Notice Board :

Call for Paper
Vol. 5 Issue 5

Submission Start Date:
May 01, 2018

Acceptence Notification Start:
May 10, 2018

Submission End:
May 15, 2018

Final MenuScript Due:
May 30, 2018

Publication Date:
June 04, 2018
                         Notice Board: Call for PaperVol. 5 Issue 5      Submission Start Date: May 01, 2018      Acceptence Notification Start: May 10, 2018      Submission End: May 15, 2018      Final MenuScript Due: May 30, 2018      Publication Date: June 04, 2018




Volume IV Issue XI

Author Name
Prema.S.Thomas
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 11
Abstract
The hotel and hospitality sector caters to millions of travellers every day, and each one of them checks in with their own set of expectations. Meeting those expectations is the key to getting people to return, and increasingly hotel and leisure operators are turning to advanced analytics solutions for clues about how to keep their customers happy. Predictive analysis is a field of data mining that is used to study the data in the past and make predictions about the future. This paper illustrates how predictive analysis can be used for increasing the sales and reducing the expenses based on advanced algorithms based on past data patterns. This will also help business to focus their marketing in the right way to increase occupancy and reduce expenses by internal optimization. Data visualization is done using Power Bi and Tableau to predict the results in terms of occupancy during the various seasons of the year, kind of guests their menu and other details.
PaperID
2017/IJTRM/11/2017/9271

Author Name
Dr. Amol Ranadive, Anirudh Rohilla
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 11
Abstract
The concept of online shopping has been executed in the market to increase the convenience of buying any product,with the rise of smartphone users in the market, companies expected a sudden shift of consumers from offline stores to online, so many ventured into the market with seed funding, but in practicality, it did not happen so. It is a cut throat competition between online and offline stores to gain customers. Online stores based their promotion on huge discounts they offered making tremendous losses in the hope of recovering them in the future and gaining loyalty of customers. The same strategy was not adopted by the online grocery stores, their only unique selling preposition being the convenience of buying grocery online. This was not enough for the Indian consumers to shift from brick and mortar stores to virtual stores, because a one-day delivery system was not really convenient groceries include essential product, which a consumer might need urgently, so it is very difficult
PaperID
2017/IJTRM/11/2017/9292

Author Name
Rakesh Kumar Ranjan, R.N. Sinha, K.K. Dubey
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 11
Abstract
For structural information around the X-ray absorbing atom XANES is considered to be an appropriate tool. But XANES is still passing through developing stage leaving wide area for developing analytical method for quantitative analysis. Inverse correlation ER2 =c has been widely used for the determination of inter atomic distances in several model systems, where E is the energy of a XANES peak, R is the inter-atomic distance and c is a parameter whose nature has not been fully understood. We in the present paper have correlated c with effective-charge on the K-edge of X-ray absorbing Copper atom in La2CuO4, CuCl2, Cu (acetate) 2, Cu2O, CuO, CuSO4.
PaperID
2017/IJTRM/11/2017/9293

Author Name
Priyanka Pawar, Harish Patidar
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 11
Abstract
Intrusion detection is to detect or analyze attacks against a computer system and report to network administrator It is useful in business sector as well as an active area of research. In Information or Network Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resources . It plays a very important role in attack detection, any security violation and network inspect. This paper presents a review of modern classification methods for intrusion detection system. Most of these techniques are based on data classification and clustering. Generally they make use of the decision tree for classification of data. Decision tree is constructed by first calculating the information gain or entropy of each attribute and then splitting the attribute sets.
PaperID
2017/IJTRM/11/2017/9296