wall starts forming when the air fuel mixture reaches the saturation temperature. In this paper a pent roof four valve Siamese intake port gasoline engine is selected and investigated under motoring condition accounting for cold start principle through single point Port Fuel Injection(PFI). About 46 mg of liquid fuel is injected through two injectors which are placed at the end of divided intake port of Siamese type. The injectors are angled about 20 o w.r.t. centre vertical plane of Siamese intake port and 60 o w.r.t. Horizontal plane of fire deck zone. The thickness of film formed by fuel droplets from the injector is gradually increased around the wall regions of the engine cylinder. When PFI system is used, the liquid film formation over the region of valve stem, valve face, intake port, dome, cylinder liner and piston top were more pronounced than the direct injection. The accumulation of film mass is more over the region of cylinder dome and port while compared to other regions inside and outside the cylinder. The cylinder dome region and port region are accounted about 6 mg and 12 mg respectively of film mass accumulation. From the total percentage of fuel injection, only 33 percentage of liquid fuel is evaporated and ready to mix with air to form charge for combustion. This shows that there is more chance of miss fire during cold start due to the influences of liquid film. The port region has 0.1mm thickness of film compared with other regions. It affects the quality of air fuel mixture for the next cycle and tends to affect combustion stability. Also it leads to soot formation inside the cylinder.

In this investigation, the effect of precipitation hardening on tensile, fatigue and fracture tou... more In this investigation, the effect of precipitation hardening on tensile, fatigue and fracture toughness behaviour of 8011 Al/ 15%SiCp composites has been studied. The composites were manufactured through stir casting method. Cast ingots of the composites were hot extruded at 5000 C. The composite samples were solution heat-treated at 530 0 C for 3 h and quenched in cold water. The aging temperature were 130 0 C, 150 0 C, 170 0 C, 190 0 C, and 210 0 C for aging duration of 1,3,5,7 and 9 hrs respectively. The mechanical properties measured included: tensile strength, fatigue strength and fracture toughness values. The composites produced exhibited maximum mechanical properties at peak aged condition. These increases in mechanical properties during aging are attributed to the formation of coherent and uniform distribution SiC particles in the aluminium matrix composites. It was also observed that thermal modification plays an important role in retaining the ductility of composites. This result shows that a substantial improvement in mechanical properties has been achieved in the reinforced metal matrices produced after age-hardening.

The Human recourses management system and reward and compensation package of Government hospitals... more The Human recourses management system and reward and compensation package of Government hospitals are mostly in positive manner to enhance the better quality services provided by nursing professions. But the lack of filling of vacancies of nursing staff members from time to time due to transfers and retirement of nurses, lack of re-fixation of the cadre strength on the base of extend of services needed from nurses to meet the increased numbers of patients in government hospital are the major problems or barriers in rendering the quality services to the patients. Another barrier is from the side of availability of medicines and tablets in time to the quality of nursing services. The supportive hospital climate, public relationship and infrastructures facilities are also affect the quality services of both government and private hospital nurses. The appointment of nurses without sufficient qualification and knowledge are the major issues in the consideration of quality of nursing professions in small level private hospital. The poor wage, prolong working hours are also adversely affect the quality of nursing professions. The numbers of government hospitals should be increased as per the present requirement in major cities of this district. The Government authorities should revise the nursing cadre strength from time to time. The supply of medicines should be done as per as requirement. The knowledge of medical insurance among the rural peoples who are living under poverty line should be created in order to avoid the dropouts of patients without curing their sick
Brain tumor segmentation is a significant area in medical applications. Early on analysis of brai... more Brain tumor segmentation is a significant area in medical applications. Early on analysis of brain tumors plays a significant part in increasing handling potential and improves the survival rate of the patients. Segmentation methods based on the manual of the brain tumors designed for cancer analysis, from huge number of MRI images created in clinical routine, is a complicated and time consumption task. There is a required designed for automatic brain tumor image segmentation. Presently amount of conventional methods are used for MRI-based brain tumor image segmentation. In this review paper,
The successful time management will give more payoff out of our life and our career. This is acco... more The successful time management will give more payoff out of our life and our career. This is accomplished by spending less time with our time robbers and more time on things that really have value to us. The surveys were conducted to gather data on how time management principles apply to clinical laboratory managers and in-depth. These interviews produced some interesting findings about typical time robbers of clinical laboratory managers and have A some innovative solutions.

Online banking (Internet banking) has arises as one of the most profitable e-commerce application... more Online banking (Internet banking) has arises as one of the most profitable e-commerce applications over the last decade. This paper mainly focused the implementation of innovational internet banking and also it focused the risk which involved while using the internet banking. In this paper we discussed the types of risk involved, its various uses and its implementations. Banking sectors to identify that they have to persistently to make the innovate and update the datasets to retain their demanding and sensitive customers and to provide convenient, reliable, and beneficial services. It also faces the risk involved in innovative internet banking services. On-line banking system has always been extremely statistics data with rigorous activity that trusts on Information and Communication Technology (ICT) to acquire, process, and deliver the information to all relevant users. The emergence of Internet banking which helps the customer's needs & demand in banking services.

Clients store immense measures of delicate information on a major information stage. Sharing touc... more Clients store immense measures of delicate information on a major information stage. Sharing touchy information will help ventures decrease the expense of giving clients customized benefits and offer some incentive included information administrations. Be that as it may, secure information sharing is tricky. This paper proposes a system for secure touchy information sharing on a major information stage, including secure information conveyance, stockpiling, utilization, and demolition on a semi-believed enormous information sharing stage. We present an intermediary reencryption calculation dependent on heterogeneous ciphertext change and a client procedure insurance strategy dependent on a virtual machine screen, which offers help for the acknowledgment of framework capacities. The system ensures the security of clients' touchy information adequately and shares these information securely. In the meantime, information proprietors hold full oversight of their own information in a sound situation for current Internet data security.

There is nothing like staying at home for real comfort. This era is a technical era. People are s... more There is nothing like staying at home for real comfort. This era is a technical era. People are searching for smart way of doing every little-to-big things in their life.so there is no exception for home at all. We can use automation technologies to make life easier for all kinds of people. Analog switches are mounted on the walls and operating them is tedious job to do for everyone and is very challenging to physically disabled and elderly people. So this proposed system is targeted to all kinds of people to make their life better. We have designed and implemented a low-cost, reliable, efficient and secure automation with speech operated system in different languages. As of today, the literacy rate are increasing but there are people who are uneducated or someone might prefer speaking their own languages. As of today, Google Assistant can support up to eight of the languages of India so as to support the indigenous people residing in India. Since it is using Google Assistant so, it removes the complexity for voice train process and voice recognition process. This system has both the feature of Bluetooth and Wi-Fi so, both of them can be utilized to control the loads of the home. The proposed system also gives the facility of operating the appliances through the internet by utilizing port forwarding technology. This paper is proposed to implement the smart home automation that controls the devices such as Fan, Lights, AC and door from within home using Bluetooth or from remote places using Node MCU and operates the devices using web, android application and Google Assistant. The main objective of this system is to be flexible for all kinds of people with specific needs.

In this paper due to the increasing vulnerabilities in the internet, security alone isn't suffici... more In this paper due to the increasing vulnerabilities in the internet, security alone isn't sufficient to keep a rupture, however digital crime scene investigation and cyber intelligence is also required to prevent future assaults or to identify the potential attacker. The unpretentious and incognito nature of biometric information gathering of keystroke dynamics has a high potential for use in cyber forensics or cyber intelligence and crime scene investigation or digital knowledge. The keystroke dynamics is a biometric assumption that different people typify in a unique way. The information accessing from computer systems is normally controlled by client accounts with usernames and passwords. If the set of data falls into the wrong hands, such a scheme has little security. For example fingerprints, can be used to strengthen security; however they require very expensive additional hardware. Keystroke dynamics with no additional hardware can be used. Keystroke dynamics is for the most part applicable to verification and identification also possible. In verification it is known who the client is supposed to be and the biometric system should verify if the user is who he claims to be in identification, the biometric The system should identify the client with keystroke dynamics without additional knowledge. This paper examines the usefulness of keystroke dynamics to determine the user's identity. We propose three plans for user identification when entering a keyboard. We use different machine learning algorithms in conjunction with the proposed user coupling technology. In particular, we show that combined user coupling in a bottom -up tree structure scheme provides the best performance in terms of both precision and time complexity. The techniques proposed are validated by keystroke data. Lastly, we also examined the performance of the identification system and demonstrated that the performance was not optimal, as expected.

In this paper analysis automatic coding method by integrating the inductive content analysis and ... more In this paper analysis automatic coding method by integrating the inductive content analysis and text classification techniques. In existing model acquire the reflective thinking categories by conducting an inductive content analysis and base our text classification algorithm on the categories, so we augment the manual method of coding. We apply the trained classification model to a large-scale and unexplored online discussion data set, so we can have a comprehensive understanding of teachers' reflection. This paper also provides six types of visualizations of the text classification results: the visualization of teachers' reflection level and the visualization of teachers' reflection evolution. By using the categories gained from inductive content analysis to create a radar map, we visually represent teachers' reflection level after obtain the results of text classification future classification model.

With the popularity of wearable devices, along with the development of clouds and cloudlet techno... more With the popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing block chain of medical data mainly includes data collection, data storage and data sharing, etc. Traditional healthcare system often requires the delivery of medical data to the cloud, which involves users' sensitive information and causes communication energy consumption. Practically, medical data sharing is a critical and challenging issue. Thus in this paper, we build up a novel healthcare system by utilizing the flexibility of cloudlet. The functions of cloudlet include privacy protection, data sharing and intrusion detection. In the stage of data collection, we first utilize Number Theory Research Unit (NTRU) method to encrypt user's body data collected by wearable devices. Those data will be transmitted to nearby cloudlet in an energy efficient fashion. Secondly, we present a new trust model to help users to select trustable partners who want to share stored data in the cloudlet. The trust model also helps similar patients to communicate with each other about their diseases. Thirdly, we divide users' medical data stored in remote cloud of hospital into three parts, and give them proper protection. Finally, in order to protect the healthcare system from malicious attacks, we develop a novel collaborative intrusion detection system (IDS) method based on cloudlet mesh, which can effectively prevent the remote healthcare big data cloud from attacks. Our experiments demonstrate the effectiveness of the proposed scheme. Combines classical partitioning algorithms with probabilistic models so as to form an efficient clustering approach.

With the popularity of wearable devices, along with the development of clouds and cloudlet techno... more With the popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing block chain of medical data mainly includes data collection, data storage and data sharing, etc. Traditional healthcare system often requires the delivery of medical data to the cloud, which involves users' sensitive information and causes communication energy consumption. Practically, medical data sharing is a critical and challenging issue. Thus in this paper, we build up a novel healthcare system by utilizing the flexibility of cloudlet. The functions of cloudlet include privacy protection, data sharing and intrusion detection. In the stage of data collection, we first utilize Number Theory Research Unit (NTRU) method to encrypt user's body data collected by wearable devices. Those data will be transmitted to nearby cloudlet in an energy efficient fashion. Secondly, we present a new trust model to help users to select trustable partners who want to share stored data in the cloudlet. The trust model also helps similar patients to communicate with each other about their diseases. Thirdly, we divide users' medical data stored in remote cloud of hospital into three parts, and give them proper protection. Finally, in order to protect the healthcare system from malicious attacks, we develop a novel collaborative intrusion detection system (IDS) method based on cloudlet mesh, which can effectively prevent the remote healthcare big data cloud from attacks. Our experiments demonstrate the effectiveness of the proposed scheme. Combines classical partitioning algorithms with probabilistic models so as to form an efficient clustering approach.
The level of pollution has increased with times by lot of factors like the increase in population... more The level of pollution has increased with times by lot of factors like the increase in population, increased vehicle use, industrialization and urbanization which results in harmful effects on human wellbeing by directly affecting health of population exposed to it. In order to monitor quality of air, water quality and sound level of the environment over wireless sensor network (WSN) based new framework is proposed which is based on data acquisition, transmission and controlling.

Substantial simulations going from equipped along with attached chip show up that fact our coordi... more Substantial simulations going from equipped along with attached chip show up that fact our coordination in attaining rich disappointment contribution moreover misleading portrait, as a consequence low conversation cost of living. Melodramatic current procedure take care of provoke a lot containing negotiate at spectacular chain devastate as a consequence is unsuited with melodramatic practice going from defined sources fly lightweight wi-fi connections. That manner has taken startling protection that one it pertain similar as a consequence extraneous wiring. when put next in order to separate approaches a well known practice character control, the one in question way has akin bankruptcy esteem protection, a lessen influence consider as well as a usually pare misleading reasonable count. mod addition, the one in question procedure has most accrued melodramatic leverage that fact it pertain analogous moreover inappropriate electronics, whereas essential observance is most effective relevant that one may associated micro circuitry. Fly An subjective aura station melodramatic gp steering technique doesn't go, powerful nodule keep work internalization techniques. Powerful various apparatus and techniques going from powerful web site consist of the various amounts in reference to errors fly website torso. Sensational feasibility consisting of breakdown depends upon sensational growth itself with sensational aura. that way generates most effective resident keep an eye on fence along with is appropriate in the interest of the two hooked up along with logged off wiring. a variety of urbanization techniques are encoded smart sensational biography. Fly melodramatic end, performing this person program produces powerful highest deficiency credit grade.
Uploads
Papers by Bonfring International Journal