CA Prashant Jain

total: 873 | displaying: 621 - 640

Hybrid Expert System For Optimal And Reliable Process Design Of Man-Machine

Hybrid expert system is best branch of AI. The paper presents a review of the theory and practice of optimal process design of man-machine systems (MMS) according to efficiency, quality and reliability (EQR) indices on the basis of functional-structural theory, artificial intelligence methods, and sequential variant analysis. It pools the necessary information about the models, methods, technologies and software, applied tools. It also includes implementation of the hybrid expert system of man-machine optimal and reliable process.

Interactive Computer Games As An Emerging Application Of Human-Level Artificial Intelligence

Emerging Technology as fundamental goals of AI is to understand and develop intelligent systems that have all the capabilities of humans, there is little active research directly pursuing this goal. This leads to the propose AI for interactive computer games is an emerging application area in which this goal of human-level AI can successfully be pursued. Inter active computer games have increasingly complex and realistic worlds and increasingly complex and intelligent computer-controlled characters. This paper presents further motivate, proposal of using interactive computer games for AI research, review previous research on AI and games, and present the different game genres and the roles that human-level AI could play within these genres. This paper also discusses the research issues and AI techniques that are relevant to each of these roles and methodology which is very interactive computer games provide a rich environment for incremental research on human-level AI. ... Read more

Trends In Information Technology

In this paper, trends in information technology, the opportunities and applications of information technology is discussed. The statistical analysis of internet activity and telecommunication is explained. ... Read more

Grooming The Qualities of Search Engine

Modern day web search engines produce the same information for a query to every user of it. The two main problems with search engine are firstly more time to generate the results and secondly producing irrelevant results. They do not take into account the user’s interest. So a system and method for using a user profile to order placed content in search results is needed [1]. The user profile is based on predefined categories. But to employ this technique we need a large categorized database. Manually categorization is obviously not a cost effective method so we need some automatic categorization techniques. In this paper author proposes a hybrid approach for automatic document categorization to improve search engine performance. The paper also focuses at Psearch domain. ... Read more

Cloud Computing Architecture For Technical Educational Institutes

Cloud –a parallel & distributed system consisting of a collection of interconnected & virtualized computers that are dynamically provisioned. In this paper we are studying present situation of infrastructure provided by engineering institutes of B grade cities and suggest how cloud computing service providers can help. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Section 1 Introduces cloud computing. In section 2 we are explaining SaaS and in section 3, need of cloud infrastructure for technical institutions. Section 4 – a proposed architecture and section 5 describes benefits and drawbacks followed by conclusion. ... Read more

An Approach For File Splitting And Merging

File Splitter is a program which does not require installation and can be used to split files to multiple chunks as well as to merge multiple chunks into a single file. File Splitter is a software which is used to split the user specifying file according to the user specifying size. It is very difficult to transfer one big file from one end to another through any media like internet or small storage like Floppy, Pen drive, CD etc. This software helps to overcome this problem. The split portions of file may carry some temporary information to denote the number of split part and total number of parts etc. This idea is used to split big files to small pieces for transferring purpose, uploading etc. In the destination side, these parts of file can be jointed to form the original source file. Splitting process is mainly aiming in the area of file transferring from one end to another. There are three techniques to split the file. 1. Split in the size of 1.4MB (Floppy size) 2. Split in the size of 650MB(CD size) 3. User specifying size, Here file will be split equally in the specified size To ensure the security, the user can include password to split and combine the files. This split portion will be in non readable format and will be encrypted. If the user has given password to split, the same password is required to do the combining option. This program is developed using Java and can implement in .NET also. ... Read more

Revolution Aspects Of Nanotechnology With Emphasis Of Future, Ethics And Challenges

Nanotechnology is the aspect of very small technology compare to micro technology. Here, this paper describes the different types of description about nanotechnology with definition and explanation of that definition also, here; we have been explained nanotechnology basic as well as conflict meaning, how nanotechnology works as general purpose technology. it’s also describes different generation of nanotechnology, how nanotechnology works, the world of nanotechnology, different types of nano-size structures, applications with nanotechnology, future of nanotechnology, and also describes risk aspects, challenges and ethics in nanotechnology. In application or product of nanotechnology we have been given different types of real world applications and explain world with scale. And how are nanotechnology effects to medical science, finance and economics, health and medicine and other areas also. ... Read more

Feature Selection: An Important Issue in Text Categorization

Text categorization is a problem of assigning a document into predefined classes. Feature selection is one of the important issues in text categorization. Wide variety of feature selection methods exist for text categorization like Information Gain (IG), Document Frequency (DF),Term Strength (TS), Mutual Information (MI) etc. Feature selection methods can improve the efficiency and performance of text categorization. This paper reports a controlled study on a large number of feature selection techniques for text classification. We also discuss some variation and combinations of these feature selection methods. ... Read more

A Conceptual Development And An Implementation For Exploring Hypothesis Space In Data Mining

The problem faced by data miners is that the information obtained is very difficult to understand and hence to represent because of high dimensionality. In this paper the effects of errors, data representation, and assessment approach in data mining is discussed. Data-mining techniques designed for classification problems usually assume that each observation is a member of only one category. We extend these methods to the case in which observations may be full members of multiple categories. They evaluate three of the popular methods (decision tree induction, linear discriminant analysis, and neural networks) and explore representational and performance measurement perspectives.We apply data mining to predicting bankruptcy. We show that different parameters for forecasting bankruptcy are obtained when economic conditions are normal and when countries are operating in crisis mode, as has been the case recently in parts of Asia. ... Read more

Software Bug Tracking Increasing Efficiency And Reducing Project Costs

The costs of erroneous software can be as high as 50 percent of the investment in software development. Yet, the potential to improve software quality and reduce project cost is enormous. Software bug tracking can be an effective means to achieve quality i.e. error free at less cost. However, bug tracking is commonly misunderstood, incorrectly implemented, and often seen as an impediment and cost to the organization. In this paper, we discuss the quality costs of erroneous software and provide an approach to implement an effective software bug tracking system within a system. ... Read more

Cloud Computing: A New Era In It Service Delivery

Enterprises strive to reduce computing costs. Many start by consolidating their IT operations and later introducing virtualization technologies. Reducing costs, accelerating processes and simplifying management are all vital to the success of an effective IT infrastructure. Companies are increasingly turning to more flexible IT environments to help them realise these goals. Cloud computing is clearly one of today’s most appealing technology areas due, at least in part, to its cost-efficiency and flexibility Cloud computing enables tasks to be assigned to a combination of software and services over a network. This network of servers is the cloud. Cloud computing can help businesses transform their existing server infrastructures into dynamic environments, expanding and reducing server capacity depending on their requirements. This paper describes cloud computing, a computing platform for the next generation of the Internet. The paper defines clouds, explains the business benefits of cloud computing, and outlines cloud architecture and its major components. ... Read more

World Wide Web :Its Perception And Usage For Professional Development Among Management Faculty

Introduction: No one can dispute that we live in a digital environment and the complexity of digital world has been simplified by the World Wide Web. World Wide Web technology has created new opportunities for learners and has created a bridge between complexity and simplicity. Businesspeople and educators have expended many efforts to test different applications and build demand for their educational offerings. Web learning sites have proliferated. The audiences and instructional methodologies for the different Web learning efforts vary. Some are for children, some are for adults. Some offer academic courses that parallel on-site classroom instruction, while others offer professional development programs that a teacher or other professional might otherwise present in a workshop or training program. Some offer traditional didactic instruction, while others attempt, through varying amounts of assistance, to orchestrate more open-ended, constructivist experiences for the user. Some are rigid in the way they channel the learner through a sequence of interactions. Others let users direct their own learning by choosing where they want to go and what they want to do. Web-based professional training yields additional benefits, like Access is available anytime, anywhere, around the globe; per-student equipment costs are affordable. Student tracking is made easy, Content is easily updated. Applications of Web-based technology for professional development include: Digital libraries that permit the retrieval of standards, lesson plans, assessments, evaluation resources, full texts of articles, artifacts such as student work, and other resource materials, in any medium. Multimedia learning technologies for training purposes that present information, assess learning, provide feedback, and individualize the learning path. Tools and environments for synchronous and asynchronous professional communication and collaboration (e.g., e-mail, whiteboards, chats, video-conferences, file-sharing systems, etc.) Professionally useful databases that permit members of professional communities to post, meta tag, query, mine, and link records of interest. Annotation interfaces layered over digital library resources that make it possible for members of professional communities to exchange context-embedded reflections and feedback about them. ... Read more

Secure Protocol For File Transfer In Adhoc Networks

Ad hoc networks are new paradigm of networks offering unrestricted mobility without any underlying infrastructure. The adhoc networks have salient characteristics that are totally different from conventional networks. These cause extra challenges on security. However, traditional cryptographic solution is useless against threats from internal compromised nodes. Thus, new mechanisms are needed to provide effective security solution for the ad hoc networks. Particularly challenging problem is how to feasibly detect and defend possible attacks on routing protocols, especially the internal attacks, such as Byzantine attack. A trust evaluation based security solution is proposed to provide effective secure routing and malicious node detection that provides resilience against Byzantine attacks. In this paper, algorithms can be integrated into existing routing protocols for ad hoc networks. ... Read more

Association Rule and The Educational Data

With the growing amount of data a new field called data mining is emerging zxtremely quickly. Data mining tools which perform data analysis may uncover important data patterns, contributing greatly to business strategies, knowledge bases, and scientific, educational and medical research. Association rules mining is one of the most well studied data mining tasks. It discovers relationships among attributes in databases, producing if-then statements concerning attribute values. There are increasing research interests in using data mining in education. This new emerging field, called Educational Data Mining, concerns with developing methods that discover knowledge from data come from educational environments. This paper shows how data mining can be used to come up with interesting knowledge from student database. We identify the measure of interestingness and implement them on student database and come up with interesting rules that can help teachers and related people to deal with students and understand their behavior and activities. ... Read more

Working Parallel With Hyper Threading

In today’s competitive world, to achieve maximum performance in shorter duration is the need in every field. Same is the situation in the field of processing of hardware and software of computer systems. At a given time, more than one activity must be carried out, that is where a need of Parallel Processing creeps in. To achieve maximum performance, nearly 100 % CPU utilization must be done. To facilitate the need of Parallel activities,Hyper-threading. Technology is used the processors. It is used to improve parallelization of computations of microprocessors.. Hyper-threading works by duplicating certain sections of the processor. It works on the fact of logical processors, allowing operating system to appear as two “processors”, to schedule two threads simultaneously, thus increasing speed of computing. This technology is transparent to operating systems and programs. All that is required to take advantage of hyper-threading is symmetric multiprocessing(SMP) support.Execution units on a hyper-threaded CPU share certain elements, such as cache and pipelines. Hyper-threading is effective as it allows for flexible scheduling of all execution slots, so that core is busy as possible. ... Read more

Search Engine For Semantic Web

Introduction: The good news about the Internet and its most visible component, the World Wide Web, is that there are hundreds of millions of pages available, waiting to present information on an amazing variety of topics. The bad news about the Internet is that there are hundreds of millions of pages available, most of them titled according to the whim of their author, almost all of them sitting on servers with cryptic names. When you need to know about a particular subject, how do you know which pages to read? If you're like most people, you visit Search Engine. Internet search engines are special sites on the Web that are designed to help people find information stored on other sites. There are differences in the ways various search engines work, but they all perform three basic tasks: They search the Internet -- or select pieces of the Internet -- based on important words. They keep an index of the words they find, and where they find them. They allow users to look for words or combinations of words found in that index. Early search engines held an index of a few hundred thousand pages and documents, and received maybe one or two thousand inquiries each day. Today, a top search engine will index hundreds of millions of pages, and respond to tens of millions of queries per day. ... Read more

Embedded Systems

This paper presents a survey of several major EMBEDDED OPERATING SYSTEMS. Normally an A Embedded Operating System is an operating system for embedded computer systems. These operating systems are designed to be very compact and efficient, forsaking many functions that non-embedded computer operating systems provide, and which may not be used by the specialized applications they run. They are frequently also real-time operating systems. Examples of embedded operating systems could include the software used in Automated Teller Machines (ATM’s), Cash Registers, CCTV systems, TV Box Set, GPS, Jukeboxes, etc. It analyzes several design issues of EMBEDDED OPERATING SYSTEMS, such as Advantages, Architecture, Memory Management, Inter Process Communication’s, Process Management, Network Support, and the Impact of Hardware Limitation and Application requirement of Embedded System. We analyzed three prevailing Embedded Operating systems: Windows XP Embedded (XPe) Operating System Windows CE operating System, and Embedded Linux. ... Read more

Embedded Systems

This paper presents about ENRICHMENT OF EMBEDDED SYSTEMS SOFT WARE METHODS. Normally an A Embedded System. An Embedded System is a computer system designed to perform one or a few dedicated function often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today. Embedded systems are critical components of our everyday lives, be they in control systems like airbag controllers in cars, or in consumer products like washing machines and phones. Since such electronic products evolve to software intensive systems, software, becoming larger, more complex and prevalent, poses severe problems in the development of those systems. The required degree of dependability will lead to more rigour in construction and validation, and hence, strengthen the role of formal methods. Moreover, methods used in other areas, such as model checking in hardware verification and finite-state-machine-based testing in protocol testing, will make their way. ... Read more

Virtual Classroom Tool

The demand for educational software is growing exponentially with the surge of interest in educational reform, internet and the distant education. Due to the wide variety of information on the Internet, students taking on-line courses. We propose a LAN based virtual classroom model to provide the instructor with the capability to call students' attention to class and to synchronize class activities. The tool provide components for instructors and students to interact effectively at the same time.VC will usher in the immense flexibility and sophistication in the existing learning platform structures, with the perfect blend of synchronous and asynchronous interaction. It provides a means of collaborative learnings for the students. Also included in the model is an FCFS floor control algorithm to regulate participants engaged in audio conferencing in an orderly fashion. ... Read more

total: 873 | displaying: 621 - 640