Gaurav Chhikara - Academia.edu (original) (raw)
Uploads
Papers by Gaurav Chhikara
Hospital gift shop management, 1986
Normally, items waiting to be purchased or purchase are considered to be in inventory. One of the... more Normally, items waiting to be purchased or purchase are considered to be in inventory. One of the most pressing problems in the manufacturing and use of goods is the control of this inventory. Many companies experience financial difficulties each year due to a lack of adequate control in this area. Whether it is raw material used to manufacture a product or products waiting to be purchase, problems arise when too many or too few items are available. INTRODUCTION The basic decisions to be made once a source has been determined are how much to order and when to order. Inherent in this analysis is the concept of demand. Demand can be known or unknown, probabilistic or deterministic, constant or lumpy. Each of these characteristics affects the method of approaching the inventory problem. For the unknown demand case a decision must be made as to how much the firm is willing to risk. Normally, the decision would be to produce some k units for use and then determine after some period of ti...
Zenodo (CERN European Organization for Nuclear Research), Mar 26, 2019
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social m... more With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user's increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we will discuss various algorithm used so far starting from classical ciphers to the modern day's hash function for ensuring safer transmission of information.
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social m... more With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user's increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we will discuss various algorithm used so far starting from classical ciphers to the modern day's hash function for ensuring safer transmission of information.
Hospital gift shop management, 1986
Normally, items waiting to be purchased or purchase are considered to be in inventory. One of the... more Normally, items waiting to be purchased or purchase are considered to be in inventory. One of the most pressing problems in the manufacturing and use of goods is the control of this inventory. Many companies experience financial difficulties each year due to a lack of adequate control in this area. Whether it is raw material used to manufacture a product or products waiting to be purchase, problems arise when too many or too few items are available. INTRODUCTION The basic decisions to be made once a source has been determined are how much to order and when to order. Inherent in this analysis is the concept of demand. Demand can be known or unknown, probabilistic or deterministic, constant or lumpy. Each of these characteristics affects the method of approaching the inventory problem. For the unknown demand case a decision must be made as to how much the firm is willing to risk. Normally, the decision would be to produce some k units for use and then determine after some period of ti...
Zenodo (CERN European Organization for Nuclear Research), Mar 26, 2019
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social m... more With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user's increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we will discuss various algorithm used so far starting from classical ciphers to the modern day's hash function for ensuring safer transmission of information.
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social m... more With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user's increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we will discuss various algorithm used so far starting from classical ciphers to the modern day's hash function for ensuring safer transmission of information.