Som B.K.,Jagan Institute of Management Studies |
Kumar R.,Shri Mata Vaishno Devi University
Journal of Industrial and Production Engineering | Year: 2017
We study a finite capacity Markovian queuing system with two heterogeneous servers, reverse balking, and reneging. The stationary system size probabilities are obtained by using iterative method. The measures of performance like expected system size, the average rate of reverse balking, and the average rate of reneging are obtained. Finally, the sensitivity analysis of the model is carried out. © 2017 Chinese Institute of Industrial Engineers
News Article | November 26, 2016
Jagan Institute of Management Studies (JIMS), Rohini organized the 2nd Series of JIMS Premier League 2016 at St. Stephen's College Ground, Mori Gate, Kashmere Gate, New Delhi.
News Article | December 22, 2016
A successful event on 'Digitalization of Businesses: Promises and Perils' was organized by Jagan Institute of Management Studies (JIMS), Rohini at Lakshmipat Singhania Auditorium, PHD House, New Delhi. The event was inaugurated in the presence of Dr.
News Article | October 27, 2016
Jagan Institute of Management Studies (JIMS), Rohini organized one day seminar on 'Growth of E-commerce and Future of Traditional Retail' under the guidance of Chief Guest, G.R. Raghavender, Joint Secretary, Ministry of Commerce.
News Article | February 16, 2017
-- Startup Bootcamp Singapore in association with Jagan Institute of Management Studies (JIMS), Rohini and startup incubator Udgam Delhi organized 'Delhi Fintech Fasttrack' at India Habitat Centre, New Delhi. Fintech Fasttrack provided a global platform to the startups and entrepreneurs for sharing their thoughts and plans and getting right direction for successful business plan. Udgam, a Delhi based startup funding organization and incubator came as a Start-Up mentor to nurture and grow the aspiring entrepreneurs.Manish Gupta – Chairman of JIMS, Founder & Chief-Mentor of Udgam said, 'The backbone of any innovation is its basic research which is going to be the foundation of your company. Don't be shy about sharing your ideas. Your ideas can be mentored and can be shaped up for commercialization. The focus should lay on Strategic plan, financial plan and Human resource plan. Today at Udgam, we have 12 startup companies which are being closely mentored and guided. Indian market is currently in tune with the consumer behavior. Believe in your ideas and you can be the NEXT game changer'.Sam Hall Program Director, Startup Bootcamp Fintech Singapore gave industrial guidance to the start-ups during the event and guided them on their project developments and support functions. He elaborated different stages of their programe.Participants got an opportunity to engage with Startup Bootcamp Global Community and received valuable feedback from the mentors: Sam Hall – Program Director, Startup Bootcamp Fintech Singapore, Manish Gupta – Chairman of JIMS, Founder & Chief-Mentor of Udgam, Sanjeev Bhandari – Director of Bizmax Consulting, Anil Gupta – Associate Director, Microsave, Aparna Gupta – Managing Director, FirstRain India, Gagan Ghai - Strategy Advisor, Valuation Expert, Business Mentor, Venture Catalyst and Crest Capital Advisors.This thoughtful event gave chance to startups to present their ideas. These included: Currency Kart.com, Bachat, Investello, Pless, Wrinq. Currencykart.com is an online integrated market place which aims at bridging the gap between money changers and customers thus making the foreign exchange market more transparent and hassle free. Bachat is the digital automated wallet which has smart features like understanding when and how much to save. Investello mission is to automate the valuation process of stocks based on popular valuation models and to help customers to select companies to invest in, based on their own criteria. Pless is a network of verified merchants with pre-installed QR codes and NFC tags. Wrinq solves the problem of cash management for international businesses.Jagan Institute of Management Studies (JIMS) imparts professional education at post graduate and graduate levels in the fields of Management and Information Technology. The Institute has been working for the attainment of a mission: to develop highly skilled and professional human resource for industry and business. From a very modest start, it has now acquired a commendable position as one of the premier institutes of the country.For more details, click on to: http://www.jimsindia.org/
Gupta K.,Jagan Institute of Management Studies |
Arora S.R.,University of Delhi
OPSEARCH | Year: 2013
This paper develops a technique for minimizing time in a capacitated transportation problem with bounds on rim conditions. An algorithm in which a related transportation problem is formed minimizes the total time necessary for transporting goods from the suppliers to the consumers in a special class of capacitated transportation problems with bounds on total availabilities at sources and total destination requirements. The procedure involves finite iterations and is based on movement from one extreme point to another extreme point till we get an optimal solution that is with minimum time and further reduction in amount in the pipeline is not possible. A numerical example illustrating the algorithm is also included. © 2013 Operational Research Society of India.
Suri B.,University of Delhi |
Singh P.,Jagan Institute of Management Studies
Lecture Notes in Electrical Engineering | Year: 2015
Information in organizations is managed efficiently by adopting data warehouses. Organizations are using data warehouses for integrating data from various heterogeneous sources in order to do analysis and make decision. Data warehouse quality is crucial because lack of quality in data warehouse may lead to rejection of the decision support system or may result in non-productive decision. A set of metrics have been defined and validated to measure the quality of the conceptual data model for data warehouse. In this paper, we first summarize the set of metrics for measuring the understand ability of conceptual data model for data warehouses. We focus on providing empirical validation by the family of experiments performed by us. The whole empirical work showed us that the subset of proposed metrics can be used as an indicator of conceptual model of data warehouses. © Springer International Publishing Switzerland 2015.
Behl A.,Cisco Systems |
Behl K.,Jagan Institute of Management Studies
Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012 | Year: 2012
Cloud Computing - some treat it as a catchphrase, others as the next step in evolution of their organization and the Internet. However, what is for sure is that, it is a way of leveraging less expensive services based environment providing cost-effective solutions to various organizations to cater for their computing needs, without investing in computing infrastructure. However, cloud computing, just like other formats of computing, is not free from issues. One of the major barriers in adoption of cloud is security. Once migrated to cloud, you do not know where your data is physically stored, what laws and regulations govern the same and most important of all, who has access to it. This paper explores security issues related to cloud computing and proposes a paradigm for securing cloud. The paper investigates some of the key research challenges of implementing cloud-aware security solutions which can plausibly secure the ever-changing and dynamic cloud environment, followed by conclusion where we try to entail the whole research and try to formulate a practical security paradigm, which will enable the cloud providers and consumers to ensure that their data and valuable assets are safe from otherwise prying eyes. © 2012 IEEE.
Singh P.,Jagan Institute of Management Studies |
Smart Innovation, Systems and Technologies | Year: 2015
Data warehouses are used in organization for efficiently managing the information. The data from various heterogeneous data sources are integrated in data warehouse in order to do analysis and make decision. Data warehouse quality is very important as it is the main tool for strategic decision. Data warehouse quality is influenced by Data model quality which is further influenced by conceptual data model. In this paper, we first summarize the set of metrics for measuring the understand ability of conceptual data model for data warehouses. The statistical and machine learning methods are used to predict effect of structural metrics, on understand ability, efficiency and effectiveness of Data warehouse Multidimensional (MD) conceptual model. © Springer India 2015.
Behl A.,Cisco Systems |
Behl K.,Jagan Institute of Management Studies
Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012 | Year: 2012
Cloud computing is a whole new paradigm that offers a non-traditional computing model for organizations to adopt Information Technology and related functions and aspects without upfront investment and with lower Total Cost of Ownership (TCO). Cloud computing opens doors to multiple, unlimited venues from elastic computing to on demand provisioning to dynamic storage and computing requirement fulfillment. However, despite the potential gains achieved from the cloud computing, the security of an open-ended and rather freely accessible resource is still questionable which impacts the cloud adoption. The security problem becomes amplified under the cloud model as new dimensions enter into the problem scope related to the architecture, multi-tenancy, layer dependency, and elasticity. This paper introduces a detailed analysis of the cloud security problem. It investigates the problem of security from the cloud architecture perspective, the cloud characteristics perspective, cloud delivery model perspective, and the cloud stakeholder perspective. The paper investigates some of the key research challenges of implementing cloud-aware security solutions which can plausibly secure the ever-changing and dynamic cloud model. Based on this analysis it presents a derived detailed specification of the cloud security problem and key features that should be covered by any proposed security solution for cloud computing. © 2012 IEEE.