802 research outputs found

    Co-producing Class Participation

    Get PDF

    Designing Remedial Course in English for Engineering Students from Non-English Medium Background

    Get PDF
    Engineering graduates in India belong to different fields of specialization. The prerequisites of the professions and the specificity of language functions required for a study of English offered at Engineering Colleges. The students who join professional courses like Engineering, half of the students come from Non-English medium Instruction. Careful analyses of these students’ performance by diagnosing the areas of difficulty will help to plan and design a remedial course to teach the basics to communication skills in order to enhance and present according to their contexts and their academics. The engineering colleges in Telangana and Andhra Pradesh have become mushrooms without maintaining any quality which should be suited to the industry requirement. The intention in preparing the paper is to point out what is lacking in engineering students and they are suited to the industry, their weaknesses, stumbling blocks, and measure to improve by suggesting with a remedial course in order to implement in engineering studies at the beginning of their courses

    The Use of Heuristics in Service Evaluations

    Get PDF
    Submitted to the School of Business and the Faculty of the Graduate School of the University of Kansas in partial fulfillment of the requirements for the degree of Doctor of Philosophy

    Managing Business-to-Business Customer Relationships Following Key Contact Employee Turnover in a Vendor Firm

    Get PDF
    This is the published version. Copyright 2002 by the American Marketing Association.Customers form relationships with the employees who serve them as well as with the vendor firms these employees represent. In many cases, a customer’s relationship with an employee who is closest to them, a key contact employee, may be stronger than the customer’s relationship with the vendor firm. If the key contact employee is no longer available to serve that customer, the vendor firm’s relationship with the customer may become vulnerable. In this article, the authors present the results of two studies that examine what business-to-business customers value in their relationships with key contact employees, what customers’ concerns are when a favored key contact employee is no longer available to serve them, and what vendor firms can do to alleviate these concerns and to retain employee knowledge even if they cannot retain the employee in that position. The studies are based on a discovery-oriented approach and integrate input from business-to-business customers, key contact employees, and managers from a broad cross-section of companies to develop testable propositions. The authors discuss managerial and theoretical implications and directions for further research

    A novel secure routing scheme using probabilistic modelling for better resistivity against lethal attacks

    Get PDF
    Study towards Wireless Adhoc Network dates two decades back with various researchers evolving up with new solutions towards addressing its problems. Irrespective of various other problems, the issues related to the secure routing is yet unsolved owing to massively increasing fatal strategies of the adversary. Review of existing literature shows that the existing secure routing scheme can only govern over the stated attacks reducing the applicability in case of dynamic attacks. Therefore, this manuscript introduces a novel probabilistic model which offers the capability to wireless nodes to identify the malicious behavior and react accordingly. Different from existing intrusion prevention system, the proposed system allows the malicious node to participate in the data forwarding process and exhaust its resources with no chance of launching an attack. The simulated outcome of the study shows that the proposed secure routing scheme offers better data forwarding characteristic in contrast to the existing system in the aspect of intrusion detection and secure data transmission

    Psychological Implications of Customer Participation in Co-Production

    Get PDF
    This is the published version. Copyright 2003 by the American Association of Marketing.Customer participation in the production of goods and services appears to be growing. The marketing literature has largely focused on the economic implications of this trend and has not addressed customers’ potential psychological responses to participation. The authors draw on the social psychological literature on the self-serving bias and conduct two studies to examine the effects of participation on customer satisfaction. Study 1 shows that consistent with the self-serving bias, given an identical outcome, customer satisfaction with a firm differs depending on whether a customer participates in production. Study 2 shows that providing customers a choice in whether to participate mitigates the self-serving bias when the outcome is worse than expected. The authors present theoretical and practical implications and provide directions for further research

    Trust-based secure routing against lethal behavior of nodes in wireless adhoc network

    Get PDF
    Offering a secure communication in wireless adhoc network is yet an open-end problem irrespective of archives of existing literatures towards security enhancement. Inclination towards solving specific forms of attack in adhoc network is majorly seen as an existing trend which lowers the applicability of existing security solution while application environment or attack scenario is changed. Therefore, the proposed system implements an analytical secure routing modeling which performs consistent monitoring of the malicious behaviour of its neighboring node and formulates decision towards secure routing by the source nodes. Harnessing the potential ofconceptual probabilistic modeling, the proposed system is capable as well as applicable for resisting maximum number / types of threats in wireless network. The study outcome show proposed scheme offer better performance in contrast to existing secure routing scheme
    • …
    corecore