CA Prashant Jain

total: 94 | displaying: 21 - 40

Knowledge Management- (A Tool For Managing Intellectual Excellence)

Knowledge refers to a person’s state of being with respect to some body of information. These states include ignorance, awareness, familiarity, understanding, facility and so on. Knowledge management comprises a range of strategies and practices used in an organization to identify, create, represent, distribute, and enable adoption of insights and experiences. Such insights and experiences comprise knowledge, either embodied in individuals or embedded in organizational processes or practice. ... Read more

Impact Of Information Technology On Employee Retention In Today’s Competitive Business Environment

In today’s business environment the explosion of Information technology has completely Transformed the structure of the organizations. But to retain the valuable employees is one of the biggest problems now-a-days. This paper focuses on the aspects of Information Technology and employee retention strategies and polices in assisting managers for achieving its objectives towards managing the employee retention by utilizing survey data drawn from various government and private departments, and to remain competitive in this area. ... Read more

Data Mining Problem Solving Algorithms & Their Comparative Study

This paper presents the comparison schemes between mining algos identified by the IEEE International Conference on Data Mining (ICDM), are : C4.5, k-Means, Apriori, FP growth, Page Rank, Ada Boost, kNN, and CART. These algos are among the most influential data mining algorithms in the research community. With each algorithm, we provide a description of the algorithm, comparison between these algos, discuss the impact of the algorithm, and review current and further research on the algos. These algorithms cover classification. ... Read more

A Comprehensive Approach On Grid Computing

Today we are in the Internet world and everyone prefers to enjoy fast access to the Internet. But due to multiple downloading, there is a chance that the system hangs up or slows down the performance that leads to the restarting of the entire process from the beginning. This is one of the serious problems that need the attention of the researchers.So we have taken this problem for our research and in this paper we are providing a layout for implementing our proposed Grid Model that can access the Internet very fast. By using our Grid we can easily download any number of files very fast depending on the number of systems employed in the Grid. We have used the concept of Grid Computing for this purpose. ... Read more

Software Security: An Emerging Problem In Software Engineering

The objective of this research paper is to discuss the software security as a problem in software engineering. The solution of this problem leads to the new constructive approach to the modeling, specification and analysis of application specific security requirements. The approach is based on a framework we developed before for generating and resolving obstacles to requirements achievement. Our framework intentional obstacles set up by attackers to break security goals. Attack tree are derived systematically through anti-goal refinement until leaf nodes are reached that are software vulnerabilities observable by the attacker or anti-requirements implementable by this attacker. New security requirements are then obtained as countermeasures by application of threat resolution operators to the anti requirements and vulnerabilities revealed by the analysis. The paper also introduces formal epistemic specification constructs and patterns that may be used to support a formal derivation and analysis process. The method is illustrated on a web-based system for which subtle attacks have been reported recently. ... Read more

Simulating Using Ns-2

1. Introduction: ns-2 is called event simulator because ns-2 simulator has list of events. Process includes beginning of event and run it until it is ... Read more

Network Simulation Using Nctuns

1. Introduction: Network simulator is software which is very helpful tool to develop, test, and diagnose any network protocol. To implement any kind of network ... Read more

E-Commerce, Its Impact & Trends & Opportunities On Supply Chain Management

1. Introduction:  Electronic commerce, commonly known as (electronic marketing), e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems ... Read more

Applying Knowledge Management (KM) for Sustainable Business Education

1. Introduction: Today, Business Education system is under great pressure from industry (society), to deliver finished products (graduates and postgraduates), from its system so as ... Read more

Emerging Paradigms of DNA Based Computation

1. Introduction: DNA computing is a novel technology that seeks to capitalize on the enormous informational capacity of DNA, biological molecules that can store huge ... Read more

Software Professionals Use Object Oriented Data Modeling Instead Of Traditional Relational Data Modeling

The purpose of this paper is to explain why object oriented data modeling is more popular than relational data modeling. A data model is a logic organization of the real world objects (entities),, constraints on them, and the relationships among objects. Relational model is very simple since data in represented in the form of relations that are depicted by use of two-dimensional tables. Rows in the table represent records and Columns represent attributes of the entity. The basic concept in the relational model is that of a relation. In object-oriented model main construct is an object. As in relational model, there are relations similarly we have objects in OO data modeling. So first thing in OO model is to identify the objects for the systems. Examining the problem statement can do it. Other important task is to identify the various operations for these objects. It is easy to relate the objects to the real world entity. The object-oriented approach has proved to be especially fruitful in application areas, such as the design of geographical information systems which have a richly structured knowledge domain and are associated with multimedia databases.Relational data modeling is different from Object Oriented data modeling because it focuses solely on data while object oriented data models focuses on both the behavior and data aspects of your domain. OODBMS are faster than relational DBMS because data isn’t stored in relational rows and columns but as objects. Objects have a many to many relationship and are accessed by the use of pointers. ... Read more

Evolution Computing Approach To Exploit User Navigational Path Applying Dynamic Prediction

Since 1991 WWW (World Wide Web), concept becomes more popular. It increases use of internet as well as internet users. The wide users’ access information leads us to improve well known strategies for web pre fetching, dynamic user modeling and site customizations to provide or access better performance in internet URL surfing. This paper presents new method to exploit user navigational path behavior to predict, in real-time, future requests. Real time user adaptation avoids the use of statistical techniques on websites or URL logs by adopting the predictive user model. Our new mode adopted from Finite State Machine formalism together with Genetic Algorithm which evolves a population for the same. ... Read more

Schematize Trust Overlays & Management In Mobile Computing

Mobility leads to unplanned interactions between computer systems or mobile devices, as people use devices to access services in varied environments. Before two or more systems ready to interact, they must trust that each will satisfy the security and privacy requirements of the other. In this paper we introduce trust overlays, a systematic approach to build such trust in Mobile computing world. Our solution exploits the increasing availability of trusted computing hardware on commodity systems, including portable computers. We report that key pieces of these solutions are coming into a place, as systems that provide distributed mandatory access control. We also point out that tremendous challenges remain, such as how to set compatible security policies across administrative domains. ... Read more

Knowledge Management: A Tool For An Efficient Organization

The paper takes an in-depth look at knowledge management, a comparatively new business concept that is attracting the consideration of informed and global-oriented companies because of its promise to introduce new rudiments of flexibility and efficiency in the entire business spectrum - from management, plant and production to front line activities. This paper explains how knowledge management benefits businesses and the business community. It discusses how the need for active knowledge management in numerous companies is understood and acknowledged. The paper studies that how often, in practice, this understanding is misconstrued to a false belief that sophisticated and expensive information technology (IT), suffices for good knowledge management. It looks at the requirements of knowledge management and the role played by business intelligence in knowledge management. Further, the differences between organizations' actual and perceived success in knowledge management are discussed. The paper further examines how success, deemed as a firm's ability to generate sustainable growth and profits, is determined not only by knowledge management but intricately linked to the humans who seek straight forward business solutions and constructively counter challenges. ... Read more

It As Catalyst For Growth For Smes In India: With Special Reference To Cloud Computing And SAAS Model

Introduction: Today, India has adapted to the growing knowledge orientation in each industry and would certainly be a leader in the R&D for many industry ... Read more

Review of Wap 1.0 And Wap 2.0 Protocol For Wireless Communication

With the growth of internet, internet application and mobile communication, demand for internet services for mobile devices like laptops, cellular mobiles and wireless devices has been increased. But the challenge is to provide internet content and advanced data services to wireless phones and other wireless terminals that work across all wireless network technologies. WAP (Wireless Application Protocol), is the solution developed by the WAP forum to the problem. WAP is an open international standard which not only responsible for the presentation and delivery of wireless information and telephony services on mobile phones and other wireless terminals in wireless communication environment but also create content and application that scale across wide range of wireless bearer networks and device types, also extend existing standards and technology whenever possible and appropriate. This paper review WAP protocol version 1.0 and 2.0 and discuss the basic architecture, features and services provided by these versions. ... Read more

Survey Of E-Commerce Security Measurement And Risk Analysis

With the hasty development of E- commerce, Security, issues are arising from people’s attention. Electronic commerce services have risen to become more and more well-liked and web environment. Exchange security on network is very important for e-commerce services and it is always the key factor that affects the accomplishment of electronic commerce (e-commerce), In detail two kind of risk analysis methods of the e-commerce security which gauge and assess the e-commerce security risk. And then the risk management strategies of e-commerce security of the e-commerce are addressed. In the end it is pointed out that the study of the risk analysis methods and the management strategies provides an available security framework. This paper present risk analysis measurement and approach for e-commerce. This paper also covers security issues in commercial activities. ... Read more

A Case Study: Security Issues In Mobile Ad Hoc Network

A Mobile Ad Hoc Network (MANET), is a self-organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Security problems in MANETs have received much attention in the last few years. Most research efforts have been focused on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion detection and response etc. There are several security issues in Mobile Ad Hoc Network having their own advantages and disadvantages. In this paper, we review some security issues in MANET as well as their current solutions. ... Read more

Network & Information Security

The terms network security and information security are often used interchangeably. Network security is generally taken as providing protection at the boundaries of an organization by keeping out intruders (crackers), Information security, however, explicitly focuses on protecting data resources from malware attack or simple mistakes by people within an organization by use of data loss prevention (DLP), techniques. Much attention has been focused on the security aspects of existing Wi-Fi (IEEE 802.11), Wireless LAN system. Pit flaws of WEP (wired equivalent privacy), are covered in this paper. And ORiNOCO and WPA (Wi-Fi protected access), solution are also discussed in that. ... Read more

total: 94 | displaying: 21 - 40