Learn More
With the exponential growth of networked system and application such as eCommerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. The application of genetic algorithms in the cryptanalysis of(More)
Genetic algorithms are a population-based Meta heuristics. They have been successfully applied to many optimization problems. However, premature convergence is an inherent characteristic of such classical genetic algorithms that makes them incapable of searching numerous solutions of the problem domain. A memetic algorithm is an extension of the traditional(More)
Enterprise resource Planning (ERP) has become a key business driver in today’s world. Retailers are also trying to reap in the benefits of the ERP. In most large Indian Retail Industry ERP systems have replaced nonintegrated information systems with integrated and maintainable software. Retail ERP solution integrates demand and supply effectively to help(More)
Purpose – The purpose of this paper is to explore the factors influencing the enterprise resource planning (ERP) implementation success in Indian retail sector. Additionally, the study also addresses the relationship between factors that influence ERP implementation and the success of ERP implementation empirically. Strategic, Technological, People and(More)
Due to increasing incidents of cyber attacks, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. In this paper, we propose a cryptanalysis method based on genetic algorithm, tabu search & simulated(More)
There are several kinds of burst errors for which error detecting and error correcting codes have been constructed. In this paper, we consider a new kind of burst error which will be termed as ‘2-repeated burst error of length b(fixed)’. Linear codes capable of detecting such errors have been studied. Further, codes capable of detecting and simultaneously(More)