Home | Conferences | Techknowledge | 12th National Conference

12th National Conference RSS

back 1 2 3 4 5 6 next total: 53 | displaying: 21 - 30

Software Professionals Use Object Oriented Data Modeling Instead Of Traditional Relational Data Modeling

The purpose of this paper is to explain why object oriented data modeling is more popular than relational data modeling. A data model is a logic organization of the real world objects (entities),, constraints on them, and the relationships among objects. Relational model is very simple since data in represented in the form of relations that are depicted by use of two-dimensional tables. Rows in the table represent records and Columns represent attributes of the entity. The basic concept in the relational model is that of a relation. In object-oriented model main construct is an object. As in relational model, there are relations similarly we have objects in OO data modeling. So first thing in OO model is to identify the objects for the systems. Examining the problem statement can do it. Other important task is to identify the various operations for these objects. It is easy to relate the objects to the real world entity. The object-oriented approach has proved to be especially fruitful in application areas, such as the design of geographical information systems which have a richly structured knowledge domain and are associated with multimedia databases.Relational data modeling is different from Object Oriented data modeling because it focuses solely on data while object oriented data models focuses on both the behavior and data aspects of your domain. OODBMS are faster than relational DBMS because data isn’t stored in relational rows and columns but as objects. Objects have a many to many relationship and are accessed by the use of pointers. ... Read Full Article

Evolution Computing Approach To Exploit User Navigational Path Applying Dynamic Prediction

Since 1991 WWW (World Wide Web), concept becomes more popular. It increases use of internet as well as internet users. The wide users’ access information leads us to improve well known strategies for web pre fetching, dynamic user modeling and site customizations to provide or access better performance in internet URL surfing. This paper presents new method to exploit user navigational path behavior to predict, in real-time, future requests. Real time user adaptation avoids the use of statistical techniques on websites or URL logs by adopting the predictive user model. Our new mode adopted from Finite State Machine formalism together with Genetic Algorithm which evolves a population for the same. ... Read Full Article

Schematize Trust Overlays & Management In Mobile Computing

Mobility leads to unplanned interactions between computer systems or mobile devices, as people use devices to access services in varied environments. Before two or more systems ready to interact, they must trust that each will satisfy the security and privacy requirements of the other. In this paper we introduce trust overlays, a systematic approach to build such trust in Mobile computing world. Our solution exploits the increasing availability of trusted computing hardware on commodity systems, including portable computers. We report that key pieces of these solutions are coming into a place, as systems that provide distributed mandatory access control. We also point out that tremendous challenges remain, such as how to set compatible security policies across administrative domains. ... Read Full Article

Knowledge Management: A Tool For An Efficient Organization

The paper takes an in-depth look at knowledge management, a comparatively new business concept that is attracting the consideration of informed and global-oriented companies because of its promise to introduce new rudiments of flexibility and efficiency in the entire business spectrum - from management, plant and production to front line activities. This paper explains how knowledge management benefits businesses and the business community. It discusses how the need for active knowledge management in numerous companies is understood and acknowledged. The paper studies that how often, in practice, this understanding is misconstrued to a false belief that sophisticated and expensive information technology (IT), suffices for good knowledge management. It looks at the requirements of knowledge management and the role played by business intelligence in knowledge management. Further, the differences between organizations' actual and perceived success in knowledge management are discussed. The paper further examines how success, deemed as a firm's ability to generate sustainable growth and profits, is determined not only by knowledge management but intricately linked to the humans who seek straight forward business solutions and constructively counter challenges. ... Read Full Article

It As Catalyst For Growth For Smes In India: With Special Reference To Cloud Computing And SAAS Model

Introduction: Today, India has adapted to the growing knowledge orientation in each industry and would certainly be a leader in the R&D for many industry ... Read Full Article

Review of Wap 1.0 And Wap 2.0 Protocol For Wireless Communication

With the growth of internet, internet application and mobile communication, demand for internet services for mobile devices like laptops, cellular mobiles and wireless devices has been increased. But the challenge is to provide internet content and advanced data services to wireless phones and other wireless terminals that work across all wireless network technologies. WAP (Wireless Application Protocol), is the solution developed by the WAP forum to the problem. WAP is an open international standard which not only responsible for the presentation and delivery of wireless information and telephony services on mobile phones and other wireless terminals in wireless communication environment but also create content and application that scale across wide range of wireless bearer networks and device types, also extend existing standards and technology whenever possible and appropriate. This paper review WAP protocol version 1.0 and 2.0 and discuss the basic architecture, features and services provided by these versions. ... Read Full Article

Survey Of E-Commerce Security Measurement And Risk Analysis

With the hasty development of E- commerce, Security, issues are arising from people’s attention. Electronic commerce services have risen to become more and more well-liked and web environment. Exchange security on network is very important for e-commerce services and it is always the key factor that affects the accomplishment of electronic commerce (e-commerce), In detail two kind of risk analysis methods of the e-commerce security which gauge and assess the e-commerce security risk. And then the risk management strategies of e-commerce security of the e-commerce are addressed. In the end it is pointed out that the study of the risk analysis methods and the management strategies provides an available security framework. This paper present risk analysis measurement and approach for e-commerce. This paper also covers security issues in commercial activities. ... Read Full Article

A Case Study: Security Issues In Mobile Ad Hoc Network

A Mobile Ad Hoc Network (MANET), is a self-organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Security problems in MANETs have received much attention in the last few years. Most research efforts have been focused on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion detection and response etc. There are several security issues in Mobile Ad Hoc Network having their own advantages and disadvantages. In this paper, we review some security issues in MANET as well as their current solutions. ... Read Full Article

Network & Information Security

The terms network security and information security are often used interchangeably. Network security is generally taken as providing protection at the boundaries of an organization by keeping out intruders (crackers), Information security, however, explicitly focuses on protecting data resources from malware attack or simple mistakes by people within an organization by use of data loss prevention (DLP), techniques. Much attention has been focused on the security aspects of existing Wi-Fi (IEEE 802.11), Wireless LAN system. Pit flaws of WEP (wired equivalent privacy), are covered in this paper. And ORiNOCO and WPA (Wi-Fi protected access), solution are also discussed in that. ... Read Full Article

Changing Facets Of E-Commerce: With Special Reference To Travel And Tourism Industry

Tourism has become the world’s largest industry as international travel has emerged as a major revenue generating industry for many countries. In order to pull travelers to a certain destination, it is essential to understand peoples’ destination selection processes, in which they discriminate and choose a single destination from a larger initial choice set. E-commerce is bringing new business opportunities to the global travel and tourism industry. Tourism-related institutions and Internet companies are joining hands to unleash the potential market created by e-commerce. With penetration of e-commerce in the travel and tourism industry, the sector identifies a number of consistent customer experiences across different channels and involves both international as well as domestic travel in emerging economies. The travel and tourism industry is a worldwide industry, the global character, both from the demand as well as supply side represents one of its dominant features as well as challenges for IT and its applications. The present paper is an attempt to through light on the changing facets of E-commerce and how it has had an impact on various dimensions of travel and tourism industry. With new developments in information technology the past has taught that consumers change behaviors in relationship to travel and tourism planning, reservations, and purchasing. The success of a travel or tourism business is largely dependent on how well they make use of the technology that is available and developing. ... Read Full Article

back 1 2 3 4 5 6 next total: 53 | displaying: 21 - 30

Log in