oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 41 )

2019 ( 235 )

2018 ( 275 )

2017 ( 292 )

Custom range...

Search Results: 1 - 10 of 224032 matches for " R.Manjula "
All listed articles are free for downloading (OA Articles)
Page 1 /224032
Display every page Item
Maturity Model of Software Product with Educational Maturity Model
R.Manjula,J.Vaideeswaran
ARPN Journal of Systems and Software , 2011,
Abstract: Software product line engineering is an inter-disciplinary concept. It spans the dimensions of business, architecture, process,and the organization. Similarly, Education System engineering is also an inter-disciplinary concept, which spans the dimensions of academic, infrastructure, facilities, administration etc. Some of the potential benefits of this approach includecontinuous improvements in System quality and adhering to global standards. The increasing competency in IT and Educational Sectors necessitates a process maturity evaluation methodology. Accordingly, this paper presents an organizational maturity model for Education system for evaluating the maturity of multi- dimension factors and attributes of an Education System. Assessment questionnaires and a rating methodology comprise the framework of this Educational maturity model. The objective and design of the questionnaires are to collect information about the Education system engineering process from the multi perspectives of academic, infrastructure, administration, facilities etc. Furthermore, we conducted one case study and reported the assessment results using the organizational maturity model presented in this paper.
HAULING TEMPLATES FROM WEB PAGES USING CLUSTERING TECHNIQUES
R.Manjula,A.Chilambuchelvan
International Journal of Engineering Sciences and Emerging Technologies , 2013,
Abstract: In today’s world, World Wide Web is the most popular information providers. A website is a collection of web pages and Web pages usually include information for the users. The web sites are designed with common templates and content. The template is used to access the content easily by consistent structures even the templates are not explicitly announced. The current Template extraction techniques are degrading the performance of web applications such as search engine due to irrelevant terms in templates.In this work, we present new method for extracting templates from a large number of web documents which are generated from heterogeneous templates. This paper cluster the web documents based on the similarity of underlying template structures in the documents so that the template for each cluster is extracted simultaneously.
A Bootstrap Approach of Benchmarking Organizational Maturity Model of Software Product With Educational Maturity Model
R.Manjula,J.Vaideeswaran
International Journal of Modern Education and Computer Science , 2012,
Abstract: This Software product line engineering is an inter-disciplinary concept. It spans the dimensions of business, architecture, process, and the organization. Similarly, Education System engineering is also an inter-disciplinary concept, which spans the dimensions of academic, infrastructure, facilities, administration etc. Some of the potential benefits of this approach include continuous improvements in System quality and adhering to global standards. The increasing competency in IT and Educational Sectors necessitates a process maturity evaluation methodology. Accordingly, this paper presents an organizational maturity model for Education system for evaluating the maturity of multi- dimension factors and attributes of an Education System. Assessment questionnaires and a rating methodology comprise the framework of this Educational maturity model. The objective and design of the questionnaires are to collect information about the Education system engineering process from the multi perspectives of academic, infrastructure, administration, facilities etc. Furthermore, we conducted one case study and reported the assessment results using the organizational maturity model presented in this paper.
A New CMM-EDU Process Improvement and Assessment Model Using SEI-CMM Approach-Engineering Education Capability Maturity Model : (E2-CMM)
R.Manjula,J.Vaideeswaran
International Journal of Software Engineering & Applications , 2010,
Abstract: We propose a maturity model called E2-CMM, for computing and assessing Engineering education qualitywhich is inspired by the Software Engineering Institute - Capability Maturity Model (SEI-CMM )[2].Similar to CMM[22], the Capability Maturity Model for Engineering Education System (E2-CMM) can beused to rate educational sector according to their capability to deliver high quality education on a fivelevel scale. Furthermore, E2-CMM can be used in order to improve an institution’s education capabilityby implementing the best practices and organizational changes it describes. In this paper, we explore amaturity model[1] suitable for educational sector to improve the standard and quality of an educationalsystem. For this purpose, we have selected Capability Maturity Model (CMM) as our base model fordeveloping E2-CMM framework for continuous quality assessment in education sector. . Finally, this paperconcludes by describing the capability assessment methodology and an algorithmic approach foreducational organization.
A New Framework for Measuring the Quality of Engineering Education System using SEI-CMM approach - (E2-CMM)
Prof. R.Manjula,Prof. J.Vaideeswaran
International Journal of Software Engineering & Applications , 2011,
Abstract: We propose a maturity model for computing education which is inspired by the Capability Maturity Model (CMM) used in software engineering. Similar to CMM, the Capability Maturity Model for Engineering Education System (E2-CMM) can be used to rate educational sector according to their capability to deliver high quality education on a five level scale. Furthermore, E2-CMM can be used in order to improve an institution’s capability by implementing the best practices and organizational changes it describes. In this paper we explore a maturity model suitable for educational sector to improve the standard and quality of an educational system. For this purpose we have selected SEI-CMM as our base model for developing E2-CMM framework, which can be used for continuous process and quality assessment in education sector. Finally, this paper concludes with a brief discussion on the capability assessment and rating methodology that can be used for ranking the level of maturity of the educational organization.
An Approach for Content Retrieval from Web Pages Using Clustering Techniques  [PDF]
R. Manjula, A. Chilambuchelvan
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.79230
Abstract: Mining the content from an information database provides challenging solutions to the industry experts and researchers, due to the overcrowded information in huge data. In web searching, the information retrieved is not an appropriate, because it gives ambiguous information for the user query, and the user cannot get relevant information within the stipulated time. To overcome these issues, we propose a new methodology for information retrieval EPCRR by providing the top most exact information to the user, by using the collaborative clustered automated filter which makes use of the collaborative data set and filter works on the prediction by providing the highest ranking for the exact data retrieved. The retrieval works on the basis of recommendation of data which consists of relevant data set with highest priority from the cluster of data which is on high usage. In this work, we make use of the automated wrapper which works similar to the meta crawler functionality and it obtains the content in the semantic usage data format. Obtained information from the user to the agent will be ranked based on the Enabled Pile clustered data with respect to the metadata information from the agent and end-user. The information is given to the end-user with the top most ranking data within the stipulated time and the remaining top information will be moved to the data repository for future use. The data collected will remain stable based on the user preference and works on the intelligence system approach in which the user can choose any information under any instances and can be provided with suitable high range of exact content. In this approach, we find that the proposed algorithm has produced better results than existing work and it costs less online computation time.
Mobile Agent Framework for Network Intrusion Detection System with Classification Algorithm
R. Sasikumar,D. Manjula
Asian Journal of Information Technology , 2012, DOI: 10.3923/ajit.2012.237.243
Abstract: Wireless computingis the delivery of computingas aservicerather than aproduct, whereby shared resources, software and information are provided to users over anetwork. Wireless computing entrusts services with a user's data, software and computation on a published Application Programming Interface (API) over a network. Wireless computing is defined in simplest terms as follows: A set of pooled computing resources, delivered over the web, powered by software. It is a form of computing that involves the interaction of several virtualized resources, meaning that many servers are connecting and sharing information that can expand and contract across servers depending on the amount of servers needed to manage the amount of traffic on various sites. Wireless allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless environment, security is the major issue. Due to the distributed nature, wireless environment is an easy target for intruders looking for the possible attacks to exploit. There are many advantages in wireless computing such as increased storage, highly automated, flexibility, mobility, etc. apart from these advantages the major issue in wireless environment is security. Due to the distributed nature of the wireless environment many users can access the wireless to utilize the service. So, there is a chance for an intruder or attacker to exploit an attack in the wireless environment. In order to address this issue in the wireless environment an Intrusion Detection System (IDS) is proposed based on the features of the mobile agent. The mobile agents are used to collect and analyze the data collected from wireless environment to identify attacks exploited by the intruders. The main objective of the proposed system is to detect the known and new attacks exploited by the intruders in the wireless environment.
Securing Watermarked-Relational Data by Using Encryption and Decryption
Nagarjuna Settipalli,R Manjula
ARPN Journal of Systems and Software , 2011,
Abstract: Ownership rights on outsourced relational database are very crucial issue in today’s internet environment and in many content distribution applications, because the rapid growth of the internet and related technologies offered an unprecedented ability to access and redistribute digital content. In earlier existing systems the relational data will be watermarked and directly send to the client system, in these systems while sending relational data from server to client attacker easily copy the data and create same copy of relational data. Here there is no security to watermarked relational data. In our proposed system before sending the watermarked relational data to client side we encrypt the relational data and send it to the client side, at client side decryption will be done to get the original watermarked data. Because of using this encryption technique even an attacker copy the data he/she may not read the watermarked relational data.
DETECTION OF MALICIOUS URL REDIRECTION AND DISTRIBUTION
T. Manjula Devi,R. Krishnaveni?
International Journal of Computer Science and Mobile Computing , 2013,
Abstract: Web-based malicious software (malware) has been increasing over the Internet .It poses threats tocomputer users through web sites. Computers are infected with Web-based malware by drive-by-downloadattacks. Drive-by-download attacks force users to download and install the Web-based malware without beingaware of it .these attacks evade detection by using automatic redirections to various websites. It is difficult todetect these attacks because each redirection uses the obfuscation technique. This paper analyzes the HTTPcommunication data of drive-by-download attacks. The results show significant features of the maliciousredirections that are used effectively when we detect malware.
A novel hash based least significant bit (2-3-3) image steganography in spatial domain
G. R. Manjula,Ajit Danti
Computer Science , 2015, DOI: 10.5121/ijsptm.2015.4102
Abstract: This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
Page 1 /224032
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.