An analytical study of the utilization and appropriation of funds of Gorakhpur Kshetriya Gramin Bank, deposits and loans in the context of the period 1987 to 1998.

Authors

  • Dr. Shiv Poojan Yadav  Associate Professor Commerce, Pandit Deendayal Upadhyay Government College, Tilhar Shahjahanpur

Keywords:

Blockchain, Internet of Things, Authentication, Security, De- centralized, autonomous system

Abstract

Banks are very important institutions, they collect small savings from the public and provide financial resources to such areas where they are needed, hence banks are called traders of capital or money, like any state business undertaking, a banking undertaking too. The purpose is to earn profit, but with the profit making of the banking enterprise, its social responsibility is associated, such banking undertakings which are owned by the public, their responsibility becomes more so that they perform their duties towards the society and the nation more faithfully. But in spite of all this, the criterion of the efficiency of a bank is its profitability. Therefore, it is necessary to plan the resources received by the bank in such a way that they can be profitable. The funds received by the bank and their various investments should be coordinated. It is known that the funds received by a bank are its liabilities and investments are its assets. Makes an analytical study of loans and loans in the context of the period 1987 to 1998 and makes a brief attempt to evaluate the performance of banks through these basic indicators. key term. Gorakhpur, Regional Rural Banks, Funds, Appropriations, Deposits, Loans

References

  1. Rekleitis, Evangelos, Panagiotis Rizomiliotis, and Stefanos Gritzalis. "How to protect security and privacy in the IoT: a policy?based RFID tag management protocol." Security and Communication Networks 7.12 (2014): 2669-2683.
  2. Norta, Alex. "Creation of smart-contracting collaborations for decentralized autonomous organizations." International Conference on Business Informatics Research. Springer, Cham, 2015.
  3. Wright, Aaron, and Primavera De Filippi. "Decentralized blockchain technology and the rise of lex cryptographia." Available at SSRN 2580664 (2015).
  4. Herbert, Jeff, and Alan Litchfield. "A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology." Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015). Vol. 27. 2015.
  5. Alqassem. Privacy and security requirements framework for the internet of things (iot). In International Conference on Software Engineering (ICSE) Companion India, pages 739–741, May-June 2014.
  6. Huang, P. Craig, H. Lin, and Z. Yan. Seciot: a security framework for the internet of things. In Security and communication networks, May 2015.
  7. Kim, Young-Pil, Seehwan Yoo, and Chuck Yoo. "DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things." 2015 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2015.
  8. Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. Internet of things (iot): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7):1645–1660, 2013. Including Special sections: Cyber-enabled Distributed Computing for Ubiquitous Cloud and Network Services & Cloud Computing and Scienti?c Applications — Big Data, Scalable Analytics, and Beyond.
  9. Ndibanje B., Lee H. J., and Lee S. G. Security analysis and improvements of authentication and access control in the internet of things. Sensors, 14(8):14786–14805, 2014.
  10. Ricardo Neisse, Gary Steri, Igor Nai Fovino, and Gianmarco Baldini. Seckit: A model-based security toolkit for the internet of things. Computers & Security, 54:60 – 76, 2015. Secure Information Reuse and Integration & Availability, Reliability and Security 2014.
  11. T. Bose, S. Bandyopadhyay, A. Ukil, A. Bhattacharyya, and A. Pal. Why not keep your personal data secure yet private in iot?: Our lightweight approach. In 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pages 1–6, April 2015.
  12. Ning YE, Yan Zhu, Ru-chuan WANG, Reza Malekian, and Lin Qiaomin. An ef?cient authentication and access control scheme for perception layer of internet of things. 8, 07 2014.
  13. Ran Canetti and Hugo Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Birgit P?tzmann, editor, Advances in Cryptology — EUROCRYPT 2001, pages 453–474, Berlin, Heidelberg, 2001. Springer Berlin Heidelberg.
  14. D. Dolev and A. C. Yao. On the security of public key protocols. In 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pages 350–357, 1981.
  15. Sjouke Mauw Cas Cremers. Operational Semantics and Veri?cation of Security Protocols. Springer-Verlag Berlin Heidelberg, 1 edition, 2012.

Downloads

Published

2015-10-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Shiv Poojan Yadav, " An analytical study of the utilization and appropriation of funds of Gorakhpur Kshetriya Gramin Bank, deposits and loans in the context of the period 1987 to 1998., International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 5, pp.509-522, September-October-2015.