165 research outputs found

    Effect of Web Mining on B2B Marketing

    Get PDF
    The Indian B2B marketplace in IT sector is going through a transformation. Both existing and new players are experimenting with new Buying solutions through internet as they lack a seamless flow of information among customers, suppliers and their employees. This research paper attempts to analyse the effect of web mining on B2B marketing on the basis of certain parameters of Web Positioning, Product Availability, Layout of a web site and Ease in Accessibility. Further, analysis regarding the relationship between age, qualification, profession and income group has been done. Thus, the main purpose of the research work is to discuss the relation of various variables related to web mining, and the extent of their influence on the success of B2B marketing of a product

    A NOVEL ALGORITHM BASED ON CASCADING OF NEURAL NETWORK MODELS AND WAVELET TRANSFORM FOR IMAGE ENHANCEMENT.

    Get PDF
    Image enhancement and restoration is pre-request of computer vision. The distortion and degradation of image suffered the process of pattern matching and quality of image. Wavelet is very important transform function play a role in image enhancement and image de-noising. The concept of wavelet used as soft thresholding and hard thresholding. A processing of data through wavelet is very efficient in process of neural network. In this paper we discuss the proposed algorithm for image enhancement based on self organized map network and wavelet transform. Basically self organized map network is unsupervised training mechanisms of pattern, due to this reason the processing of network is very fast in compression of another artificial neural network method. And the combination of wavelet and self organized map network have great advantage over conventional method such as histogram equalization and multi-point histogram equalization and another conventional technique of image enhancement

    QUANTIFICATION OF ASH AND SELECTED PRIMARY METABOLITES FROM NON-EDIBLE PARTS OF SEVERAL FRUITS

    Get PDF
    Objective: Fruit peel and seeds are generally considered as waste and it creates a trouble in waste management. Economic value and use of the plant partially dependent on the quantitative and qualitative aspects of their organic reserves like sugar, starch, protein etc. The purity of material is associated with the ash analysis. The present study was aimed to analyze selected fruit waste for their ash content and primary metabolites.Methods: Selected fruit waste was collected, cleaned, dried and powdered. This powdered material was used for analysis. Total ash value, water soluble ash value, and acid insoluble ash were analyzed. Methods proposed by Nelson for total and reducing sugar, Chinoy for starch and Bradford for protein were adopted for estimation of primary metabolites.Results: Highest content of total ash was recorded 12.73±0.1% in watermelon peel (WMP), acid insoluble ash 0.94±0.05% in cucumber peel (CC) and water soluble ash was highest in WMP i.e. 11.44±0.05%. Pomegranate peel (PGP) recorded the maximum amount of total and reducing sugar 44.35±0.20 mg/gdw and 45.68±0.04 mg/gdw respectively. Mango seeds were recorded for highest starch content i.e. 21.86±5.45 mg/gdw. Watermelon peel (WMP) showed the highest protein content i.e. 32.35±0.66 mg/gdw in comparison with other fruit waste materials.Conclusion: The outcome of this study might prove important in reducing waste and also in industries fruit waste can be utilized as raw materials having commercial importance. Secondary metabolites or bioactive compounds can be synthesized by using these primary metabolites. Obtained findings can lead to a great interest in fruit waste pharmaceuticals.Â

    BPMN to BPEL: Implementing ATM System

    Get PDF
    BPMN provides a standard graphical notation for modelling business process. BPEL is a XML based language which generate executable code from BPMN diagram. Several BPEL engines are available which execute BPEL. In this paper , an example is provided to explain how BPMN diagram is generated and then with the help of BPEL executable code is generated

    “Reducing Packet Loss in MANET”

    Get PDF
    Dynamic topology and infrastructure less behaviour provide a great facility for adhoc network. Such facility generates easy connection of adhoc network and provides node mobility without loss of connection. In such ability packet dropping is a serious challenge for quality performance of adhoc network. The adhoc network suffered some serious security therats such attacks are black hole attack, malicious attack and worm hole attack that attack occurred a packet dropping problem in adhoc network. For the minimization of attack and packet dropping various authors built various method such method is node authentication, passive feedback scheme, ack-based scheme,reputation based scheme and incentive based scheme, ack-based scheme suffered a problem of massive overhead due to extra acknowledgment  packet and it also suffered decision ambiguity if the requested node refuse to send back Acknowledgment. In this dissertation we uses modified ack-based scheme using secure channel for overcoming the problem of decision ambiguity for requested node, improved node authentication and minimize packet dropping in adhoc network. Keywords- mobile ad-hoc network, routing misbehaviour, AODV routing protocol, ACK based approach, network security

    Migrating Packet Dropping in Mobile Ad-hoc Network Based on Modified ACK-Based Scheme

    Get PDF
    Dynamic topology and infrastructure less behavior provide a great facility for adhoc network. Such facility generates easy connection of adhoc network and provides node mobility without loss of connection. In such ability packet dropping is a serious challenge for quality performance of adhoc network. The adhoc network suffered some serious security threats such attacks are black hole attack, malicious attack and worm hole attack that attack occurred a packet dropping problem in adhoc network. For the minimization of attack and packet dropping various authors built various method such method is node authentication, passive feedback scheme, ack-based scheme, reputation based scheme and incentive based scheme, ack-based scheme suffered a problem of massive overhead due to extra acknowledgment  packet and it also suffered decision ambiguity if the requested node refuse to send back Acknowledgment. In this dissertation we uses modified ack-based scheme using secure channel for overcoming the problem of decision ambiguity for requested node, improved node authentication and minimize packet dropping in adhoc network. Keywords mobile ad-hoc network, routing misbehaviour, AODV routing protocol, ACK based approach, network security

    Network design and safety stock placement for a multi-echelon supply chain

    Get PDF
    Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2008.Includes bibliographical references (leaf 80).With the increasing complexities in supply chains and increasing global trade, integrated supply chain network design is utilized by the firms in order to reduce the overall cost while meeting the customer demand with requisite levels of service. This view of collaborative approach towards supply chain design has the potential of providing competitive edge for the firms in a highly competitive environment with high variability of end customer demand. In this study we present a framework for the design of a multi echelon supply chain network facing uncertain demand. We develop a comprehensive procedure for the optimization of a multi echelon supply chain. We provide the details of each step to describe the methodology and develop mathematical models for the design of a multi echelon distribution network. The procedure has been developed for the design of network flow and the placement of safety stock for a multi echelon distribution network.by Hitesh Gupta.M.Eng.in Logistic
    corecore