CA Prashant Jain

total: 873 | displaying: 421 - 440

Need And Significance Of E-Learning In Education

Technology is an agent of change and major technological innovations can result in entire paradigm shifts. The technological revolution poses tremendous challenges to the educators to rethink their basic tenets, to apply technology in creative way to redesign education. After affecting extensive changes in the way people communicate and do business, the Internet is poised to bring about a paradigm shift in the way people learn. Now-a day’s anywhere, anytime education is possible. The practice of providing education with the help of modern technologies is termed as e-Learning. It is dynamic, operates in real time, empowering, individual and comprehensive, effective and quick. E-learning is a combination of content and instructional methods delivered by media elements such as words and graphics on a computer intended to build job-transferable knowledge and skills linked to individual learning goals or organizational performance. The major benefits of e-Learning are that it is eco-friendly because it takes place in a virtual environment and thus avoid travelling and reduces the usage of paper. This paper will focus on the: Overview of e-learning, e-learning strategies and significance of e-learning in the field of education. ... Read more

Navigation Based Relevance Feedback in Content Based Image Retrieval

Accuracy enhancement of Content Based Image Retrieval System as well as reduction in semantic gap can be efficiently achieved with the help of Relevance Feedback. Many schemes and techniques of relevance feedback exist with many assumptions and operating criteria. This paper focuses on a novel method, Navigation-Pattern-based Relevance Feedback (NPRF), which can be used to achieve high efficiency and effectiveness of CBIR while coping with the large-scale image data. By using NPRF method, high quality of image retrieval on RF can be achieved in a small number of feedbacks. It mainly applies data mining techniques to mine the navigation patterns from the user log information and incorporates the same while further searching for the relevant images. ... Read more

E-Business: The Emerging Significance

Web has changed every aspect of life. However, no area is going through a significant and rapid change like today’s business world. Businesses start to achieve real business value as they integrate Internet Technology into their core processes. Today, major corporations are rethinking their businesses in terms of the internet and its new culture and capabilities. Companies are using the Web to buy parts and supplies from other companies, to communicate with their partners, to collaborate on sales promotions and to transact commerce. This is e-business, where the strength and the reliability of traditional information technology meet the Web. E-business isn't about re-inventing "the wheel" of your business. It's about streamlining current business processes which improves operating efficiencies, which in turn will strengthen the value you provide to your customers. It is the powerful business environment that is created when you connect critical business systems directly to customers, employees, vendors and business partners using Intranets, Extranets, e-commerce technologies, collaborative applications and the Web. This paper examines the role of e-business on business processes and will also emphasize on the emerging importance of e-business. ... Read more

Information Extraction From Web Pages Based On Pattern Discovery

Information extraction from Web documents is a critical issue for Software agents on the Internet. Extracting data from the Web requires a wrapper that “wraps" around a Web site and extracts data from Web pages. Wrapper induction is one of such techniques that learn extraction rules by generalizing from training examples. In this project, we utilize a data structure called a PAT tree in which repeated patterns in a given input string can be efficiently identified. A PAT tree is an efficient data structure successfully used in the area of information retrieval for indexing a continuous data stream using this data structure to index an input string, all possible character strings, including their frequency counts and their positions in the original input string can be easily retrieved. ... Read more

Use Of ICT In Primary School

Education is playing the most important role in all-round development of student. Teachers shape the students by providing them with various teaching- learning experience. Today’s era is a known as era of Information and Communication Technology (ICT). ICT has reached into the every aspect of life. Thus, to make individuals technology literate, ICT education should start from primary school. ICT enable users to create, access, store, transmit, and manipulate different information in audio and visual form with the help of different hardwares and softwares. ICT is useful for effective teaching-learning process, quality education and overall development of students, teachers and administrative staff. The main objective of this study was to examine computer related experience in primary school related to classroom teaching and administrative use, specifically in rural area of India. ... Read more

Civil Development Project Cost Assessment By Neural Network With Genetic Algorithm

Cost assessment is most important part when new civil development is start. If cost assessment is not correct then project may not complete within a budget. So many times budget is over and development is stopped. To solve this problem we are using the concept of neural network and genetic algorithm, and designing a model by which we can assess the cost of any civil project very efficiently. In this paper we are using Back propagation Method of Neural Network and Genetic Algorithm. Back propagation method will give some solution of problem and our genetic algorithm will give the optimize solution. During the process of development cost assessment, back propagation neural network has a very powerful application. Genetic algorithm optimizing back propagation has been proposed to aim at handling locality minimum and low convergence speed. The method based on analyzing the basic fundamental states that how to use genetic algorithm to improve the ability of back propagation. After optimizing, the Genetic Algorithm Back Propagation model has been built up. So many project cases and some testing samples are put into the model to observe generalize ability. The result of Genetic Algorithm Back Propagation model can get lower forecast error and iterations. For these reason, Genetic Algorithm Back Propagation model is appropriate for construction cost assessment. ... Read more

Solo Programming and Pair Programming in Software Metrics

In the software development environment Software metrics is an attribute (consisting of a quality, or characteristic of an object) derived from the measuring attributes of software objects. Software Metrics is termed as the measurement based techniques for software development process and its products to supply meaningful and timely management information, and the use of those techniques to improve that process and its products [GOOD 93].Metrics basically are used to improve software quality and productivity .Software metrics deal with software items. While dealing with software metrics various management activities are there which are discussed in the later part of this paper. Solo Programming is where one programmer develops software alone. Pair Programming is where programmers develop software side by side at one computer. Pair Programming is basically referred as Collaborative Programming [2].While dealing with software metrics sometimes problem of pair programming (also termed as team programming) and solo programming occurs. In this paper we compared solo programming and pair programming; and listed the benefits and defects of both programming(i.e. pair programming and solo programming) that occur while working with teams or without in software metrics. ... Read more

A Study Of Awareness Of Green Computing Amongst The It-Users

Now a day’s living standard of people is changing at a faster pace and to cope up with the environment, everyone has to meet that pace. Similar is the case with the Green computing. “Greening" your computing equipment is a low-risk way for your business to not only help the environment but also reduce costs. Green computing can lead to serious cost savings over time. Reductions in energy costs from servers, cooling, and lighting are generating serious savings for many corporations. As energy demands in the world go up, energy supply is declining or flattening. An energy efficient system helps ensure healthy power. Hence, this study is throwing light in the area of green computing. The study is done considering IT-users. ... Read more

Software Maintenance & Its Challenges

Thirty years ago, software maintenance was characterized as an "iceberg”. We hope that what was immediately visible is all there is to it, but we know that an enormous mass of potential problems and cost lies under the surface [6]. Research industry presently spends in excess of $15 bn per annum on data maintenance, including software, services, consulting and so forth. Nor is it recognized as an independent restraint within data management. Indeed, the tasks required in data maintenance are typically treated as being just a part of what you need to do when maintaining, implementing or upgrading application software. There are several issues involved in software maintenance in a software industry and this research paper is related to conducting an analytical study of the challenges involved in it. ... Read more

Electronic Business: An Emerging Trend

This research paper focus on a unified framework that captures the antecedents of e-business adoption, provide a clear picture of the benefits and challenges that e-business companies face and identify the fundamental design principles for building a successful e-business blueprint .The merge of the information technology and the web standards have formed the electronic business “E-business”. E-business has dynamic, rapidly growing and highly competitive characteristic. E-business is transforming the rules of competition for established businesses in many ways. This paper attempts to see the theoretical perspectives of e-business. This research investigates the characteristics of e-business. Then we discuss theories that highlight the sources of value in general. Succession in e-business will need organizations to revise their strategies and goals to meet market rules of demand and supply. Conversion of ordinary business into e-business has forced organizations to be redesigned and reshaped. E-business is a combination of economic, technology and market forces that reinvented strategies of traditional business. E-business and Internet have enforced organizations to use new and combined models. This enforcement drove organizations to seek and create solutions to the issues of change management. While e-business is often mixed with electronic commerce (e-commerce), they are completely different concepts. E-business encompasses e-commerce as well as many other applications. There are more benefits to be derived from e-business than from e-commerce. E-business can lead to competitive advantage as well as profitability. The authors' findings provide the foundation for a more rigorous study of e-business. ... Read more

Threat Analysis And Network Security

The internet as a primary source of entertainment, communication, and education, has undoubtedly changed the life of an individual of all ages. As the use of internet is increasing rapidly more privacy threats are percolating day by day. Not only financial institutions and military Organizations need to worry about securing their computer systems but also from an ultimate learned individual to companies from all different sectors and sizes need to be serious about the matter. This document is an attempt to secure the organizations and allow the personage to look after their daily operations rather than worry about the teenage criminal trying to infiltrate into the network. ... Read more

Role Of Information Technology In Integrating Biological Databases Into Metabases- A Review

Life science researchers are experiencing a “data explosion” due to vast amounts of raw data being produced genomic, proteomic, and structure predicting experimentation. This exponential growth curve is expected to continue. These piles of data are kept in different databases scattered across the diverse industries, different universities and research institutes throughout the world. There is a dire need for the creation of intelligent database of these databases to query, collect, link, merge, analyze and give biological sense to these different data to tackle more and more intricate and challenging scientific problems. An imperative resource for finding biological databases is a special annual issue of the journal Nucleic Acids Research (NAR).which is freely available and categorizes many of the publicly available on line databases related to biology and bioinformatics. Although a huge variety of database are available online, PubMed maintained by the National Center for Biotechnology Information (NCBI); Ensembl maintained by the European Bioinformatics Institute (EBI) and the Wellcome Trust; the UCSC Genome Browser a human, mouse and rat genome browser maintained by David Haussler’s group at the University of California at Santa Cruz; FlyBase maintained by the FlyBase Consortium; WormBas, and the Gene Ontology (GO) database exemplify some of the major biological databases. Many researchers are not aware of their availability and consequently these databases were not effectively utilized. A better solution would to generate a database of database which contains a plethora of information of various biological databases, maintaining the scientific and political independence of the databases, but allowing the information that they contain to be easily integrated to enable cross-database queries.This study deals with the features of four major metabases of biological databases – DBD (database of biological databases) http://www.biodbs.info/, DOD – Database of Databases (http://www.progenebio.in /DoD/DoD.htm), MetaBase - The Database of Biological Database (http://biodatabase.org) and DBcat (http://www.infobiogen.fr/services/dbcat). ... Read more

E-Security: Proposed Algorithm Of Authenticity Of Digital Signature

The increasing use of digital signature in electronic documents poses special challenges in verifying authenticity, because digital technology makes such documents easy to alter or copy, leading to multiple non-identical versions that can be used in unauthorized or illegitimate ways. To help meet the challenge of the digital age but also provide the assurance that an electronic document has not been altered. A digital signature, viewed through authenticity, verifies documents, at no cost to the customer. [12] Everyone is used to dealing with an original document, or an authenticated copy of the original document, but is in difficulties when the concept of ‘original’ proves to be elusive in respect of a digital signature, whatever form it takes. [8] Data and information security becomes more and more important in digital signature which uses a public high-speed wide area network. Generally, E-security is characterized in terms of privacy, authenticity and integrity of digital data. [14]Authentication is concerned for both information providers and information users thought the process. [5]This paper proposed an algorithm with flowchart of authenticity of digital signature that gives us generalization to check security and authentication of digital signature effectively. ... Read more

Optical Character Recognition Using Artificial Neural Network

Optical character recognition is the mechanical or electronic translation of images of handwritten, typewritten or printed text into machine-editable text. In this paper, a simplified neural approach to recognition of optical or visual characters is portrayed and discussed. ... Read more

Scaling K-Mode Algorithm For Clustering Large Categorical Dataset And Its Performance Analysis

Scalable data mining algorithms have become crucial to efficiently support KDD processes on large datasets. The k-mode is one of the partitioning algorithms used for the purpose of clustering. We show that basic k-mode algorithm is very much time consuming for large dataset. Instead we present the advanced algorithm which performs much better than known algorithm. In addition to presenting detailed experimental results for advanced k-mode algorithm, we also conduct an experimental study with real life data sets to demonstrate the effectiveness of our technique. We address the task of scaling up k-modes based algorithm through the utilization of memoization technique. Experimental results based on several datasets, including synthetic and real data, show that the proposed algorithm may reduce the number of distance calculations by a factor of more than a thousand times when compared to existing algorithms while producing clusters of comparable quality. ... Read more

Recognition of Face Using Artificial Neural Network

Face recognition is done naturally by humans. However, developing a computer algorithm to do the same thing is difficult. Assume for the moment we start with images, and we want to distinguish between images of different people. One class of methods presupposes the existence of certain features in the image, i.e. eyes, nose, mouth, hair, and an algorithm is devised to find and characterize these features. FACE recognition is an important research problem spanning numerous fields and disciplines. This because face recognition, in additional to having numerous practical applications such as bankcard identification, access control, Mug shots searching, security monitoring, and surveillance system, is a fundamental human behavior that is essential for effective communications and interactions among people. ... Read more

A Role Of J2EE And .Net In Enterprise-Level Application Development

Enterprise-level application development means e-Business terminology used to describe the information systems and applications that support and drive business processes using web technologies. e-Business means any business process that relies on an automated information system. This task is mostly done with web-based technologies. e-Business methods enable companies to link their internal and external data processing systems more efficiently and flexibly to work more closely with suppliers and satisfy the needs and expectations of their customers. Applications of e-Business are based on N-tier architecture. For developing such types of applications there are two approaches – J2EE and .NET. The main objective of this paper is to present the concept of e-Business and N-tier architecture as well as to present the comparison of J2EE and .NET technology for developing the enterprise-level application development (e-Business) on specific criteria. ... Read more

A Study Of Factors-Affecting User’s Acceptance Of E-Payment Method In Indore City

E payment is a subset of an e-commerce transaction to include electronic payment for buying and selling goods or services offered through the Internet”. Electronic commerce was identified as the facilitation of commercial transactions electronically, using technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). Awareness will be key in promoting electronic payments. If a customer is well educated about the electronic payment service options, he\she definitely may get converted to the electronic habits. Electronic payment is very convenient for the consumers and can benefit ones business by extending customer base; boosting cash flow; reducing costs; enhancing customer service and improving competitive advantage. The further study will focus on the process and methods used in E Payment. ... Read more

BER Study of OFDM With Coding And Without Coding Transmission On Nakagami-M Fading Channel

High bit error rates of the wireless communication system require employing forward error correction (FEC) methods on the data transferred to reducing the error in transmission. In this paper, the performance of OFDM- BPSK,-QPSK and -QAM system by using forward error correcting codes as concatenated codes schemes that are used to encode the data stream in wireless communications Nakagami-m fading channel has been reported here . Our approach is based on decomposition of Nakagami random variable into orthogonal random variables with Gaussian distribution envelopes. Results have been presented by using optimum value of m based on BER and SNR We present OFDM for wireless communications .We address basic OFDM and related modulations, as well as techniques to improve the performance of OFDM for wireless communications (OFDM). we performed simulations to find out the best BER performance using RS-CC concatenated codes. By concatenating two different codes we can get the effect of improving the total BER due to benefits of RS codes correcting burst errors while convolutional codes are good for correcting random errors that are caused due to a noisy channel. ... Read more

total: 873 | displaying: 421 - 440