CA Prashant Jain

total: 94 | displaying: 41 - 60

Knowledge Management: Issues And Challenges

It is very difficult to define knowledge Management in a few sentence or in few word when it is itself is a treasure of all enriched and lavish thought which if starting pouring cannot have the sufficient model or the space to refine the elements of Knowledge management. The dynamics of the knowledge management is different in each one’s life and it varies with age, sex, race, profession, need etc. The nature of Knowledge Management and ways of imparting Knowledge Management is new wave, which has regained from the birth of its ambitious theme of today. The algorithmic approach and rich nation entity has loosened its wall and flown in all direction to enrich all the nations of god gifted pie of land. The Knowledge Management system in the world has the objective of creating intellectual awareness of trends and growth of our economics, social, political and cultural activities and their ethos. Knowledge Management is regarded as a corporate cost savings process to enhance performance capabilities with broader availability and utilization of major corporate knowledge assets. This paper is an attempt to study the issues and challenges that are interwoven with knowledge management. ... Read more

Privacy Preserving Issues In Datamining

This paper talks about threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases and paper addresses the issue of privacy preserving data mining. Specifically, it considers a scenario in which two parties owning confidential databases wish to run a data-mining algorithm on the union of their databases, without revealing any unnecessary information. The above problem is a specific example of secure multi-party computation and assuch, can be solved using known generic protocols. Privacy preserving mining of distributed data has numerous applications. Paper suggests that the solution to this is a tool-kit of components that can becombined for specific privacy preserving data mining applications. Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that non-trusting parties could jointly compute functions of their different inputs while ensuring that no party learns anything but the defined output of the function. ... Read more

A General Comparison Of FFT Algorithms

. Introduction: The first major breakthrough in implementation of Fast Fourier Transform (FFT), algorithms was the Cooley-Tukey [1] algorithm developed in the mid-1960s, which reduced ... Read more

E-Learning: A Tool For Customer Satisfaction And Dissatisfaction

The prevalent usage of computer technology in today’s society has enabled the customers to access much more information than ever before. Computers have been recognized as not only a powerful technology for managing information and enhancing productivity, but also an efficient tool for education and training. E-learning has become a new paradigm and a new philosophy in education with a mission to serve as a development platform for present-day society based on knowledge. Schools, colleges and business spend a great amount of money on computer-based education and training each year in order to remain in the competitive environment and also to retain the customers. E- learning offers tremendous opportunities for acquiring knowledge and skills that are as good as offered in the traditional classrooms. In spite of this e-learning courses initiation and completion rate, e-education has not yet conquered the hearts of learners and is still in an infancy stage. Though e-learning is considered to be very attractive as a new learning paradigm it has been observed that having e-learning on the agenda the Indian customer is still facing a lot of problems in this field. E-learning is a relatively new field of research. Even though the use of technologies for learning has been implemented for several decades, the introduction of the Internet has promoted a considerable shift and innovation. The present study focuses on the use and impact of e- learning in the satisfaction or dissatisfaction of customers. The study is carried out on the college youth because it is such a segment which is using the internet maximally for surfing and educational purposes. Convenience sampling technique will be applied for data collection. The questionnaire will be comprised of the various factors that a student looks for in case of e-learning which ultimately leads to satisfaction or dissatisfaction among them. The data is analyzed by using ANOVA. ... Read more

Distributed Remote Architectures Neural Base Mining

middleware and middleware standards that can be readily exploited for distributed computing applications by the SIP community. High performance computing and High Performance Embedded Computing (HPEC), applications will benefit significantly from highly efficient & portable computational middleware for signal & image processing. Open middleware standards such as VSIPL, MPI, CORBA, encoding and SOAP –based messaging protocols. More specifically, we will be focused on the appropriate use of such technologies for implementing new SIP applications, or extending legacy applications through the use of these technologies. The three middleware standards we have selected all have certain commonalities. All are based around the concept of a client application using the services available on a remote machine, or server. A remote executable object that implements one or more exposed interfaces provides these services. The object’s interface represents a contract between the client and the server. This interface is written as a Java interface for Java RMI, in IDL for CORBA, and in WSDL for web services. In the latter two cases, the more generic descriptions can be translated intospecific language imp lementations, ... Read more

P-Ram Algorithms And Data Structures For Sparse Linear Systems

e have studied the variations in the matrix elements through Gauss Elimination. We know that in Gauss elimination a nonzero position in position jk, implied that there was also a non zero position in kj, which would cause fill to occur in position i, j when row k was used to eliminate the element in position ik. This process may be performed in general by creating zeros in the first column, then the second and so forth. For k=1,2,...,n-1 we use the formulae ... Read more

Cyber Crime And Its Implications

The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal or destroy valuable information. Crime is a social and economic phenomenon and is as old as the human society. As, Life is about a mix of good and evil, so is the Internet. For all the good it does to us, cyberspace has its dark sides too The idea of Cyber crime is not new, yet there is significant confusion amongst academics, computer security experts and users as to the extent of real Cyber crimes. In this paper, we explore the breadth of computer-based crime, providing a definition of the emerging terms Cyber crimes. In this paper we will try discuss almost every aspect of cyber crime, like meaning then we divide Cyber crime into three distinct categories: Type I Cyber crimes against persons. Type II Cyber crimes against property. Type III Cyber crimes against government. We are describing its classification and explain the Law of cyber crime. And explain the REASONS of cyber crime and who the cyber criminal is and how to prevent from this crime then we use some case studies to illustrate the role different types of Cyber crime, and offer some observations on the role of cognition in the process of Cyber crime. Finally we provide several suggestions for future work in the area of Cyber Crime. ... Read more

Model Driven Architecture (MDA)

The Model Driven Architecture (MDA), separates the system business aspects from the system implementation aspects on a specific technology platform. MDA proposes a software development process in which the key notions are models and model transformation, where the input models are platform independent and the output models are platform specific and can be transformed into a format that is executable. The principles of MDA for the task of study program development are applied using two hemispheres model driven (2HMD), approach, which assumes modeling and use of procedural and conceptual knowledge and may be applied in the context of modeling the knowledge about the domain. From the point of view of 2HMD approach each course of the study program may be considered as a knowledge provider, which satisfies particular knowledge requirements. The particular Specific knowledge requirements are derived from the knowledge model that consists of functional and conceptual hemispheres, which reflect knowledge derived from original academic or industrial requirements or standards. ... Read more

Grid Computing: A Virtual Organization

It is a great challenge for the scientific community to provide information online with low prices in this era of competition. In today’s world computer users are globally located. The grid is essentially a heterogeneous collection of computational and storage resources, thereby leading to many related challenges. These challenges require dealing with diversity in the terms of local resources, dynamic nature of the local resources, creation and management of services and maintaining the Quality of Service (QoS), Since grid is inherently a parallel and distributed system, the key issues regarding design of the grid, data locality and availability, implementation, scalability, anatomy, privacy, maintenance, fault tolerance, security, etc come into picture and need to be addressed. These issues demand new technical approaches for the grid environment. ... Read more

Mutual Diligence Business In Supply Chains - A Dynamics Business System Approach

Abstract In this paper, we have considered the multiple stage supply chain where agents order, produce and distribute goods while considering uncertainties of customers’ behavior. Generally, those operational risks result in undesirable effects of the supply chain, e.g. bullwhip effects. We model the problem in terms of system dynamics which seems adequate for a process-oriented perspective where time is a decisive factor. The original model developed by Forrester (1958) is extended by integrating data warehouse architectures which make the collaborative processes between the agents more handy. Key figures of the analysis are the bullwhip effect, the maximum production rate and imbalance period. Some supply chain models are tested by simulation runs where the parameters are adapted to different scenarios. It is shown that, generally, a reduction of the delivery time has a greater influence on the performance of the supply chain than the improvement of mutual trust between the partners. ... Read more

Supply Chain Relationships Among Strategy, Flexibility And Performance: A Theoretical Framework

Abstract In today’s global business environment, concepts are moving towards inter-national contrary to yester years. This has made companies to explore the new ways to leverage their supply chain and to develop a strategic approach. A strategic approach with flexibility is helpful to increase the overall performance of the organization and to respond customer requirements. Consequently, in order to maintain cut-throat competition in the market and to be able to satisfy end customers, supply chain strategy (SCS) must be aligned with the supply chain flexibility (SCF). With a large number of SCS dimensions and SCF dimensions, it is not feasible to practice each dimensions. The study aims to classify them in a suitable manner, which is helpful to the organizations to select a correct mix of SCS and SCF dimensions to increase supply chain performance (SCP). The purpose of this study is to identify all the dimensions of SCS and SCF. In addition, this study also aims to identify SCP dimensions. Later on, the relationships among SCS, SCF and SCP are identified through a theoretical model. The findings from various literatures are compared and analyzed. Thus guidelines are developed. ... Read more

Unique Identification Number: A New Way Of Identification

Unique Identification Number (UID) is a recently finalized initiative by the Government of India to create and manage a centralized identification system for all the adult citizens and residents of India, which can be utilized for a variety of identification purposes. Nandan Nilekani former co-chairman of Infosys has been appointed as the head of Unique Identification Authority of India and will have a ministerial rank. In the proposed paper we will talk about the UID and its implications with reference to India. ... Read more

Information Ethics: A Social Responsibility

We know that our world has become globalize; technologies developed in one country quickly spread around the world. As computers become central to our lives, much writing and thinking has been done about the ethical dimension of Information. Technology. Themes such as privacy, intellectual property, and the digital divide have been studied for years. Information Ethics is the field that investigates the ethical issues arising from the development and application of information technologies.This paper draws a light on some current issues and ethical dilemmas with refference to Cyber Crimes, Unethical Hacking in Information Technology that is related to major issues like privacy, security, environmental issues moral issues and community responsibility. ... Read more

A New Approach On Computer Networking For Cyber Criminals By Using Markov Chain Model

The use of internet is popular among youth of every contrary. This has provided business to internet operators because of this a competition has been generated among service providers to catch-up more and more traffic proportion of users many internet café exist in city having internet connectivity of many operators. In the market many type of users are situated. Some users have crime category behavior and have attitudes of criminals like hacking the site, blocking the mail, chatting unauthorized users etc.The crime users after getting success in call connection performs cyber crime.Naldi(2002) have made an attempt to describe traffic sharing under the multi operator environment with the help of Markov chain model. This paper presents performance analysis for cyber criminals in computer network. Simulation methodology is performing to support the mathematical finding. ... Read more

New Paradigm In Supply Chain Management

Today, the need for integrated, global supply chain management is largely unquestioned. It is accepted, for example, that supply chain leaders usually work more effectively with external business partners. They also tend to design, build, move, store, sell and service their products with greater speed and economy. Now, more than ever, supply chains are regarded as sources of business value. ... Read more

Utility Of Ubiquitous Computing

The term ubiquitous implies that technology is everywhere and we use it all the time. ubiquitous computing is global and local, social and personal, public and private, invisible and visible, an aspect of both knowledge creation and information dissemination. Ubiquitous computing is changing our daily activities in a variety of ways such as communicate in different ways, conceive and use geographical and temporal spaces differently.This paper discuss on applications of ubiquitous computing. It identifies different application areas such as Communications, Logistics, E-commerce, Inner security. ... Read more

A Model For Learning Objects Reusability

Designing systems from scratch is an old fashioned concept nowadays. Availability of reusable components allows the developers to concentrate less on coding but more on reuse of these components in their application. If an application can be developed with such an approach then why not the material designed for E-learning. This paper focuses on Learning objects (LO), the core concept in E-learning reusability and suggests a model to check for reusability of an LO under consideration. Various metrics used in software engineering are used for that purpose. ... Read more

Future Computer And Communication: Our Dream: Actually Fictions

1.     Introduction: Scientific research has conclusively established that man is a part of nature. While the aim of science is to find answer to ... Read more

A Hybrid Arq Protocol With Improved Performance

In recent past several new and modified ARQ protocols are studied in literature in order to achieve higher throughput. Packet combining scheme, Modified Packet Combining scheme, Truncated Packet Transmission Scheme, Bit Oriented XOR based packet transmission scheme are well defined ARQ protocol for error correction either by retransmission or by processing at the receiver. For retransmission, Satry’s multi copies technique was extensively studied by Bhunia whereby it was established to fix multiple copies with number of times retransmission are requested. For correction at the receiver, packet combining scheme suggested by Chakraborty and Multiple Packet Combining scheme introduced by Bhunia are understood. In the paper we propose a hybrid ARQ technique made of multi copies retransmission with packet combining & Multiple packet combining scheme and study its performance in terms of throughput. ... Read more

total: 94 | displaying: 41 - 60