1. K-means Clustering for Software Faults prediction

Meenu Singla Department of computer science and Engineering Thapar University, Patiala, Punjab Bhavtosh Mishra Department of Information technology, Rajkiya Engineering College, Banda UP

Abstract:

The occurrence of defects in the software system has become prominent problem in development process of software. A software fault refers to wrong transition within software that causes the product to act in an unintended manner. Faults are the root causes of software failures. There are various types of software faults such as coding, design and requirement faults, data problems . clustering and classification of faults are important issues.ICM are used for these like Expert System (ES), Multi Agent System (MAS), Knowledge Based Reasoning (KBR), Genetic Algorithm (GA), Case Based Reasoning (CBR), Data Mining (DM)techniques, Rule Based Reasoning (RBR), and Artificial Neural Networks (ANN) are the components of ICM CBR and RBR are the parts of KBR. In this paper we have used K means clustering method for software faults prediction.

2. A Comparitve Study of Anlyzing Data Minig Methods in Libyan National Crime Data

Ayman Altaher Mahmmud Phd Student At SHIATS
W. Jebersen Head of Computer Science Department of SHIATS

Abstract:

Law enforcement agencies which are represented in the police today are faced with large volume of data that must be processed and transformed into useful information and hence data mining can greatly improve crime analysis and aid in reducing and preventing crime as much as possible. Crime reports and data are used as an input for the formulation of the crime prevention policies and strategic plans. This work will apply some data mining methods to analyses Libyan national criminal record data to help the Libyan government to make a strategically decision regarding prevention the increasing of the high crime rate these days. The data was collected manually from Benghazi, Tripoli, and Al-Jafara Supremes Security Committee (SSC). A comparative study will be conducted with a recent model used in the Federal Bureau of Investigation (FBI)  to detect and classify the major personality and behavioral characteristics of an individual based upon analysis of the crime or crimes the person committed. Our proposed model will be able to extract crime patterns by using association rule mining and clustering to classify crime records on the basis of the values of crime attributes.

3. The Distributed Computing Environment: Issues of Secure Networks

Shambhu Sharan Srivastava Associate Professor, School of Management Sciences,Varanasi

Abstract:

In the Distributed Computing Environment, many processors/nodes remain active in system at any moment, coordinate or operate without interfering. Nodes have certain degree of freedom like own hardware, own code, sometimes own independent task, but at the same time there will still be sharing of some common resources and information. One of the main themes of recent research in distributed computing is “locality” (as utilized by decentralized/peer-to-peer systems). Networks grow fast, thus locality and scalability becomes a major issues. Computing security is, at its core, more than a technical issue. It is a fundamental business challenge. Managers have plenty of security alternatives, but have very little real guidance on making intelligent decisions about them. Today’s distributed, multi-vendor, Internet-connected environments encompass more insecure systems and networks than ever before. Security in Distributed Computing offers the manager of distributed systems a thorough, common-sense framework for cost-effective computer security. The first step to understand security is to know what the potential risks are, or more specifically, to determine the type and level of security risks for the organizations. Security risks are unique to each organization because they are dependent on the nature of the business and the environment in which the organization operates. Security risk is determined by identifying the assets that need to be protected.

4.Emerging Challenges and Opportunities of Mobile Commerce in India: A Study on Societal Perspective

Utkarsh Kumar Research Scholar Faculty of Commerce, BHU
Anil Kumar Gope Assitant Professor, School of Management Sciences- Varanasi
Shweta Singh Research Scholar Faculty of Commerce, BHU

Abstract:

In India, the position of mobile banking was in saga and this time, it is in pic position. The speed of reaching the people is going high and high. This is time of wireless world and sense of prestige; no doubt the mobile commerce is contributing to enhance the beauty of life and playing the role of metaphor and has become the part and parcel of our life. This growth has changed people to do business in mobile commerce (МCommerce).  Peoples are transferring to M-Commerce to attain good and fast transaction into market and saving their precious time. M-Commerce has become distinguished in Indian people, quickly during last few years. Due to large number of mobile application, growth rate in mobile penetration in India is increasing with the rapid speed. The mobile users has shifted to use the android phone from simple and black and white phone and taking the service of internet, the role of telecom companies is also important in the being popular of mobile commerce. Although many people have started E-Commerce but still a separate part of the society feel uncomfortable and hesitate to use M-Commerce because of security problems, payment issues and complexity of mobile applications. This paper identifies facts about the feasibility of MCommerce in India today its growth and the Strength and opportunity, weakness and threats lying ahead.

5. The Role of ICT in Governing Rural Development

Priyanka Shahi Assistant Professor, RAJ School of Management and Sciences, Babatpur Varanasi

Abstract:

Information and Communication Technologies (ICTs) hold tremendous potential for rural development in India in the areas of agriculture, health, Micro and Small Enterprises (MSEs), and education. Information and Communication Technologies (ICTs) refers to systems for producing, storing, sending and retrieving digital files .These files can contain text, sounds and images, both still and moving. Information and communication technologies, and particularly the Internet, are transforming all human activities dependent on information, including those in rural areas. Advancement in Information and Communication Technologies (ICT) has demonstrated opportunities to the people to utilize it in their socioeconomic and cultural development in a better and more sophisticated way. By utilizing it, the government finds the importance and role played in delivering services at the locations convenient to the citizens. The rural ICT applications attempt to offer development ideas and solutions to the people who are deprived of basic human facilities such as safe drinking water, diary, education, immunization, reproductive health, employment generation, human rights, etc. Similarly, the government and administration try to exploit the technological explosion by utilizing the ICT in offering improved and affordable solutions to these basic necessities of the people at their village doorsteps. Towards the beginning of 21st century, in India, we have witnessed at our disposal a technology of which our forefathers could only dream— a technology which can transform local happenings into global events and which can reverse the trends towards divergence.

6. ANN based  performance measure of students in learning a course work

Bhavtosh Mishra Department of Information technology, Rajkiya Engineering College, Banda UP
Kiran Mishra Department of computer science and Engineering, NIT Bhopal

Abstract:

Intelligent Tutoring System (ITS) is concerned with the design and development of an automatic and interactive system which can communicate among different entities such as student, pedagogue and subject as well as compute the various parameters which govern the dynamics of leaning through the interaction of pedagogue and domain knowledge. Classical methods have been developed which use mathematics and heuristics for the design of such tutoring systems Various computing methods have been developed for performance measure of a student  important among some are given below.  Hsieh et al.,2009 developed a learning path construction and the learning object recommendation and persionlization, analyze learners’ preferences  using Apriori algorithm  and Formal concept analysis. Lee et al.,2009 did mining student’s learning behaviour, and personalization providing feedback to courseware authors (improvement of domain knowledge  usingC4.5 (Decision tree, Rule set). ID3, Prism and Apriori, . Romero et al.,2002 discovered pedagogically relevant knowledge by Clustering, Classification, association rule mining. Merceron et al.,2005 used sequential patterns mining and traversal patterns mining. Kristofic et al2004 worked on personalization discover knowledge about students’ behavior during learning; personalization . improving exercises and scheduling the course based on linear regression and probabilistic models..Hamalainen et al., 2006  performed Categorization (classification) of student, deciding importance of  question type responsible for category of student and method for enhanced Learning using  ANN (Quick, Dynamic and RBFN) for deciding importance of inputs and C5.0 (decision tree and rule set) for categorization(classification) of student We have developed an Artificial Neural Network (ANN) based  paradigm which takes into account various difficulty levels of courseware with different content/question types such as   A(Analytical), R (Reasoning), D (Descriptive), AR (Analytical-Reasoning), AD (Analytical-  Descriptive), RD (Reasoning-Descriptive) and ARD (Analytical-Reasoning-Descriptive).The data  mining method has been deployed for categorization (classification) of student types such as Very Good, Good, Average, Below Average and Poor based on his performance in a questionnaire of a course ware

7. Mobile to Fuel Explosive E-commerce Growth in India

Priya Yadav Research Scholar Faculty of Commerce B.H.U. Varanasi
Pranjeet das Research Scholar Faculty of Commerce B.H.U. Varanasi
Ravi Kumar Malhotra Research Scholar Faculty of Commerce B.H.U. Varanasi

Abstract:

E-commerce is process of doing business through computer networks. Advances in wireless network technology and the continuously increasing number of users of mobile latter on make an ideal platform for offering various high utility services in just a snap of a finger to the mobile users and give pace to the rapid development of E-Commerce in India. E-commerce is considered an excellent alternative for companies to reach new customers but the fact that has hindered the growth of e-commerce is security. Security is the challenge facing e-commerce today & there is still a lot of advancement made in the field of security for increasing the use of e-commerce in developing countries the B2B e-commerce is implemented for improving access to global markets for firms in developing countries. With the special characteristics and constraints of mobile terminals and wireless networks and the context, situations and circumstances that people use their hand-held terminals which will ultimately fuel explosive e-commerce growth in India This paper highlights the various key challenges and opportunities which Indian e-commerce industry may face in the upcoming years. And also discuss challenges in electronic commerce transactions.

8. Organizational Effectiveness through Technology Innovation and HRM Strategies

Rajkumar Singh
Rajkamal Prajapati

Abstract:

The main theme is to understand the organizational effectiveness from recent developments in technology innovation and human resources management. The editorial first describes the need for technology innovation and HRM integration. A three-strategy model for global technology innovation and organizational development was adopted: personnel strategy, system strategy, and organizational strategy. The personnel strategy could play a crucial role in enhancing the effects of human resources management (HRM) and entrepreneurship by supporting the main dimensions of HRM. The system strategy was used to facilitate technology innovation through knowledge management while the organizational strategy was adopted to create positive organizational culture and high performance systems. The paper suggests that globally distributed engineering and international technology entrepreneurship be new area for theory building. The strategies from this special issue have implications for the study of new information technology innovation and e-HR developmental approaches as well as professional service, customer relations modeling and strategic HRM.

9. An Intelligent Navigation and Path Finding Technique of Fuzzy logic

Prem Kumar Senior Programmer, Election Department, Patna, Bihar, Election Commission of India

Abstract:

In all path finding and navigation problems the inputs are its environment space and the output of path finding and navigation algorithm is a route from source location to destination location. It seems very simple to choose a path from source to destination in theory but in real world it is very difficult to decide a route that is safe and optimal. This paper presents the navigation method which uses the human intelligence to navigate for path finding using fuzzy logic. The procedure simulates decision-making process of human for navigation and path finding.

10. Enhancing the use of Object Based Contents Addressable Storage

Simab Hasan Rizvi Head, Department of Computer Science & Engineering, S.I.M.T. Lucknow

Abstract:

In Today’s age of Tetra Scale computing, the application has become more data intensive than ever. The increased data volume from applications, in now tackling larger and larger problems, and has fuelled the need for efficient management of this data. In this paper, a technique called Content Addressable Storage or CAS, for managing large volume of data is evaluated. This evaluation focuses on the benefits and demerits of using CAS it focuses, i) improved application performance via lockless and lightweight synchronization of access to shared storage data, ii) improved cache performance, iii) increase in storage capacity and, iv)  increase network bandwidth. The presented design of a CAS-Based file store significantly improves the storage performance that provides lightweight lock less user defined consistency semantics. As a result, this file system shows a 28% increase in read bandwidth and 13% increase in write bandwidth, over a popular file system in common use. In this paper the potential benefits of using CAS for a virtual machine are estimated.  The study also explains   mobility application for active use and public deployment.

11. Modification in Aodv Protocol for Prevention from Black Hole Attack in Manets

Divya Singh Assistant Professor, KIT , Varanasi
Sumit Jalan Assistant Professor, SMS Varanasi

Abstract:

In Wireless ad-hoc network, the infrastructure of MANET’s differ to each other due to the topology of MANETs changes time to time because the mobile nodes of MANET’s are movable. In MANETs protocols, if any node wants to communicate with another node then they establish a path with the help of adjacent node due to this the security in MANETs protocol is vulnerable. Thus, there are various types of attacks are try to break the security of MANETs protocol. AODV is a popular and most usable protocol of MANET and Black Hole Attack is a severe attack that affects the functionality of AODV protocol. The malicious node treat to the source node which have freshest and nearest path for the destination. In this work, my prime focus specifically is on follow the security against Black Hole Attack. I proposed AODV protocol capture some extra effort for source node and destination node which based on best possible effort (heuristic) with appropriate simulation using ns-2.35.

12. Role of E-commerce in Today’s Business

Sri Nivas Singh Assistant Professor, RAJ School of Management and Sciences, Babatpur Varanasi

Abstract:

Electronic commerce, commonly known as e-commerce which consists of the buying and selling of products or services over electronic systems such as the internet and other computer networks. Ecommerce stands for electronic commerce and pertains to trading in goods and services through the electronic medium. The amount of trade conducted electronically has grown dramatically since the spread of the internet. B2B, B2C, C2C and similar opportunity help consumer preferences and consumer markets developing electronic infrastructure for challenges of the future. E-commerce has revolutionized business, changing the shape of competition with internet, the computer communication network creating a  e-commerce market place for consumers and business . With developments in the Internet and Web-based technologies, distinctions between traditional markets and the global  electronic marketplace-such as business capital size, among others-are gradually being  narrowed down. India is showing tremendous growth in the e-commerce. The low cost of the PC and the growing use of the Internet is one of reasons for that. There is a growing awareness among the business community in India about the opportunities offered by e-commerce. The present paper mainly aims to discuss the Role of E commerce in Today’s Business.

© 2015, School of Management Sciences | All rights reserved.

MANDATORY DISCLOSURE | WEBMAIL | Chat Live