CA Prashant Jain

total: 227 | displaying: 181 - 200

Timely Computing Base Transaction in DBMS

Current database systems are very often based on large scale, unpredictable and unreliable infrastructures. On-time data management is becoming a key difficulty faced by the information infrastructure of most organizations. In fact, database applications for critical areas are increasingly giving more importance to the timely execution of transactions. Database applications with timeliness requirements have to deal with the possible occurrence of timing failures, when the operations specified in the transaction do not complete within the expected deadlines. In spite of the importance of timeliness requirements in database applications, typical commercial DBMS do not assure any temporal properties, not even the detection of the cases when the transaction takes longer than the expected/desired time. In this paper, we propose an architectural construct and programming model, which address this problem. We assume the existence of a component that is capable of executing timely functions, however asynchronous the rest of the system may be also we discusses the problem of timing failure detection in database applications and proposes a transaction programming approach to help developers in programming database applications with time constraints.

Computational Intelligence: Study of Specialized Methodologies of Soft Computing in Bioinformatics

Soft Computing, the study of specialized methodologies, has broad area in bioinformatics now a day. The study for soft computing has many standard methodologies than bioinformatics but none of them provides best method aspect. This leads to study of specialized methodologies of soft computing in bioinformatics. This paper provides a process to massively integrate the aspects and experiences in the different core subjects such as biology, medicine, computer science, engineering, chemistry, physics, and mathematics. Recently the use of soft computing tools for solving bioinformatics problems have been gaining the attention of researchers because of their ability to handle imprecision, uncertainty in large and complex search spaces.

Save-Energy VoIP over Wireless LANs

The key idea of saving energy of the wireless interface is to allow it to sleep as much as possible reducing the time spent in idle state. There is typically about one order of magnitude difference between the power consumption in the idle and sleep states. This is a difficult problem since the radio may not know when exactly it has to wake up to receive incoming packets and will lose them if it stays in the sleep state. A standardized solution to this issue is the Power Save Mode (PSM) which was introduced in the IEEE 802.11 standard for infrastructure WLANs. Emerging dual-mode phones incorporate a Wireless LAN (WLAN) interface along with the traditional cellular interface. The additional benefits of the WLAN interface are, however, likely to be outweighed by its greater rate of energy consumption. This is especially of concern when real-time applications that result in continuous traffic, are involved. WLAN radios typically conserve energy by staying in sleep mode. With real-time applications like Voice over Internet Protocol (VoIP), this can be challenging since packets delayed above a threshold are lost. Moreover, the continuous nature of traffic makes it difficult for the radio to stay in the lower power sleep mode enough to reduce energy consumption significantly. In this work, we propose the Green Call algorithm to derive sleep/ wake-up schedules for the WLAN radio to save energy during VoIP calls while ensuring that application quality is preserved within acceptable levels of users. We evaluate Green Call on commodity hardware and study its performance over diverse network paths and describe our experiences in the process. We further extensively investigate the effect of different application parameters on possible energy savings through trace-based simulations. We show that, in spite of the interactive, real-time nature of voice, energy consumption during calls can be reduced by close to 80 percent in most instances. Index Terms—Voice over IP (VoIP), wireless LANs, energy consumption, portable communication devices, Internet.

Intrusion Detection using k-mean Algorithm via Support Vector Machine

It is unrealistic to prevent security breaches completely using the existing security technologies. The intrusion detection plays an important role in network security. However, many current intrusion detection systems (IDSs) are signature-based systems. The signature based IDS also known as misuse detection looks for a specific signature to match, signaling an intrusion. Provided with the signatures or patterns, they can detect many or all known attack patterns, but they are of little use for as yet unknown attack methods. The rate of false positives is small to nil but these types of systems are poor at detecting new attacks, variations of known attacks or attacks that can be masked as normal behavior. Statistical-Based Intrusion Detection Systems (SBIDS) can alleviate many of the aforementioned pitfalls of a Signature Based IDS. Statistical-Based IDS perform better than signature based IDS for novelty detection. Novelty detection i.e. detection of new attack is very important for intrusion detection system. Researchers have evaluated various classification techniques for intrusion detection. This work evaluates support vector machine (SVM) based classifier over benchmark dataset. This dissertation explores non linear SVM both binary and multiclass over KDD 1999 dataset. The non linear SVM maps input feature to the feature space by using kernel function. In this dissertation the performance of SVM is evaluated using different kernel functions. This work also tries to find optimal kernel function using kernel width delimiter.

Writing Good Software Engineering Research Papers

Software engineering researchers solve problems of several different kinds. To do so, they produce several different kinds of results, and they should develop appropriate evidence to validate these results. They often report their research in conference papers. I analyzed the Abstracts of research papers submitted to ICSE 2002 in order to identify the types of research reported in the submitted and accepted papers, and I observed the program committee discussions about which papers to accept. This report presents the research paradigms of the papers, common concerns of the program committee, and statistics on success rates. This information should help researchers design better research projects and write papers that present their results to best advantage.

Re- Joining to Internet Analysis of User by Markov Chain Model

The need of internet is widely spread throughout the world. A large number of people are joining the user group everyday. Places where broadband facilities are not available, people are using dial-up based connectivity, especially in rural areas. This suffers from troubles of frequent non-connectivity and call-disconnectivity. A user leaves the computer terminal after multiple failure attempts of non-connectivity. Some hard-core and dedicated users of dial-up based connection re-join the attempt process after being away for time being. If re-joining has some probability then this needs to study intensively. This paper is an attempt to analyze the rejoining probability by using a Markov chain model over consumer behavior and internet traffic sharing.

Security Based Comparison of Relational and Object Oriented Distributed Database Model

In today environment Distributed database is mainly used by large organization for there striking features. When we develop a distributed database there are many features which may concern but the Security concerns is the main feature. When choosing between the object oriented Model and the relational model, many factors should be considered. The most important of these factors are single level and multilevel access controls, protection against inference, and maintenance of integrity etc. When determining which distributed database model will be more secure for a particular application, the decision should not be made purely on the basis of available security features. One should also question the efficiency of the delivery of these features. Do the features provided by the database model provide adequate security for the Intended application? Does the implementation of the security controls add an unacceptable amount of Computational overhead? In this paper, the security strengths and weaknesses of both database models and the Special problems found in the distributed environment are discussed.

Knowledge from the Web, Using Web Usage Mining

Web usage mining differs from collaborative filtering in the fact that we are not interested in explicitly discovering user profiles but rather usage profiles. When preprocessing a log file we do not concentrate on efficient identification of unique users but rather try to identify separate user sessions. Web usage mining is used to try to extract knowledge from the raw data available on the Web by organizing web pages in well defined structures or by looking into patterns of activities of Web users. Web usage mining can be used to support dynamic structural changes of a Web site in order to suit the active user to extract the knowledge from the web.

Knowledge from the Web, Using Web Usage Mining

Web usage mining differs from collaborative filtering in the fact that we are not interested in explicitly discovering user profiles but rather usage profiles. When preprocessing a log file we do not concentrate on efficient identification of unique users but rather try to identify separate user sessions. Web usage mining is used to try to extract knowledge from the raw data available on the Web by organizing web pages in well defined structures or by looking into patterns of activities of Web users. Web usage mining can be used to support dynamic structural changes of a Web site in order to suit the active user to extract the knowledge from the web.

E-Business Practices of Leading Company (Nestle)

Nestlé is a 135 years old, Switzerland-based company ranked as the world’s largest food producer. In some 70 countries around the globe, 230,000 people and just under 500 factories strive to bring 8,000 products to the world’s table. Some Important products of Nestle are Nescafe instant coffee, of course, but also Perrier bottled water, breakfast cereals including Cheerios, Kit Kat bars, Stouffer’s prepared meals, Buitoni pasta and Maggi cooking sauces. From his office at the company’s headquarters in Vevey, on the shores of Lake Geneva, Nestlé’s senior vice president of group information systems and logistics, Jean Claude Dispaux, occupies a place at the cutting edge of global business. It’s a place shaped by the combination of Nestlé’s worldwide scope and CEO Peter Brabeck-Letmathe’s commitment to an "e-revolution" to boost revenues and slash $3 billion from the cost base. Dispaux’s role calls for a firm, hands-on approach, experiencing for him how NestlŽ’s far-flung operations can play their part in consolidating and standardizing the food giant’s business processes to reach Brabeck-Letmathe’s goal. In recent years Nestlé India has focused steadily on improving operational efficiencies, gaining and implementing consumer insights, and increased efforts to ensure that Nestlé products are visible and conveniently available. Recognizing the need for a more flexible sales force capable of tapping emerging opportunities, the Company had earlier in the year restructured the sales organization. While the sales structure that was put in place is now stabilizing the Company has significantly, during the past one year, increased the outlets that retail its products. About this revolution Brabeck-Letmathe’s message, “the new regime seems to have been a case of steady-as-you-go for Dispaux”. In the job for almost 11 years, he’s fiercely proud of the progress that has been made in welding Nestlé’s widely scattered forces into a coherent whole. "Ten years ago, we had every spreadsheet and word processing program you’d ever heard of? Now there’s Microsoft Office," he says. "There was a time when you couldn’t send an e-mail from the U.S. to the U.K., and now you can send an e-mail from anywhere to anywhere." When he came into the job, he adds, an informal audit showed that Nestlé had around 140 different financial systems, now it’s down to a handful, and there will ultimately be only one, SAP. Improved technology has helped in the consolidation, but so have the impact of trade liberalization and the easing of Cold War tensions. "These days, my constituency is much more homogenous than it was 10 years ago," Dispaux says. "Then, there were countries such as India and Brazil into which you couldn’t import AS/400s, and the Eastern bloc was pretty much untouchable. Now, we deal with Russia like we do with Spain." In this paper we covered impact of Information Technology over the Company, its detailed functionalities, position in the market, business strategies followed in the perspective of FMCG industries, and some of the negative aspects of this company. Lastly we concluded with the revolutionizing affects of e-business strategies taken by the company, for better marketing opportunities.

Ethical Issues in Mergers and Acquisitions-A Case Study of Arcelor Mittal

In recent years cross- border mergers and acquisitions (henceforth, M&A) have increased in importance due to globalization, liberalization, technological development and intensely competitive business environment. They are the means to enter foreign markets, secure resources and increase global outreach. This process in extensively used for restructuring the business organization. The consequences of M & A can be an important ethical issue as the employees in such organization feel ethics-related pressures at nearly double the rate of other workers. Considering the ethical call and the size of people influenced by the waves of M & A, examining M & A from an ethical perspective has become a pressing issue. As a case study, this research paper has chosen the merger of Arcelor & Mittal Steel. Mittal Steel was the biggest producer of steel in the world and had bought Arcelor which was the leading producer in Europe. This merger happened in 2005 making Arcelor Mittal as the leading company that controls the steel sector in the world.

Distributed Context Switching in Complex Adaptive Systems

This paper aims to contribute to the tactical and operational decision making process of manufacturing and logistics operations by providing distributed context switching into modeling and simulation, based on complex adaptive systems (CAS). The research approach is theoretically based on CAS with agent-based modeling (ABM) as the implementation method. A case study is presented where an agent-based model has contributed to distributed context switching to increased understanding and precision in decision making by an agent in distributed environment.

New Advancement of Intelligent Business Management System to Enhance Data Mining Facets

Data mining or knowledge discovery refers to the process of finding interesting information in large repositories of data. The term data mining also refers to the step in the knowledge discovery process in which special algorithms are employed in hopes of identifying interesting patterns in the data. These interesting patterns are then analyzed yielding knowledge. The desired outcome of data mining activities is to discover knowledge that is not explicit in the data, and to put that knowledge to use. This paper contains study about data mining algorithms as a part of intelligent business management system and we are going to refer its implementation into different applications and areas.

Ethical Issues in Surrogate Advertisement & its Impact on Brand Building

Advertisements have a strong influence in our life. We like them because they provide information and create awareness about the market. Their significance in corporate world can not be underestimated. But many times, some advertisements are accused of misleading people. When such accusations are proved, some advertisements are scrapped off from media. Such instances have been reported in the advertisements endorsing alcoholic drinks, cigarettes & other tobacco products. These advertisements were opposed by a major section of the society. Hence the Government had imposed a ban on advertisements of these products in the media in the year 2002. As a reaction to the directive of Government, the liquor & tobacco majors sought other ways of endorsing their products. They have found an alternative path of advertising through which they can keep on reminding their liquor brands to their customers. They have introduced various other products with the same brand name. Launching new products with common brand name is known as brand extension, which can be carried out for related products (ex: Tata Salt and Tata Tea) or unrelated products (ex: Tata Tea and Tata Indica). Prima facie, there is nothing wrong with brand extension. The problem occurs when brand extension is carried out in response to the ban on advertisement of one product category. In this case, the companies launch other products with the same brand name for the purpose of reminding their old customers. Heavy advertising is done so that the customers do not forget their liquor & tobacco brands, for which advertisements are banned. The advertisements for such new products are placed under the category of "Surrogate Advertisements". Their only objective is to compensate the losses arising out of the ban on the advertisement of particular products. The research tries to study the ethical issues involved in surrogate advertisement and its effect on brand image. Primary Data for the purpose of research is collected through structured questionnaires. This method is used for collecting data from Advertising Companies & consumers in Nagpur city. The findings of this research will help in understanding the impact of surrogate advertisements on the brand.

What is Talent Management?

Rather than a one-time event, talent management is a continuous process that plans talent needs, builds an image to attract the very best, ensures that new hires are immediately productive, helps to retain the very best, and facilitates the continuous movement of talent to where it can have the most impact within the organization. The goal of the talent management process is to increase overall workforce productivity through the improved attraction, retention, and utilization of talent. The talent management strategy is superior not just because it focuses on productivity, but also because it is forward looking and proactive, which means that the organization is continuously seeking out talent and opportunities to better utilize that talent. It produces excellent results because it overcomes the major problem of traditional recruiting, which is isolation. It instead integrates the previously independent functions of recruiting, retention, workforce planning, employment branding, metrics, orientation and redeployment into a seamless process. Talent management involves individual and organizational development in response to a changing and complex operating environment. It includes the creation and maintenance of a supportive, people oriented organization culture Talent Management” has become one of the most important buzzwords in Corporate HR and Training today. So it is the duty of the HR department to nurture a brigade of talented workforce, which can win them the war in the business field. The talent has to be spotted, carefully nurtured and most importantly preserved. Right person for the right job - is the new mantra So it is the duty of the HR department to nurture a brigade of talented workforce, which can win them the war in the business field. The talent has to be spotted, carefully nurtured and most importantly preserved. Right person for the right job - is the new mantra

Supply Chain Management: A Review

Supply chain management is the oversight of materials, information, and finances as they move in a process from supplier to manufacturer to wholesaler to retailer to consumer. Supply chain management involves coordinating and integrating these flows both within and among companies. Supply chain management (SCM) is the management of a network of interconnected businesses involved in the ultimate provision of product and service packages required by end customers. Supply chain management spans all movement and storage of raw materials, work-in-process inventory, and finished goods from point of origin to point of consumption. Supply-chain management is the strategic, tactical, and operational decision making that optimizes supply-chain performance. The strategic level defines the supply chain network; that is, the selection of suppliers, transportation routes, manufacturing facilities, production levels, warehouses, and the like. The tactical level plans and schedules the supply chain to meet actual demand. The operational level executes plans. Tactical- and operational-level decision-making functions are distributed across the supply chain. The extent to which businesses engaged in global commerce adhere to labor and environmental standards is primarily an issue of national governance rather than supply chain management. In countries where laws governing anti-competitive business practices, environmental protection and labor standards are effectively enforced, companies can rely on government oversight to ensure that their suppliers are, at a minimum, in compliance with local law. However, in countries where such laws exist but are not effectively enforced the question of whether suppliers meet these legal requirements or not is much more difficult to determine. In the short term, business can help to address this situation through voluntary efforts and in partnership with governments and others.

Development of Logistic Management in Co-operative Sugar Industry of Maharashtra

The purpose of this Abstract is to examine the current status and development of the logistics management in co-operative sugar industries which in turn has enormous influence on other agricultural subsidiary industries. Based on the data obtained through in-depth interviews and secondary evidences, this paper will investigate logistic management of selected sugar industry located in Pune. The theme of the paper is empirically based. The rationale behind the selection of this research entity is that it is one that has undergone changes in the name of reforms but without much luck. The focus of this paper is on unveiling the logistic strategies that continue to plague the sugar logistic management followed by a list of suggestions and recommendations. The findings of the research paper are of importance and it is the hope of this paper to contribute positively in terms of suggestions which may be worth noting in development of sugar logistic management. To a certain extent, the results of this study may also have implications for similar sugar logistic management in other states of India.

Competition Issues in Electronic Goods Sector: Washing Machine Industry

The Indian Washing Machine industry is going through turbulent transformation. Companies are re-looking at their strategies and are desperate for growth. The entrenched position of the Indian market leaders in Washing Machines’ like Videocon, BPL and Onida has been challenged by the MNCs such as LG, Whirlpool, Samsung; some in a perceptible way and others threatening to do so. The changing environment demands fresh thinking to gain the cutting edge advantage. Exchange schemes, free gifts, price offs, prizes, deferred payment schemes and other incentives as promotional tools have been deployed by the players, which certainly have made the market, vibrant and pulsating. A major factor contributing to the growth has been availability of consumer financing schemes. Concomitantly, the industry has been witnessing a new scenario with a new market profile. The entry cost into this industry is substantially low. Thus, there is already a lot of competition in this sector and due to this, consumer is benefiting by not only getting the above benefits, but also world class products of high quality at reasonable prices. Due to this, washing machine is now a necessity of every house, whether in rural India or Urban India. This paper talks about the Washing Machine Industry in India, its market structure and challenges and opportunities it faces. The paper uses econometric techniques to deal with the issue of market concentration. Towards the end, a hypothetical situation is created where the major Korean MNCs, LG and Samsung get together and play in the market as a single entity. The paper analyses the reasons and results for this merger, and the economic theory and the competition issues emerging with this collaboration

The Risk Management Challenges Faced by Global Banks

The overwhelming top of mind –issue is regulatory uncertainty. The top risk management and control challenges faced today by the company leaders will be discussed elaborately later. The challenges which need to be discussed or which need a probe into are – • Dealing with regulatory uncertainty – Multiple regulatory proposals complicate planning as banks anticipate systemic reform • Anticipating new capital requirements – Stricter regulatory proposals are driving banks to reallocate capital , rebalance portfolios and rethink market strategies • Shifting the risk culture – Banks are strengthening their risk culture and governance processes with more senior management involvement and invigorated risk procedures • Navigating the Fluid economy – Uncertainty about the economy poses a challenge to long – term and short- term planning • Repairing the balance sheets – Many banks are still dealing with fallout from the economic crisis

total: 227 | displaying: 181 - 200