Sonali Ajankar - Academia.edu (original) (raw)
Papers by Sonali Ajankar
— Due to growth of computer networks and complex scenarios the role of Network simulators in rese... more — Due to growth of computer networks and complex scenarios the role of Network simulators in research field cannot be ignored. Simulators are useful tools when one wants to consider time and resources, implementation of new security solutions, performance estimation etc. it provides a virtual environment for an assortment of desirable features such as modeling a network based on a specific criteria and analyzing its performance under different scenarios. The newly proposed network simulator NS-3 supports coupling, interoperability, good memory management, debugging of split language objects, coding in C++ and object oriented concepts, as well as supports models supported by NS-2 and most suitable for wireless networks. The primary purpose of this paper is to compare and review this new simulator, as well as find its advantages in the field of research and how it is different from others. We also discuss the current demand of industry as well proposed a framework for a simulator whic...
Department of Computer Technology Veermata Jijabai Technological Institute Mumbai, India urashu06... more Department of Computer Technology Veermata Jijabai Technological Institute Mumbai, India urashu06@gmail.com s.ajankar9@gmail.com mmchandane@vjti.org.in ABSTRACT— Due to growth of computer networks and complex scenarios the role of Network simulators in research field cannot be ignored. Simulators are useful tools when one wants to consider time and resources, implementation of new security solutions, performance estimation etc. it provides a virtual environment for an assortment of desirable features such as modeling a network based on a specific criteria and analyzing its performance under different scenarios.
International Journal of Advance Research, Ideas and Innovations in Technology, 2018
Data monetization strategy can be defined as a re-engineering of business data to create a measur... more Data monetization strategy can be defined as a re-engineering of business data to create a measurable and positive impact on business revenue by making efficient use of data. There are mainly two forms to transform data into money. Firstly, provide access to organizational data and get the benefit of supplemental revenue stream which is also called as direct data monetization. Secondly, client data can be used to get insights and enhance customer services and operations which is called as indirect data monetization. As this monetization has become crucial for industries, data creators such as healthcare, retailers etc. are pursuing new and significant ways to monetize their data. At the same time, consumers who are actual contributors of data demands for access control over their public data to get knowledge about usage of their data in the market. A solution is constituted known as Blockchain technology. Even though blockchain is under execution for some business applications, it h...
Proceedings of the International Conference on Advances in Computer Science and Electronics Engineering, 2012
In mobile environment cache management is a challenging task; it attracts the interest of many re... more In mobile environment cache management is a challenging task; it attracts the interest of many researchers to work on this field. Caching and prefetching techniques improves the performances of the use of cache for mobile devices. One of the important problem is the efficient access to data. A proposed solution to this problem is the prefetching technique because of which user is able to access the data with low access latency and in case of disconnection or limited connectivity also. This paper deals with the study of cache prefetching policy and it's simulation and analysis. In order to do this, here present a client and server algorithm for prefetching scheme in mobile environment. It includes prefetching techniques based on user interest and a cache invalidation scheme which is used for freeing space from non-validate data. It reduces the latency for accessing data by the user and also reduces the number of data item in the client cache. As percentage of cache updation is reduced, performance of the device improved. We are demonstrating the feasibility of the proposed approach with experiments using simulation.
Thinkquest~2010, 2011
... Sonali Ajankar . Ashish Mohta . SS Sane Department of Computer Technology, Veermata Jeejabai ... more ... Sonali Ajankar . Ashish Mohta . SS Sane Department of Computer Technology, Veermata Jeejabai Technological Institute Mumbai, India 1. Introduction ... It can provide an isolated execu-tion environment to applications, support share and reuse of hardware resources. ...
— Due to growth of computer networks and complex scenarios the role of Network simulators in rese... more — Due to growth of computer networks and complex scenarios the role of Network simulators in research field cannot be ignored. Simulators are useful tools when one wants to consider time and resources, implementation of new security solutions, performance estimation etc. it provides a virtual environment for an assortment of desirable features such as modeling a network based on a specific criteria and analyzing its performance under different scenarios. The newly proposed network simulator NS-3 supports coupling, interoperability, good memory management, debugging of split language objects, coding in C++ and object oriented concepts, as well as supports models supported by NS-2 and most suitable for wireless networks. The primary purpose of this paper is to compare and review this new simulator, as well as find its advantages in the field of research and how it is different from others. We also discuss the current demand of industry as well proposed a framework for a simulator whic...
Department of Computer Technology Veermata Jijabai Technological Institute Mumbai, India urashu06... more Department of Computer Technology Veermata Jijabai Technological Institute Mumbai, India urashu06@gmail.com s.ajankar9@gmail.com mmchandane@vjti.org.in ABSTRACT— Due to growth of computer networks and complex scenarios the role of Network simulators in research field cannot be ignored. Simulators are useful tools when one wants to consider time and resources, implementation of new security solutions, performance estimation etc. it provides a virtual environment for an assortment of desirable features such as modeling a network based on a specific criteria and analyzing its performance under different scenarios.
International Journal of Advance Research, Ideas and Innovations in Technology, 2018
Data monetization strategy can be defined as a re-engineering of business data to create a measur... more Data monetization strategy can be defined as a re-engineering of business data to create a measurable and positive impact on business revenue by making efficient use of data. There are mainly two forms to transform data into money. Firstly, provide access to organizational data and get the benefit of supplemental revenue stream which is also called as direct data monetization. Secondly, client data can be used to get insights and enhance customer services and operations which is called as indirect data monetization. As this monetization has become crucial for industries, data creators such as healthcare, retailers etc. are pursuing new and significant ways to monetize their data. At the same time, consumers who are actual contributors of data demands for access control over their public data to get knowledge about usage of their data in the market. A solution is constituted known as Blockchain technology. Even though blockchain is under execution for some business applications, it h...
Proceedings of the International Conference on Advances in Computer Science and Electronics Engineering, 2012
In mobile environment cache management is a challenging task; it attracts the interest of many re... more In mobile environment cache management is a challenging task; it attracts the interest of many researchers to work on this field. Caching and prefetching techniques improves the performances of the use of cache for mobile devices. One of the important problem is the efficient access to data. A proposed solution to this problem is the prefetching technique because of which user is able to access the data with low access latency and in case of disconnection or limited connectivity also. This paper deals with the study of cache prefetching policy and it's simulation and analysis. In order to do this, here present a client and server algorithm for prefetching scheme in mobile environment. It includes prefetching techniques based on user interest and a cache invalidation scheme which is used for freeing space from non-validate data. It reduces the latency for accessing data by the user and also reduces the number of data item in the client cache. As percentage of cache updation is reduced, performance of the device improved. We are demonstrating the feasibility of the proposed approach with experiments using simulation.
Thinkquest~2010, 2011
... Sonali Ajankar . Ashish Mohta . SS Sane Department of Computer Technology, Veermata Jeejabai ... more ... Sonali Ajankar . Ashish Mohta . SS Sane Department of Computer Technology, Veermata Jeejabai Technological Institute Mumbai, India 1. Introduction ... It can provide an isolated execu-tion environment to applications, support share and reuse of hardware resources. ...