891 research outputs found
Custom Annotation for Execution of Data Manipulation Commands in a Generic Manner ? A Case Study
Java annotations are the tags employed for providing meta data for Java code. They can be attached to a class, method, or a field to provide some additional information to the compiler and JVM. This paper introduces the concept of Annotations in Java with an emphasis on various in-built annotations in Java and the annotations that are used by other annotations. The reader is introduced to J2EE standard annotations and those employed by Hibernate as a replacement for XML-based mapping document. Steps in designing and using custom annotations are highlighted. A custom annotation design is illustrated with the help of an example for execution of DML commands in a generic way in a database management system independent manner
Struts, Hibernate and Spring Integration ? A Case Study
Over the last few decades software development has undergone tremendous radical changes in order to enhance user experience, user friendliness and to widen its scope over large geographical area. The key actors in this arena are two leading IT companies Microsoft and Sun Microsystems, now taken owner by Oracle Inc. who compete on a continual basis for rendering rapid professional software design and development process at the same time incorporating more functionality and focusing strongly towards software maintenance issues. Due to this intense competition, the ultimate beneficiary is a software developer who is tremendously benefited at large. In this review paper, the researcher aims at consolidating the technological advancements that have brought a revolutionary change in corporate software development over last few decades. The main substance of the paper is technological advancements facilitating J2EE application development viz., struts framework, hibernate and spring framework which operate in different layers of scalable N-tier architecture. Each technology has its own merits and de-merits. The researcher attempts to aggregate the benefits offered by the trio in a single J2EE application thereby bringing in best of three worlds to a single application. The application is boosted with powerful struts tag library, persistent layer provided by hibernate and dependency injection or Inversion of Control (IoC) user the same roof. A case study is presented to demonstrate the integration of three diverse technologies, struts, hibernate and spring. JBOSS application server is employed as a container for J2EE components
Multi Objective Criteria for Selection of Manufacturing Method using NLP Parser
Installing a manufacturing method might be very expensive and time consuming project. Organization should examine and decide on how best to make this decision of selecting appropriate process meeting their requirements. In order to improve the manufacturing cycle more than 110 manufacturing processes have been proposed. The objectives aimed at and the functions focused on by these processes vary. The process should be flexible enough to accommodate reasonable changes in design. This poses a great challenge to a manager in selection of effective and economical manufacturing process. Different organizations have different objectives and based on their specific requirement they deploy suitable process conforming to their objective. Today’s business scenario is highly competitive, complex and dynamic in nature which demands strategic planning meeting the challenges of changing time. In this paper we have made an attempt to enable the end user a quick selection of appropriate manufacturing method based on multiple objectives. The information pertaining to the method selection is stored in a persistent Relational DataBase Management System (RDBMS) which can be manipulated by the end user as the organizational objectives and the market needs change. The end user instead of querying the database directly will use the natural language, termed as Manufacturing Query Language (MQL) designed by us, which is interfaced with RDBMS using prolog. To implement MQL, we have defined a finite set of symbols, words and language rules, MQL grammar. The parse tree is constructed based on the grammar specified. The NLP query is parsed using NLP parser designed by us and the queries which are successfully parsed are evaluated by mapping them to the corresponding prolog query using Java interface to Prolog (JPL). Prolog rules are stored in three different prolog knowledge bases, mqlgrammar.pl, rules.pl, and methodrules.pl. NLP offers most flexible way to implement grammar which can be readily extended with least efforts and as such offers an efficient way of implementing rules in dynamically changing scenarios. Our current work focuses on a multiple objectives. In real situations multi objective and multi function criteria is required for the proper selection of the manufacturing method. Our future work involves modification of the tool and parser to take account of multiple objectives and function
Hybrid Security Framework for Activity Based Authentication using RSA & Genetic Algorithm
In the current information age, security has achieved a tremendous importance in e-commerce applications involving financial transactions. Non-repudiation, data integrity, data confidentiality and authenticity, have become an integral part of information security. There is a tremendous risk involved in the communication of a plain text over Internet. Cryptography offers a solution for this type of risk which is referred to as a technique of encrypting and decrypting messages in such a way that they cannot be interpreted by anybody with the exception of a sender and an intended recipient. In majority of the e-commerce based applications where security is considered to be of prime importance, a single encryption algorithm is adopted for encrypting a password and the authentication information is stored on a single database server which becomes open to risks against different computer hacks. A novel solution for this problem is to generate an individual’s personal and dynamic activities which will be hard for the attackers to guess. Further, this can be combined with distributed technology where the authentication information is distributed over geographically separated multiple servers. In this paper authors have generated an activity based distributed 3D password incorporating various activities where the authentication information is distributed over geographically separated multiple authentication servers. The key pair is generated using RSA algorithm which is encrypted using single-point cross over and mutation of bits at the extreme position. This further adds another level of security and renders the key unbreakable by an unintended user. The configuration information pertaining to the distributed environment is stored in XML file which is parsed using Microsoft's XML Parser and the activity related information is stored in different servers which is encrypted using RSA algorithm. The technique employed combines RSA algorithm with Genetic Algorithm to offer a robust hybrid security framework in a distributed environment which is difficult to guess for an unintended user
Chondroid Syringoma and Eccrine Spiradenoma
Fine needle aspiration cytology (FNAC) is a well established diagnostic tool. However, most clinicians prefer to diagnose suspected skin tumors by excisional biopsy as they are easily accessible and hence benign skin adnexal tumors are rarely encountered on FNAC. There are only a very few case reports describing the fine needle aspiration cytologic features of chondroid syringoma and eccrine spiradenoma for diagnosis. Cases: First case was a 20 year old female who presented with firm,non-tender swelling in the left little finger measuring 1 cm in diameter. Smears showed clusters of round to plasmacytoid cells with moderate to abundant cytoplasm embedded in a chondromyxoid ground substance . Hence, a diagnosis of chondroid syringoma was made. Another case was a 40 year old lady who presented with a painful swelling on the anterior chest wall measuring approximately 0.8 cms in diameter. Smears were moderately cellular with cohesive sheets and clusters of bland cells of three different cell types. Hence, a probable diagnosis of eccrine spiradenoma was made and both the cases were confirmed histologically. Conclusion: Appropriate knowledge of the cytologic features of chondroid syringoma and eccrine spiradenoma helps in providing a definitive diagnosis and correct management of the patient
Cascaded Fuzzy Inference System for Overall Equipment Effectiveness of a Manufacturing Process
Overall equipment effectiveness (OEE) is one of the widely accepted performance evaluation methods most commonly employed for measuring the efficiency of a manufacturing process in a manufacturing industry. It plays a most prominent role in improving the efficiency of a manufacturing process which in turn ensures quality, consistency and productivity. The OEE parameters, availability, performance and quality are not single parameters. But these parameters in turn depend on several other parameters which introduce a cascaded effect in OEE computation. The variation in the value of lowest level parameters propagate to the higher levels making the OEE computation a complex process. To cater such situations, in this paper authors propose cascaded fuzzy inference system for measurement of Overall Equipment Effectiveness. In the simplified model proposed by the authors, only few prominent parameters up to two levels are considered. The model can be easily extended to incorporate more parameters and more levels to render it more realistic
User Satisfaction of Library Resources and Services: A Case Study of Krishnadas Shama Goa State Central Library
The present study examines the user satisfaction of library resources and services in Krishnadas Shama Goa state central Library. Structured questionnaires were distributed among 200 users to collect their opinions regarding the frequency and purpose of their visit to the library. 160 questionnaires were received and analyzed. The study highlights the opinion of respondents about the available resources, facilities, and services in the library. In this study, it was found that the majority of the respondents are satisfied with the resources and services in the library. The study concludes that the library needs to integrate training program for library users as well as staff for effective utilization of resources and services. There is also need to take Regular feedback from visitors and library members
Rain Tourism: A Progressive Opportunity and Challenges for Konkan Tourism
Konkan region is located in Maharashtra state surrounded by Sahyadri hills ranges in the west, metro city Mumbai and suburbs in the north, Goa in the south and mighty Arabian Sea in the east. It enjoys 720 km long coastline, it is one of the unexploited tourism destination in India which has a huge potential to attract and provide a mesmerising service to the tourists. Konkan is blessed with surprisingly natural waterfalls amid green canopy mountains and beautiful popping out Wadis welcoming the tourists with a wonderful gesture of delicious mouth-watering signature delicacies, rich culture and down to earth ethnic hospitality. The waving coconut trees directing the visitors towards the gorgeous emerald virgin beaches, historical forts, ancient temples, mango and beetle nut grooves. It bears all the pre-requisites that perfectly fit into various types of tourism formats like religious tourism, cultural tourism, ethnic tourism, rural tourism, agro tourism, Senior citizen tourism, Adventure tourism, Food tourism, etc. But unfortunately due to heavy rainfall during rainy season it experiences a rock bottom low in terms of tourist flow. Rainy season in Konkan persists from the month of June to the month of September. It has measured more than 4000 mm rainfall at an average last year that is almost 57% above normal rainfall in Maharashtra. Many of the time it observes flood situations. The rainfall trends experienced usually by Konkan region states that June and July are aggressive month with heavy rainfall followed by reduced intensity of rain from August to October. Thus June and July can be focused on adventurous and risk taker topological tourists while August, September and October can be focused on senior citizen and family oriented tourists.
The researcher tries to identify a niche kind of tourism opportunity that is rain tourism which will focus on attracting tourists’ inflow during the slack period from various locations of Maharashtra, India and across the globe that have below average or low rainfall at their place. A detailed SWOC analysis of Konkan is done to highlight the challenges and opportunities so it can arise as sustainable and a notable contender in achieving $ 5 trillion economy of India. Konkan can possibly generate lot of opportunities during rainy season to attract domestic and international tourist around the World at a large who have below average or low rainfall during rainy season. Konkan can provide them with a memory to cherish for a lifetime with beautiful jade scenic beauty, aroma of freshness, crabs and frogs moving around with mouth-watering hot snacks and local delicacies. In addition to this it can have value added infrastructure for rain based activities like Mud pies for rain dance, Rain gears loaded heritage walk, Monsoon camping, Rain gauge workshop, Rice farms plantation activity, Ayurveda spa, Rain trek, Horse safari, natural waterfall showers, Open discotheque, Wine and beer appreciation and testing sessions, Government or NGO initiated Food tourism events like Rain food festivals or cookery shows etc., Rain sports like football, volley ball etc., adventure sports like river rafting, Waterfall rappelling and many more. If this opportunity will be converted in to reality will help, the temporary hospitality workforce that is laid-off due to off-season to have hopes of being financially benefitted with job security, locals will have direct and indirect source of income. Due to revenue generation by the government through taxes it will concentrate on developing a safe infrastructure for Konkan region with respect to rainy season. If the above stated opportunities be converted in to reality it will gradually add on to the nations GDP for sure.
Konkan has to firstly be optimistic about the concept of rain tourism as history has revealed that rain has always come up with disaster and loss. With the government intervention by developing proper roadways, railway network and proper whether forecast and alerts the situation is getting better. Konkan faces many challenges in many aspects to get this niche tourism concept into reality starting from changing the mind-set of locals favouring this innovative enterprise and gaining their support along with skill development and expertise. Accessibility infrastructure which will be safe and secured like good quality and big roads, specially trained drivers etc. Medical infrastructure including good medical assistance and quick response team. Digital infrastructure like Wi-Fi, mobile network, high speed internet has become the basic necessity presently hence it is required to be developed at least at the tourist destinations. Power failure especially during rainy seasons is a normal, the government needs to find out solution to curb this issue and ensure 24hrs electricity or backups by the hoteliers. Aggressive marketing using digital marketing tools and travel agents networking is very essential to make this seed idea to flourish in a success story. Advertisement will help to create awareness, develop confidence and motivate the potential tourists to opt for it. Government or NGO should initiate with an emergency rescue task support team who can rush in case of any unforeseen calamities. The safety and security concerns need to be properly dealt by the Police department with more check post to control immoral and illegal practices that might occur during rainy season.
The researcher has not only explored the potential opportunities and possible challenges during rainy season in Konkan but also has tried to analyse the perception, willingness and acceptance by the probable tourists with the help of well-developed questionnaire through digital survey tools like Google forms etc. The hypothesis made by the researcher has been statistically tested to prove the significance of the concept.
Rain tourism concept is an innovative niche avenue that can be applied to all other tourism destinations with heavy rainfall and slack business during that period. With lot of opportunities in the concept, if the challenges faced are dealt in a professional and planned way will give rise to a new transformation. Rain tourism has a great prospective to streamline the economic graph of the destination which goes down during the rainy season and raise it upwards
Design and Development of Deterministic Finite Automata Parser for Querying Hardware and Software Configuration Information of Local Area Network
A typical Local Area Network (LAN) of an educational institution hosts different hardware devices and contains numerous softwares installed, serving the needs of persons from low technical expertise to high technical standards. Further as the academic curriculum is upgraded most of the existing softwares become obsolete and new softwares are installed or existing softwares are upgraded to new version to cater the needs which is a continuous process. To address such issues, a quick and reliable snapshot of the network configuration is desirable at any point of time. On many occasions the softwares with limited usage are installed only on few machines of a LAN. Thus, it proves to be a time consuming task to search the whole network for a single rarely used software. To tackle such issues the authors in the current paper have provided a first hand tool for automating the process of discovering LAN configuration, storing it persistently and querying the stored information in human language. The entire process is automated without any human intervention. The information pertaining to the hardware and software configuration is stored in a persistent Relational DataBase Management System (RDBMS) which can be manipulated by the tool automatically as the new hardware is connected to a LAN or a software configuration changes. The end user instead of querying the database directly will use the natural language, termed as Hardware Query Language (HQL) and Software Query Language (SOQL) designed by the authors, which is interfaced with RDBMS using DFA parser implemented by the authors. To implement HQL/SOQL, a finite set of symbols, words and language rules are defined which together constitute HQL/SOQL grammar. In this paper we present a deterministic finite automata (DFA) parser developed by us for parsing HQL/SOQL tokens. The state table and state diagrams are developed for different tokens of HQL/SOQL identified by us. State information is stored in a persistent database management system as a measure towards improving efficiency and extensibility. Currently, HQL/SOQL consists of only few commands and more commands will be added to HQL/SOQL command set in near future. The reports generated are exported to MS Word using Microsoft Word 12.0 object library
Robust Aggregation Mechanism in WSN for Mitigating Attacks
Wireless Sensor Network (WSN) is a collection of sensor nodes connected to base station which is characterized by many to one communication. Many sensor nodes will send data to base station making it many to on communication. The sensor nodes can act as sender and receiver of data as the data is sent to base station through intermediary nodes. The nodes are resource constrained as they are deployed in hostile environment or environment where resources are limited. The nodes are expected to participate in sensing or surveillance. WSNs are widely used in civilian and military applications for sending data and surveillance. As WSN is becoming increasingly popular, security needs to be provided in the network as the nodes are vulnerable to various attacks. Since the nodes are energy constrained, it is very useful to use some aggregation technique in order to reduce communication overhead and also energy consumption. Recently Roy et al. focused on aggregation in WSN for filtering out the impact of attackers on the network. Their focus was to use aggregation in WSN in order to reduce communication overhead and reduce the impact of attacks on WSN. In this paper we implement a variant of protocol that takes care of secure communications over WSN besides reducing energy consumption and mitigating attack impact. The simulation results are encouraging
DOI: 10.17762/ijritcc2321-8169.15065
- …