Home | Conferences | Techknowledge | 9th National Conference

9th National Conference RSS

back 1 2 3 4 5 6 7 8 9 10 next total: 92 | displaying: 31 - 40

Cloud Computing Architecture For Technical Educational Institutes

Cloud –a parallel & distributed system consisting of a collection of interconnected & virtualized computers that are dynamically provisioned. In this paper we are studying present situation of infrastructure provided by engineering institutes of B grade cities and suggest how cloud computing service providers can help. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Section 1 Introduces cloud computing. In section 2 we are explaining SaaS and in section 3, need of cloud infrastructure for technical institutions. Section 4 – a proposed architecture and section 5 describes benefits and drawbacks followed by conclusion. ... Read Full Article

An Approach For File Splitting And Merging

File Splitter is a program which does not require installation and can be used to split files to multiple chunks as well as to merge multiple chunks into a single file. File Splitter is a software which is used to split the user specifying file according to the user specifying size. It is very difficult to transfer one big file from one end to another through any media like internet or small storage like Floppy, Pen drive, CD etc. This software helps to overcome this problem. The split portions of file may carry some temporary information to denote the number of split part and total number of parts etc. This idea is used to split big files to small pieces for transferring purpose, uploading etc. In the destination side, these parts of file can be jointed to form the original source file. Splitting process is mainly aiming in the area of file transferring from one end to another. There are three techniques to split the file. 1. Split in the size of 1.4MB (Floppy size) 2. Split in the size of 650MB(CD size) 3. User specifying size, Here file will be split equally in the specified size To ensure the security, the user can include password to split and combine the files. This split portion will be in non readable format and will be encrypted. If the user has given password to split, the same password is required to do the combining option. This program is developed using Java and can implement in .NET also. ... Read Full Article

Revolution Aspects Of Nanotechnology With Emphasis Of Future, Ethics And Challenges

Nanotechnology is the aspect of very small technology compare to micro technology. Here, this paper describes the different types of description about nanotechnology with definition and explanation of that definition also, here; we have been explained nanotechnology basic as well as conflict meaning, how nanotechnology works as general purpose technology. it’s also describes different generation of nanotechnology, how nanotechnology works, the world of nanotechnology, different types of nano-size structures, applications with nanotechnology, future of nanotechnology, and also describes risk aspects, challenges and ethics in nanotechnology. In application or product of nanotechnology we have been given different types of real world applications and explain world with scale. And how are nanotechnology effects to medical science, finance and economics, health and medicine and other areas also. ... Read Full Article

Feature Selection: An Important Issue in Text Categorization

Text categorization is a problem of assigning a document into predefined classes. Feature selection is one of the important issues in text categorization. Wide variety of feature selection methods exist for text categorization like Information Gain (IG), Document Frequency (DF),Term Strength (TS), Mutual Information (MI) etc. Feature selection methods can improve the efficiency and performance of text categorization. This paper reports a controlled study on a large number of feature selection techniques for text classification. We also discuss some variation and combinations of these feature selection methods. ... Read Full Article

A Conceptual Development And An Implementation For Exploring Hypothesis Space In Data Mining

The problem faced by data miners is that the information obtained is very difficult to understand and hence to represent because of high dimensionality. In this paper the effects of errors, data representation, and assessment approach in data mining is discussed. Data-mining techniques designed for classification problems usually assume that each observation is a member of only one category. We extend these methods to the case in which observations may be full members of multiple categories. They evaluate three of the popular methods (decision tree induction, linear discriminant analysis, and neural networks) and explore representational and performance measurement perspectives.We apply data mining to predicting bankruptcy. We show that different parameters for forecasting bankruptcy are obtained when economic conditions are normal and when countries are operating in crisis mode, as has been the case recently in parts of Asia. ... Read Full Article

Software Bug Tracking Increasing Efficiency And Reducing Project Costs

The costs of erroneous software can be as high as 50 percent of the investment in software development. Yet, the potential to improve software quality and reduce project cost is enormous. Software bug tracking can be an effective means to achieve quality i.e. error free at less cost. However, bug tracking is commonly misunderstood, incorrectly implemented, and often seen as an impediment and cost to the organization. In this paper, we discuss the quality costs of erroneous software and provide an approach to implement an effective software bug tracking system within a system. ... Read Full Article

Cloud Computing: A New Era In It Service Delivery

Enterprises strive to reduce computing costs. Many start by consolidating their IT operations and later introducing virtualization technologies. Reducing costs, accelerating processes and simplifying management are all vital to the success of an effective IT infrastructure. Companies are increasingly turning to more flexible IT environments to help them realise these goals. Cloud computing is clearly one of today’s most appealing technology areas due, at least in part, to its cost-efficiency and flexibility Cloud computing enables tasks to be assigned to a combination of software and services over a network. This network of servers is the cloud. Cloud computing can help businesses transform their existing server infrastructures into dynamic environments, expanding and reducing server capacity depending on their requirements. This paper describes cloud computing, a computing platform for the next generation of the Internet. The paper defines clouds, explains the business benefits of cloud computing, and outlines cloud architecture and its major components. ... Read Full Article

World Wide Web :Its Perception And Usage For Professional Development Among Management Faculty

Introduction: No one can dispute that we live in a digital environment and the complexity of digital world has been simplified by the World Wide Web. World Wide Web technology has created new opportunities for learners and has created a bridge between complexity and simplicity. Businesspeople and educators have expended many efforts to test different applications and build demand for their educational offerings. Web learning sites have proliferated. The audiences and instructional methodologies for the different Web learning efforts vary. Some are for children, some are for adults. Some offer academic courses that parallel on-site classroom instruction, while others offer professional development programs that a teacher or other professional might otherwise present in a workshop or training program. Some offer traditional didactic instruction, while others attempt, through varying amounts of assistance, to orchestrate more open-ended, constructivist experiences for the user. Some are rigid in the way they channel the learner through a sequence of interactions. Others let users direct their own learning by choosing where they want to go and what they want to do. Web-based professional training yields additional benefits, like Access is available anytime, anywhere, around the globe; per-student equipment costs are affordable. Student tracking is made easy, Content is easily updated. Applications of Web-based technology for professional development include: Digital libraries that permit the retrieval of standards, lesson plans, assessments, evaluation resources, full texts of articles, artifacts such as student work, and other resource materials, in any medium. Multimedia learning technologies for training purposes that present information, assess learning, provide feedback, and individualize the learning path. Tools and environments for synchronous and asynchronous professional communication and collaboration (e.g., e-mail, whiteboards, chats, video-conferences, file-sharing systems, etc.) Professionally useful databases that permit members of professional communities to post, meta tag, query, mine, and link records of interest. Annotation interfaces layered over digital library resources that make it possible for members of professional communities to exchange context-embedded reflections and feedback about them. ... Read Full Article

Secure Protocol For File Transfer In Adhoc Networks

Ad hoc networks are new paradigm of networks offering unrestricted mobility without any underlying infrastructure. The adhoc networks have salient characteristics that are totally different from conventional networks. These cause extra challenges on security. However, traditional cryptographic solution is useless against threats from internal compromised nodes. Thus, new mechanisms are needed to provide effective security solution for the ad hoc networks. Particularly challenging problem is how to feasibly detect and defend possible attacks on routing protocols, especially the internal attacks, such as Byzantine attack. A trust evaluation based security solution is proposed to provide effective secure routing and malicious node detection that provides resilience against Byzantine attacks. In this paper, algorithms can be integrated into existing routing protocols for ad hoc networks. ... Read Full Article

Association Rule and The Educational Data

With the growing amount of data a new field called data mining is emerging zxtremely quickly. Data mining tools which perform data analysis may uncover important data patterns, contributing greatly to business strategies, knowledge bases, and scientific, educational and medical research. Association rules mining is one of the most well studied data mining tasks. It discovers relationships among attributes in databases, producing if-then statements concerning attribute values. There are increasing research interests in using data mining in education. This new emerging field, called Educational Data Mining, concerns with developing methods that discover knowledge from data come from educational environments. This paper shows how data mining can be used to come up with interesting knowledge from student database. We identify the measure of interestingness and implement them on student database and come up with interesting rules that can help teachers and related people to deal with students and understand their behavior and activities. ... Read Full Article

back 1 2 3 4 5 6 7 8 9 10 next total: 92 | displaying: 31 - 40