CA Prashant Jain

total: 56 | displaying: 41 - 56

Cloud Computing: A New Era In It Service Delivery

Enterprises strive to reduce computing costs. Many start by consolidating their IT operations and later introducing virtualization technologies. Reducing costs, accelerating processes and simplifying management are all vital to the success of an effective IT infrastructure. Companies are increasingly turning to more flexible IT environments to help them realise these goals. Cloud computing is clearly one of today’s most appealing technology areas due, at least in part, to its cost-efficiency and flexibility Cloud computing enables tasks to be assigned to a combination of software and services over a network. This network of servers is the cloud. Cloud computing can help businesses transform their existing server infrastructures into dynamic environments, expanding and reducing server capacity depending on their requirements. This paper describes cloud computing, a computing platform for the next generation of the Internet. The paper defines clouds, explains the business benefits of cloud computing, and outlines cloud architecture and its major components. ... Read more

World Wide Web :Its Perception And Usage For Professional Development Among Management Faculty

Introduction: No one can dispute that we live in a digital environment and the complexity of digital world has been simplified by the World Wide Web. World Wide Web technology has created new opportunities for learners and has created a bridge between complexity and simplicity. Businesspeople and educators have expended many efforts to test different applications and build demand for their educational offerings. Web learning sites have proliferated. The audiences and instructional methodologies for the different Web learning efforts vary. Some are for children, some are for adults. Some offer academic courses that parallel on-site classroom instruction, while others offer professional development programs that a teacher or other professional might otherwise present in a workshop or training program. Some offer traditional didactic instruction, while others attempt, through varying amounts of assistance, to orchestrate more open-ended, constructivist experiences for the user. Some are rigid in the way they channel the learner through a sequence of interactions. Others let users direct their own learning by choosing where they want to go and what they want to do. Web-based professional training yields additional benefits, like Access is available anytime, anywhere, around the globe; per-student equipment costs are affordable. Student tracking is made easy, Content is easily updated. Applications of Web-based technology for professional development include: Digital libraries that permit the retrieval of standards, lesson plans, assessments, evaluation resources, full texts of articles, artifacts such as student work, and other resource materials, in any medium. Multimedia learning technologies for training purposes that present information, assess learning, provide feedback, and individualize the learning path. Tools and environments for synchronous and asynchronous professional communication and collaboration (e.g., e-mail, whiteboards, chats, video-conferences, file-sharing systems, etc.) Professionally useful databases that permit members of professional communities to post, meta tag, query, mine, and link records of interest. Annotation interfaces layered over digital library resources that make it possible for members of professional communities to exchange context-embedded reflections and feedback about them. ... Read more

Secure Protocol For File Transfer In Adhoc Networks

Ad hoc networks are new paradigm of networks offering unrestricted mobility without any underlying infrastructure. The adhoc networks have salient characteristics that are totally different from conventional networks. These cause extra challenges on security. However, traditional cryptographic solution is useless against threats from internal compromised nodes. Thus, new mechanisms are needed to provide effective security solution for the ad hoc networks. Particularly challenging problem is how to feasibly detect and defend possible attacks on routing protocols, especially the internal attacks, such as Byzantine attack. A trust evaluation based security solution is proposed to provide effective secure routing and malicious node detection that provides resilience against Byzantine attacks. In this paper, algorithms can be integrated into existing routing protocols for ad hoc networks. ... Read more

Association Rule and The Educational Data

With the growing amount of data a new field called data mining is emerging zxtremely quickly. Data mining tools which perform data analysis may uncover important data patterns, contributing greatly to business strategies, knowledge bases, and scientific, educational and medical research. Association rules mining is one of the most well studied data mining tasks. It discovers relationships among attributes in databases, producing if-then statements concerning attribute values. There are increasing research interests in using data mining in education. This new emerging field, called Educational Data Mining, concerns with developing methods that discover knowledge from data come from educational environments. This paper shows how data mining can be used to come up with interesting knowledge from student database. We identify the measure of interestingness and implement them on student database and come up with interesting rules that can help teachers and related people to deal with students and understand their behavior and activities. ... Read more

Working Parallel With Hyper Threading

In today’s competitive world, to achieve maximum performance in shorter duration is the need in every field. Same is the situation in the field of processing of hardware and software of computer systems. At a given time, more than one activity must be carried out, that is where a need of Parallel Processing creeps in. To achieve maximum performance, nearly 100 % CPU utilization must be done. To facilitate the need of Parallel activities,Hyper-threading. Technology is used the processors. It is used to improve parallelization of computations of microprocessors.. Hyper-threading works by duplicating certain sections of the processor. It works on the fact of logical processors, allowing operating system to appear as two “processors”, to schedule two threads simultaneously, thus increasing speed of computing. This technology is transparent to operating systems and programs. All that is required to take advantage of hyper-threading is symmetric multiprocessing(SMP) support.Execution units on a hyper-threaded CPU share certain elements, such as cache and pipelines. Hyper-threading is effective as it allows for flexible scheduling of all execution slots, so that core is busy as possible. ... Read more

Search Engine For Semantic Web

Introduction: The good news about the Internet and its most visible component, the World Wide Web, is that there are hundreds of millions of pages available, waiting to present information on an amazing variety of topics. The bad news about the Internet is that there are hundreds of millions of pages available, most of them titled according to the whim of their author, almost all of them sitting on servers with cryptic names. When you need to know about a particular subject, how do you know which pages to read? If you're like most people, you visit Search Engine. Internet search engines are special sites on the Web that are designed to help people find information stored on other sites. There are differences in the ways various search engines work, but they all perform three basic tasks: They search the Internet -- or select pieces of the Internet -- based on important words. They keep an index of the words they find, and where they find them. They allow users to look for words or combinations of words found in that index. Early search engines held an index of a few hundred thousand pages and documents, and received maybe one or two thousand inquiries each day. Today, a top search engine will index hundreds of millions of pages, and respond to tens of millions of queries per day. ... Read more

Embedded Systems

This paper presents a survey of several major EMBEDDED OPERATING SYSTEMS. Normally an A Embedded Operating System is an operating system for embedded computer systems. These operating systems are designed to be very compact and efficient, forsaking many functions that non-embedded computer operating systems provide, and which may not be used by the specialized applications they run. They are frequently also real-time operating systems. Examples of embedded operating systems could include the software used in Automated Teller Machines (ATM’s), Cash Registers, CCTV systems, TV Box Set, GPS, Jukeboxes, etc. It analyzes several design issues of EMBEDDED OPERATING SYSTEMS, such as Advantages, Architecture, Memory Management, Inter Process Communication’s, Process Management, Network Support, and the Impact of Hardware Limitation and Application requirement of Embedded System. We analyzed three prevailing Embedded Operating systems: Windows XP Embedded (XPe) Operating System Windows CE operating System, and Embedded Linux. ... Read more

Embedded Systems

This paper presents about ENRICHMENT OF EMBEDDED SYSTEMS SOFT WARE METHODS. Normally an A Embedded System. An Embedded System is a computer system designed to perform one or a few dedicated function often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today. Embedded systems are critical components of our everyday lives, be they in control systems like airbag controllers in cars, or in consumer products like washing machines and phones. Since such electronic products evolve to software intensive systems, software, becoming larger, more complex and prevalent, poses severe problems in the development of those systems. The required degree of dependability will lead to more rigour in construction and validation, and hence, strengthen the role of formal methods. Moreover, methods used in other areas, such as model checking in hardware verification and finite-state-machine-based testing in protocol testing, will make their way. ... Read more

Virtual Classroom Tool

The demand for educational software is growing exponentially with the surge of interest in educational reform, internet and the distant education. Due to the wide variety of information on the Internet, students taking on-line courses. We propose a LAN based virtual classroom model to provide the instructor with the capability to call students' attention to class and to synchronize class activities. The tool provide components for instructors and students to interact effectively at the same time.VC will usher in the immense flexibility and sophistication in the existing learning platform structures, with the perfect blend of synchronous and asynchronous interaction. It provides a means of collaborative learnings for the students. Also included in the model is an FCFS floor control algorithm to regulate participants engaged in audio conferencing in an orderly fashion. ... Read more

A Case Study: Security Issues In Mobile Ad Hoc Network

A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Security problems in MANETs have received much attention in the last few years. Most research efforts have been focused on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion detection and response etc. There are several security issues in Mobile Ad Hoc Network having their own advantages and disadvantages. In this paper, we review some security issues in MANET as well as their current solutions. ... Read more

Re-Examination Of Protocols For Mobile Ah Hoc Network

A mobile ad hoc network is a multi-hop wireless network with dynamically and frequently changing topology. In recent years, with the development of mobile ad hoc networks (MANETs) technology, various multicast routing protocols such as On Demand Distance Vector Routing Protocol (AODV), AODV with break avoidance (AODV-BR), Scalable Multipath On Demand Routing (SMORT) protocol, DMSR have been proposed for MANETs. Most of the routing protocols, however, use a single route and do not utilize multiple alternate paths. These protocols have distinguishing features and different applications. This paper provides a control study of many different Routing Protocols by presenting their characteristics and functionality .We also focus on some applications of these protocols. ... Read more

Dynamic Data Grid Replication And Data Consistency

This paper is based on problems of replication in grid computing. The study mainly focuses on replication strategy in data grid environment. I have proposed dynamic services for replicating and maintaining data in grid environments, and directing replicas to appropriate locations for use. To address a problem with the Bandwidth Hierarchy-based Replication (BHR) algorithm, a strategy for maintaining replicas dynamically, I have propose the Dynamic Maintenance Service (DMS). I anticipate striking a balance between improving data access performance and replica consistency in data grids. This work can find out the more efficient ways of utilizing storage space is an important point. ... Read more

Impact Of Electronic Data Interchange In E-Business

1.    Introduction: Electronic Data Interchange is considered as a technical representation between two parties, either internal or external. It refers as a transformation of data ... Read more

A Model For Learning Objects Reusability

Designing systems from scratch is an old fashioned concept nowadays. Availability of reusable components allows the developers to concentrate less on coding but more on reuse of these components in their application. If an application can be developed with such an approach then why not the material designed for E-learning. This paper focuses on Learning objects (LO), the core concept in E-learning reusability and suggests a model to check for reusability of an LO under consideration. Various metrics used in software engineering are used for that purpose. ... Read more

Future Computer And Communication: Our Dream: Actually Fictions

1.     Introduction: Scientific research has conclusively established that man is a part of nature. While the aim of science is to find answer to ... Read more

total: 56 | displaying: 41 - 56