Papers by Manishaben Jaiswal
Social Science Research Network, May 1, 2016
Software engineering (SE) is a locality with a large variety of ideas and information. Such diver... more Software engineering (SE) is a locality with a large variety of ideas and information. Such diversity of topics needs the appliance of various teaching and learning techniques for effective education. Serious games are one in every technique nevertheless. Its style tends to be advance, and presently lacking a map of game standards that go with software engineering education needs. This paper presents a method to spot the sport style patterns which will be effective for game developing, specifically the package project management topic. Firstly, it begins by the principle of software engineering and programming language used in game development. Secondly, it how the game architecture is working, for that they used various patterns and one of the common pattern is the state diagram. Finally, how the game methodology technique is use to analyze the goal. The results may be use as a basis for planning and developing serious games for teaching package project management.
Bookmarks Related papers MentionsView impact
Risk Analysis and Management is a key task administration exercise to make sure that the least va... more Risk Analysis and Management is a key task administration exercise to make sure that the least variety of surprises take place whilst your task is underway. While we can by no means predict the future with certainty, we can follow an easy and streamlined threat administration procedure to predict the uncertainties in the tasks and reduce the incidence or have an effect on of these uncertainties. This improves the danger of profitable mission completion and reduces the penalties of these risks.This paper offers the structured Risk Management in information technology its scopes and resources. It also includes some tools which can help us in risk assessment and how it is impact on business impact analysis.
Bookmarks Related papers MentionsView impact
International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.9, Issue 3, pp.6270-6280, March 2021, 2021
This research aims to understand COVID-19 genetics, origin, evolution, virus origin, and manageme... more This research aims to understand COVID-19 genetics, origin, evolution, virus origin, and management measures at the human-animal interface. We used the data visualization method and researched multiple peer-reviewed journal articles to study and analyze the Covid origination, evolution, and spread of the virus and impact the livelihood around the globe, impacting economic and sociological and understanding the sustainable risk reduction strategies. SARS-CoV-2 or COVID-19 is a novel coronavirus that started from Wuhan City in China. Coronavirus extends mainly from person to person through respiratory droplets, touching surfaces with a virus on them, and then touching the face, nose, or eyes. Due to the spread of the virus, a global economic and sociological hit has changed people's lives worldwide. A few sustainable risk reduction strategies include wearing a mask, social distance, washing hands, and avoiding crowds. This study definitively answers the question relating to genetics, origin, evolution, and the management of COVID-19. Advance studies are needed to establish the proper action to stop a deadly virus from outbursts globally. The government, state, community, and individual need to learn and act from their level to prevent another pandemic.
Bookmarks Related papers MentionsView impact
IJRAR - International Journal of Research and Analytical Reviews (IJRAR), E-ISSN 2348-1269, P- ISSN 2349-5138, Volume.1, Issue 1, Page No pp.446-453, January-2014, 2014
The security problem arose around twenty-five years ago. The internet was small and relatively us... more The security problem arose around twenty-five years ago. The internet was small and relatively user for private purposes. Today, the use of the internet is indeed public. As the use of cyberspace has grown, the need for security has grown with it. All the hardware control by people who were well known and would generally have had security permission. In such a network, we do not need to build security into the protocol. It is easier to use locks and guards to ensure safety at the time of encryption. Several methods have evolved over the years to address the need for security. Most of these are focused on higher-level internet protocols due to a lack of security. These solutions escalate for certain situations, but they cannot generalize as it depends on the application. For example, the use of SSL on www, FTP. Many applications require this type of security, and Internet protocol security is one of them. This paper provides the depth of knowledge on the introduction of internet security protocol, its architecture, the security policy for using an internet protocol, and its relevant database, internet security mode, involving its functions and methods.
Bookmarks Related papers MentionsView impact
International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.1, Issue 5, page no.1107-1115, October-2014, 2014
Computer graphics technology has been very active in recent years, with extensive and successful ... more Computer graphics technology has been very active in recent years, with extensive and successful technical research and application development. With the development of computers and peripheral equipment, the functions of computer graphics have been extensively developed. The measurement and expansion functions of the software and computer graphics have been further strengthened. Graphics itself is extending in the direction of standardization, integration, and intelligence. Before the informatization requirements of design work can be expanded and visualized, the pursuit of realistic virtual reality technology will be a large application field. Computer graphics technology will be diversified in an integrated manner, based on graphics, auditory, sensory, and other sensory effects.
Bookmarks Related papers MentionsView impact
International Journal of Research and Analytical Reviews (IJRAR), E-ISSN 2348-1269, P- ISSN 2349-5138, 2015
The enormous growth in the scale of data observed in recent years is a vital factor. It can be de... more The enormous growth in the scale of data observed in recent years is a vital factor. It can be defined as high volume, velocity, and various data that require new high-performance processing. Addressing data is a challenging and time-demanding task requiring extensive computational infrastructure to ensure successful data processing and analysis. The presence of preprocessing data methods for data mining review in this paper. The definition, characteristics, and categorization of preprocessing data approaches are introduced. The connection between data and preprocessing throughout all methods and technologies is examined and covers a state-of-the-art review. Additionally, research issues focus on performance, data, and other issues in some families of data preprocessing methods and applications on new prominent data learning patterns. It provides information about knowledge discovery databases and significant issues associates with data mining techniques.
Bookmarks Related papers MentionsView impact
International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.7, Issue 1, pp.526-536, February 2019, 2019
After determining computer system criminal offense within endeavor, experts examine the styles th... more After determining computer system criminal offense within endeavor, experts examine the styles that have been devoted over the last, and the brand new techniques probably to seem down the road. Experts also check the challenge in evaluating and discovering computer system criminal activity, procedures for trying to put on trial or even stop such criminal offenses, and the performance of these solutions. Just a little portion of computer system breather-ins are sensed, as well as, in addition, stats on computer system unlawful act are usually not available. The most usual types of computer system criminal activity mentioned to InterGOV consist of youngster fraudulence, email, and porn spam. Buffers versus computer system illegal activity might happen in the restricting access to the relevant information to be safeguarded, using file encryption to ensure personal privacy and stability, and enlightening the social concerning safety concerns. It provides information on cybercrime and various types and how to prevent the data from the threat.
Bookmarks Related papers MentionsView impact
International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.8, Issue 1, pp.60-70, January 2020, 2020
Bitcoin is the internet-based world's top-ranking cryptocurrency. It is one of the common cryptoc... more Bitcoin is the internet-based world's top-ranking cryptocurrency. It is one of the common cryptocurrencies that are readily available. Bitcoin is most experienced due to the people's anonymity and openness in the device. Daily styles in the bitcoin exchange have acquired popularity amongst fans, investors, individuals, and many more. Bitcoin cost data show preferable residential properties where some classical opportunity collection prophecy approaches use the actions, making unsatisfactory predictions without a probabilistic interpretation. This paper conducts an extensive research study on the development of Bitcoin and an organized evaluation of it. It deeply provides the information for the difference between the digital and virtual currencies, decentralized bitcoin network and compares it with others. The nature and characteristics of bitcoin. Also, depth in the study of the benefits, risks, and challenges of bitcoins. The future and application of bitcoin focus on its stability.
Bookmarks Related papers MentionsView impact
International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.9, Issue 1, pp.4748-4759, January 2021, 2021
The expansion of Artificial Intelligence is speeding up rapidly, and a sequence of Artificial Int... more The expansion of Artificial Intelligence is speeding up rapidly, and a sequence of Artificial Intelligence with automation has begun to change over the business landscape. Companies and businesses are focusing on applying existing Artificial Intelligence with automation processes to gain new heights of efficiency and quality. The paper depicts artificial intelligence and automation. It tries to demonstrate to the consultation how automation, networking, and artificial intelligence are connected and how they can be more effective when they work together and give a competitive advantage. Artificial intelligence in automation has contributed to businesses by reducing the effective rate and vocational costs. It introduced a new-found level of accuracy, and due to Artificial Intelligence's learning ability, efficiency improves over time. However, there is a good advancement in the field of Automation and Artificial Intelligence. Mutually Artificial Intelligence and machine learning are so far to be optimized. Corporations have realized that the key to business success is exposed understanding machine learning, artificial intelligence, and automation. Momentarily, the companies will be fully equipped with these start systems and entirely change the traditional methods by yielding significant benefits.
Bookmarks Related papers MentionsView impact
International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.6, Issue 1, pp.514-525, January 2018, 2018
The Android operating unit is a mobile phone operating body built through Google primarily for to... more The Android operating unit is a mobile phone operating body built through Google primarily for touchscreen tools, smartphones, and tablet computers. It will undoubtedly begin with Android Architecture, which consists of five degrees: the Linux piece, Libraries, Application structure, Android runtime, and System apps. The Android operating unit is a multiuser Linux device in which each application is a various customer. Mobile applications have transformed interaction from conventional antiqued methods and fast-forwarded. Mobile applications have delivered more significant than social networking sites functionalities. Mobile applications have entirely altered the point of view and the process of working. Ordering food items, inspecting profile harmony, and creating a grocery store checklist are achievable utilizing mobile phone requests. Apple and Google have carried out significant improvements in the industry of mobile phones. Mobile uses have made our lifestyles less complicated, yet it has also unfavorably affected our lifestyles. Current researches state that making use of a mobile phone the entire time may lead to anxiety. Mobile applications denote a turning point in the primary creations and also developments. They aid organizations to interact much better along with their clients via flash message, offer on-demand solutions utilizing area sharing, and give prolonged assistance with document sharing, video recording conferencing, and a lot more. This paper describes the information about the android operating system and its components, how they interconnected with each other, and in today's era, it can change the way of communication.
Bookmarks Related papers MentionsView impact
International Journal of Management and Humanities Scopus , 2020
ERP is enterprise administration software-typically a suite of built-in applications-that a agenc... more ERP is enterprise administration software-typically a suite of built-in applications-that a agency can use to collect, store, manipulate and interpret facts from many enterprise activities, including: product planning, cost, manufacturing or carrier delivery, advertising and sales. Most of the agencies both MSMEs and massive scale groups have integration interfaces between ERP and CRM structures for the change of patron and income data. In latest years there has been a blurring of the distinctions between ERP and CRM systems. Most ERP structures have elevated to fundamental performance for CRM and Management Information Systems (MIS). Similarly, CRM structures now consist of a great deal commonplace ERP functionality. The whole CRM-ERP integration oriented engineering groups are 143 in Gujarat. The decision of 15 agencies is made feasible on the groundwork of 5 zones of Gujarat State. The supply of information is principal and secondary. The foremost statistics are amassed thru structured questionnaire administered to the respondents in individual and thru email. The legitimate pattern dimension for this find out about is decided on the foundation of the aforesaid formulation for the pattern size. The populace for deterring is in variant mode 3803 by means of getting records via net hyperlinks and private assembly with organization authorities. The pattern measurement may additionally be decided as 372. IBMSPSS.22 is employed as a statistical device for the reason of information analysis. Demographic frequency of respondents, scale reliability test, correlations, component evaluation and regression evaluation are performed as statistical checks for attaining the objectives.
Bookmarks Related papers MentionsView impact
International Journal of Advanced and Innovative Research (IJAIR) , 2018
Big data could be a willing dynamical issue. Successful organizations achieving business blessing... more Big data could be a willing dynamical issue. Successful organizations achieving business blessings by analyzing knowledge. It is a conventional vital attention in recent years. However, some challenges measure one in all the key causes in decreasing the expansion of organizations. The most problems why these organizations are not beginning their recruiting board to implement the huge knowledge strategy because they are doing not enough grip regarding enormous knowledge and that is the main reason that they do not notice the advantages of huge knowledge. During this study, an effort is hoped to review the role of huge knowledge within the business is a Big Data.
Bookmarks Related papers MentionsView impact
International Journal of Research and Analytical Reviews (IJRAR), E-ISSN 2348-1269, P- ISSN 2349-5138, Vol.4, Issue 2, pp.742-746, 10.6084/m9. June 2017, , 2017
Cloud Computing uses hardware and software programs to grant an issue over the internet. With clo... more Cloud Computing uses hardware and software programs to grant an issue over the internet. With cloud computing, clients can access documents and use them to gain admission to the internet from any system. Cloud computing is an application-based software program and infrastructure that retail outlets facts on the way of service, accessing through the internet. A consumer's frontlets get admission to data saved in
the cloud using an internet browser or cloud computing software. In other words, cloud computing can describe as turning in computing power of CPU, RAM, Network Speeds, Storage OS software a company over a neighborhood instead of bodily having the computing property at the customer location. In this paper, I would like to introduce cloud computing and its infrastructure with the prons and cons of the cloud storage
IndexTerms - Cloud, Cloud computing infrastructure, SAAS, IAAS, PAAS, Scope of the cloud, Advantages and disadvantages of cloud
Bookmarks Related papers MentionsView impact
International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.5, Issue 4, pp.648-651, December 2017
computer users including students, home and corporate users, system administrators, corporate man... more computer users including students, home and corporate users, system administrators, corporate managers, and even the anti-virus manufacturers. The viruses are written by people with malefic intentions to bother innocent users.
Bookmarks Related papers MentionsView impact
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056, p-ISSN: 2395-0072, Volume: 06 Issue: 11, s. no -303 , pp. 2452-2454 , Nov 2019
Software architecture defined as strategic design of an activity concerned with global requiremen... more Software architecture defined as strategic design of an activity concerned with global requirements and its solution is implemented such as programming paradigms, architectural styles, component-based software engineering standards, architectural patterns, security, scale, integration, and law-governed regularities. Functional design, also described as tactical design, is an activity concerned with local requirements governing what a solution does such as algorithms, design patterns, programming idioms, refactoring, and low-level implementation. In this paper I would like to introduce some concepts of software architecture, and software design as well as relationship between them.
Bookmarks Related papers MentionsView impact
International Journal of Informative & Futuristic Research (IJIFR), ISSN: 2347-1697, Volume 6, issue -2, pp. 114-119, October-2018, 2018
Software quality downside is the leading issue for the software package business. The difficulty ... more Software quality downside is the leading issue for the software package business. The difficulty exists for forty years or fifty years long. The business is suffering and shutting for this issue. During this circumstance, it is necessary to address and take away its root cause. Otherwise, day-by-day business economic loss can increase. In
this paper, I would like to introduce some important challenges of software quality assurance and testing which are facing by the software package industries. The analysis centered on many little and medium software package firms of the globe
Bookmarks Related papers MentionsView impact
International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.3, Issue 5, page no.267-270, May-2016, 2016
Software engineering (SE) is a locality with a large variety of ideas and information. Such diver... more Software engineering (SE) is a locality with a large variety of ideas and information. Such diversity of topics needs the appliance of various teaching and learning techniques for effective education. Serious games are one in every technique nevertheless. Its style tends to be advance, and presently lacking a map of game standards that go with software engineering education needs. This paper presents a method to spot the sport style patterns which will be effective for game development, specifically the package project management topic. Firstly, it begins with the principle of software engineering and programming language used in game development. Secondly, it how the game architecture is working, for that they used various patterns and one of the common patterns is the state diagram. Finally, how the game methodology technique is used to analyze the goal. The results may be used as a basis for planning and developing serious games for teaching package project management.
Bookmarks Related papers MentionsView impact
IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol. 2, No.6, December 2012, 2012
The purpose of this paper is to present anprologue to distributed databasesand Parallel Database.... more The purpose of this paper is to present anprologue to distributed databasesand Parallel Database. Also we compare Distributed and Parallel Database by using Different Characteristic. And also declare some research areas of Distributed Database that have to be solved.
Bookmarks Related papers MentionsView impact
Books by Manishaben Jaiswal
Thakur publication , 2021
Cyber security is the application of technologies, processes, and controls to protect systems, ne... more Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks. It aims to reduce the risk of cyber-attacks and protect against the unauthorized exploitation of systems, networks, and technologies.
Bookmarks Related papers MentionsView impact
Red 'shine publication, 2021
Data is the most integral component for the functioning of any organization. With the increasing ... more Data is the most integral component for the functioning of any organization. With the increasing importance of data, the need to store such a vast chunk of data is necessary. This brings databases into the picture and when we talk about relational database languages, PL/SQL and SQL stand as one of the most popular. Though they may seem to be intertwined with one another, there are several differences in the manner they operate. Be it an IT student or a database administrator, one must be acquainted with the differences between SQL and PL/SQL. So, let’s dive into knowing what these relational languages are and what are the differences between them.
Bookmarks Related papers MentionsView impact
Uploads
Papers by Manishaben Jaiswal
the cloud using an internet browser or cloud computing software. In other words, cloud computing can describe as turning in computing power of CPU, RAM, Network Speeds, Storage OS software a company over a neighborhood instead of bodily having the computing property at the customer location. In this paper, I would like to introduce cloud computing and its infrastructure with the prons and cons of the cloud storage
IndexTerms - Cloud, Cloud computing infrastructure, SAAS, IAAS, PAAS, Scope of the cloud, Advantages and disadvantages of cloud
this paper, I would like to introduce some important challenges of software quality assurance and testing which are facing by the software package industries. The analysis centered on many little and medium software package firms of the globe
Books by Manishaben Jaiswal
the cloud using an internet browser or cloud computing software. In other words, cloud computing can describe as turning in computing power of CPU, RAM, Network Speeds, Storage OS software a company over a neighborhood instead of bodily having the computing property at the customer location. In this paper, I would like to introduce cloud computing and its infrastructure with the prons and cons of the cloud storage
IndexTerms - Cloud, Cloud computing infrastructure, SAAS, IAAS, PAAS, Scope of the cloud, Advantages and disadvantages of cloud
this paper, I would like to introduce some important challenges of software quality assurance and testing which are facing by the software package industries. The analysis centered on many little and medium software package firms of the globe
Computers have outperformed people in many tasks like Numerical computations, Information storage, and repetitive operations, which are mechanical and unintelligent. Computers are essentially machines for obeying rules speedily and accurately.
Software engineering is a new era as CIOs and Digital Leaders now understand the importance of software engineering and the impact – both good and bad – it can have on your bottom line.
Vendors, IT staff, and even departments outside of IT need to be aware that software engineering is increasing in its impact – it is affecting almost all aspects of your daily business.
For more insight into how your software engineering impacts your business, schedule a call with CAST Software Intelligence experts.