Friday, 26 June 2020

Ten Tips for your PhD viva voce

Hello Researchers and Academicians
Herewith we present 10 points to consider for your successful PhD Viva Voce Presentation. Hope this will be useful for you.
1. Prepare an appealing PPT. Include the most vital parts of your research thesis in it. Use more of pictorial representations than theoretical content in the PPT. Take inputs from your supervisor on the contents of the PPT.
2. Dress up yourselves in a way that makes you feel comfortable. In fact you would be the centre of attraction on that day. However avoid wearing gorgeous outfits and dress up in formals.
3. Organize a mock session at your home or workplace with a few audience to bring down your nervousness . Get their feedback on your presentation.
4. Ensure to convey whatever you wish to convey within the timeframe that would be given to you. ( This can be rehearsed during the mock viva). Most examiners give 40 to 45 minutes for the candidate to present.
5. Do not use complex terms or jargons while presenting your work. Remember..most of the viva voce sessions have audience from non- academic and non-technical background as well.
6.Ensure that you have found answers to all queries that Thesis Examiners had aroused upon evaluating your Thesis. You will be expected to answer atleast a few of them for sure by the panel members at the time of your presentation.
7. After completing your presentation, wait for the examiners or audience to ask their questions. Listen to the questions carefully. Think well and then answer.
8. Not all human beings know everything .In case, you do not know the answer to any of the questions raised by the examiners or outsiders.. feel free to admit it. Covering up with wrong answers or cooking up with stories will create a bad impression on you.
9. Maintain a good eye contact while presenting as well as answering to the questions raised by the audience. Answer boldly and clearly. You should be firm and confident of your research findings and not get confused when someone arises a question.
10. Above All, stay cool and composed.. for you have come this far ..overcoming all your hurdles in your doctoral journey. This is indeed the last lap heading you towards the FINISH line of your race.

All the Best !!!!

Monday, 29 July 2019

How to search a journal from UGC -Care List

How to search a journal from UGC -Care List 

Hello Researchers
It is well known fact that UGC in order to curb predatory journals and in order to enhance the quality of the research paper publication process in India has introduced a new set of journals called UGC-Care List of Journals.
Here is a detailed Step wise instruction on how to access this UGC- care list and how to find out if a journal actually belongs to the CARE List.
Step 1: Go to the url

The url will lead you to a window as shown in the following figure

Step 2: Click the Login Button  in the right most corner

Step 3: Click the Registration Button in the left side (2nd item in the Drop down menu). It  will lead you to a screen as shown below . You can fill in the details like Your Title, Name, Gender, Mobile Number, Address and Email ID and set a password for the same.

Step 4: Once you register yourself in the UGC website, you will be asked to Login again.

Step 5: Once you login you can see the following list of Journals as shown in the below figure

Step 6: The first category is UGC- Care List Group A- This includes Web of Science Journals and Scopus Journals. Those are the journals available in the following links respectively

A journal is said to belong to Group A if it is available in four of the below links given

Wos (Arts and Humanities Citation Index List)

Wos (Science Citation Index Expanded)

Wos (Social Science Citation Index)

Scopus source list

Next is the group B, C and D
For accessing Group B C and D list,  you need to click the search button given below

Step 7: The search window opens up like this and you can use a keyword and find out the journal of your choice

Step 8: Once the search process is done,  you have to logout of the window by clicking the Logout button in the top right

Many journals in India claim to be approved by UGC in their website. Before you submit your research work /manuscript that you have created with great pain and hardwork, ensure that the journal is a part of the UGC Care List .Make sure that your manuscript is published at the right publication platform so that it adds greater credit to your career as a researcher.

Tuesday, 4 August 2015



Knowledge is defined as a link for people who make his/her mind between the application and information in a confined place. Knowledge occurs by the value that is added to the organization by categorizing, contextualizing and calculating the data. Information is also sometimes termed as knowledge when it is processed in the minds of people. This knowledge is again turned to information when it is communicated to others in the form of text, writing or words.

Characteristics of Knowledge Transfer

 There are many characteristics that affect the transfer of knowledge in an organization; they are classified into two type’s namely situational characteristics and knowledge characteristics. A knowledge characteristic consists of a system user and the receiver by the organization. The risk that is faced by the organization in the transfer of knowledge is termed as stickiness in knowledge or knowledge stickiness. The methods and concepts involved in the process of knowledge transfer results in the stickiness during the construction of knowledge and it is also used to solve the issues while the knowledge is transferred in an organization [Dixon.H, 2000]. The stickiness in the process of knowledge transfer is based upon the following characteristics, they are knowledge character, sender and receiver and the growth between the sender and receiver [Wang et al, 2001]. While knowledge transfer is taking place, the above aspects are important to handle the stickiness carefully in order to enhance the process of knowledge transfer successfully.
The factors that affect the situational characteristics are source, recipient and the organizational context in an organization. The knowledge source is the initial factor of the process and their main aim is to transfer the knowledge since it is the most important factor for the success of an organization [Ghaziri .M, 2004]. Another aspect of the source which affects the transfer is the reliability of the knowledge transfer. The final source of aspect in situational characteristics is to complete the process of knowledge transfer.


Thus the knowledge transfer is the concept and fact that are present in the people’s minds. Knowledge transfer also aims at the process of communication that involves both information transmissions to the recipient and sender by a group or person in the organization. Therefore it is revealed from above that the role of knowledge transfer is the ability to act and also it evaluates the new information in an organization.


1. Dixon.H Common Knowledge: How Companies Thrive By Sharing Knowledge, Harvard University Press, Boston, 2000.
2. Awad.E.M and Ghaziri.M (Knowledge Management, Pearson Education, NJ, 2004.
3. Wang et al, Introduction to Knowledge Management: Principles and Practice, Tapir Academic Press, Trondheim, 2001.



Data management is defined as the process in which the data or information undergoes validation, storing, processing and protected in order to satisfy the requirements of the end users. Data is the heart of the information and it acts as a primary source of model through which the entire world is operating. It is also termed as the process of executing the procedures and policies that are needed for the effective management of the information or data.

Emerging Technologies for Effective Data Management

There are many technologies that are used for the effective management of data out of which some important technologies are discussed here. The first technology is the Usage of programs that are scripted for the analysis of data or information. In this method the data is thoroughly processed and analyzed to provide a metadata .In this technique the data can be revised at any point of time since a record will be created from the time of data collected till the publish [Gordon.K, 2007]. The second technology is the storage of data in the form of non proprietary software and hardware. In this technique the data stored will remain for many decades even when the software is lost. But if the data is stored in proprietary software or hardware the data will disappear if the software is lost and it is difficult to open the files [Mehdi.K, 1998]. The third method used for the effective data management is the usage of descriptive names for the files that contain data [Mathew.B, 2001]. This technique is the quickest way to represent the data in the file. This method consists of two approaches to be followed for effective management of data namely the first one is that the file name should not be long and the second one is that there should be space between the file names.


Thus from the above technologies mentioned it is revealed that the data can be effectively managed and it can be made free from errors and it also can be structured still more effectively for the analysis process. More importantly it is more interpretable for future research and for the management of the data. Hence these technologies are very useful to revise the data even in future and it can also be used for research purposes for many decades.


1.      Gordon.K Principles of Effective Data Management, British Informatics Society Limited, UK, 2007.

2.      Mathew.B Effective Management Of Data, California University, CA, 2001

3.      Mehdi.K Effective Data Management and Emerging Technologies, Idea Publishing, New York, 1998


Ratio is a term which indicates the association between any of the two inter - connected variables. That is, the ratios use to institute the association among two items that are stated in quantitative form. The ratio analysis is the analysis of financial statements (balance sheet, profit and loss statement, cash flow statement etc.) of the firms of a specific period and interpreting of financial results with the assistance of available ratios. In finance, a ratio is termed as an association between 2 numbers of similar type which generally uttered as a: b or ‘a to b’.
Ratio analysis
In ratio analysis, the financial ratios act as a tool. The required data for the ratio analysis used to be gathered from the financial statements of the firm. Generally, the ratio analyses are used to determine the financial safety and financial condition of a firm. The ratio analysis is considered as an essential technique to institute the association between two accounting numbers in order to highlight the important data to the management and the users who could assess the condition of the business and to view their concert in an expressive way. There are various analyses and researches (for example, Minter et al Eds. 1982; Kumbirai & Webb, 2010) on the use of ratio analysis in evaluating the financial performance of the firms. Added to that, the ratio analysis assists in the firms’ budgeting, long – term planning, strengthening the financial performance through asset management etc.
The ratios in the ratio analysis are classified into various types. They are liquidity ratio or quick ratio or liquid ratio or acid test ratio, solvency or financial structure or capital structure ratio, profitability ratio, activity ratio or efficiency ratio and coverage ratio.
Thus, it is clearly understood that ratio analysis helps in analyzing each and every financial aspect of a firm starting from its assets to liabilities and debt. This helps in understanding the financial condition and complete performance of an entity.
Minter et al Eds. (1982), Using ratio analysis to evaluate financial performance, New Directions for Higher Education, Issue 38, pages 25–38.
Kumbirai & Webb (2010), A financial Ratio Analysis of Commercial Bank Performance in South Africa, African Review of Economics and Finance, Print Services, Rhodes University, Vol. 2, No. 1.

Tuesday, 28 July 2015


Introduction to Cloud Computing:
Cloud computing can be referred as a new computing style in which dynamically scalable and always virtualized resources are offered as a service over internet. Cloud computing has become an essential trend of technology and several professionals expect that cloud computing will reshape information technology marketplace and information technology processes.
Benefits of Cloud Computing:
According to Armburst et al (2010) the most essential benefit of cloud computing is that firms can reduce their expenditures of capital and use operational expenditures for developing their capabilities of computing. This is a lower obstacle to entry and also needs fewer in house information technology resources to offer system assistance. Another benefit of cloud computing is that firms can initiate with a little deployment and develop at a big deployment rapidly and scale back if essential. Buyya et al (2009) has mentioned that the cloud computing flexibility permits firms to use additional resources at peak times enhancing them to fulfill the demands of customers. Maintenance, is also one of the benefits of cloud computing. The providers of cloud service perform the maintenance of system and access through application programming interfaces that do not need installations of applications onto personal computers. With the technology of cloud computing users use different devices involving laptops, personal computers, personal digital assistants and smart phones to access programs, application development and storage platforms over internet through services provided by the providers of cloud computing. Mather, Kumaraswamy and Latif (2009) have described that the features of cloud computing involves wide access of network, on demand self service, rapid elasticity, measured service and resource pooling. Another benefit is reliability where the services using numerous redundant sites can assist disaster recovery and continuity of business. The last benefit of cloud computing is mobile accessibility where mobile employees have developed productivity because of system accessible in an infrastructure feasible from anywhere.
Cloud computing develops profitability by developing utilization of resources. Costs are reduced by providing proper resources only for the time those resources are required. Cloud computing is altering the way information technology departments purchase information technology. Businesses have an extent of paths to the cloud involving platforms, infrastructure and applications that are accessible from providers of cloud as online services.   
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G.,  atterson, D., Rabkin, A., Stoica, I. and Zaharia, M. (2010) A View of Cloud Computing, Communications of the ACM, 53, 4, 50-58.
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I. (2009) Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility, Future Generation Computer Systems, 25, 6, 599-616.

Mather, T., Kumaraswamy, S and Latif S (2009), Cloud security and privacy. Sebastopol, CA: O’Reilly Media, Inc


Code Division Multiple Access (CDMA) is a multiple access and modulation scheme based on the communication of spread-spectrum. CDMA is a new concept in the advanced wireless communications and digital cellular radio communications.
With CDMA, each signal comprises various pseudo-random binary sequences which set the carrier and spreads the waveform spectrum. CDMA is a system of direct sequence spread spectrum. Numerous CDMA signals share the same spectrum of frequency. If CDMA is viewed either in the time or frequency domain, the signals of multiple access appear to be on topmost of each other. The multiple access signals are separated at the receiver with the help of correlator that permits only signal energy from the selected sequence of binary and despreads its spectrum. The system of CDMA works directly on digital signals like 64 Kbit/Sec. These signals may be ISDN channels, digitized voice, modem data and more (Adachi et al., 1998).
According to Viterbi (1995) CDMA changes the subscriber station nature from an analog to digital device. CDMS receivers do not neglect analog processing completely, but they separate channels of communication by a means of a modulation of pseudo-random which is applied and removed in the domain of digital, non on the frequency basis. Multiple users occupy the band of the same frequency. CDMS is changing the face of PCS and cellular communication by improving the voice quality and removing the audible multipath fading effects, improving the capacity of telephone traffic, minimizing the incidence of dropped calls since handoff failures, providing reliable mechanism of transport for data communications like internet traffic, facsimile, simplifying site selection, reducing the number of sites required to support any provided amount of traffic, reducing the operating and deployment costs since fewer cells sites are required, minimizing average transmitted power, reducing potential health risks and minimizing interference to the other electronic devices (Sari et al., 2000).
It is concluded that CDMA is a radio access system and digital modulation which employs frequency bands in order to arrange continuous and simultaneous access to a wireless network by multiple users.
1.      Adachi.F, Sawahashi.M and Suda.H (1998), Wideband DS-CDMA for Next- Generation Mobile Communication Systems”, IEEE Communication, Mag., vol.36, pp. 56-59.
2.      Sari.H, Vanhaverbeke.F, Moeneclaey.M (2000), “Multiple access using two sets of orthogonal signal waveforms,” IEEE Communication. Lett., vol. 4, no. 1, pp. 4-6.

3.      Viterbi. A (1995), CDMA: Principles of Spread Spectrum Communication Addison-Wesley Wireless Communications Series.