111. Billing System |
Vikas Bansaland and B.Persis Urbana |
Abstract |
Pdf
|
Category : Computing and Informatics | Sub Category : Information Technology |
Billing System
The main aim of this paper is the briefing of a billing system for small commercial purpose. The purpose of the paper is to provide reliable environment forstoring the bills for all the customers for whom account is created. The bills are stored in file format. Visual Studio software is used for creating the application, C# language is used in this software for creating the application. If account is not created for the user then the bill will not be created. Keypad is used for creating the accounts and entering the values in it. Alter function is also used for changing the entries and delete function is used for deleting the values stored in the account. If a wrong entry is given error will be shown. Before deleting an entry a confirmation message will come.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure and Robust Cloud Storage with Cryptography and Access Control
Cloud computing is a new evolving paradigm to a wide range of users like individuals, businesses and governments to provide resources in an on-demand environment. Enterprises store their incredible abundance of data on cloud to reduce data management cost. In addition, an emerging class of entrepreneurs is taking advantage of clouds as they might not have enough finance to purchase resources or ensure the necessary security. As the data is stored on cloud service providers' servers, confidentiality, authentication and access control are the most challenging factors in data security. Cloud providers should provide adequate security measures on their data and applications. Cryptography access control architecture overcomes the issue of data security in cloud environment. In this paper, we illustrate a secure and robust cloud storage architecture by combining cryptography and access control with two layered encryption.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Security of Data in the Utilization of E-Government
Both the computer and the software and data essential elements of a system of information in the digital environment associated with e-government. Computer may be associated with devices and services in the communication network terminal ends or other accounts or specific network facilities. Computing network may be a LAN or private network extended the scope of the government department or ministry concerned as a network intranet, or wide area WAN network as extranet or international information network such as the Internet, may also be linked to external contact is open to any individual provider technological means that enable access to her. The aim of this research is the security of information systems, protection and availability of resources and its components and work their confidentiality and integrity. Where in the absence of adequate security systems and information and communication technologies, do not use all their capacities and energies. The absence or lack of security in a loss of confidence in the system to stop and not to make the most of it, making it a burden on the organization. On this basis it must protect the system and information from damage that can lead to system failures and loss dating back to their organizations and their staff. You can identify three main dimensions of the target of various information in security systems, (I) definition: who is allowed to enter the system? Must check it out through three main entrances (II) dependence: once you learn the rules of the real user, the natural next question is what allowed for this person? Thus, an accreditation process based access to resources for this user (iii) Management: representing management saving the user attributes, in addition to the security of a given resource definition. It includes on activities such as the exclusion of the advantages of the arrival of the user or employee leaving the service. The search results are in four axes task, first (Security Policy: The purpose of information security policy relates to provide appropriate guidance and administrative support to the security of the information and recommendation (II) Security organization: This dimension aims information security management focus in the organization (iii) the security of individuals: the purpose of the after the security of individuals to reduce the risk of human error, theft, embezzlement or misuse of facilities (iv) control of access to information). Concludes research is the establishment of political, regulatory and legal frameworks to address the matters relating to the dangers of security such as piracy and management of domain names and the protection of citizens, the development of information security policy and encourage the application and adaptation programs and records of e-government, strengthen the expertise and Practice better for the security of information systems through the development of guidance and technical standards on a large scale and use including is a global developer, organize public campaigns to raise awareness aims to improve public knowledge and understanding of the importance of information and intellectual property rights and the protection of security software.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Automated methodology to reduce the redundancy in relational database
Normalization is a correct process for good relational database design of an application but not a complete. To support this, in a Boyce-Codd normal form design, three relations are designed from the two functional dependencies. Clearly, this is a setback in the basic aim of normalization i.e. reduction in database redundancy. The indecision here is that can we reduce the database redundancy further? Secondly, the database designers are creating the relations from the set of attributes and functional dependencies existing among them. The human work in the design process may lead to ambiguity and incorrect relations when the set of attributes and functional dependencies are large. The design of automated process for the human work overcomes this lacuna. The researchers have shown that there is a natural correspondence between the hypergraph and relational database schema. Beeri .et .al introduced a special class of hypergraphs known as ‘acyclic’, where the properties of relational database are equivalent to ‘ -acyclicity’. Another researcher Fagin introduced ‘ -acyclicity, which establishes the condition of unique relationship among the attributes. Hence, the amelioration of hypergraph from cyclic to acyclic satisfies the properties of relational database. Our paper proposes a methodology that takes the functional dependencies, attributes set as an input, and identifies the candidate key attributes. From the candidate key attributes, the hypergraph is redefined for the ‘acyclicity’ by the isolation of functional dependency (ies) framed by the candidate key attributes.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Natural Language Interface to Databases: Development Techniques
In the world of computing, information plays an important role in our lives. One of the major sources of information is database. Database and Database technology are having major impact on the growing use of computers. Almost all IT applications are storing and retrieving the information or data from the database. Database Management Systems (DBMS) have been widely used for storing and retrieving data. However, databases are often hard to use since their interface is quite rigid in co-operating with users. For storing and retrieving the information from database requires the knowledge of database language like SQL. Structured Query Language (SQL) is an ANSI standard for accessing and manipulating the information stored in database. However, everyone may not be able to write the SQL query as they may not be aware of the syntax and structure of SQL and database respectively. The purpose of Natural Language Interface is to allow users to compose questions in Natural Language and receive the response also in Natural Language. The idea of using Natural Language instead of SQL has promoted the development of new type of processing called Natural Language Interface to Database(NLIDB). This paper discuss about an introduction of Intelligent Database System, Natural Language Processing and Natural Language Interface to Database. It also gives a brief overview of subcomponent of NLIDB, techniques used to development of NLIDB along with its architecture.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Review of security issues in cloud computing related to Single and Multi-clouds
The use of cloud computing has accrued quickly in several organizations. Cloud computing provides several edges in terms of low price and accessibility of information. making certain the safety of cloud computing could be a major think about the cloud computing atmosphere, as users typically store sensitive data with cloud storage suppliers however these suppliers is also untrusted. Addressing “single cloud” suppliers is foretold to abate fashionable customers owing to risks of service handiness failure and also the risk of malicious insiders within the single cloud. A movement towards “multi-clouds”, or in different words, “interclouds” or “cloud-of-clouds” has emerged recently. This paper surveys recent analysis associated with single and multi-cloud security and addresses doable solutions. it\'s found that the analysis into the utilization of multi-cloud suppliers to take care of security has received less attention from the analysis community than has the utilization of single clouds. This work aims to market the utilization of multi-clouds owing to its ability to cut back security risks that have an effect on the cloud computing user.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A 3d stacked mesh NoC for reliable inter-layer communication and congestion reduction
The increasing viability of 3D silicon integration technology has opened new opportunities for chip architecture innovations. One direction is in the extension of 2D mesh based chip multiprocessor architecture into three Dimensions. We present an efficient architecture to optimize system performance, power consumption, and reliability of stacked mesh 3D NoC is proposed. Stacked mesh is a feasible architecture which takes advantage of the short inter-layer wiring delays, while suffering from inefficient intermediate buffers. To cope with this, an inter-layer communication mechanism is developed to enhance the buffer utilization, load balancing, and system fault-tolerance. The mechanism benefits from a congestion-aware and bus failure tolerant routing algorithm for vertical communication.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Designing Association Models for Disease Prediction using Apriori
Data mining is has three major components Clustering or Classification, Association Rules and Sequence Analysis. Association rules used to find interesting relationship between attribute values. Sequence Analysis used to find statistically relevant patterns between data. Data mining techniques have led over various methods to gain knowledge from vast amount of data. Association rules are mainly used in mining transaction data to find interesting relationship between attribute values and also it is a main topic of data mining There is a great challenge in candidate generation for large data with low support threshold. Association rules will be effectively worked with the solid data and low support threshold was discussed. By using Apriori algorithm we applied association rules on data set of certain areas to predict the chance of getting the dengue disease, the above data set was collected from some selected areas, so it is the real time data. Three different sets of rules are generated with this dataset and applied the Apriori algorithm to it, find the relation between the parameters in database.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Descriptive approach to software development life cycle models
The concept of system lifecycle models came into existence that emphasized on the need to follow some structured approach towards building new or improved system. Many models were suggested like waterfall, prototype, rapid application development, V-shaped, top & Bottom model etc. In this paper, we approach towards the traditional as well as recent software development life cycle models.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Analyzing blood cell images to differentiate WBC and counting of linear & non-linear overlapping RBC based on morphological features
In this paper we propose a new set of features based on morphology for total RBC count in given blood sample is explained along with classification of WBC. For the diagnosis of any disease first requirement is complete blood count i.e total number of RBC, WBC and platelets in given blood sample. And if there are excess of any of these types or any of these is few in number then this gives the doctor a basic idea that the person is not healthy for sure. To do this manually is very tedious. Here RBC and WBC are first differentiated and then counted through some algorithm. Implementation here is done through MATLAB.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]