496 research outputs found
An Adaptive Design Methodology for Reduction of Product Development Risk
Embedded systems interaction with environment inherently complicates
understanding of requirements and their correct implementation. However,
product uncertainty is highest during early stages of development. Design
verification is an essential step in the development of any system, especially
for Embedded System. This paper introduces a novel adaptive design methodology,
which incorporates step-wise prototyping and verification. With each adaptive
step product-realization level is enhanced while decreasing the level of
product uncertainty, thereby reducing the overall costs. The back-bone of this
frame-work is the development of Domain Specific Operational (DOP) Model and
the associated Verification Instrumentation for Test and Evaluation, developed
based on the DOP model. Together they generate functionally valid test-sequence
for carrying out prototype evaluation. With the help of a case study 'Multimode
Detection Subsystem' the application of this method is sketched. The design
methodologies can be compared by defining and computing a generic performance
criterion like Average design-cycle Risk. For the case study, by computing
Average design-cycle Risk, it is shown that the adaptive method reduces the
product development risk for a small increase in the total design cycle time.Comment: 21 pages, 9 figure
Technology Adoption and E-Learning in Higher Education: An Analysis by using Meta Analyses
The increase use of new technology has made a huge change in higher education Use of new electronic tools as computer internet audio video conferences likewise which are helpful in learning higher education This study aims to analyze the attitude of students teachers and administrators towards technology adoption and e learning in higher education To accomplish the objective it examines the ten previous research studies based on the e learning and new technology adoption in higher education In this study meta analyses has used as a statistical tool to analyze the study and recorded that the acceptance of the null hypothesis This study found that the students teachers and administrators are positively accepted the technology adoption and e learning in higher education The teachers and students has increased their use of new technology while delivering their lectures make their assignments presenting their views in seminars conferences and workshop
IP TRACEBACK Scenarios
Internet Protocol (IP) trace back is the enabling technology to control Internet crime. In this paper, we present novel and practical IP traceback systems which provide a defense system with the ability to find out the real sources of attacking packets that traverse through the network. IP traceback is to find the origin of an IP packet on the Internet without relying on the source IP address field. Due to the trusting nature of the IP protocol, the source IP address of a packet is not authenticated. As a result, the source address in an IP packet can be falsified (IP address spoofing). Spoof IP packets can be used for different attacks. The problem of finding the source of a packet is called the IP traceback problem. IP Traceback is a critical ability for identifying sources of attacks and instituting protection measures for the Internet. Most existing approaches to this problem have been tailored toward DDoS attack detection
Use of Online Public Access Catalogue [OPAC] at Sadakathullah Appa College, Tirunelveli District, Tamil Nadu: A Study
OPAC is an imperative device in the libraries to offer a moral support of the clients. Electronic Information access and recovery in numerous ways should be possible utilizing the OPAC administrations. The present study explores the Use of Online Public Access Catalogue (OPAC) at Sadakathullah Appa College (SAC) Tirunelveli District, Tamil Nadu. This paper discusses various aspects of OPAC use such as frequency use, and satisfaction regarding use of OPAC etc.
Use of Online Public Access Catalogue [OPAC] at Sadakathullah Appa College, Tirunelveli District, Tamil Nadu: A Study
OPAC is an imperative device in the libraries to offer a moral support of the clients. Electronic Information access and recovery in numerous ways should be possible utilizing the OPAC administrations. The present study explores the Use of Online Public Access Catalogue (OPAC) at Sadakathullah Appa College (SAC) Tirunelveli District, Tamil Nadu. This paper discusses various aspects of OPAC use such as frequency use, and satisfaction regarding use of OPAC etc.
Mobile Cloud Computing Concepts and Models: A Review
Cloud computing has gained a lot of intriguein these years from both industry and the scholarly world. As it might, the scale and significantly usefulproperties of cloud application arises critical lots of challenges in front of resource management and for thispowerful resource scheduling techniques are especially required.The proliferation of cloud computing resources in the present years offers a route for mobile phones with limited assets to achieve computationally serious undertakings dynamically.The mobile-cloudcomputing worldview, which includes coordinated effort amongst versatile and cloud assets, is relied upon to end up progressively prevalent in mobile application development.Along with the advancement of gadgets which are versatile in nature and handheld, the asset need of individual applications also growing. As it might, the performances of mobile phones are still constantly being identified with execution (e.g., count, accumulating and battery life), setting adaptation (e.g., irregular accessibility, flexibility and heterogeneity) and safety points of view and it always will be. A prominent solution to remove these impediments is the affirmed computation offloading, and this is the point of convergence of (MCC) mobile cloud computing. Mobile Ad-hoc execution confinement and difficulties may assume a noteworthy part in influencing the execution and development of cloud based administrations. In such manner, distinctive strategies and techniques will likewise be broke down and exemplified in the examination consider in order to guarantee the unwavering quality of cloud-based administrations' activities
Commodification of Women Characters in Indian and Greek Mythology with Special Reference Chitra Banerjee Divakaruni and Amanda Elyot
The papers attempt to explore the feminine themes in Greek and Indian mythological works. This paper looks at how Indian and Greek mythological texts deal with female existence. The authors have compared and contrasted the feminine and masculine gods in Greek and Indian literature. It is clear that female and male gods are deified and treated differently. In Greek literature, the characteristics of each god are shown to be those of destruction and construction. Additionally, the negative characteristics were given to the feminine gods, while the virtues of construction were given to the masculine gods. The paper likewise ponders on the treatment of ladylike and manly divine beings in Indian fanciful texts like the Puranas and the old legends of India like the Ramayana and
Mahabharata. The commodification of female existence in Indian folklore is also the subject of this paper, which draws particular attention to the works of Chitra Banerjee Divakaruni and Amanda Elyot
BIBLIOMETRIC ANALYSIS OF RESEARCH LITERATURE ON PIPER BETLE
Betel leaf plays an important role in ancient civilization. Chewing betel leaves with areca nut was pointed out in the pre-historic books. In 13th century, Marco Polo mentioned about the betel chewing among kings and nobles in India. Betel and areca nut plays an important role in Indian Culture, especially among Hindus. On that basis of idea the keyword of “Piper betle” or betel was collected from the Web of Science. This study is limited for the period 1997- 2016 with Bibexcel and Pajek tool. Scientists are so much interested to publish the research immediately in the journal article. English is the widely used communicable language. It is true in the betel research also. Added to that, this study focuses on publishing trend, authorship pattern, author’s productivity, h-index, co-authorship map, citation map
Association of Personality Traits among under Graduate students (With reference to Management stream)
This study was done to decide if there is a relationship between character attributes and graduation stream of understudies. This concentrate additionally tried the relationship of character characteristics with picked specialization. The large five-character attributes are estimated for an example of 106 administration understudies through a study created by the analyst. The chi-square outcomes showed relationship of extraversion, reliability, suitability and receptiveness with character attributes. Greater part of high scorers came from designing foundation while greater part of low scorers came from business foundation. Greatest quality contrasts were seen in designing understudies. Specialization decision was viewed as free of character
- …