Component Based Software Development (CBSD) has gained widespread acceptance as it often results in higher quality software with a significant reduction in development time and costs. A key idea behind CBSD is the extensive reuse and composition of preexisting modules into new software. In this paper we introduce the pliability metric, which is well suited… (More)
The purpose of this paper is to develop Artificial Neural Network (ANN)-based apple classifier. Testing effort is calculated using ANN method. The complete system is divided into two modules. In the first module, input (surface level apple quality parameter) from the different sources is collected by the software developed in Visual Basic through different… (More)
This paper describes a new apple classification system based on machine vision and artificial neural network (ANN), which classifies apple in real time on the basis of physical parameters of apple such as size, color and external defects. A specific hardware subsystem has been developed and described for every stage of input and output. The hardware… (More)
— Over the years, the focus has been on protecting network, host, database and standard applications from internal and external threats. The Rapid Application Development (RAD) process makes the web application extremely short and makes it difficult to eliminate the vulnerabilities. Here we study web application risk assessment technique called threat risk… (More)
For E-HEALTH initiatives in Uttarakhand the proposed E-HEALTH service model may allow better sharing of health information among multiple government departments, locally as well as at a distant location. But without coordination of different departments in Uttarakhand we cannot setup good e-health solutions. Priorities of Uttarakhand government for… (More)
The study tries to quantify and measure two abstract phenomenon of awareness and usability with respect to IT-initiatives. Indexes have been developed to measure both and a thorough analysis revealed a gap between the two. Further the effects training on the two variables were studied and it revealed a significant pre and post training gap.
Security has become ubiquitous in every domain today as newly emerging malware pose an ever-increasing perilous threat to systems. Consequently, honeypots are fast emerging as an indispensible forensic tool for the analysis of malicious network traffic. Honeypots can be considered to be traps for hackers and intruders and are generally deployed… (More)
This paper focuses on the effectiveness and efficiency of IT initiatives in rural areas where topology creates isolation to developmental activities. A village is selected for the study and information is gathered through interviews of village dwellers. These collected responses are then analyzed and a gaps model is proposed.