CA Prashant Jain

total: 227 | displaying: 21 - 40

Schematize Trust Overlays & Management In Mobile Computing

Mobility leads to unplanned interactions between computer systems or mobile devices, as people use devices to access services in varied environments. Before two or more systems ready to interact, they must trust that each will satisfy the security and privacy requirements of the other. In this paper we introduce trust overlays, a systematic approach to build such trust in Mobile computing world. Our solution exploits the increasing availability of trusted computing hardware on commodity systems, including portable computers. We report that key pieces of these solutions are coming into a place, as systems that provide distributed mandatory access control. We also point out that tremendous challenges remain, such as how to set compatible security policies across administrative domains. ... Read more

Knowledge Management: A Tool For An Efficient Organization

The paper takes an in-depth look at knowledge management, a comparatively new business concept that is attracting the consideration of informed and global-oriented companies because of its promise to introduce new rudiments of flexibility and efficiency in the entire business spectrum - from management, plant and production to front line activities. This paper explains how knowledge management benefits businesses and the business community. It discusses how the need for active knowledge management in numerous companies is understood and acknowledged. The paper studies that how often, in practice, this understanding is misconstrued to a false belief that sophisticated and expensive information technology (IT) suffices for good knowledge management. It looks at the requirements of knowledge management and the role played by business intelligence in knowledge management. Further, the differences between organizations' actual and perceived success in knowledge management are discussed. The paper further examines how success, deemed as a firm's ability to generate sustainable growth and profits, is determined not only by knowledge management but intricately linked to the humans who seek straight forward business solutions and constructively counter challenges. ... Read more

It As Catalyst For Growth for Smes In India: With Special Reference to Cloud Computing and SAAS Model

Introduction: Today, India has adapted to the growing knowledge orientation in each industry and would certainly be a leader in the R&D for many industry ... Read more

Review of Wap 1.0 And Wap 2.0 Protocol for Wireless Communication

With the growth of internet, internet application and mobile communication, demand for internet services for mobile devices like laptops, cellular mobiles and wireless devices has been increased. But the challenge is to provide internet content and advanced data services to wireless phones and other wireless terminals that work across all wireless network technologies. WAP (Wireless Application Protocol) is the solution developed by the WAP forum to the problem. WAP is an open international standard which not only responsible for the presentation and delivery of wireless information and telephony services on mobile phones and other wireless terminals in wireless communication environment but also create content and application that scale across wide range of wireless bearer networks and device types, also extend existing standards and technology whenever possible and appropriate. This paper review WAP protocol version 1.0 and 2.0 and discuss the basic architecture, features and services provided by these versions ... Read more

Survey Of E-Commerce Security Measurement And Risk Analysis

With the hasty development of E- commerce, Security, issues are arising from people’s attention. Electronic commerce services have risen to become more and more well-liked and web environment. Exchange security on network is very important for e-commerce services and it is always the key factor that affects the accomplishment of electronic commerce (e-commerce). In detail two kind of risk analysis methods of the e-commerce security which gauge and assess the e-commerce security risk. And then the risk management strategies of e-commerce security of the e-commerce are addressed. In the end it is pointed out that the study of the risk analysis methods and the management strategies provides an available security framework. This paper present risk analysis measurement and approach for e-commerce. This paper also covers security issues in commercial activities. ... Read more

A Case Study: Security Issues In Mobile Ad Hoc Network

A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Security problems in MANETs have received much attention in the last few years. Most research efforts have been focused on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion detection and response etc. There are several security issues in Mobile Ad Hoc Network having their own advantages and disadvantages. In this paper, we review some security issues in MANET as well as their current solutions. ... Read more

Network & Information Security

The terms network security and information security are often used interchangeably. Network security is generally taken as providing protection at the boundaries of an organization by keeping out intruders (crackers). Information security, however, explicitly focuses on protecting data resources from malware attack or simple mistakes by people within an organization by use of data loss prevention (DLP) techniques. Much attention has been focused on the security aspects of existing Wi-Fi (IEEE 802.11) Wireless LAN system. Pit flaws of WEP (wired equivalent privacy) are covered in this paper. And ORiNOCO and WPA (Wi-Fi protected access) solution are also discussed in that. ... Read more

Changing Facets Of E-Commerce: With Special Reference To Travel And Tourism Industry

Tourism has become the world’s largest industry as international travel has emerged as a major revenue generating industry for many countries. In order to pull travelers to a certain destination, it is essential to understand peoples’ destination selection processes, in which they discriminate and choose a single destination from a larger initial choice set. E-commerce is bringing new business opportunities to the global travel and tourism industry. Tourism-related institutions and Internet companies are joining hands to unleash the potential market created by e-commerce. With penetration of e-commerce in the travel and tourism industry, the sector identifies a number of consistent customer experiences across different channels and involves both international as well as domestic travel in emerging economies. The travel and tourism industry is a worldwide industry, the global character, both from the demand as well as supply side represents one of its dominant features as well as challenges for IT and its applications. The present paper is an attempt to through light on the changing facets of E-commerce and how it has had an impact on various dimensions of travel and tourism industry. With new developments in information technology the past has taught that consumers change behaviors in relationship to travel and tourism planning, reservations, and purchasing. The success of a travel or tourism business is largely dependent on how well they make use of the technology that is available and developing. ... Read more

Knowledge Management: Issues And Challenges

It is very difficult to define knowledge Management in a few sentence or in few word when it is itself is a treasure of all enriched and lavish thought which if starting pouring cannot have the sufficient model or the space to refine the elements of Knowledge management. The dynamics of the knowledge management is different in each one’s life and it varies with age, sex, race, profession, need etc. The nature of Knowledge Management and ways of imparting Knowledge Management is new wave, which has regained from the birth of its ambitious theme of today. The algorithmic approach and rich nation entity has loosened its wall and flown in all direction to enrich all the nations of god gifted pie of land. The Knowledge Management system in the world has the objective of creating intellectual awareness of trends and growth of our economics, social, political and cultural activities and their ethos. Knowledge Management is regarded as a corporate cost savings process to enhance performance capabilities with broader availability and utilization of major corporate knowledge assets. This paper is an attempt to study the issues and challenges that are interwoven with knowledge management. ... Read more

Privacy Preserving Issues In Datamining

This paper talks about threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases and paper addresses the issue of privacy preserving data mining. Specifically, it considers a scenario in which two parties owning confidential databases wish to run a data-mining algorithm on the union of their databases, without revealing any unnecessary information. The above problem is a specific example of secure multi-party computation and assuch, can be solved using known generic protocols. Privacy preserving mining of distributed data has numerous applications. Paper suggests that the solution to this is a tool-kit of components that can becombined for specific privacy preserving data mining applications. Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that non-trusting parties could jointly compute functions of their different inputs while ensuring that no party learns anything but the defined output of the function. ... Read more

A General Comparison Of FFT Algorithms

A large number of FFT algorithms have been developed over the years, notably the Radix-2, Radix-4, Split- Radix, Fast Hartley Transform (FHT), Quick Fourier Transform (QFT), and the Decimation-in-Time-Frequency (DITF) algorithms. How these algorithms fare in comparison with each other is of considerable interest to developers of signal processing technology. In this paper, we present a general analysis and comparison of the aforementioned algorithms. The analysis of each algorithm includes the number of mathematical operations, computation time and memory requirements. The results indicate that the FHT is the overall best algorithm on all platforms, offering the fastest execution time and requiring reasonably small amounts of memory ... Read more

E-Learning: A Tool For Customer Satisfaction And Dissatisfaction

The prevalent usage of computer technology in today’s society has enabled the customers to access much more information than ever before. Computers have been recognized as not only a powerful technology for managing information and enhancing productivity, but also an efficient tool for education and training. E-learning has become a new paradigm and a new philosophy in education with a mission to serve as a development platform for present-day society based on knowledge. Schools, colleges and business spend a great amount of money on computer-based education and training each year in order to remain in the competitive environment and also to retain the customers. E- learning offers tremendous opportunities for acquiring knowledge and skills that are as good as offered in the traditional classrooms. In spite of this e-learning courses initiation and completion rate, e-education has not yet conquered the hearts of learners and is still in an infancy stage. Though e-learning is considered to be very attractive as a new learning paradigm it has been observed that having e-learning on the agenda the Indian customer is still facing a lot of problems in this field. E-learning is a relatively new field of research. Even though the use of technologies for learning has been implemented for several decades, the introduction of the Internet has promoted a considerable shift and innovation. The present study focuses on the use and impact of e- learning in the satisfaction or dissatisfaction of customers. The study is carried out on the college youth because it is such a segment which is using the internet maximally for surfing and educational purposes. Convenience sampling technique will be applied for data collection. The questionnaire will be comprised of the various factors that a student looks for in case of e-learning which ultimately leads to satisfaction or dissatisfaction among them. The data is analyzed by using ANOVA. ... Read more

Cloud Computing: A Delicate Balance Of Risk And Benefit

Cloud computing technology is enabling IT to do more with the infrastructure that already exists, as well as adding new ways to expand capacity quickly and economically by using external cloud computing resources. This technology is enabling IT managers to treat infrastructure as a common substrate on which they can provision services to users faster in a much more flexible and cost-effective way –without having to re-design or add to the underlying infrastructure. Given the benefits of cloud computing, its broad appeal is not surprising. However, this new approach does raise some concerns. Chief among them is securing data in the cloud. This paper, will briefly review the basic fundamentals of cloud computing and describe how virtualization and the Cloud initiative are enabling enterprises to move toward a flexible, federated computing model with a cohesive mix of private external and internal cloud environments. It then discusses the risk and benefits of cloud computing. Area to be discuss in this paper: 1. Introduction 2. Fundamentals of Cloud Computing 3. Types of Cloud computing 4. Risk and Benefits of Cloud Computing 5. Conclusion ... Read more

Distributed Remote Architectures Neural Base Mining

An emerging trend in the Signal and Image Processing (SIP) community is the appearance of middleware and middleware standards that can be readily exploited for distributed computing applications by the SIP community. High performance computing and High Performance Embedded Computing (HPEC) applications will benefit significantly from highly efficient & portable computational middleware for signal & image processing. Open middleware standards such as VSIPL, MPI, CORBA, encoding and SOAP –based messaging protocols. More specifically, we will be focused on the appropriate use of such technologies for implementing new SIP applications, or extending legacy applications through the use of these technologies. The three middleware standards we have selected all have certain commonalities. All are based around the concept of a client application using the services available on a remote machine, or server. A remote executable object that implements one or more exposed interfaces provides these services. The object’s interface represents a contract between the client and the server. This interface is written as a Java interface for Java RMI, in IDL for CORBA, and in WSDL for web services. In the latter two cases, the more generic descriptions can be translated intospecific language imp lementations, ... Read more

Cyber Crime And Its Implications

The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal or destroy valuable information. Crime is a social and economic phenomenon and is as old as the human society. As, Life is about a mix of good and evil, so is the Internet. For all the good it does to us, cyberspace has its dark sides too The idea of Cyber crime is not new, yet there is significant confusion amongst academics, computer security experts and users as to the extent of real Cyber crimes. In this paper, we explore the breadth of computer-based crime, providing a definition of the emerging terms “Cyber crimes”. In this paper we will try discuss almost every aspect of cyber crime, like meaning then we divide Cyber crime into three distinct categories: Type I Cyber crimes against persons. Type II Cyber crimes against property. Type III Cyber crimes against government. We are describing its classification and explain the Law of cyber crime. And explain the REASONS of cyber crime and who the cyber criminal is and how to prevent from this crime then we use some case studies to illustrate the role different types of Cyber crime, and offer some observations on the role of cognition in the process of Cyber crime. Finally we provide several suggestions for future work in the area of Cyber Crime. ... Read more

Model Driven Architecture (MDA)

The Model Driven Architecture (MDA) separates the system business aspects from the system implementation aspects on a specific technology platform. MDA proposes a software development process in which the key notions are models and model transformation, where the input models are platform independent and the output models are platform specific and can be transformed into a format that is executable. The principles of MDA for the task of study program development are applied using two hemispheres model driven (2HMD) approach, which assumes modeling and use of procedural and conceptual knowledge and may be applied in the context of modeling the knowledge about the domain. From the point of view of 2HMD approach each course of the study program may be considered as a knowledge provider, which satisfies particular knowledge requirements. The particular “Specific” knowledge requirements are derived from the knowledge model that consists of functional and conceptual “hemispheres”, which reflect knowledge derived from original academic or industrial requirements or standards. ... Read more

Grid Computing : A Virtual Organization

It is a great challenge for the scientific community to provide information online with low prices in this era of competition. In today’s world computer users are globally located. The grid is essentially a heterogeneous collection of computational and storage resources, thereby leading to many related challenges. These challenges require dealing with diversity in the terms of local resources, dynamic nature of the local resources, creation and management of services and maintaining the Quality of Service (QoS). Since grid is inherently a parallel and distributed system, the key issues regarding design of the grid, data locality and availability, implementation, scalability, anatomy, privacy, maintenance, fault tolerance, security, etc come into picture and need to be addressed. These issues demand new technical approaches for the grid environment. ... Read more

A Study Of Initial Public Offer Market (IPO) In India.

Introduction: In recent years Initial Public Offerings (IPOs) have increased tremendously. IPOs provide an easy way to increase initial investor’s wealth and to raise cash ... Read more

total: 227 | displaying: 21 - 40