Anuranjan Misra | Greater Noida Institute of Technology (original) (raw)
Papers by Anuranjan Misra
Atlantis Highlights in Computer Sciences, Dec 31, 2022
International Journal of Computer Applications, 2015
The development in wireless communication technology and mobile computing has made it possible to... more The development in wireless communication technology and mobile computing has made it possible to use smart phones, laptops, and tabs massively for downloading purpose. There are a number of applications which provide a single user downloading scheme but there is no provision for cooperative downloading i.e. multiple user can download the same file provided each group member will download a separate segment of file. The software likes Torrent, YouTube facilitates only a single end user to download a file. However because of limited bandwidth access the data download volume by an individual is quite less and take much more time to download a high resolution video. Nowadays, there are unlimited 2G/3G plans provided by internet service provider the most of data plans are waste due to bandwidth limitations. The cooperative content downloading framework will allow the requested members in the group to download some portion of the file separately. This will provide the ability to download the file cooperatively in less time and cost. The proposed system will also show the actual process how the bandwidth can be shared among the friends and group member. The system will provide the efficient use of bandwidth in different environment.
Our law enforcing system called as Indian Legal System is lacking in terms of computerisation int... more Our law enforcing system called as Indian Legal System is lacking in terms of computerisation intelligent enough to enable law open for everybody. We are moving towards Digital India in all spheres of activity. In our country majority of people are not aware of the law of the land. AKOMA-NTOSO is an international technical standard for representing judiciary documents in addition to executive & legislative in a structured manner. We can call it XML vocabulary on law and it suggests also a convention of giving name for providing unique identifier to legal sources based on FRBR mode. There is no effort has been made to create standard representation of law in India. The subject matter of the paper goes into detail of creation of standard representation of parts of RTI Act 2005 for its implementation under a given circumstances. The process model of second appeal was undertaken. It was found that majority of RTI appeals at CIC are returned only for the reason that rule 8 and 9 of the RTI Act has not been fulfilled. The study captured the process of filing second appeal and created a schema of representation of various components and system prototype to check the compliance before accepting second appeal. The schema was created using subset of AKOMA-NTOSO schema, XML & HTML standard. The result shows that quality of services are improved by eighty percent(80%) and it has the potential to augment the way to create schema for entire RTI ACT. There are challenges associated with complexities in judicial system and quality of encoding of law on the basis of schema created and development of system to act accordingly. The study provided evidence that data on law can be interchanged among various system with semantic and technical interpretability.
International Conference on Computing for Sustainable Global Development, Mar 1, 2019
The routing protocol on which the MANET works, or the technic of MANET has a basic standard which... more The routing protocol on which the MANET works, or the technic of MANET has a basic standard which can control many nodes on it’s network that makes a proper way to route a packet between all the nodes on it’s network. Network stability, Security, Performance, Efficiency, and Energy efficiency are some provocations to mobile adhoc networks and here we are discussing about the energy optimization of MANET. As there is no fix structure for MANET and it is proper self-configuring network with a number of nodes. As the mobiles are useless without good batteries, so the energy optimization is very big issue of concern in MANET because it has the limited source of energy. Enormous traffics demands for the omnipresent access and developing multimedia applications crucially increases the energy consumption of battery-powered mobile devices.
2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), Sep 1, 2017
the foremost illustrative task in data mining process is clustering. It plays an exceedingly impo... more the foremost illustrative task in data mining process is clustering. It plays an exceedingly important role in the entire KDD process also as categorizing data is one of the most rudimentary steps in knowledge discovery. It is an unsupervised learning task used for exploratory data analysis to find some unrevealed patterns which are present in data but cannot be categorized clearly. Sets of data can be designated or grouped together based on some common characteristics and termed clusters , the mechanism involved in cluster analysis are essentially dependent upon the primary task of keeping objects with in a cluster more closer than objects belonging to other groups or clusters. Depending on the data and expected cluster characteristics there are different types of clustering paradigms. In the very recent times many new algorithms have emerged which aim towards bridging the different approaches towards clustering and merging different clustering algorithms given the requirement of handling sequential ,extensive data with multiple relationships in many applications across a broad spectrum. Various clustering algorithms have been developed under different paradigms for grouping scattered data points and forming efficient cluster shapes with minimal outliers. This paper attempts to address the problem of creating evenly shaped clusters in detail and aims to study, review and analyze few clustering algorithms falling under different categories of clustering paradigms and presents a detailed comparison of their efficiency, advantages and disadvantages on some common grounds. This study also contributes in correlating some very important characteristics of an efficient clustering algorithm.
Asset analytics, Oct 19, 2019
In today’s world, cellular phone has become an important necessity and essential part of everyday... more In today’s world, cellular phone has become an important necessity and essential part of everyday life. Call drop is a phenomenon in which the ongoing conversation is terminated abruptly in-between. With the introduction of technologies like 3G and 4G and services like voice and data, and stiff competition among the telecommunication companies, the volume of call drop cases has increased many folds. Unexpected call drop is one of the biggest issues in telecom industry in our country and worldwide. Researchers, telecom operators and industry have proposed many solutions which were implemented as a solution to dropped calls minimization in mobile network. All the solution proposed so far has their own pros and cons, and no one solution could be considered as a comprehensive successful solution which has been deployed till now. This research work carried out is an attempt to identify and describes the reasons for call drop. The research work further provides analysis on the problem encircling the issue of call drop at every stage of wireless technology. This research work presents the journey of Global System for Mobile Communications (GSM) to Long-Term Evolution (LTE) on the basis of their merits and demerits and finds out the reasons to move to next emerging technology. Then, the author focuses on their proposed work, i.e., self-organizing network (SON), is most capable to improve voice call quality, reduces call drop factors, and degrades the capital and operational expenditure on the basis of their architecture and installation features.
Communications in Computer and Information Science
Unwanted terminations of an on-going wireless conversation become the biggest issue of the whole ... more Unwanted terminations of an on-going wireless conversation become the biggest issue of the whole world. Call drop degrades the voice call quality and impacted the quality of service of the network. Researchers, industries, and telecom- vendors are bothered to improve the call quality in existing telecom infrastructure and already proposed many valuable solutions which have own pros and cons but still there is no optimized reliable solution to reduce call drop has been deployed till now. This research paper focuses on some background reasons for call drop in existing wireless infrastructure and proposed the self-optimization concept to handle the overall network issue automatically in perspective of call drops minimization in mobile networks. This Research paper proposed some robust functionality of self-optimizing network such as automatic neighbor list optimization, mobility load balancing optimization and handover optimization approach used to improve voice call quality and make a self-automated mobile network that would be fruitful to reduce call drop rate.
2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA)
Proceedings of the 2022 3rd International Conference on Management Science and Engineering Management (ICMSEM 2022), Dec 15, 2022
International Journal of Engineering Research and, 2015
We are in the world of technology, where data is moving around all the time. This data is becomin... more We are in the world of technology, where data is moving around all the time. This data is becoming bigdata when it comes in huge volume and data can be structured, unstructured or semi-structured. hadoop is the technology to analysis the big data. The objective of this paper is to analysis the data that is collected from the open source using the hadoop and mapreduce programming model.
Nowadays, most of the economic activities and business models are driven by the unprecedented evo... more Nowadays, most of the economic activities and business models are driven by the unprecedented evolution of theories and technologies. The impregnation of these achievements into our society is present everywhere, and it is only question of user education and business models optimization towards a digital society. Progress in cognitive science, knowledge acquisition, representation, and processing helped to deal with imprecise, uncertain or incomplete information. Management of geographical and temporal information becomes a challenge, in terms of volume, speed, semantic, decision, and delivery. Information technologies allow optimization in searching an interpreting data, yet special constraints imposed by the digital society require on-demand, ethics, and legal aspects, as well as user privacy and safety. The event was very competitive in its selection process and very well perceived by the international scientific and industrial communities. As such, it is attracting excellent con...
2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), 2017
As information sharing over the internet has been increased has raised the problem of security of... more As information sharing over the internet has been increased has raised the problem of security of digital data on the device as well as the communication channel through which the information is shared. Many techniques have been used so far to secure the valuable data and steganography is one of them. It is a technique used to conceal the secret data within a normal appearing cover media i.e. it makes the secret message almost invisible for any unwanted recipient. To make our steganography algorithm more secure, here we are encoding the secret data into its ASCII and then GA is Applied to the audio samples of cover file in order to get an optimum position to hide the data, after this LSB is used to embed the ASCII codes of the secret data.
This study establishes a stolen-vehicle tracking management information system (MIS) combining in... more This study establishes a stolen-vehicle tracking management information system (MIS) combining information technology (IT) equipment in a wireless local area network (WLAN), personal digital assistant (PDA), and charge couple devices (CCD) camera with vehicle license plate recognition (LPR) technology. First, the police setup CCD cameras at fixed locations or in police vehicles to monitor every moving vehicle and fetch plate information to match retrieved plate information compared with stolen-vehicle databases. Second, when a stolen-vehicle is detected, the system communicates real-time warning signals to PDA held by on-duty police to intercept the stolen vehicle. The real-time information delivery and communication provided by this system not only help the police to solve serious criminal cases and protect public life and property, but also increase management effectiveness and lower manpower costs.
This paper is going to present the applications of Queuing Theory in our day-today life. Queuing ... more This paper is going to present the applications of Queuing Theory in our day-today life. Queuing Theory is the mathematical study of the processes which we handle in daily lives. It will give the calculation of, which process should be handle first and which should be left without handling, which should be given preference or which should not be given. Through this paper of mine, we will discuss the relation of Queuing Theory with our lives. The literature review on the topic will be discussed here. We will give some real live examples to show the relativity of queuing theory. We will discuss various Models in this paper to put some light on various techniques that we follow in our daily routine. It will give you the idea to provide the service to the processes as they enter. This paper discuss about the work previously done for the topic. It will tell you to opt a queuing model to achieve an efficient task according to your need. Queuing theory is generally considered a branch of O...
2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), 2017
Information Technology is an integral part of the industry for a long time and the role of Servic... more Information Technology is an integral part of the industry for a long time and the role of Services has increased in last 10 years. IT had been playing a major role in the Manufacturing sector in the first half of the decade, which now has shifted to the Services. With this shift in focus of the industry, from Manufacturing to Services, there arises a need of certain set of policies and standard procedures, which help the organizations in providing up to the mark services to their customers, and improved customer relations. Information Technology Infrastructure Library (ITIL) is such a set of best practices and standard procedures, which helps in practicing better Information Technology Service Management (ITSM). This paper studies some of the benefits of the Service Operations process named Incident Management of the ITIL and highlight its best practices. The paper will give a detailed description of Incident Management from the User perspective, as well as from the Administrator and Developer perspective. The automation of this out-of-box vendor-provided process can help the users in using the ITSM tools more efficiently. This paper also studies the benefits of hosting the servers on Cloud as well as how it may help in using the ITSM tools on the go.
2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), 2017
The study of this paper of ours is focused on assessing the K-12 students since this is the major... more The study of this paper of ours is focused on assessing the K-12 students since this is the major portion of student’s life and whatever they are going through during this tenure stays in their memories and plays a vital role in their life. Here, we have tried to elaborate how and what impact the non–cognitive factors leaves on the students who are going though the K-12 education system. Non–cognitive factors consists of the impact of Psychological factors, Motivational factors, Environmental surroundings, Amenities and facilities available which can transform experiences of students, deciding and achieving goals, improvement in their academic patterns, orientation towards social responsibilities etc. We will also be discussing the educational initiatives and interventions that may be “Motivation”, “Praising”, “Appraising”, “Encouragement”, etc.
Abstract: Testing of aspect oriented programs is a new programming paradigm. Many researchers had... more Abstract: Testing of aspect oriented programs is a new programming paradigm. Many researchers had contributed their research in the field of testing AOP. Mutation testing has been shown to be one of the strongest testing criteria for the evaluation of both programs and test suites. Comprehensive sets of mutants require strong test sets to achieve acceptable testing coverage. Moreover, mutation operators are valuable for the evaluation of other testing approaches. The effectiveness of mutation testing depends on finding fault types and designing of mutation operators on the basis of faults identified. Therefore the effectiveness of testing depends upon the quality of these mutation operators. We already have the mutation operators for procedural and object oriented languages, but for aspect oriented language only a few researchers have contributed. In this paper we will study in detail about the fault types and related mutation operators for AspectJ language. This paper also proposes...
— Currently digital mammography is the most efficient and widely used technology for early breast... more — Currently digital mammography is the most efficient and widely used technology for early breast cancer detection. The major diagnosing elements such as masses, lesions in the digital mammograms are noisy and of low contrast. The aim of the proposal is to enhance the mammogram images by reducing the noise using median filter, image sharpening and image smoothing. The data clustering algorithm i,e Fuzzy C means clustering is used to segment the region of interest from which various statistical, gradient and geometrical features are extracted. The features extracted from the few images of the data base are used to train the neural networks for classification. The evaluated algorithm is tested on the digital mammograms from the Mammogram Image Analysis Society (MIAS) database. The experimental results show that the breast region extracted by the presented algorithm approximately follows that extracted by an expert radiologist. The detected mass is classified as normal or abnormal. Fur...
2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon), 2017
Through this paper of mine I would like to elaborate the usage of Digital Technology in classroom... more Through this paper of mine I would like to elaborate the usage of Digital Technology in classrooms. In many countries teachers as well as students are allowed to use the newly introduced devices like iPad, Tabs, Minis and etc with WiFi connectivity at the school levels. In India still we are struggling with the old anomalies of not even using the electronic devices which are generally used in terms of technology advancement. The usage of such devices at the school level can help and provide the knowledge to students to compete in the technology world. These devices are capable enough to become the guide and the mentor to make students techno savvy which will play a vital role in making the education system fully ICT based at school levels.
2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017
Joint clustering of multiple networks has been shown to be much more accurate when compared to th... more Joint clustering of multiple networks has been shown to be much more accurate when compared to the clustering on individual networks performed separately. For joint multi-network clustering, many multi view and multidomain network clustering methods have been proposed. These methods assume that there is a common clustering structure which is shared by all networks, and different networks can provide complementary information on the underlying clustering structure. Better clustering performance can be achieved by considering the groups differently. As a result, an ideal method should be able to automatically detect network groups so that networks which are in the same group share a common clustering structure. To address this problem, we propose a novel method, K-means to simultaneously group and cluster multiple networks.
Atlantis Highlights in Computer Sciences, Dec 31, 2022
International Journal of Computer Applications, 2015
The development in wireless communication technology and mobile computing has made it possible to... more The development in wireless communication technology and mobile computing has made it possible to use smart phones, laptops, and tabs massively for downloading purpose. There are a number of applications which provide a single user downloading scheme but there is no provision for cooperative downloading i.e. multiple user can download the same file provided each group member will download a separate segment of file. The software likes Torrent, YouTube facilitates only a single end user to download a file. However because of limited bandwidth access the data download volume by an individual is quite less and take much more time to download a high resolution video. Nowadays, there are unlimited 2G/3G plans provided by internet service provider the most of data plans are waste due to bandwidth limitations. The cooperative content downloading framework will allow the requested members in the group to download some portion of the file separately. This will provide the ability to download the file cooperatively in less time and cost. The proposed system will also show the actual process how the bandwidth can be shared among the friends and group member. The system will provide the efficient use of bandwidth in different environment.
Our law enforcing system called as Indian Legal System is lacking in terms of computerisation int... more Our law enforcing system called as Indian Legal System is lacking in terms of computerisation intelligent enough to enable law open for everybody. We are moving towards Digital India in all spheres of activity. In our country majority of people are not aware of the law of the land. AKOMA-NTOSO is an international technical standard for representing judiciary documents in addition to executive & legislative in a structured manner. We can call it XML vocabulary on law and it suggests also a convention of giving name for providing unique identifier to legal sources based on FRBR mode. There is no effort has been made to create standard representation of law in India. The subject matter of the paper goes into detail of creation of standard representation of parts of RTI Act 2005 for its implementation under a given circumstances. The process model of second appeal was undertaken. It was found that majority of RTI appeals at CIC are returned only for the reason that rule 8 and 9 of the RTI Act has not been fulfilled. The study captured the process of filing second appeal and created a schema of representation of various components and system prototype to check the compliance before accepting second appeal. The schema was created using subset of AKOMA-NTOSO schema, XML & HTML standard. The result shows that quality of services are improved by eighty percent(80%) and it has the potential to augment the way to create schema for entire RTI ACT. There are challenges associated with complexities in judicial system and quality of encoding of law on the basis of schema created and development of system to act accordingly. The study provided evidence that data on law can be interchanged among various system with semantic and technical interpretability.
International Conference on Computing for Sustainable Global Development, Mar 1, 2019
The routing protocol on which the MANET works, or the technic of MANET has a basic standard which... more The routing protocol on which the MANET works, or the technic of MANET has a basic standard which can control many nodes on it’s network that makes a proper way to route a packet between all the nodes on it’s network. Network stability, Security, Performance, Efficiency, and Energy efficiency are some provocations to mobile adhoc networks and here we are discussing about the energy optimization of MANET. As there is no fix structure for MANET and it is proper self-configuring network with a number of nodes. As the mobiles are useless without good batteries, so the energy optimization is very big issue of concern in MANET because it has the limited source of energy. Enormous traffics demands for the omnipresent access and developing multimedia applications crucially increases the energy consumption of battery-powered mobile devices.
2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), Sep 1, 2017
the foremost illustrative task in data mining process is clustering. It plays an exceedingly impo... more the foremost illustrative task in data mining process is clustering. It plays an exceedingly important role in the entire KDD process also as categorizing data is one of the most rudimentary steps in knowledge discovery. It is an unsupervised learning task used for exploratory data analysis to find some unrevealed patterns which are present in data but cannot be categorized clearly. Sets of data can be designated or grouped together based on some common characteristics and termed clusters , the mechanism involved in cluster analysis are essentially dependent upon the primary task of keeping objects with in a cluster more closer than objects belonging to other groups or clusters. Depending on the data and expected cluster characteristics there are different types of clustering paradigms. In the very recent times many new algorithms have emerged which aim towards bridging the different approaches towards clustering and merging different clustering algorithms given the requirement of handling sequential ,extensive data with multiple relationships in many applications across a broad spectrum. Various clustering algorithms have been developed under different paradigms for grouping scattered data points and forming efficient cluster shapes with minimal outliers. This paper attempts to address the problem of creating evenly shaped clusters in detail and aims to study, review and analyze few clustering algorithms falling under different categories of clustering paradigms and presents a detailed comparison of their efficiency, advantages and disadvantages on some common grounds. This study also contributes in correlating some very important characteristics of an efficient clustering algorithm.
Asset analytics, Oct 19, 2019
In today’s world, cellular phone has become an important necessity and essential part of everyday... more In today’s world, cellular phone has become an important necessity and essential part of everyday life. Call drop is a phenomenon in which the ongoing conversation is terminated abruptly in-between. With the introduction of technologies like 3G and 4G and services like voice and data, and stiff competition among the telecommunication companies, the volume of call drop cases has increased many folds. Unexpected call drop is one of the biggest issues in telecom industry in our country and worldwide. Researchers, telecom operators and industry have proposed many solutions which were implemented as a solution to dropped calls minimization in mobile network. All the solution proposed so far has their own pros and cons, and no one solution could be considered as a comprehensive successful solution which has been deployed till now. This research work carried out is an attempt to identify and describes the reasons for call drop. The research work further provides analysis on the problem encircling the issue of call drop at every stage of wireless technology. This research work presents the journey of Global System for Mobile Communications (GSM) to Long-Term Evolution (LTE) on the basis of their merits and demerits and finds out the reasons to move to next emerging technology. Then, the author focuses on their proposed work, i.e., self-organizing network (SON), is most capable to improve voice call quality, reduces call drop factors, and degrades the capital and operational expenditure on the basis of their architecture and installation features.
Communications in Computer and Information Science
Unwanted terminations of an on-going wireless conversation become the biggest issue of the whole ... more Unwanted terminations of an on-going wireless conversation become the biggest issue of the whole world. Call drop degrades the voice call quality and impacted the quality of service of the network. Researchers, industries, and telecom- vendors are bothered to improve the call quality in existing telecom infrastructure and already proposed many valuable solutions which have own pros and cons but still there is no optimized reliable solution to reduce call drop has been deployed till now. This research paper focuses on some background reasons for call drop in existing wireless infrastructure and proposed the self-optimization concept to handle the overall network issue automatically in perspective of call drops minimization in mobile networks. This Research paper proposed some robust functionality of self-optimizing network such as automatic neighbor list optimization, mobility load balancing optimization and handover optimization approach used to improve voice call quality and make a self-automated mobile network that would be fruitful to reduce call drop rate.
2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA)
Proceedings of the 2022 3rd International Conference on Management Science and Engineering Management (ICMSEM 2022), Dec 15, 2022
International Journal of Engineering Research and, 2015
We are in the world of technology, where data is moving around all the time. This data is becomin... more We are in the world of technology, where data is moving around all the time. This data is becoming bigdata when it comes in huge volume and data can be structured, unstructured or semi-structured. hadoop is the technology to analysis the big data. The objective of this paper is to analysis the data that is collected from the open source using the hadoop and mapreduce programming model.
Nowadays, most of the economic activities and business models are driven by the unprecedented evo... more Nowadays, most of the economic activities and business models are driven by the unprecedented evolution of theories and technologies. The impregnation of these achievements into our society is present everywhere, and it is only question of user education and business models optimization towards a digital society. Progress in cognitive science, knowledge acquisition, representation, and processing helped to deal with imprecise, uncertain or incomplete information. Management of geographical and temporal information becomes a challenge, in terms of volume, speed, semantic, decision, and delivery. Information technologies allow optimization in searching an interpreting data, yet special constraints imposed by the digital society require on-demand, ethics, and legal aspects, as well as user privacy and safety. The event was very competitive in its selection process and very well perceived by the international scientific and industrial communities. As such, it is attracting excellent con...
2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), 2017
As information sharing over the internet has been increased has raised the problem of security of... more As information sharing over the internet has been increased has raised the problem of security of digital data on the device as well as the communication channel through which the information is shared. Many techniques have been used so far to secure the valuable data and steganography is one of them. It is a technique used to conceal the secret data within a normal appearing cover media i.e. it makes the secret message almost invisible for any unwanted recipient. To make our steganography algorithm more secure, here we are encoding the secret data into its ASCII and then GA is Applied to the audio samples of cover file in order to get an optimum position to hide the data, after this LSB is used to embed the ASCII codes of the secret data.
This study establishes a stolen-vehicle tracking management information system (MIS) combining in... more This study establishes a stolen-vehicle tracking management information system (MIS) combining information technology (IT) equipment in a wireless local area network (WLAN), personal digital assistant (PDA), and charge couple devices (CCD) camera with vehicle license plate recognition (LPR) technology. First, the police setup CCD cameras at fixed locations or in police vehicles to monitor every moving vehicle and fetch plate information to match retrieved plate information compared with stolen-vehicle databases. Second, when a stolen-vehicle is detected, the system communicates real-time warning signals to PDA held by on-duty police to intercept the stolen vehicle. The real-time information delivery and communication provided by this system not only help the police to solve serious criminal cases and protect public life and property, but also increase management effectiveness and lower manpower costs.
This paper is going to present the applications of Queuing Theory in our day-today life. Queuing ... more This paper is going to present the applications of Queuing Theory in our day-today life. Queuing Theory is the mathematical study of the processes which we handle in daily lives. It will give the calculation of, which process should be handle first and which should be left without handling, which should be given preference or which should not be given. Through this paper of mine, we will discuss the relation of Queuing Theory with our lives. The literature review on the topic will be discussed here. We will give some real live examples to show the relativity of queuing theory. We will discuss various Models in this paper to put some light on various techniques that we follow in our daily routine. It will give you the idea to provide the service to the processes as they enter. This paper discuss about the work previously done for the topic. It will tell you to opt a queuing model to achieve an efficient task according to your need. Queuing theory is generally considered a branch of O...
2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), 2017
Information Technology is an integral part of the industry for a long time and the role of Servic... more Information Technology is an integral part of the industry for a long time and the role of Services has increased in last 10 years. IT had been playing a major role in the Manufacturing sector in the first half of the decade, which now has shifted to the Services. With this shift in focus of the industry, from Manufacturing to Services, there arises a need of certain set of policies and standard procedures, which help the organizations in providing up to the mark services to their customers, and improved customer relations. Information Technology Infrastructure Library (ITIL) is such a set of best practices and standard procedures, which helps in practicing better Information Technology Service Management (ITSM). This paper studies some of the benefits of the Service Operations process named Incident Management of the ITIL and highlight its best practices. The paper will give a detailed description of Incident Management from the User perspective, as well as from the Administrator and Developer perspective. The automation of this out-of-box vendor-provided process can help the users in using the ITSM tools more efficiently. This paper also studies the benefits of hosting the servers on Cloud as well as how it may help in using the ITSM tools on the go.
2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), 2017
The study of this paper of ours is focused on assessing the K-12 students since this is the major... more The study of this paper of ours is focused on assessing the K-12 students since this is the major portion of student’s life and whatever they are going through during this tenure stays in their memories and plays a vital role in their life. Here, we have tried to elaborate how and what impact the non–cognitive factors leaves on the students who are going though the K-12 education system. Non–cognitive factors consists of the impact of Psychological factors, Motivational factors, Environmental surroundings, Amenities and facilities available which can transform experiences of students, deciding and achieving goals, improvement in their academic patterns, orientation towards social responsibilities etc. We will also be discussing the educational initiatives and interventions that may be “Motivation”, “Praising”, “Appraising”, “Encouragement”, etc.
Abstract: Testing of aspect oriented programs is a new programming paradigm. Many researchers had... more Abstract: Testing of aspect oriented programs is a new programming paradigm. Many researchers had contributed their research in the field of testing AOP. Mutation testing has been shown to be one of the strongest testing criteria for the evaluation of both programs and test suites. Comprehensive sets of mutants require strong test sets to achieve acceptable testing coverage. Moreover, mutation operators are valuable for the evaluation of other testing approaches. The effectiveness of mutation testing depends on finding fault types and designing of mutation operators on the basis of faults identified. Therefore the effectiveness of testing depends upon the quality of these mutation operators. We already have the mutation operators for procedural and object oriented languages, but for aspect oriented language only a few researchers have contributed. In this paper we will study in detail about the fault types and related mutation operators for AspectJ language. This paper also proposes...
— Currently digital mammography is the most efficient and widely used technology for early breast... more — Currently digital mammography is the most efficient and widely used technology for early breast cancer detection. The major diagnosing elements such as masses, lesions in the digital mammograms are noisy and of low contrast. The aim of the proposal is to enhance the mammogram images by reducing the noise using median filter, image sharpening and image smoothing. The data clustering algorithm i,e Fuzzy C means clustering is used to segment the region of interest from which various statistical, gradient and geometrical features are extracted. The features extracted from the few images of the data base are used to train the neural networks for classification. The evaluated algorithm is tested on the digital mammograms from the Mammogram Image Analysis Society (MIAS) database. The experimental results show that the breast region extracted by the presented algorithm approximately follows that extracted by an expert radiologist. The detected mass is classified as normal or abnormal. Fur...
2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon), 2017
Through this paper of mine I would like to elaborate the usage of Digital Technology in classroom... more Through this paper of mine I would like to elaborate the usage of Digital Technology in classrooms. In many countries teachers as well as students are allowed to use the newly introduced devices like iPad, Tabs, Minis and etc with WiFi connectivity at the school levels. In India still we are struggling with the old anomalies of not even using the electronic devices which are generally used in terms of technology advancement. The usage of such devices at the school level can help and provide the knowledge to students to compete in the technology world. These devices are capable enough to become the guide and the mentor to make students techno savvy which will play a vital role in making the education system fully ICT based at school levels.
2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017
Joint clustering of multiple networks has been shown to be much more accurate when compared to th... more Joint clustering of multiple networks has been shown to be much more accurate when compared to the clustering on individual networks performed separately. For joint multi-network clustering, many multi view and multidomain network clustering methods have been proposed. These methods assume that there is a common clustering structure which is shared by all networks, and different networks can provide complementary information on the underlying clustering structure. Better clustering performance can be achieved by considering the groups differently. As a result, an ideal method should be able to automatically detect network groups so that networks which are in the same group share a common clustering structure. To address this problem, we propose a novel method, K-means to simultaneously group and cluster multiple networks.