CA Prashant Jain

total: 873 | displaying: 341 - 360

Program Schedule

  Pioneer Institute of Professional Studies, Indore 15th National Conference On Emerging Trends in IT (Feb 16, 2013) Program Schedule   Registration and Fellowship- Lobby                       (9:00 a.m. – 10:00 a.m.) Inaugural Session- Conference ... Read more

Programming with ANSI and Turbo C

Programming with ANSI and Turbo C is proposed for anyone interested knowing about the C programming. Programming is used today in very much. It  introduces ... Read more

Cryptography and Network Security

Cryptography & network security is proposed for anyone interested knowing about security. Security is used today in every field. It introduces the concept of security. Click ... Read more

Computer Fundamentals

Computer Fundamentals is proposed for anyone interested in knowing about computers. Computers are used in every field. It has changed the basic concepts of computing ... Read more

Pioneering Approach of Damage Recovery of Forensics Evidence Images

Digital Forensic is the application of science and engineering to the legal problem of digital evidence with the reference of computer and related fields. It is a synthesis of science and law. Digital Forensic is application of forensics techniques and method in Computer, Internet, Mobile, Database, and other Digital Memory media. Because of some unique features and applications making the application of classical computer forensic techniques are very difficult nowadays. The different forensic techniques are required to gather the evidences images from the computer and store it in a digital storage media. The stored images can be damaged due to unexpected internal and external electromagnetic effects. Because of the security reasons we cannot make multiple copies of evidences images. Therefore we need some recovery techniques to get the damaged images back. We will discuss different algorithms of damage recovery. There are some major limitations of existing block recovery methods. I proposed a new block recovery format with the combination of CRC and MD5. ... Read more

Recommender Systems for E-commerce: In Perspective of Business Strategies

The rapid growth of emerging technologies and Internet has moved the world towards an e-world where most of the things are digitized and available on a mouse click. Most of the commercial transactions are performed on Internet with the help of on-line shopping. The huge amount of data puts an extra overload to the user in performing on-line task. Recommender Systems are being used widely to reduce this extra overload and recommend the scrutinized product to the customers. Several data mining techniques are frequently being used for recommendation technology to enhance the online business, amongst which Collaborative filtering, Association rules and web mining are on top . In this paper we try to give an overview of these recommendation techniques with suitable examples and illustrative diagrams, and change of trends in recommender systems. Also the SWOT analysis is discussed for these technologies that give an idea about the respective effects of these systems on business strategies. Various diagrammatic representations are illustrated. And finally we conclude that there is a need of an extra effort to overcome the limitations in existing technology also the aspects of these technology to be used as a business strategy are discussed. ... Read more

Key Drivers of Mobile Commerce An Exploratory Study

Mobile commerce is a business model that allows a consumer to complete all steps of a transaction by using a mobile phone or personal digital assistant (PDA) rather than by going to a physical store or by voice. Downloading ring tones and screensavers and using different types of paid information (traffic reports, sports news, etc.) and entertainment services (SMS chats, games, etc.) are common types of mobile commerce, but mobile commerce transactions can also include purchasing physical goods such as books to be delivered offline. The rapid evolution of B2C e-Commerce alternative interaction channels like World Wide Web, Mobile Telephony and Digital TV along with the continuously changing consumer behavioral patterns, has created a strong need for research tailored to the peculiarities and needs of the aforementioned emerging “distance shopping” channels. Stimulated by these evolutions, this paper focuses on the investigation of consumer attitudes and behaviors against mobile commerce in towards identifying he critical success factors for accelerating its usage. An online consumer survey constituting the research vehicle was employed within an exploratory research design setting. Despite the fact that some considerable differences regarding mobile commerce adoption rates and consumer behavioral patterns were observed, it was found that mobile commerce penetration in India is on its infancy. However, improving mobile devices, designing more user-friendly shopping interfaces, developing effective applications and services, along with reducing prices, influencing opinion leaders and solving security, bandwidth and coverage problems, constitute the critical success factors for accelerating mobile commerce adoption amongst youth in particular. ... Read more

Measuring E-Governance Awareness Among Citizens of Indore District of Madhya Pradesh

E-governance is the use of technology to reach Governmental services to the masses. Recent developments in the web technologies and networking technologies have reduced the ... Read more

Mining Association Rules in Long Sequence

Discovering interesting patterns in long sequences, and finding confident association rules within them, is a popular area in data mining. Most existing methods define patterns as interesting if they occur frequently enough in a sufficiently cohesive form. Based on these frequent patterns, association rules are mined in the traditional manner. Recently, a new interestingness measure, combining cohesion and frequency of a pattern, has been proposed, and patterns are deemed interesting if encountering one event from the pattern implies with a high probability that the rest of the pattern can be found nearby. It is quite clear that this probability is not necessarily equally high for all the events making up such a pattern, which is why we propose to introduce the concept of association rules into this problem setting. The confidence of such an association rule tells us how far on average from a particular event, or a set of events, one has to look, in order to find the rest of the pattern. In this paper, we present an efficient algorithm to mine such association rules. After applying our method to both synthetic and real-life data, we conclude that it indeed gives intuitive results in a number of applications. ... Read more

A Study of the Impact of Information Technology on Stock Market Indices

A Stock market index is a leading indicator of the performance of the overall economy or a sector of the economy through providing up to date information. Indices serve as a benchmark for measuring the performance of stocks or portfolios. Indian Stock Market has many indices and it contains many companies and every index is important. Investors, Stakeholders and Policy Makers invest the money in stock market, especially in sectoral indices, and gain more profits. Information Technology (IT) industry has played a major role in the Indian economy during the last few years and the same is even reflected in the performance of the companies individually as also through their respective indices. A number of large, profitable Indian companies today belong to the IT sector and a great deal of investment interest is now focused on the IT sector. Information technology provides mass access to the stock market, while improving efficiencies which enables investors to make informed decisions. Technology and ebusiness have mpacted the stock market in several significant ways. This paper proposes to analyze the impact of BSE TECk index, BSE IT index and CNX IT index on Sensex and Nifty respectively. The appropriate regression test would be applied to test the data. ... Read more

Customer Perception On Mobile Banking

Mobile usage has seen an explosive growth in most of the Asian economies like India, China and Korea. The main reason that Mobile Banking scores over Internet Banking is that it enables 'Anywhere Anytime Banking. Customers don't need access to a computer terminal to access their bank accounts, now they can do so on-the-go while waiting for the bus to work, traveling or when they are waiting for their orders to come through in a restaurant. Mobile banking in India is set to explode - approximately 43 million urban Indians used their mobile phones to access banking services during quarter ending August, 2009, a reach of 15% among urban Indian mobile phone user .As per a survey made by Bangalore based research firm that tracks current and future mobile trends in India has revealed that the most popular mobile banking services used by consumers are Checking accounts, to view last three transactions, status of checks, payment reminders, to sent a request for new check book. The present study is done to know the aw eness of mobile banking among banking customers and their perceptions on mobile banking and the impact of mobile banking on customers. The research was conducted by taking 100 account holders of various banks. ... Read more

An Association Mining of Efficient by Compressed Large Database

Large Amount of data is being using very rapidly in the world. It to be compressed takes much more time and takes lot of effort to process these data for knowledge discovery and decision making. Data compression technique is one of good solutions to be reduce size of data that can be save more time the time of discovering useful knowledge by using appropriate methods, for example Data mining. Data mining is used to help users discover interesting and useful knowledge more easily to decision making purpose. It is more and more popular to apply the association rule mining in recent years because of its wide applications in many fields such as stock analysis, web log mining, medical diagnosis, customer market analysis and bioinformatics. In this paper the main focus in on association rule mining and data pre-process with data compression. In this paper we analysis the methods simple Apriori, Partion based Apriori and Apriori with compressed dataset. We compare these three methods on the basis of minimum support, inimum confidence, number of records and execution times ... Read more

Integrating DNA Computing in Chaos-Based Optimization Algorithm Approach for Cryptography

Abstract: DNA cryptography is a field which is being in tremendous demand for providing effective electronic security since 1990s. It exploits the extreme randomness and complexity properties of DNAstructure for coding and decoding any information. As a new step to enhance the security, this paper presents an alternative security method of chaotic encryption and decryption by embedding DNA security algorithm in it. The presented method of cryptography can transmit highly confidential data efficiently and securely, and complements standard, algorithmic procedures, providing security solutions with novel features. ... Read more

Data Scientist Hot Victim of Short Term Shortage

With ever increasing amount of data being generated every moment there is a strong need of a person who can not only read but can also interpret, analyze and can evaluate critically to bring out the desired result out of it. Data Scientist is one who can work on enormous data involving data complexity, can query huge databases with different aspects and extract meaningful data with different view using tools and applications. He is a mixture of business analysis, analytics modeling and data management and the scientist. These people are gaining importance and are becoming crucial assets as they give an edge to business in today's competitive era. The purpose of this paper is to figure out the shortage of data scientist and to find out the remedies to cope up with such scarcity of the intellectual professionals in IT hiring market. Keywords: Data scientist, hiring, internet, shortage. ... Read more

BPO A SWOT Analysis

BPO is one of the popular business practices in today's competitive environment. India has enormous opportunities emerging from globalization and consequent lowering of tariff barriers. The Indian BPO industry is constantly growing. However, along with the Phenomena Increase in BPO to India there has been a backlash against outsourcing. Information Technology has given India formidable brand equity in the global markets. Indian BPO companies have a unique distinction of providing efficient business solutions with cost and quality as an advantage by using state of art technology. This article explains overview of BPO industry in India comparative strength, weakness, opportunities and thread Indian BPO industry. ... Read more

An Analysis of Major Information Security Management System Standards

In the era of globalization information is an important asset for any organization. Due to rapid growth in the use of electronic devices and networking, protecting the information and providing its security is an important task for any organization. However, in spite of tremendous growth in information security management system there is scarcity of a standard which can guarantee total information security to any organization. This paper tries to introduce different information security management system standards. It also presents an analysis of pros and cons of major information security standards, like ISO27001, PA DSS, PCIDSS, ITIL and COBIT. The study will provide various features, compatibility and usability of major information security standards. It will also imbibe the profile and methodology of each standard under study. ... Read more

Role of Cloud Computing in Business Concepts Merits and Demerits

Cloud Computing arose as one of the latest/hottest topic in the world of Information Technology. It is based on several research areas like Grid Computing, Virtualization, Distributed computing and Utility Computing. Cloud Computing is the next stage in the Internet's evolution. It provides the means through which everything — from computing power to computing infrastructure, applications, business processes to personal collaboration — can be delivered to you as a service wherever and whenever you need. ... Read more

Benefits Challenges and Proposed Solutions of e-Business in India

This paper emphasizes on the concept, benefits, challenges and major solutions of e-Business in India. Many of the people are confused and make others confused between e-Business and e-Commerce In this paper it was try to explore the basic concepts of e-Business because in India majority of people both businessmen and customers find difficulty in e-Business even many of them don't know what it is. It presents a research basically on why many of the people are not aware or scared of e-Business and what are the major problems people find while operating business or purchasing through internet. Basically, electronic business is the process of buying, transferring, or exchanging products, services, and/or information via computer networks, including the internet. E-business can also be beneficial from many perspectives including business process, service, learning, collaborative, community. To compete with other domestic and international traders' knowledge and use of e-Business is a must in today's world. Thus, by giving light on advantages, challenges and solutions, it was tried to give simple brief outlook on e-Business. ... Read more

Design of One Dimensional Chaotic Maps Based System for Secret Key Generation

The quality of the stream ciphers highly depends on the quality of the key-stream. The process of key generation is the major task which defines the level of security of a cryptosystem. A lot of key generation techniques based on linear feedback shift registers have been suggested in the literature. In this paper, we propose a circuit based on one-dimensional chaotic maps for the generation of secret keys. Multiple Logistic maps and Cubic maps are used to design the system which generates the key-stream in a novel manner. The proposed system includes the preprocessing and quantization of the chaotic sequences. The integration of multiple one dimensional chaotic systems is basic thought to secure the data from the unauthorized sources. Further these keys are used in cryptography to encrypt and decrypt the data. The experimental results show that the sequence has desirable autocorrelation property and can be applied in a cryptographic process. ... Read more

total: 873 | displaying: 341 - 360