Home | Conferences | Techknowledge | 12th National Conference

12th National Conference RSS

back 1 2 3 4 5 6 next total: 53 | displaying: 31 - 40

Knowledge Management: Issues And Challenges

It is very difficult to define knowledge Management in a few sentence or in few word when it is itself is a treasure of all enriched and lavish thought which if starting pouring cannot have the sufficient model or the space to refine the elements of Knowledge management. The dynamics of the knowledge management is different in each one’s life and it varies with age, sex, race, profession, need etc. The nature of Knowledge Management and ways of imparting Knowledge Management is new wave, which has regained from the birth of its ambitious theme of today. The algorithmic approach and rich nation entity has loosened its wall and flown in all direction to enrich all the nations of god gifted pie of land. The Knowledge Management system in the world has the objective of creating intellectual awareness of trends and growth of our economics, social, political and cultural activities and their ethos. Knowledge Management is regarded as a corporate cost savings process to enhance performance capabilities with broader availability and utilization of major corporate knowledge assets. This paper is an attempt to study the issues and challenges that are interwoven with knowledge management. ... Read Full Article

Privacy Preserving Issues In Datamining

This paper talks about threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases and paper addresses the issue of privacy preserving data mining. Specifically, it considers a scenario in which two parties owning confidential databases wish to run a data-mining algorithm on the union of their databases, without revealing any unnecessary information. The above problem is a specific example of secure multi-party computation and assuch, can be solved using known generic protocols. Privacy preserving mining of distributed data has numerous applications. Paper suggests that the solution to this is a tool-kit of components that can becombined for specific privacy preserving data mining applications. Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that non-trusting parties could jointly compute functions of their different inputs while ensuring that no party learns anything but the defined output of the function. ... Read Full Article

A General Comparison Of FFT Algorithms

. Introduction: The first major breakthrough in implementation of Fast Fourier Transform (FFT), algorithms was the Cooley-Tukey [1] algorithm developed in the mid-1960s, which reduced ... Read Full Article

E-Learning: A Tool For Customer Satisfaction And Dissatisfaction

The prevalent usage of computer technology in today’s society has enabled the customers to access much more information than ever before. Computers have been recognized as not only a powerful technology for managing information and enhancing productivity, but also an efficient tool for education and training. E-learning has become a new paradigm and a new philosophy in education with a mission to serve as a development platform for present-day society based on knowledge. Schools, colleges and business spend a great amount of money on computer-based education and training each year in order to remain in the competitive environment and also to retain the customers. E- learning offers tremendous opportunities for acquiring knowledge and skills that are as good as offered in the traditional classrooms. In spite of this e-learning courses initiation and completion rate, e-education has not yet conquered the hearts of learners and is still in an infancy stage. Though e-learning is considered to be very attractive as a new learning paradigm it has been observed that having e-learning on the agenda the Indian customer is still facing a lot of problems in this field. E-learning is a relatively new field of research. Even though the use of technologies for learning has been implemented for several decades, the introduction of the Internet has promoted a considerable shift and innovation. The present study focuses on the use and impact of e- learning in the satisfaction or dissatisfaction of customers. The study is carried out on the college youth because it is such a segment which is using the internet maximally for surfing and educational purposes. Convenience sampling technique will be applied for data collection. The questionnaire will be comprised of the various factors that a student looks for in case of e-learning which ultimately leads to satisfaction or dissatisfaction among them. The data is analyzed by using ANOVA. ... Read Full Article

Distributed Remote Architectures Neural Base Mining

middleware and middleware standards that can be readily exploited for distributed computing applications by the SIP community. High performance computing and High Performance Embedded Computing (HPEC), applications will benefit significantly from highly efficient & portable computational middleware for signal & image processing. Open middleware standards such as VSIPL, MPI, CORBA, encoding and SOAP –based messaging protocols. More specifically, we will be focused on the appropriate use of such technologies for implementing new SIP applications, or extending legacy applications through the use of these technologies. The three middleware standards we have selected all have certain commonalities. All are based around the concept of a client application using the services available on a remote machine, or server. A remote executable object that implements one or more exposed interfaces provides these services. The object’s interface represents a contract between the client and the server. This interface is written as a Java interface for Java RMI, in IDL for CORBA, and in WSDL for web services. In the latter two cases, the more generic descriptions can be translated intospecific language imp lementations, ... Read Full Article

P-Ram Algorithms And Data Structures For Sparse Linear Systems

e have studied the variations in the matrix elements through Gauss Elimination. We know that in Gauss elimination a nonzero position in position jk, implied that there was also a non zero position in kj, which would cause fill to occur in position i, j when row k was used to eliminate the element in position ik. This process may be performed in general by creating zeros in the first column, then the second and so forth. For k=1,2,...,n-1 we use the formulae ... Read Full Article

Cyber Crime And Its Implications

The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal or destroy valuable information. Crime is a social and economic phenomenon and is as old as the human society. As, Life is about a mix of good and evil, so is the Internet. For all the good it does to us, cyberspace has its dark sides too The idea of Cyber crime is not new, yet there is significant confusion amongst academics, computer security experts and users as to the extent of real Cyber crimes. In this paper, we explore the breadth of computer-based crime, providing a definition of the emerging terms Cyber crimes. In this paper we will try discuss almost every aspect of cyber crime, like meaning then we divide Cyber crime into three distinct categories: Type I Cyber crimes against persons. Type II Cyber crimes against property. Type III Cyber crimes against government. We are describing its classification and explain the Law of cyber crime. And explain the REASONS of cyber crime and who the cyber criminal is and how to prevent from this crime then we use some case studies to illustrate the role different types of Cyber crime, and offer some observations on the role of cognition in the process of Cyber crime. Finally we provide several suggestions for future work in the area of Cyber Crime. ... Read Full Article

Model Driven Architecture (MDA)

The Model Driven Architecture (MDA), separates the system business aspects from the system implementation aspects on a specific technology platform. MDA proposes a software development process in which the key notions are models and model transformation, where the input models are platform independent and the output models are platform specific and can be transformed into a format that is executable. The principles of MDA for the task of study program development are applied using two hemispheres model driven (2HMD), approach, which assumes modeling and use of procedural and conceptual knowledge and may be applied in the context of modeling the knowledge about the domain. From the point of view of 2HMD approach each course of the study program may be considered as a knowledge provider, which satisfies particular knowledge requirements. The particular Specific knowledge requirements are derived from the knowledge model that consists of functional and conceptual hemispheres, which reflect knowledge derived from original academic or industrial requirements or standards. ... Read Full Article

Grid Computing: A Virtual Organization

It is a great challenge for the scientific community to provide information online with low prices in this era of competition. In today’s world computer users are globally located. The grid is essentially a heterogeneous collection of computational and storage resources, thereby leading to many related challenges. These challenges require dealing with diversity in the terms of local resources, dynamic nature of the local resources, creation and management of services and maintaining the Quality of Service (QoS), Since grid is inherently a parallel and distributed system, the key issues regarding design of the grid, data locality and availability, implementation, scalability, anatomy, privacy, maintenance, fault tolerance, security, etc come into picture and need to be addressed. These issues demand new technical approaches for the grid environment. ... Read Full Article

Mutual Diligence Business In Supply Chains - A Dynamics Business System Approach

Abstract In this paper, we have considered the multiple stage supply chain where agents order, produce and distribute goods while considering uncertainties of customers’ behavior. Generally, those operational risks result in undesirable effects of the supply chain, e.g. bullwhip effects. We model the problem in terms of system dynamics which seems adequate for a process-oriented perspective where time is a decisive factor. The original model developed by Forrester (1958) is extended by integrating data warehouse architectures which make the collaborative processes between the agents more handy. Key figures of the analysis are the bullwhip effect, the maximum production rate and imbalance period. Some supply chain models are tested by simulation runs where the parameters are adapted to different scenarios. It is shown that, generally, a reduction of the delivery time has a greater influence on the performance of the supply chain than the improvement of mutual trust between the partners. ... Read Full Article

back 1 2 3 4 5 6 next total: 53 | displaying: 31 - 40

Log in