Home | Conferences | Techknowledge | 9th National Conference

9th National Conference RSS

1 2 3 4 5 6 7 8 9 10 next total: 92 | displaying: 1 - 10

Rtos Real-Time Operating System

Real-time systems play a considerable role in our society, and they cover a spectrum from the very simple to the very complex. Examples of current real-time systems include the control of domestic appliances like washing machines and televisions, the control of automobile engines, telecommunication switching systems, military command and control systems, industrial process control, flight control systems, and space shuttle and aircraft avionics. All of these involve gathering data from the environment, processing of gathered data, and providing timely response. A concept of time is the distinguishing issue between real-time and non-real-time systems. When a usual design goal for non-real-time systems is to maximize system's throughput, the goal for real-time system design is to guarantee, that all tasks are processed within a given time. The taxonomy of time introduces special aspects for real-time system research. Real-time operating systems are an integral part of real-time systems. Future systems will be much larger, more widely distributed, and will be expected to perform a constantly changing set of duties in dynamic environments. This also sets more requirements for future real-time operating systems. This seminar has the humble aim to convey the main ideas on Real Time System and Real Time Operating System design and implementation.

Classification Using Flexible Neural Tree

The purpose of my work is to develop data mining techniques based on flexible neural tree FNT. Based on the pre-defined instruction/operator sets, a flexible neural tree model can be created and evolved.. The FNT structure is developed using genetic programming (GP) and the parameters are optimized by a emetic algorithm (MA). The proposed approach was applied for two real-world problems involving designing intrusion detection system (IDS) and for breast cancer classification. The IDS data has 41 inputs/features and the breast cancer classification problem has 30 inputs/features. The results show that proposed method is efficient for both input feature selection and improved classification rate. ... Read Full Article

Recommender System For Dating Services

The aim of the thesis is to research the utility of collaborative filtering based recommender systems in the area of dating services. The practical part of the thesis describes the actual implementation of several standard collaborative filtering algorithms and a system, which recommends potential personal matches to users based on their preferences (e.g. ratings of other user profiles). The collaborative filtering is built upon the assumption, that users with similar rating patterns will also rate alike in the future.Second part of the work focuses on several benchmarks of the implemented system’s accuracy and performance on publicly available data sets (MovieLens and Jester) and also on data sets originating from real online dating services (ChceteMˇe and L´ıb´ımSeTi). All benchmark results proved that collaborative filtering technique could be successfully used in the area of online dating services. ... Read Full Article

Video Mining Watermarking Using Spectrum Nework

Watermarking VIDEO MINING files has recently become much focused due to the wide availability on the Internet leading to digital proliferation of digital VIDEO MINING files. Watermarking may give the record companies the ability to enforce the copy right protection of their products to identify the origin, author, usage rights and distributor or authorized user of the VIDEO MINING clip even if the clip has been processed or distorted. Proof of ownership watermarks may help to determine rightful file ownership perhaps in the court of law. Enforcement of usage watermarks could provide instructions or copyright information to consumer applications, which could refuse to duplicate or play music in violation of a usage policy. There are also variations in watermarks, namely, “Fingerprint” watermarks and “Fragile” watermarks. ... Read Full Article

Nanotechnology: The Next Big Thing Is Really Small

This research paper deals with the basics of nanotechnology. Nanotechnology covers a wide range including fabrication of functional nanostructures with engineered properties, synthesis and processing of nanoparticles, supramolecular chemistry, self assembly and replication techniques sintering of nanostructured metallic alloys, use of quantum effects, creation of chemical and biological templates and sensors, surface modification and films. Along with the current, short term and long term applications of the nanotechnology, this paper also emphasizes on its interdisciplinary nature. The direct and the indirect threats from the molecular nanotechnology is explained stating the disadvantages of this recent technology. It is also concluded that if this technology is used properly then the world will be on a technology roller coaster. ... Read Full Article

Examining Knowledge Spillover And Knowledge Creation Patterns In Organizations: A Theoretical Framework

21st century has been recognized as the knowledge-based economic era. The most distinctive feature of the knowledge-based economy is that knowledge has become the strategically significant resource organizations possess to sustain competitive advantage. Organizations must survive and succeed in the midst of dramatic and rapid environmental changes. Since organizational inputs and outputs are associated with various kinds of knowledgeable resources, obtaining, organizing, and applying knowledge become the main parts of organizations' activities. Theories and tools are needed to manage and create sources of valuable knowledge and to develop organizational knowledge bases to create organizations' innovativeness and sustain the competitive advantage Wave after wave of new technologies have made our interactions with colleagues and partners more seamless than ever before, from email systems and collaborative workspaces, to today’s web 2.0 tools and state-of-the-art telepresence suites for remote conferencing. But in the flurry of excitement (and hype) that surrounds such developments, it's easy to forget that knowledge integration is, after all, an essentially human practice. If you get the fundamentals wrong, no technology in the world is going to assist people to interact seamlessly. Knowledge transfer and creation serve as the vehicle to organizations' ability to innovate and tighter cooperation. This transfer and creation of knowledge which can also be referred as knowledge integration leads to accumulation of organizational knowledge and learning and both of these factors are influential to organizations' adaptation to the environmental changes Therefore, organizations that prove to have superior capabilities to manage knowledge will be more capable of adapting to environmental changes with high uncertainty and complexity. The paper tries to address to this integral issue of knowledge integration with business strategy by examining the existing theoretical framework and to support the thought few industry cases have been mentioned. ... Read Full Article

Effective Supply Chain Management Towards Productivity Improvement In Industries

Supply chain management is to coordinate the flow of materials, services, and information to maximize customer vale. The key functions include sales and order processing, transportation and distribution, operations, inventory and materials management, finance, and customer service. A supply chain is an integral system and needs much coordination and collaboration. This paper highlights the impact of implementation of IT applications in supply chain management towards enhancing productivity of industries. ... Read Full Article

Information Technology And Its Implementation In Library With Special Reference To Core Business School

In the era of all-embracing and rapid technological changes and an increasingly interdependent global economy. It has ability to accommodate change and to adaptation to environmental needs and emerging socio-economic trends. In the modern era acquisition of computer skills is becoming necessary for employment, education development and leisure. Information Technology is changing how we work, play, learn, travel and govern. Today, information and knowledge have become the principal forces of social transformation. They hold the promise that many of the problems confronting human societies could be significantly alleviated if only the requisite information and equitably employed and shared. The use of ICTs is potentially beneficial to development as it encourages the sharing of information and the effective involvement by social groups at various levels, offering, in particular, the possibility of networking individuals and systems. ICT offer the potential to expand the scope of teaching and learning, breaking through traditional constraints of space and time as well as boundaries of current educational systems. Moves towards learning societies are based on the world web need to acquire new knowledge throughout life. Knowledge is very difficult to define because of its multifaceted nature. And the management of knowledge is also difficult in present informatics world. Knowledge Management has become part of library and its resources. Libraries have to plan their KM based services to meet the challenges of its members effectively, so that libraries will be identified as Knowledge Centers and it’s only done by with the help of information technology. ... Read Full Article

Maximum Number Of Keys In B Tree Of Height K

B-tree is a tree data structure that keeps data always in the sorted order. The time complexity for the operations like searching, insertions, deletions, and sequential access is logarithmic amortized time. In other way, B-tree is a generalization of a binary search tree in which more than two paths may diverge from a single node and all leaf nodes must be at the same level. B-trees are most commonly used in databases and filesystems. B Trees are balanced search tree which are designed to work on secondary storage devices like magnetic disks, hard disks etc. As branchimg factor of Btress can be very large so they can store large amount of data easily. Some algorithms are being implemented to copy the fixed number of pages from disk in to the primary memory like RAM and also write down on to the disks those pages which have been altered. Generally branching factor in between 50 and 2000 are being used to store a large B Tree on disks. If a database contains n key values then worst case running time of searching an un indexed and unsorted key value will be of order of n that is O(n) but if the same data is indexed with a B-tree, the same search operation will run in O(log n) which is always asymptotic less than O(n). To perform a search for a single key on a set of one million keys (1,000,000), As it is well known fact that a linear search will require at most 1,000,000 comparisons but If the same data is indexed with a B-tree of minimum degree (10), then only 114 comparisons will be required in the worst case. So indexing large amounts of data can significantly improve search performance. Although other balanced tree structures can be used, a B-tree also optimizes costly disk accesses that are of concern when dealing with large data sets and operation of searching, inserting, deleting etc. is being done rapidly. In this paper, the mathematical derivation of the maximum number of keys in B Tree of height k and minimum degree m is described, tested and found to be absolutely correct. ... Read Full Article

Towards The Solution Of NP Complete Problems

The word algorithm is the magical word in the field of computer science because the imagination of the existence of any branch of computer science like artificial intelligence, computer network, human computer interaction etc. is useless without the word algorithm. There are some problems for which no any researcher is able to design those algorithms, which have polynomial time complexity in the worst case. No any researchers have even proved that no any polynomial time algorithm can solve them in worst case. NP complete problems arise in domains like automata and language theory, sequencing and scheduling, mathematical programming, algebra and number theory, games and puzzles, optimization problems, Boolean logic, graphs, arithmetic, designing of network, sets and partitions, storage and retrieval, biology, chemistry, physics etc. In this paper such kind of the problems (non deterministic polynomial type complete problem) is being studied along with the approximation algorithm for vertex cover problem. Researchers are applying their best efforts to design new approximation algorithms for nondeterministic polynomial type problems which have comparable less time complexity and space complexity as compared to the existing approximation algorithms. ... Read Full Article

1 2 3 4 5 6 7 8 9 10 next total: 92 | displaying: 1 - 10

Log in

Featured author

Amal Singh