1National Institute of Technical Teachers Training and Research, Bhopal India
2National Institute of Technical Teachers Training and Research, Bhopal India
3 Department of Physics Maulana Azad National Institute of Technology Bhopal India
4Depatment of Computer Applications Maulana Azad National Institute of Technology, Bhopal India
Mobile agent technology offers a new computing paradigm in which a program, in the form of a software agent, can start its execution on a host computer that provides the necessary computational environment to run that agent, suspend its execution on the host computer, transfer itself to another agent-enabled host on the network, and resume execution on the new host. Incarnations of current generation agent can be characterized in a number of ways varying from simple distributed objects to highly organized software with embedded intelligence. A mobile agent is a particular type of agent with the ability to migrate from one host to another where it can resume its execution.
Thus, as the sophistication of mobile software has increased, the associated threats to security have also increased. This paper provides an overview of the variety of threats that are being faced by the designers of agent platforms and the developers of agent based applications. The paper also identifies generic objectives of agent security, and presents a range of measures for countering the identified threats and fulfilling these security objectives.
Lecturer Department of MCA I.E.T. Dr. R.M.L. University Faizabad India
Improvement in traditional paper based R S Task is basically improvement in requirement specification tools by which the R S Tasks does its work. The improvement in R S Tools will not only enable better Requirement Management; but it also enable the automatic generation of consistent, current and audience specific Request Specification that for meet the demand of their individual looker-on.
Department of Computer Science, MANIT Bhopal India
Ad-hoc networking is a concept in computer communications, which means that users wanting to communicate with each other form a temporary network, without any form of centralized administration. A node roaming in a particular network is a challenging task for any network management and key aspects is how we can deploy its information through routing protocols to the base station or destination. In this paper, we use to analyze the performance and comparison of good combination of Reactive, Proactive and Hybrid routing protocol5 for CBR in wireless ad-hoc network. We compare four routing protocols: Zone routing protocol (ZRP)9, which comprises in Hybrid protocol, Optimized link state routing (OLSR), comes in Proactive routing protocol, and ad hoc on-demand distance vector (AODV) and Dynamic MANET on-demand routing protocol (DYMO), which is in Reactive protocol. We simulate the performance of these routing protocols using QualNet Simulator of Scalable Networks.
1Computer Sciences Department , University Malaysia Terengganu (UMT)
2faculty of Computer Science and Mathematics, Universiti Teknology MARA Malaysia
3School of Dental Sciences, University Sains Malaysia Kelatan Malaysia
Disease diagnoses are a complex tasks in medical practice, especially for medical students and new apprentice staff. One of the most promising fields in bioinformatics is medical decision support system. Various artificial intelligent approaches are now being applied to enhance decision making of the clinicians such as using artificial neural networks, fuzzy logic, Bayesian networks, expert system and genetic algorithm. Numerous artificial intelligent techniques are integrated into hybrid intelligent medical informatics in order to produce most effective results in diagnostic tasks.
Department of Computer University of Gondar, Gondar Ethiopia
When drilling for data via SQL injection there are three classes of attack in band, out-of-band and the relatively unknown inference attack. In band attacks extract data over the same channel between the client and the web server, for example, results are embedded in a web page via a union select. Out-of-band attacks employ a different communications channel to drill for data by using database mail or HTTP functions for example. Inference attacks stand alone in the fact that no actual data is transferred rather, a difference in the way an application behaves can allow an attacker to infer the value of the data. SQL Inference is the subject of this paper; this paper is the paper I promised I'd write after talking about this at the Blackhat Security Briefings in Europe in the March of 2005. Better late than never. Mining subtopics from web logs and analyzing their spatial temporal patterns have applications in multiple domains. In this paper, we define the novel problem of mining spatiotemporal theme patterns from web logs and propose a novel probabilistic approach to model the subtopic themes and spatiotemporal theme patterns simultaneously. The proposed model discovers spatiotemporal theme patterns by (1) extracting common themes from web logs; (2) generating theme life cycles for each given location; and (3) generating theme snap-shots for each given time period. Data mining holds the key to uncovering and cataloging the authoritative links, traversal patterns, and semantic structures that will bring intelligence and direction to our Web interactions.
Information Technology Programme, School of Management Technology, Abubakar Tafawa-Balewa University Bauchi Nigeria
A digital repository, called Predire, was designed in this study to address the problem of preservation, accessibility and documentation of project reports at School Management Technology (SMT). System analysis and design methodology is used and the system is implemented using PHP, MySQL, HTML, CSS and Ajax
1,3Govt Narmada P.G.College Hoshangabad India
2Govt. Home Sciene P.G. College Hoshangabad India
In our society people are suffering from obesity. The data related to patient is very large, therefore the need for efficient management of data was felt. The treatment of diseases is a vital and difficult job in medicine. The different types of therapies prevailing in our society emphasize on n types of suggestions. Among these diet therapy is most relevant therapy and it also deals with large databases, so using different Data Mining techniques like - classification, predictive data modeling, an association rule, clustering. Among which clustering technique is used for the classification of similar data in one group and dissimilar data in different groups. First grouping is accomplished by finding similarity between data according to the economic status characteristics of the actual patient data . These groups are the clusters of low, moderate and high. This paper focuses on the diet prediction based on economic status of Indian Society for obese subjects18 by correlating diet nutrients to different sections according to their financial capabilities.
1Institute of Commerce and Management , Jiwaji University, Gwalior MP India
2Department of Library & Information Science, University of Delhi ,Delhi
Information and Communication Technology (ICT) has revolutionised library and information services. Libraries are now expected to use various information technologies to provide information more expeditiously and exhaustively than before. The libraries have found it very difficult to acquire, arrange, process and disseminate information in traditional ways. Information and communication technology offers numerous possibilities to improve information management in libraries and therewith make better use of employees' knowledge. One of such options is use of intranet as internal information system of Universities, which is based on Internet protocols and services. It enables relatively inexpensive and simple storage, organization, processing, maintenance and sharing of information between the library users and library; all these tasks are essential for good information management. It could be possible easy use of libraries, very easy search of any book, research article, thesis, or any type of material in libraries because of the Information and Communication Technology. ICT presents use of various technologies such as computer, telecommunications, Internet, Intranet, application software, micrographic, reprographics, video recordings and other electronic devices for the storage, retrieval, reproduction and dissemination of information in a library environment.
Lecturer Department of MCA I.E.T. Dr. R.M.L. Awadh University Faizabad India
It is known to all that quality requirements are of many kinds. A quality model gives a foundation based on structure. In this model I identify, analyze and give a special name to these quality requirements.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License