Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Physical Sciences and Mathematics

Is Anti-Virus A Necessary Evil?, Umakant Mishra May 2014

Is Anti-Virus A Necessary Evil?, Umakant Mishra

Umakant Mishra

While everybody is becoming more and more dependent on computers there are some unscrupulous people who continuously try to misuse the technology and get illegal and illegitimate benefit out of this sophisticated environment. Today the Internet is like a busy street or open market place where you find almost everything you want. As there are some obvious risks when you stand or move in a busy street such as you are likely to be pick pocketed or cheated or even knocked out by a rash driving vehicle. Similar threats loom over the head of a user when he is exposed …


Evolution Of User Interfaces For The Visually Impaired, Umakant Mishra May 2014

Evolution Of User Interfaces For The Visually Impaired, Umakant Mishra

Umakant Mishra

Physically or mentally challenged people cannot use a computer in the same way a normal people can. For example, persons with disability in hands cannot use a standard keyboard or mouse efficiently. Persons having visual disability cannot benefit from a standard display screen. People having locomotor challenge, visual disability or hearing problem etc. cannot interact with a computer like a normal person. So it is necessary to design the computers, interfacing devices and software interfaces with special features, which can be used by the people with physical challenges.

There are many input/output devices like mouse, keyboard, pointers, and touch screens …


Understanding Secrets Of Sustainability Through Triz Philosophy, Umakant Mishra Apr 2014

Understanding Secrets Of Sustainability Through Triz Philosophy, Umakant Mishra

Umakant Mishra

After creating the weapons that can destroy the world, the next challenge of man is not to win an enemy but to survive the disasters. The modern man realizes that the worst challenges to face are the manmade disasters. While the nature has given us a well-disposed atmosphere to grow we are spoiling the natural resources through various anti-environmental activities. Our partial knowledge on development has taken us through a so-called development, which is neither eco-friendly nor sustainable. It is therefore important to control our own activities and behavior to minimize their negative effects on other adjacent systems and environment. …


Critical Considerations For Developing Mis For Ngos, Umakant Mishra, Kailash Chandra Dash Mar 2014

Critical Considerations For Developing Mis For Ngos, Umakant Mishra, Kailash Chandra Dash

Umakant Mishra

Although Information Systems and Information Technology (IS & IT) has become a major driving force for many of the current day organizations, the NGOs have not been able to utilize the benefits up to a satisfactory level. Most organizations use standard office tools to manage huge amount for field data and never feel the need for a central repository of data. While many people argue that an NGO should not spend too much money on information management, it is a fact that organizing the information requires more of a mindset and an organized behavior than a huge financial investment.


Designing An Mis Database For Selection And Recruitment, Umakant Mishra Sep 2013

Designing An Mis Database For Selection And Recruitment, Umakant Mishra

Umakant Mishra

Selection and recruitment is a key HR function and it is often necessary to maintain at least a small database of all the candidates who have been invited in past interviews. This information may be considered as a part of HR MIS and may be maintained by HR department along with other HR MIS such as employee information, transfers, performance appraisals, trainings etc.

This recruitment MIS database includes all the candidates after the preliminary scrutiny is over. When the candidates go through different stages of interviews, the MIS also captures all their interview results. Maintaining this information not only helps …


Introduction To Management Information System, Umakant Mishra Aug 2013

Introduction To Management Information System, Umakant Mishra

Umakant Mishra

A Management Information System (MIS) is an information system that is intended to be used by the higher management of an organization. The MIS generally collects summarized data from different departments or subsystems of an organization and presents in a form that is helpful to the management for taking better decisions for the organization.


Management Information Systems Vs. Other Information Systems, Umakant Mishra Aug 2013

Management Information Systems Vs. Other Information Systems, Umakant Mishra

Umakant Mishra

A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization. In one sense MIS is a part or subset of the Information Management System of an Organization. There are different types of information systems such as, Transaction Processing System (TPS), Decision Support System (DSS), Executive Support System (ESS) etc. having some differences and some overlapping.

MIS is different from DSS as the later uses unstructured data to take non-standard decisions. MIS is different from TPS and the later is used for day-to-day transactions of the organization. Thus …


How To Implement Access Rights In An Mis Project, Umakant Mishra Aug 2013

How To Implement Access Rights In An Mis Project, Umakant Mishra

Umakant Mishra

The MIS data is critical to an organization and should be protected from misuse by wrong persons. Although The MIS data is typically meant for the senior managers each MIS report may not be required by every manager. The access to MIS data is determined by the role of an individual in the organization and controlled by the MIS administrator accordingly. The access is generally determined by the following parameters, (a) the type of user (such as staff or manager etc.), (b) the type of data (whether general data or managerial data), (c) level of access (read/ write/ admin access) …


How Do Viruses Attack Anti-Virus Programs, Umakant Mishra Jul 2013

How Do Viruses Attack Anti-Virus Programs, Umakant Mishra

Umakant Mishra

As the anti-viruses run in a trusted kernel level any loophole in the anti-virus program can enable attackers to take full control over the computer system and steal data or do serious damages. Hence the anti-virus engines must be developed with proper security in mind. The ant-virus should be able to any type of specially created executable files, compression packages or documents that are intentionally created to exploit the anti-virus’s weakness.

Viruses are present in almost every system even though there are anti-viruses installed. This is because every anti-virus, however good it may be, leads to some extent of false …


Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra Jul 2013

Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra

Umakant Mishra

During a fight between viruses and anti-viruses it is not always predictable that the anti-virus is going to win. There are many malicious viruses which target to attack and paralyze the anti-viruses. It is necessary for an anti-virus to detect and destroy the malware before its own files are detected and destroyed by the malware. The anti-virus may follow thorough testing and auditing procedures to fix all its bugs before releasing the software in the market. Besides the anti-virus may use all the obfuscation techniques like polymorphism that the viruses generally use to hide their codes. This article also shows …


Contradictions In Improving Speed Of Virus Scanning, Umakant Mishra May 2013

Contradictions In Improving Speed Of Virus Scanning, Umakant Mishra

Umakant Mishra

Although everything in computing industry moves faster, the processor, memory speed, memory size, storage space etc. there is no improvement in virus scanning time. Although the processing speed has substantially increased, a typical full scanning is still taking several hours for an average computer. There is a serious need to improve the scanning time.

Contradiction is a stage of problem solving where the nature of the actual problem is clearly explained in terms of at least two parameters, one improving and another worsening. While emphasizing one parameter strengthens the system position emphasizing another parameter weakens the system.

In conventional methods …


Finding And Solving Contradictions Of False Positives In Virus Scanning, Umakant Mishra May 2013

Finding And Solving Contradictions Of False Positives In Virus Scanning, Umakant Mishra

Umakant Mishra

False positives are equally dangerous as false negatives. Ideally the false positive rate should remain 0 or very close to 0. Even a slightest increase in false positive rate is considered as undesirable.

Although the specific methods provide very accurate scanning by comparing viruses with their exact signatures, they fail to detect the new and unknown viruses. On the other hand the generic methods can detect even new viruses without using virus signatures. But these methods are more likely to generate false positives. There is a positive correlation between the capability to detect new and unknown viruses and false positive …


Methods Of Repairing Virus Infected Files, A Triz Based Analysis, Umakant Mishra May 2013

Methods Of Repairing Virus Infected Files, A Triz Based Analysis, Umakant Mishra

Umakant Mishra

Some computer viruses damage the host file during infection either partially or fully. These types of viruses are known as “file modifying viruses”. In these cases, the chance of recovery is less, but the anti-virus has to apply various methods with hope. The virus cleaner must know the characteristics of a virus in order to remove that virus. It cannot remove an unknown virus whose methods of infection are not known. If a virus is wrongly detected to be a different virus, then the cleaner will do wrong operations and build a garbage file.

Most viruses are capable of fixing …


Why Is It Difficult To Find A Good Free Web Host, Umakant Mishra Feb 2012

Why Is It Difficult To Find A Good Free Web Host, Umakant Mishra

Umakant Mishra

This article illustrates how the advertisements on free hosts are deceptive, the evaluations are fake, and the user feedbacks are manipulated. As a search engine cannot differentiate between good and bad free hosts per se, it is likely to serve you a list of free hosts, which are discussed more or advertised more and not necessarily better. Searching a good free host is as difficult as searching a diamond in a coalmine.


Should You Use A Free Server For Hosting Your Site?, Umakant Mishra Feb 2012

Should You Use A Free Server For Hosting Your Site?, Umakant Mishra

Umakant Mishra

Contrary to the general belief that the paid servers provide better service, the services provided by paid servers are often horrible. The matter of the fact is that you may not need much of service from a well-configured server. But the service provider wants to provide you service in order to prove its service efficiency. But how will they provide service when there is no need of service? So they have to create many artificial problems for you (e.g., by changing server configurations etc.) and then solve those problems promptly on your request, in order to prove their service efficiency. …


The Mechanics Of Implementing Rss - Really Simple Syndication, Umakant Mishra Dec 2011

The Mechanics Of Implementing Rss - Really Simple Syndication, Umakant Mishra

Umakant Mishra

RSS is a format to update the frequently updated content in the Internet such as blog entries, news headlines etc. An RSS document contains full or summarized texts plus metadata such as publishing dates and authorship. RSS stands for Really simple Syndication. RSS feeds benefits publishers by letting them syndicate content automatically. A standardized XML file format is used to publish once and viewed by many different programs.


Dirty Tricks Played By The Domain Registrars, Umakant Mishra Dec 2011

Dirty Tricks Played By The Domain Registrars, Umakant Mishra

Umakant Mishra

With the popularity of Internet the number of websites are increasing in exponential rate. Everybody needs a website and every website needs a domain name and a hosting server. Domain names often represent a business organization or a commercial brand. Hence, changing domain names may affect business strategy and result in serious business loss. The domain registrars often take advantage of customers’ ignorance and weakness and trouble them to unduly extract more and more money.


The Dirty Tricks Played By Web Hosting Agencies, Umakant Mishra Dec 2011

The Dirty Tricks Played By Web Hosting Agencies, Umakant Mishra

Umakant Mishra

The number of websites are increasing in exponential rate. There are almost 50,000 websites being launched in every week and a similar number of web hosting companies are thriving to grab that opportunity. This has led to a cutthroat competition between the web hosting companies. The competition has gone beyond the ethical boundaries and many of them follow various unfair practices to attract and retain customers.


Demonstrating Contradictions In A Graphical User Interface, Umakant Mishra Jun 2010

Demonstrating Contradictions In A Graphical User Interface, Umakant Mishra

Umakant Mishra

Designing a GUI is not so easy as it may appear to outside. The developer has to face many difficulties while improving the features of a GUI. In many cases improving one feature of a GUI results in worsening another feature of it, thus leading to a situation known as contradiction in TRIZ. Many such contradictions have been solved by different inventors in the past. We will demonstrate some important contradictions in this article and discuss alternative solutions for each contradiction.


Application Of Triz Principles In Software Concepts, Umakant Mishra Sep 2007

Application Of Triz Principles In Software Concepts, Umakant Mishra

Umakant Mishra

The Inventive Principles of TRIZ are not only applicable to mechanical or technical field; they are also applicable to Software solutions. Most of the 40 principles are easy to learn, but the question arises where to apply and how to apply. This article shows some simple examples of applying TRIZ principles.

Some people may ask, the solutions in this article are all known, what is the use of trying out TRIZ Principles on them. My answer is the art of problem solving is like learning a bicycle. If you are capable of riding the cycle on a known road, there …


10 Inventions On Improving Keyboard Efficiency: A Triz Based Analysis, Umakant Mishra Jan 2005

10 Inventions On Improving Keyboard Efficiency: A Triz Based Analysis, Umakant Mishra

Umakant Mishra

A keyboard is the most important input device for a computer. With the development of technology a basic keyboard does not want to remain confined within the basic functionalities of a keyboard, rather it wants to go beyond. There are several inventions which attempt to improve the efficiency of a conventional keyboard. This article illustrates 10 inventions from US Patent database all of which have proposed very interesting methods for improving the efficiency of a computer keyboard. Some interesting inventions include, adding toolbar buttons on the keyboard, power saving method, keyboard-cooling mechanism, robust keyboard for public use, keyboard enhancement for …