Computing Trendz - The Journal of Emerging Trends in Information Technology
Latest Publications


TOTAL DOCUMENTS

12
(FIVE YEARS 0)

H-INDEX

0
(FIVE YEARS 0)

Published By "School Of Management Sciences, Varanas"

2230-9152

Author(s):  
Divya Singh ◽  
Sumit Jalan

In Wireless ad-hoc network, the infrastructure of MANET's differ to each other due to the topology of MANETs changes time to time because the mobile nodes of MANET's are movable. In MANETs protocols, if any node wants to communicate with another node then they establish a path with the help of adjacent node due to this the security in MANETs protocol is vulnerable. Thus, there are various types of attacks are try to break the security of MANETs protocol. AODV is a popular and most usable protocol of MANET and Black Hole Attack is a severe attack that affects the functionality of AODV protocol. The malicious node treat to the source node which have freshest and nearest path for the destination. In this work, my prime focus specifically is on follow the security against Black Hole Attack. I proposed AODV protocol capture some extra effort for source node and destination node which based on best possible effort (heuristic) with appropriate simulation using ns-2.35.


Author(s):  
Simab Hasan Rizvi

In Today's age of Tetra Scale computing, the application has become more data intensive than ever. The increased data volume from applications, in now tackling larger and larger problems, and has fuelled the need for efficient management of this data. In this paper, a technique called Content Addressable Storage or CAS, for managing large volume of data is evaluated. This evaluation focuses on the benefits and demerits of using CAS it focuses, i) improved application performance via lockless and lightweight synchronization ofaccess to shared storage data, ii) improved cache performance, iii) increase in storage capacity and, iv) increase network bandwidth. The presented design of a CAS-Based file store significantly improves the storage performance that provides lightweight lock less user defined consistency semantics. As a result, this file system shows a 28% increase in read bandwidth and 13% increase in write bandwidth, over a popular file system in common use. In this paper the potential benefits of using CAS for a virtual machine are estimated. The study also explains mobility application for active use and public deployment.


Author(s):  
Priya Yadav ◽  
Pranjeet Das ◽  
Ravi Kumar Malhotra

E-commerce is process of doing business through computer networks. Advances in wireless network technology and the continuously increasing number of users of mobile latter on make an ideal platform for offering various high utilityservices in just a snap of a finger to the mobile users and give pace to the rapid development of E-Commerce in India.E-commerce is considered an excellent alternative for companies to reach new customersbut the fact that has hindered the growth of e-commerce is security. Security is the challenge facing e-commerce today and there is still a lot of advancement made in the field of securityfor increasing the use of e-commerce in developing countries the B2B e-commerce is implemented for improving access to global markets for firms in developing countries. With the special characteristics and constraints of mobile terminals and wireless networks and the context, situations and circumstances that people use their hand-held terminalswhich will ultimately fuel explosive ecommerce growth in India This paper highlights the various key challenges and opportunities which Indian e-commerce industry may face in the upcoming years. And also discuss challenges in electronic commerce transactions.


Author(s):  
Utkarsh Kumar ◽  
Anil Kumar Gope ◽  
Shweta Singh

In India, the position of mobile banking was in saga and this time, it is in pic position. The speedof reaching the people is going high and high. This is time of wireless world and sense of prestige; no doubt the mobile commerce is contributing to enhance the beauty of life and playing the role of metaphor and has become the part and parcel of our life. This growth has changed people to do business in mobile commerce (М- Commerce). Peoples are transferring to M-Commerce to attain good and fast transaction into market and saving their precious time. M-Commerce has become distinguished in Indian people, quickly during last few years. Due to large number of mobile application, growth rate in mobile penetration in India is increasing with the rapid speed. The mobile users has shifted to use the android phone from simple and black and white phone and taking the service of internet, the role of telecom companies is also important in the being popular of mobile commerce. Although many people have started E-Commerce but still a separate part of the society feel uncomfortable and hesitate to use M-Commerce because of security problems, payment issues and complexity of mobile applications. This paper identifies facts about the feasibility of MCommercein India today its growth and the Strength and opportunity, weakness and threats lying ahead.


Author(s):  
Dr. Prem Kumar

In all path finding and navigation problems the inputs are its environment space and the output of path finding and navigation algorithm is a route from source location to destination location. It seems very simple to choose a path from source to destination in theory but in real world it is very difficult to decide a route that is safe and optimal. This paper presents the navigation method which uses the human intelligence to navigate for path finding using fuzzy logic. The procedure simulates decision-making process of human for navigation and path finding.


Author(s):  
Shambhu Sharan Srivastava

In theDistributed Computing Environment, many processors/nodes remain active in system at any moment, coordinate or operate without interfering. Nodes have certain degree of freedom like own hardware, own code, sometimes ownindependent task, but at the same time there will still be sharing of some common resources and information. One of the main themes of recent research in distributed computing is "locality" (as utilized by decentralized/peer-to-peer systems). Networks grow fast, thus locality and scalability becomes a major issues. Computing security is, at its core, more than a technical issue. It is a fundamental business challenge. Managers have plenty of security alternatives, but have very little real guidance on making intelligent decisions about them. Today's distributed, multi-vendor, Internet-connected environments encompass more insecure systems and networks than ever before. Security in Distributed Computing offers the manager of distributed systems a thorough, common-sense framework for cost-effective computer security. The first step to understand security is to know what the potential risks are, or more specifically, to determine the type and level of security risks for the organizations. Security risks are unique to each organization because they are dependent on the nature of the business and the environment in which the organization operates. Security risk is determined by identifying the assets that need to be protected.


Author(s):  
Sri Nivas Singh

Electronic commerce, commonly known as e-commerce which consists of the buying and selling of products or services over electronic systems such as the internet and other computer networks. Ecommerce stands for electronic commerce and pertains to trading in goods and services through the electronic medium. The amount of trade conducted electronically has grown dramatically since the spread of the internet. B2B, B2C, C2C and similar opportunity help consumer preferences and consumer markets developing electronic infrastructure for challenges of the future. E-commerce has revolutionized business, changing the shape of competition with internet, the computer communication network creating a e-commerce market place for consumers and business . With developments in the Internet and Web-based technologies, distinctions between traditional markets and the global electronic marketplace-such as business capital size, among others-are gradually being narrowed down. India is showing tremendous growth in the Ecommerce. The low cost of the PC and the growing use of the Internet is one of reasons for that. There is a growing awareness among the business community in India about the opportunities offered by ecommerce. The present paper mainly aims to discuss the Role of E - commerce in Today's Business.


Author(s):  
Ayman Altaher Mahmmud ◽  
W. Jebersen

Law enforcement agencies which are represented in the police today are faced with large volume of data that must be processed and transformed into useful information and hence data mining can greatly improve crime analysis and aid in reducing and preventing crime as much as possible. Crime reports and data are used as an input for the formulation of the crime prevention policies and strategic plans. This work will apply some data mining methods to analyses Libyan national criminal record data to help the Libyan government to make a strategically decision regarding prevention the increasing of the high crime rate these days. The data was collected manually from Benghazi, Tripoli, and Al-Jafara Supremes Security Committee (SSC). A comparative study will be conducted with a recent model used in the Federal Bureau of Investigation (FBI) to detect and classify the major personality and behavioral characteristics of an individual based upon analysis of the crime or crimes the person committed. Our proposed model will be able to extract crime patterns by using association rule mining and clustering to classify crime records on the basis of the values of crime attributes.


Author(s):  
Meenu Singla ◽  
Bhavtosh Mishra

The occurrence of defects in the software system has become prominent problem in development process of software. A software fault refers to wrong transition within software that causes the product to act in an unintended manner. Faults are the root causes of software failures. There are various types of software faults such as coding, design and requirement faults, data problems . clustering and classification of faults are important issues.ICM are used for these like Expert System (ES), Multi Agent System (MAS), Knowledge Based Reasoning (KBR), Genetic Algorithm (GA), Case Based Reasoning (CBR), Data Mining (DM)techniques, Rule Based Reasoning (RBR), and Artificial Neural Networks (ANN) are the components of ICM CBR and RBR are the parts of KBR.


Author(s):  
Rajkumar Singh ◽  
Rajkamal Prajapati

The main theme is to understand the organizational effectiveness from recent developments in technology innovation and human resources management. The editorial first describes the need for technology innovation and HRM integration. A three-strategy model for global technology innovation and organizational development was adopted: personnel strategy, system strategy, and organizational strategy. The personnel strategy could play a crucial role in enhancing the effects of human resources management (HRM) and entrepreneurship by supporting the main dimensions of HRM. The system strategy was used to facilitate technology innovation through knowledge management while the organizational strategy was adopted to create positive organizational culture and high performance systems. The paper suggests that globally distributed engineering and international technology entrepreneurship be new area for theory building. The strategies from this special issue have implications for the study of new information technology innovation and e-HR developmental approaches as well as professional service, customer relations modeling and strategic HRM.


Sign in / Sign up

Export Citation Format

Share Document