scispace - formally typeset
Search or ask a question
Institution

Budge Budge Institute of Technology

EducationBaj Baj, India
About: Budge Budge Institute of Technology is a education organization based out in Baj Baj, India. It is known for research contribution in the topics: Steganography & Plasmon. The organization has 65 authors who have published 121 publications receiving 744 citations. The organization is also known as: BBIT.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
05 Jun 2021
TL;DR: In this paper, the authors point out the major problems that an HR face while taking tough calls on moral decisions and how he/she can overcome their dilemma and overcome the communication barrier that is common in most organizational sectors.
Abstract: At present, we see HR Professionals are tasked with various ethical as well as professional challenges such as inequality in workplace, sexual harassments, setting standards for workplace conducts amongst few. When certain types of scandals threaten the status quo of a company, it becomes the prerogative of the HR to take tough decisions and handle the matter swiftly so that the daily work culture is not affected. Thus, an HR professional can be termed as the “moral police” of a company. But this task is no easy feat. It befalls on a them to master the art of ethical decision making and become a valuable resource by communicating them not only to the employees but for the sake of company as well. In this study, I aim to point out the major problems that an HR face while taking tough calls on moral decisions and how he/she can overcome their dilemma and overcome the communication barrier that is common in most organizational sectors. My study will mainly focus on the four Ws : What kind of situation may arise that can threaten the moral grounds of decision making, Why such threatening situations may arise , What can be ethically done to overcome such situation and Ways to communicate them to the employees of the organization.
Journal ArticleDOI
TL;DR: Cloud Computing with CDroid Operation System that is based on Fujitsu Server for Mobile Technology, which is completely used for saving energy, enhancing battery life and saving processor cycles more than ever of mobile phone, sharing data and faster access is developed.
Abstract: CDroid is the next generation technology which will be used with clouds to get benefits from it. The twenty first century made us smart enough, it is now mandatory to save power consumption as much as for the sake of financial, environmental stability. It is equally important for national security and mankind. Today a huge number of populations in the world is worried about Smartphone batteries. They are huge consumer of energy when using several apps. Our system is to develop Cloud Computing with CDroid Operation System that is based on Fujitsu Server for Mobile Technology, which is completely used for saving energy, enhancing battery life and saving processor cycles more than ever of mobile phone, sharing data and faster access. The system shares both the memory of server and phone as well by using offloading mechanism. The mobile cloud computing concept helps several things to conserve power. The newest Fujitsu server provides world’s fastest processing. We had described thoroughly the architecture of newly proposed system. This will be one more step towards the quickest changing cell phone technology. The hybrid cloud computing mobile technology for the next generation will be ready for our world within few years.
Book ChapterDOI
01 Jan 2023
TL;DR: In this article , an algorithm for allocating appropriate resource to job in the MG environment to optimize resource utilization with respect to different parameters like scalability, job completion time, and cost as well.
Abstract: Manufacturing Grid is composed of enormous set of miscellaneous as well as geographically scattered manufacturing resources; those are aggregated as a virtual stage for carrying out far-reaching different types of manufacturing operations. Since the number of heterogeneous manufacturing resources increases in MG environment, so allocating the applicable resources for specific jobs becomes a critical concern. In this work, we propose an algorithm for allocating appropriate resource to job in the MG environment to optimize resource utilization with respect to different parameters like scalability, job completion time, and cost as well. Unlike conventional different types of algorithms, our proposed algorithm captures the resource which is most suitable with respect to all parameters; henceforth, it permits all other further resources to take part in further bid processes, and our recommended algorithm is able to assign the most appropriate and correct resources for jobs completing as well as attain worthy enactment in provisions of effectiveness and helpfulness.
Book ChapterDOI
01 Jan 2021
TL;DR: An incipient convoluted structure is introduced where the main motive is to make an algorithm which is more expeditious, lighter and time preserver than the traditional Feistel cipher.
Abstract: The twenty-first century is a digital era when bulk volume of data is engendering per second over the cyber world which is somehow an indispensability of digital life. So, for the purport of its auspice from unauthorized betokens, sundry encryption and decryption techniques were engendered which are predicated on different aspects of bulwarking the data. One of them is the Feistel cipher algorithm which is predicated on symmetric key cryptography where a single key is utilized for both encryption and decryption of the text. In this method, there is immensely colossal drawback that the Feistel cipher only transmutes a component of the internal state in each round, i.e., after user feeds the data, only half part of the main text is manipulated in each round which as a result is bit insecure as the left half is the pristine text for the very first round. So, to surmount this issue we have proposed one algorithm predicated on Feistel cipher which transmutes the entire internal state in each round and makes the data entered by user more secure. Not only that, our method is more time-efficient than that of the traditional Feistel cipher. In this paper, we introduced an incipient convoluted structure where our main motive is to make an algorithm which is more expeditious, lighter and time preserver than the traditional Feistel cipher.
Journal ArticleDOI
TL;DR: Disposal of warm weight on the fasteners, diminished upkeep cost on the control framework, versatile nut sprinters, end of the prerequisite of high talented works, achievement of required torque extend, decrease of gathering time and lessening in number of parts being rejected at quality check are examined in this work.

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20232
20221
202110
202010
201911
201813