Home | Conferences | Techknowledge | 12th National Conference

12th National Conference RSS

back 1 2 3 4 5 6 next total: 53 | displaying: 11 - 20

Knowledge Management- (A Tool For Managing Intellectual Excellence)

Knowledge refers to a person’s state of being with respect to some body of information. These states include ignorance, awareness, familiarity, understanding, facility and so on. Knowledge management comprises a range of strategies and practices used in an organization to identify, create, represent, distribute, and enable adoption of insights and experiences. Such insights and experiences comprise knowledge, either embodied in individuals or embedded in organizational processes or practice. ... Read Full Article

Impact Of Information Technology On Employee Retention In Today’s Competitive Business Environment

In today’s business environment the explosion of Information technology has completely Transformed the structure of the organizations. But to retain the valuable employees is one of the biggest problems now-a-days. This paper focuses on the aspects of Information Technology and employee retention strategies and polices in assisting managers for achieving its objectives towards managing the employee retention by utilizing survey data drawn from various government and private departments, and to remain competitive in this area. ... Read Full Article

Data Mining Problem Solving Algorithms & Their Comparative Study

This paper presents the comparison schemes between mining algos identified by the IEEE International Conference on Data Mining (ICDM), are : C4.5, k-Means, Apriori, FP growth, Page Rank, Ada Boost, kNN, and CART. These algos are among the most influential data mining algorithms in the research community. With each algorithm, we provide a description of the algorithm, comparison between these algos, discuss the impact of the algorithm, and review current and further research on the algos. These algorithms cover classification. ... Read Full Article

A Comprehensive Approach On Grid Computing

Today we are in the Internet world and everyone prefers to enjoy fast access to the Internet. But due to multiple downloading, there is a chance that the system hangs up or slows down the performance that leads to the restarting of the entire process from the beginning. This is one of the serious problems that need the attention of the researchers.So we have taken this problem for our research and in this paper we are providing a layout for implementing our proposed Grid Model that can access the Internet very fast. By using our Grid we can easily download any number of files very fast depending on the number of systems employed in the Grid. We have used the concept of Grid Computing for this purpose. ... Read Full Article

Software Security: An Emerging Problem In Software Engineering

The objective of this research paper is to discuss the software security as a problem in software engineering. The solution of this problem leads to the new constructive approach to the modeling, specification and analysis of application specific security requirements. The approach is based on a framework we developed before for generating and resolving obstacles to requirements achievement. Our framework intentional obstacles set up by attackers to break security goals. Attack tree are derived systematically through anti-goal refinement until leaf nodes are reached that are software vulnerabilities observable by the attacker or anti-requirements implementable by this attacker. New security requirements are then obtained as countermeasures by application of threat resolution operators to the anti requirements and vulnerabilities revealed by the analysis. The paper also introduces formal epistemic specification constructs and patterns that may be used to support a formal derivation and analysis process. The method is illustrated on a web-based system for which subtle attacks have been reported recently. ... Read Full Article

Simulating Using Ns-2

1. Introduction: ns-2 is called event simulator because ns-2 simulator has list of events. Process includes beginning of event and run it until it is ... Read Full Article

Network Simulation Using Nctuns

1. Introduction: Network simulator is software which is very helpful tool to develop, test, and diagnose any network protocol. To implement any kind of network ... Read Full Article

E-Commerce, Its Impact & Trends & Opportunities On Supply Chain Management

1. Introduction:  Electronic commerce, commonly known as (electronic marketing), e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems ... Read Full Article

Applying Knowledge Management (KM) for Sustainable Business Education

1. Introduction: Today, Business Education system is under great pressure from industry (society), to deliver finished products (graduates and postgraduates), from its system so as ... Read Full Article

Emerging Paradigms of DNA Based Computation

1. Introduction: DNA computing is a novel technology that seeks to capitalize on the enormous informational capacity of DNA, biological molecules that can store huge ... Read Full Article

back 1 2 3 4 5 6 next total: 53 | displaying: 11 - 20

Log in

Featured author

Amal Singh