PARTICULAR
|
Page No.
|
Empirical and Qualitative Studies by Analyzing Requirement Issues In Global Software Development (GSD). Rabia Sultana, Fahad Jan, Ahmad Mateen and Ahmad Adnan
Abstract:
Global software development has been a phenomenon of growing interest for almost past decade. Requirement engineering plays vital role in global software development projects. In this research work we focused on change management phase of requirement engineering. As we know change is the only thing which is constant. This result in continuously changing the requirements in any software development effort, so effective management of requirement is of vital important. In global software development it is not a straightforward task and it imposes numerous challenges which are unique to this form of development. We suggest a model in this paper for managing requirement change in globally distributed software development context. In this paper qualitative research method is used to explore requirement change management process.
Download full Length Paper......
|
1-18
|
Challenges and Opportunities of Technology Transfer Management.
Armin Mahmoudi
Abstract:
Today, technology has become so rich that many of the developing countries can t even afford to have all the facilities, It is admitted that these changes and takeovers affected economical, industrial, security, technical, cultural aspects of many countries in the world-wide age, only by gaining technological capabilities, power sources for competing with other countries could be gained. Therefore, to expand economical development of a country, it is the politicians and bureaucracy developing countries, duty to look after their respective countries economic problems by keeping in mind their technological gap with the industrial world which is a very dangerous matter and by use of their knowledge about all related policies; they should provide scope of technology for their country.
Download full Length Paper......
|
19-34
|
SMEs Competitive Advantage through Supply Chain Management ractices. Prof. Gyaneshwar Singh Kushwaha
Abstract:
The impact of globalization has compelled SMEs to adopt Information and Communication Technology (ICT) practices to survive and compete with large companies. This paper describes the role of Information and Communication Technology (ICT) enabled Supply Chain Management practices to achieve the competitive advantage. The paper synthesizes the existing contributions to supply chain literature primarily focusing on ICT practices and draws on various related bodies of literature that enables SMEs to achieve competitive advantage. The key for SMEs is that the information and communication technology provides so many options and avenues to take advantage of in a way that big business just can't or doesn't see value in. Finally the paper suggests that SMEs should establish appropriate ICTs goals, identifies critical ICTs needs and allocates financial resources in order to achieve the competitive advantages. Download full Length Paper......
|
35-50
|
Different Issue for Handling Different Cache Strategies on Usenet. Harish Rohil and Jitender Yadav
Abstract:
Usenet is the name of a worldwide network of servers for group communication between people from 1979 and onwards, it has seen a fast growth in the amount of data transported, which has been a break on bandwidth and storage. This paper describes the history of Cache Strategies used for Usenet in a growth viewpoint and its different issues. Usenet volume has been growing exponentially for many years; this growth increasing demands on the cache strategies of a net news server for disk space. We wanted to find a best strategy that could easily handle to meet future growth of system administration effort. In this paper we present a high performance cache server for Usenet News that helps to conserve network bandwidth and disk storage. After a systematic comparison of existing news database formats we designed NEWSCACHE to remedy Usenet News bottlenecks. Download full Length Paper......
|
51-71
|
Power Quality enhancement in MICROGRID (Islanding Mode) by Using ND - MLI DSTATCOM. M. Manigandan, MIEEE and Dr. B. Basavaraja, SMIEEE
Abstract:
Microgrids are systems with clusters of micro generators, which are installed for distributed power generation. When interfaced to the utility grid, microgrids are exposed to common utility power-quality disturbances. The paper focuses on the combination of wind, FC and MT for sustained power generation. We propose herein a dynamic model, design and simulation of a wind/FC/MT hybrid power generation system with power flow controllers.
Download full Length Paper......
|
72-90
|
Analysis of Optical Soliton Propagation in Birefringent Fibers. R. Samba Siva Nayak, Suman. J and Naveen
Abstract:
In this paper, the effects of polarization-mode dispersion and third-order dispersion on soliton pulse propagation and also studied effective pulse dynamics in single mode fiber. In this paper we are discussing about optical pulse propagation inside single mode fiber, polarization mode dispersion is discussed, effects of third-order dispersion and birefringence on solitons propagation and methods for solving coupled nonlinear Schrodinger equations. Download full Length Paper......
|
91-102
|
Human Resource Accounting in IT industry (A study with reference to Infosys Technologies Limited). Dr. P. Natarajan and Bashar Nawaz
Abstract:
Human resource accounting is evaluated as a potential organisational measurement tool. Human being constitutes the most ticklish assets of an organisation. However, the value of this asset does not appear in the financial statement. This paper defines HRA and narrates process of measuring human capital for financial reporting and managerial uses in general and HRA practices adopted by the Infosys Technologies Ltd. in particular.
Download full Length Paper......
|
103-123
|
Solving profit based unit commitment problem using single unit dynamic programming. P.V. Rama Krishna and Dr. Sukhdeo sao
Abstract:
The unit commitment problem under deregulated environment involves determining the time intervals at which a particular generating unit should be online and available for generation, and the associated generation or dispatch, the aim being to maximize its total profits based on a given price profile. This dissertation describes how a lagrangian relaxation method and single unit dynamic programming algorithm is used to solve this complex optimization problem. All the usual unit constraints are considered, after which results for the chosen 26 generating units are presented, and discussed. Download full Length Paper......
|
124-146
|
Achieving Optimal DoS Resistant P2P Topologies for Live Multimedia Streaming using Cost function Algorithm. A. L.Srinivasulu, S. Jaya Bhaskar, Ms. K. Deepthi and Dr. Sudarson Jena
Abstract:
The peer-to-peer approach for live multimedia streaming applications offers the promise to obtain a highly scalable, decentralized, and robust distribution service. When constructing streaming topologies, however, specific care has to be taken in order to ensure that quality of service requirements in terms of delay, jitter, packet loss, and stability against deliberate denial of service attacks are met. In this paper, we concentrate on the latter requirement of stability against denial-of-service attacks. We present an analytical model to assess the stability of overlay streaming topologies and describe attack strategies. Building on this, we describe topologies, which are optimally stable toward perfect attacks based on global knowledge, and give a mathematical proof of their optimality. Download full Length Paper......
|
147-162
|
Quality of Web Sites - A Study On Some Standard Indian Universities. K. V. N. Prasad and Dr. A. A. Chari
Abstract:
The main objective of this study is to investigate the websites of some standard Indian universities and their accessibility and utility to various users. Thus the main investigation is to analyze various characteristics connected with these websites to assess the quality. To begin with, it is attempted to investigate various faults occurring in the websites of 30 universities. The aim is to focus on these faults (major or minor) and to suggest corrections. The study has in depth analysis and categorizing the vital few major and minor faults which contribute to the confusion and wasting of precious time of users. The study is based on "Pareto principle". The modules of the university web sites studied are various departments, courses offered, admission, administration, libraries, faculties etc. Download full Length Paper......
|
163-182
|
Simulating Complex Environmental Phenomena Using Cubemap Mapping Technique. Movva. N.V. Kiran Babu, Ch. Siva Rama Krishna, M. Hanumantha Rao and V. Venu Gopal
Abstract:
concepts of simulation of rain falling effects using: Delta3D Particle System Editor, which renders rain falling effect using two static raindrop textures, and Physical Properties-Based Method which renders rain falling effect by mapping the background scene onto raindrops according to their refraction property. We observe that the reflection property of a raindrop is also important since it contribute to its visibility in the dark regions. Hence, we propose a new method that takes into account both refraction and reflection property of raindrop. increase in the computational speed of graphics hardware in recent times. This power afforded by modern graphics cards enables the possibility of simulating complex environmental phenomena. Download full Length Paper......
|
183-203
|
Data Sharing and Querying in Peer-to-Peer Data management System. Jyoti Duhan
Abstract:
In this work, we investigate mechanisms to support data sharing and querying in a peer-to-peer data management system, that is, a peer-to-peer system where each peer manages its own data. To support data sharing, we propose the use of mapping tables which list pairs of corresponding data values that reside in different peers. My work illustrates how automated tools can help manage the tables between multiple peers by inferring new tables from existing ones and by checking their consistency. In terms of querying, we propose a framework in which users pose queries only with respect to their local peer. Then, we provide a rewriting mechanism that uses mapping tables to translate a locally expressed query to a set of queries over the acquainted peers. Download full Length Paper......
|
204-223
|
Secure File Transmission Scheme Based on Hybrid Encryption Technique. Gaurav Shrivastava
Abstract:
To enhance the security level of data transmission in Open Network, a hybrid encryption Technique based on AES, RSA and MD5 is proposed. The mechanism makes full use of advantage of AES RSA, MD5 because encryption speed of AES algorithm is faster than RSA algorithm for long Encrypting Plain Texts, and RSA algorithm Key distribute is very safely and easily. Under the dual protection with the AES algorithm and the RSA algorithm, the data transmission in the Open Network will be more secure. Mean while, it is clear that the procedure of the entire encryption is still simple and efficient as ever. Digital abstract Algorithm MD5 is adopted in this technique. It is an effective technique to overcome the problem of safe data transmission in network. This Technique maintained the confidentiality, Authentication and Integrity. Download full Length Paper......
|
224-238
|
Investigating Flip-Flop Gates Using Interactive Technology. Mr. Amish Patel, Ms. Neha P. Chinagi and Mr. Hiren R.Raotole
Abstract:
Recent advances in metamorphic theory and low-energy models offer a viable alternative to telephony. After years of key research into the World Wide Web, we verify the emulation of active networks, which embodies the important principles of algorithms. We construct an application for virtual machines, which we call LoopHoove. Download full Length Paper......
|
239-255
|
B2B Versus B2C Direct Selling. Ankit Chadha and Er. Banita Chadha
Abstract:
The business-to-business (B2B) group includes all applications intended to enable or improve relationships within firms and between two or more companies. In the past this has largely been based on the use of private networks and Electronic Data Interchange (EDI). Examples from the business-business category are the use of the Internet for searching product catalogues, ordering from suppliers, receiving invoices and making electronic payments. This category also includes collaborative design and engineering, and managing the logistics of supply and delivery.The business-to-consumer (B2C) group is a much newer area and largely equates to electronic retailing over the Internet. Download full Length Paper......
|
256-270
|
Application And Implementation of Crm In Hotels of Developing Cities - A Case Study of Ranchi. Praveen Srivastava, Abhinav Kumar Shandilya and Shelly Srivastava
Abstract:
Hotel sells room to the guest. It is the main product that Hotel sells and with the sale of this product, other hotel products like food, beverage, laundry services etc. also get sold. Earlier when the numbers of hotels were limited, guests were not left with many choices. They were bound to select from the available few. This placed hotelier at the comfort zone as they never thought about building any long term relations with the guest. Their marketing strategy was limited only till the guest made transaction with the hotel. This was known as transactional approach of marketing and hoteliers were involved in this marketing to sell their prime product (i.e. rooms) and earn revenue. Download full Length Paper......
|
271-294
|
An Automatic Bacterial Colony Counter. Ms. Hemlata, Mr. Ashish Oberoi and Mr. Sumit Kaushik
Abstract:
Bacterial colony counting is useful in many areas e.g. Disinfectants are used to kill harmful microorganismsin many different applications. They are used in veterinary practice to help to preventthe spread of infectious diseases such as foot and mouth and avian influenza. They are used in food production and catering premises,as well as in the pharmaceutical industry, to prevent contamination of products with harmful bacteria. In the medical area, hospital acquiredinfections (e.g. caused by Staphylococcus aureus MRSA) can be controlled by employing a rigorous regime of cleaning and disinfectingwith appropriate bactericidal products [1, 2].To count these bacterial colonies manually is very hectic and time consuming process To count these bacterial colonies microbiologist uses some dyes so that bacterial colonies appear as colored spots and our problem is to count the number of these bacterial colonies. Download full Length Paper......
|
295-309
|
Role of Stress, Social Support and Personality in Coping
Swati Kumari Singh
Abstract:
Personality and social relationship play an important role in almost every stress and coping.
Daily process methods are particularly useful in elucidating how these factors might
influence both responses to an outcome of stress. ourwork has linked both dimensions of
personality, particularly the big five, and aspects of social relationships, particularly social
support, to the likelihood of engaging in certain coping strategies and the effectiveness or
outcomes of these coping strategies. In addition, we have found the effect of personality on
coping and stress outcomes to vary by the situational context in which stress occurs. We
review findings from our recent daily process studies of stress, coping, and social support.
Further, we discuss the costs and benefits of the daily process methodology for addressing
these questions, highlighting the clinical utilities of findings gleaned with the use of this
approach. Finally, we discuss further directions and applications of daily process methods to
the study of stress and coping.
Download full Length Paper......
|
310-313
|
A STUDY OF ENVIRONMENTAL NEED ASSESSMENT
DR SANTOSH KUMAR TRIPATHI
|
314-321/b>
|