An Empirical Study on the Powerloom Entrepreneurs Expectations towards the Enhancement of Business Ecosystem with Special Reference to Tamilnadu
DOI:
https://doi.org/10.61841/yxqfen71Keywords:
Powerloom Entrepreneurs, Business Ecosystem, Primary DataAbstract
The power loom sector is ultimately a labor-focused sector. It offers large-scale employment prospects to the societies there by helping in solving the unemployment problem successfully. The power loom units are usually located in semi-urban and rural zones and support altering the regional inequities. It has empowered the weaker segments of society to earn their livelihood. In the present study, we collected systematically both extensive primary and reliable secondary data. For collecting primary data, convenience sampling technique was used in the study area through a structured questionnaire. The expectation of support from the government for rehabilitating the powerloom industry and the opinion regarding the scope of growth and development in the powerloom sector in the near future, etc., were also collected. The total sample size of 500 respondents was approached in Erode, Karur, and Salem districts. The total populations of the power loom entrepreneurs are not available since more entrepreneurs have not registered themselves with proper authority for doing the power loom business. The non-availability of the total population made the researcher adopt a non-probability sampling method. Under this convenience, sampling techniques were used to collect the primary data.
Downloads
References
[1] Hemang Shangvi, “Need to modernize powerloom sector”, Textile Magazine, P.30, July 2005
[2] Manivannan L., Saravanaraj M.G., Gopan R., and Manivannan C., “Strategic Approach to Power Loom
Business: An Empirical Evaluation”, The ICFAI Journal of Business Strategy, Vol. IV, No. 4, 2007.
[3] Arun N. Jariwala, “Powerloom Sector of India: A SWOT Analysis," Textile Review, Vol. 2, Issue 6, P. 7.
June 2007.
[4] Hoa, N.T., & Voznak, M. (2019). High Speed and Reliable Double Edge Triggered D-Flip for
Memory Applications. Journal of VLSI Circuits and Systems, 1(1), 13-17.
[5] Shamim, F.M. & Vishwakarma, S. (2016). Exploiting the Motion Learning Paradigm for Recognizing
Human Actions. Bonfring International Journal of Advances in Image Processing, 6(3), 11-16.
[6] Kumar, K.A., Sadulla, S., & A. Surendar (2018). Statistical Analysis of Reliable and Secure Transmission
Gate-based Arbiter Physical Unclonable Functions (PUFs). Journal of Computing Information Systems,
14(3), 62-69.
[7] Puliyath, S. (2014). Advanced Secure Scan Design against Scan-Based Differential Cryptanalysis.
International Journal of Advances in Engineering and Emerging Technology, 5(6), 274-279.
[8] Rinesh, S., and Jagadeesan, S. (2014). Detection and Localization of Multiple Spoofing Attackers in
Wireless Networks. Excel International Journal of Technology, Engineering, and Management, 1(1), 17-20.
[9] Sadish Kumar S.T., & Kasthuri N. (2014). Determination of epileptic disorder with discrete wavelet
transforms and neural network classifier. Journal of Computer Science 10(1).
[10] Thilagamani S. & Shanthi N. (2014). Gaussian and Gabor filter approaches for object segmentation. 2013
International Conference on Optical Imaging Sensor and Security, ICOSS 2013.
[11] Jothilakshmi, R., Shanthi, N., & Babisaraswathi, R. (2013). An approach for semantic query expansion
Based on the maximum entropy-hidden Markov model. In 2013 Fourth International Conference on Computing,
Communications and Networking Technologies (ICCCNT) (pp. 1-5). IEEE.
[12] Sadagoban K., Tamizhchelvan M., Gopalakrishnan S., & Gopalakrishnan S. (2015). Information gathering
practices of engineering faculty members: An emphirical study. International Journal of Applied
Engineering Research 10(3):6389-6404.
[13] Kanchana A. & Arumugam S. (2015). Diffie-Hellman-merkle longer key usage on minutiae, orientation,
and density-based palmprint pattern matching. International Journal of Applied Engineering Research
10(3):6833-6850.
[14] Murthi M.K., Nithiyanandam S., Srinivasan P.S., Sivakumar D., Ashok T. (2015). The effect of karanja oil
and its blend with additives on performance and emissions from a diesel engine. International Journal of
Applied Engineering Research 10(1):59-68.
[15] Sureshkumar T. & Shanthi N. (2015). LVC-D: A technique to extract web page data using layout, visual and
content-based features. International Journal of Applied Engineering Research 10(2):2465-2481.
[16] Usha, Arumugam (2016). Detection of calcification in mammograms using the nearest neighbour algorithm.
IIOAB Journal, 7(9).
[17] Bennet A., Sankaranarayanan, Kandasamy R., Rathna, Jaishreebai, Nalini.(2016). Investigation of audio
signals watermarking using empirical mode decomposition. IIOAB Journal, 7(9).
[18] Bennet A., Kandasamy R., Sankaranarayanan, Nandhini, Meena, Alamelu.(2016). Performance &
analysis automation of medical reimbursement for BSNL. IIOAB Journal, 7(9).
[19] Kalyanasundaram P., Gnanasekaran T. (2016). A noval method for optimizing maximal lifetime coverage
(OMLC) scheduling of nodes in wireless sensor networks. IIOAB Journal, 7(9).
[20] Chandravathi C., Somasundaram K., Kandasamy R., Velmurugan J. (2016). Implementation of kerberos
based authenticated key exchange protocol for parallel network file systems in the cloud. IIOAB Journal, 7(9).
[21] Jagan K., Sivasankaran S., Bhuvaneswari M., Rajan S. (2018). Effect of thermal radiation and slip on
unsteady 3D MHD nanofluid flow over a non-linear stretching sheet in a porous medium with convective
boundary condition. Journal of Physics: Conference Series, 1139(1).
[22] Jamuna P., Ramesh S. (2018). Experimental Validation of Impedance Source Network Based Active Power
Filter for Interconnection of PV System into Grid. Journal of Circuits, Systems, and Computers, 27(14).
[23] Kumar S.S., Karthick M. (2018). An Secured Data Transmission in Manet Networks with Optimizing Link
State Routing Protocol Using ACO-CBRP Protocols. ICSNS 2018: Proceedings of IEEE International
Conference on Soft Computing and Network Security.
[24] Rameshkumar, T., Rajendran, I., & Latha, A. D. (2010). Investigation on the mechanical and tribological
properties of aluminium-tin-based plain bearing material. Tribology in industry, 32(2), 3-10.
[25] E. Latha Mercy, R. Karthick, and S. Arumugam (2010). Fuzzy Controlled Shunt Active Power Filter for
Power Quality Improvement. International Journal of Soft Computing, 5(2), 35-41.
[26] Sivasankaran, S., Sivakumar, V., & Prakash, P. (2010). Numerical study on mixed convection in a lid-driven
cavity with non-uniform heating on both sidewalls. International journal of heat and mass transfer, 53(19-
20), 4304-4315.
[27] Kavitha, S., Karthikeyan, S., & Duraiswamy, K. (2010, July). Early detection of glaucoma in retinal images
using cup to disc ratio. In 2010, the Second International conference on Computing, Communication and
Networking Technologies (pp. 1-5). IEEE.
[28] Sengottaiyan, N., Somasundaram, R., & Arumugam, S. (2010, October). A modified approach for measuring
TCP performance in a wireless adhoc network. In 2010 International Conference on Advances in Recent
Technologies in Communication and Computing (pp. 267-270). IEEE.
[29] Ravi, S., & Balakrishnan, P. A. (2010, October). Modelling and control of an anfis temperature controller for
plastic extrusion process. In International Conference on Communication Control and Computing
Technologies (pp. 314-320). IEEE.
[30] Senthilkumar, J., Chandrasekaran, M., Suresh, Y., Arumugam, S., & Mohanraj, V. (2011). Advertisement
timeout-driven bee's mating approach to maintain fair energy levels in sensor networks. Applied Soft
Computing, 11(5), 4029-4035.
[31] Peter, K. J., Glory, G. G. S., Arguman, S., Nagarajan, G., Devi, V. S., & Kanan, K. S. (2011, April).
Improving ATM security via face recognition. In 3rd International Conference on Electronics Computer
Technology (Vol. 6, pp. 373-376). IEEE.
[32] Samikannu, R., & Poonamallie, B. A. (2011). Design of synthetic optimizing neuro fuzzy temperature
controller for dual screw profile plastic extruder using LabView. Journal of Computer Science, 7(5), 671-677.
[33] Kavitha, S., & Duraiswamy, K. (2011). Adaptive neuro-fuzzy inference system approach for the automatic
screening of diabetic retinopathy in fundus images.
[34] Ravi, S., Sudha, M., & Balakrishnan, P. A. (2011). Design of intelligent self-tuning GA ANFIS temperature
controller for plastic extrusion system. Modelling and Simulation in Engineering, 2011.
[35] AntoBennet, M. JacobRaglend. (2012), ‘A Novel Method Of Reduction Of Blocking Artifact Using Machine
Learning Metric Approach'. Journal of Applied Sciences Research, 8(5), 2429-2438.
[36] Senthilkumar, J., Chandrasekaran, M., Suresh, Y., Arumugam, S., & Mohanraj, V. (2011). Advertisement
timeout-driven bee's mating approach to maintain fair energy levels in sensor networks. Applied Soft
Computing, 11(5), 4029-4035.
[37] Karthikeswaran, D., Sudha, V. M., Suresh, V. M., & Sultan, A. J. (2012, March). A pattern-based
framework for privacy preservation through association rule mining. In IEEE-International Conference On
Advances in Engineering, Science, and Management (ICAESM-2012) (pp. 816-821). IEEE.
[38] Suresh, V. M., Karthikeswaran, D., Sudha, V. M., & Chandrasheker, D. M. (2012, March). Web server load
balancing using the SSL back-end forwarding method. In IEEE-International Conference On Advances In
Engineering, Science, and Management (ICAESM-2012) (pp. 822-827). IEEE.
[39] Bennet, M. A., & Ragglend, I. J. (2012). Performance, Analysis of Filtering Schedule Using Deblocking Filter
for the reduction of block artifacts from MPEQ compressed document images.
[40] Vijayakumar, J., & Arumugam, S. (2013, October). Certain investigations on foot rot disease for betelvine
plants using digital imaging techniques. In 2013 International Conference on Emerging Trends in
Communication, Control, Signal Processing, and Computing Applications (C2SPCA) (pp. 1-4). IEEE.
[41] Gnanasaravanan, S., & Rajkumar, P. (2013). Characterization of minerals in natural and manufactured sand
in the Cauvery River belt, Tamil Nadu, India. Infrared Physics & Technology, 58, 21-31.
[42] Kumar, T. S., & Sampath, V. R. (2013). Prediction of dimensional properties of weft knitted cardigan fabric
by artificial neural network systems. Journal of Industrial Textiles, 42(4), 446-458.
[43] AntoBennet M., Jacob Raglend I. (2013). Performance and analysis of compression artifact reduction for
Mpeq-2 moving pictures using TV regularization method. Life Science Journal, 10(2):102-110.
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.