Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (20)
- Software Engineering (12)
- Information Security (7)
- Databases and Information Systems (6)
- Other Computer Sciences (4)
-
- Systems Architecture (3)
- Computer Engineering (2)
- Engineering (2)
- Graphics and Human Computer Interfaces (2)
- OS and Networks (2)
- Environmental Sciences (1)
- Hardware Systems (1)
- Natural Resources and Conservation (1)
- Social and Behavioral Sciences (1)
- Sustainability (1)
- Theory and Algorithms (1)
- Urban Studies and Planning (1)
- Keyword
-
- Computer and Software (7)
- Computer security (7)
- Anti-virus (6)
- Anti-virus software (6)
- Computer Anti-Virus (6)
-
- Computer virus (6)
- Virus detection (6)
- Virus scanning (6)
- Management Information Systems (5)
- Anti-virus design (4)
- Computer vulnerability (4)
- Domain problem (4)
- Domain transfer (4)
- Heuristic scanning (4)
- Hosting problem (4)
- Inventive Problem Solving (4)
- Software Innovation (4)
- TRIZ (4)
- Web hosting (4)
- Fake advertisements (3)
- Fake rating (3)
- Hosting cheats (3)
- Information systems (3)
- Innovation (3)
- Inoculation (3)
- Integrity checking (3)
- Management information system (3)
- Virus removal (3)
- Anti-virus development (2)
- Domain locking (2)
Articles 1 - 21 of 21
Full-Text Articles in Physical Sciences and Mathematics
Is Anti-Virus A Necessary Evil?, Umakant Mishra
Is Anti-Virus A Necessary Evil?, Umakant Mishra
Umakant Mishra
While everybody is becoming more and more dependent on computers there are some unscrupulous people who continuously try to misuse the technology and get illegal and illegitimate benefit out of this sophisticated environment. Today the Internet is like a busy street or open market place where you find almost everything you want. As there are some obvious risks when you stand or move in a busy street such as you are likely to be pick pocketed or cheated or even knocked out by a rash driving vehicle. Similar threats loom over the head of a user when he is exposed …
Evolution Of User Interfaces For The Visually Impaired, Umakant Mishra
Evolution Of User Interfaces For The Visually Impaired, Umakant Mishra
Umakant Mishra
Physically or mentally challenged people cannot use a computer in the same way a normal people can. For example, persons with disability in hands cannot use a standard keyboard or mouse efficiently. Persons having visual disability cannot benefit from a standard display screen. People having locomotor challenge, visual disability or hearing problem etc. cannot interact with a computer like a normal person. So it is necessary to design the computers, interfacing devices and software interfaces with special features, which can be used by the people with physical challenges.
There are many input/output devices like mouse, keyboard, pointers, and touch screens …
Understanding Secrets Of Sustainability Through Triz Philosophy, Umakant Mishra
Understanding Secrets Of Sustainability Through Triz Philosophy, Umakant Mishra
Umakant Mishra
After creating the weapons that can destroy the world, the next challenge of man is not to win an enemy but to survive the disasters. The modern man realizes that the worst challenges to face are the manmade disasters. While the nature has given us a well-disposed atmosphere to grow we are spoiling the natural resources through various anti-environmental activities. Our partial knowledge on development has taken us through a so-called development, which is neither eco-friendly nor sustainable. It is therefore important to control our own activities and behavior to minimize their negative effects on other adjacent systems and environment. …
Critical Considerations For Developing Mis For Ngos, Umakant Mishra, Kailash Chandra Dash
Critical Considerations For Developing Mis For Ngos, Umakant Mishra, Kailash Chandra Dash
Umakant Mishra
Although Information Systems and Information Technology (IS & IT) has become a major driving force for many of the current day organizations, the NGOs have not been able to utilize the benefits up to a satisfactory level. Most organizations use standard office tools to manage huge amount for field data and never feel the need for a central repository of data. While many people argue that an NGO should not spend too much money on information management, it is a fact that organizing the information requires more of a mindset and an organized behavior than a huge financial investment.
Designing An Mis Database For Selection And Recruitment, Umakant Mishra
Designing An Mis Database For Selection And Recruitment, Umakant Mishra
Umakant Mishra
Selection and recruitment is a key HR function and it is often necessary to maintain at least a small database of all the candidates who have been invited in past interviews. This information may be considered as a part of HR MIS and may be maintained by HR department along with other HR MIS such as employee information, transfers, performance appraisals, trainings etc.
This recruitment MIS database includes all the candidates after the preliminary scrutiny is over. When the candidates go through different stages of interviews, the MIS also captures all their interview results. Maintaining this information not only helps …
Introduction To Management Information System, Umakant Mishra
Introduction To Management Information System, Umakant Mishra
Umakant Mishra
A Management Information System (MIS) is an information system that is intended to be used by the higher management of an organization. The MIS generally collects summarized data from different departments or subsystems of an organization and presents in a form that is helpful to the management for taking better decisions for the organization.
Management Information Systems Vs. Other Information Systems, Umakant Mishra
Management Information Systems Vs. Other Information Systems, Umakant Mishra
Umakant Mishra
A Management Information System (MIS) is a systematic organization and presentation of information that is generally required by the management of an organization. In one sense MIS is a part or subset of the Information Management System of an Organization. There are different types of information systems such as, Transaction Processing System (TPS), Decision Support System (DSS), Executive Support System (ESS) etc. having some differences and some overlapping.
MIS is different from DSS as the later uses unstructured data to take non-standard decisions. MIS is different from TPS and the later is used for day-to-day transactions of the organization. Thus …
How To Implement Access Rights In An Mis Project, Umakant Mishra
How To Implement Access Rights In An Mis Project, Umakant Mishra
Umakant Mishra
The MIS data is critical to an organization and should be protected from misuse by wrong persons. Although The MIS data is typically meant for the senior managers each MIS report may not be required by every manager. The access to MIS data is determined by the role of an individual in the organization and controlled by the MIS administrator accordingly. The access is generally determined by the following parameters, (a) the type of user (such as staff or manager etc.), (b) the type of data (whether general data or managerial data), (c) level of access (read/ write/ admin access) …
How Do Viruses Attack Anti-Virus Programs, Umakant Mishra
How Do Viruses Attack Anti-Virus Programs, Umakant Mishra
Umakant Mishra
As the anti-viruses run in a trusted kernel level any loophole in the anti-virus program can enable attackers to take full control over the computer system and steal data or do serious damages. Hence the anti-virus engines must be developed with proper security in mind. The ant-virus should be able to any type of specially created executable files, compression packages or documents that are intentionally created to exploit the anti-virus’s weakness.
Viruses are present in almost every system even though there are anti-viruses installed. This is because every anti-virus, however good it may be, leads to some extent of false …
Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra
Protecting Anti-Virus Programs From Viral Attacks, Umakant Mishra
Umakant Mishra
During a fight between viruses and anti-viruses it is not always predictable that the anti-virus is going to win. There are many malicious viruses which target to attack and paralyze the anti-viruses. It is necessary for an anti-virus to detect and destroy the malware before its own files are detected and destroyed by the malware. The anti-virus may follow thorough testing and auditing procedures to fix all its bugs before releasing the software in the market. Besides the anti-virus may use all the obfuscation techniques like polymorphism that the viruses generally use to hide their codes. This article also shows …
Contradictions In Improving Speed Of Virus Scanning, Umakant Mishra
Contradictions In Improving Speed Of Virus Scanning, Umakant Mishra
Umakant Mishra
Although everything in computing industry moves faster, the processor, memory speed, memory size, storage space etc. there is no improvement in virus scanning time. Although the processing speed has substantially increased, a typical full scanning is still taking several hours for an average computer. There is a serious need to improve the scanning time.
Contradiction is a stage of problem solving where the nature of the actual problem is clearly explained in terms of at least two parameters, one improving and another worsening. While emphasizing one parameter strengthens the system position emphasizing another parameter weakens the system.
In conventional methods …
Finding And Solving Contradictions Of False Positives In Virus Scanning, Umakant Mishra
Finding And Solving Contradictions Of False Positives In Virus Scanning, Umakant Mishra
Umakant Mishra
False positives are equally dangerous as false negatives. Ideally the false positive rate should remain 0 or very close to 0. Even a slightest increase in false positive rate is considered as undesirable.
Although the specific methods provide very accurate scanning by comparing viruses with their exact signatures, they fail to detect the new and unknown viruses. On the other hand the generic methods can detect even new viruses without using virus signatures. But these methods are more likely to generate false positives. There is a positive correlation between the capability to detect new and unknown viruses and false positive …
Methods Of Repairing Virus Infected Files, A Triz Based Analysis, Umakant Mishra
Methods Of Repairing Virus Infected Files, A Triz Based Analysis, Umakant Mishra
Umakant Mishra
Some computer viruses damage the host file during infection either partially or fully. These types of viruses are known as “file modifying viruses”. In these cases, the chance of recovery is less, but the anti-virus has to apply various methods with hope. The virus cleaner must know the characteristics of a virus in order to remove that virus. It cannot remove an unknown virus whose methods of infection are not known. If a virus is wrongly detected to be a different virus, then the cleaner will do wrong operations and build a garbage file.
Most viruses are capable of fixing …
Why Is It Difficult To Find A Good Free Web Host, Umakant Mishra
Why Is It Difficult To Find A Good Free Web Host, Umakant Mishra
Umakant Mishra
This article illustrates how the advertisements on free hosts are deceptive, the evaluations are fake, and the user feedbacks are manipulated. As a search engine cannot differentiate between good and bad free hosts per se, it is likely to serve you a list of free hosts, which are discussed more or advertised more and not necessarily better. Searching a good free host is as difficult as searching a diamond in a coalmine.
Should You Use A Free Server For Hosting Your Site?, Umakant Mishra
Should You Use A Free Server For Hosting Your Site?, Umakant Mishra
Umakant Mishra
Contrary to the general belief that the paid servers provide better service, the services provided by paid servers are often horrible. The matter of the fact is that you may not need much of service from a well-configured server. But the service provider wants to provide you service in order to prove its service efficiency. But how will they provide service when there is no need of service? So they have to create many artificial problems for you (e.g., by changing server configurations etc.) and then solve those problems promptly on your request, in order to prove their service efficiency. …
The Mechanics Of Implementing Rss - Really Simple Syndication, Umakant Mishra
The Mechanics Of Implementing Rss - Really Simple Syndication, Umakant Mishra
Umakant Mishra
RSS is a format to update the frequently updated content in the Internet such as blog entries, news headlines etc. An RSS document contains full or summarized texts plus metadata such as publishing dates and authorship. RSS stands for Really simple Syndication. RSS feeds benefits publishers by letting them syndicate content automatically. A standardized XML file format is used to publish once and viewed by many different programs.
Dirty Tricks Played By The Domain Registrars, Umakant Mishra
Dirty Tricks Played By The Domain Registrars, Umakant Mishra
Umakant Mishra
With the popularity of Internet the number of websites are increasing in exponential rate. Everybody needs a website and every website needs a domain name and a hosting server. Domain names often represent a business organization or a commercial brand. Hence, changing domain names may affect business strategy and result in serious business loss. The domain registrars often take advantage of customers’ ignorance and weakness and trouble them to unduly extract more and more money.
The Dirty Tricks Played By Web Hosting Agencies, Umakant Mishra
The Dirty Tricks Played By Web Hosting Agencies, Umakant Mishra
Umakant Mishra
The number of websites are increasing in exponential rate. There are almost 50,000 websites being launched in every week and a similar number of web hosting companies are thriving to grab that opportunity. This has led to a cutthroat competition between the web hosting companies. The competition has gone beyond the ethical boundaries and many of them follow various unfair practices to attract and retain customers.
Demonstrating Contradictions In A Graphical User Interface, Umakant Mishra
Demonstrating Contradictions In A Graphical User Interface, Umakant Mishra
Umakant Mishra
Designing a GUI is not so easy as it may appear to outside. The developer has to face many difficulties while improving the features of a GUI. In many cases improving one feature of a GUI results in worsening another feature of it, thus leading to a situation known as contradiction in TRIZ. Many such contradictions have been solved by different inventors in the past. We will demonstrate some important contradictions in this article and discuss alternative solutions for each contradiction.
Application Of Triz Principles In Software Concepts, Umakant Mishra
Application Of Triz Principles In Software Concepts, Umakant Mishra
Umakant Mishra
The Inventive Principles of TRIZ are not only applicable to mechanical or technical field; they are also applicable to Software solutions. Most of the 40 principles are easy to learn, but the question arises where to apply and how to apply. This article shows some simple examples of applying TRIZ principles.
Some people may ask, the solutions in this article are all known, what is the use of trying out TRIZ Principles on them. My answer is the art of problem solving is like learning a bicycle. If you are capable of riding the cycle on a known road, there …
10 Inventions On Improving Keyboard Efficiency: A Triz Based Analysis, Umakant Mishra
10 Inventions On Improving Keyboard Efficiency: A Triz Based Analysis, Umakant Mishra
Umakant Mishra
A keyboard is the most important input device for a computer. With the development of technology a basic keyboard does not want to remain confined within the basic functionalities of a keyboard, rather it wants to go beyond. There are several inventions which attempt to improve the efficiency of a conventional keyboard. This article illustrates 10 inventions from US Patent database all of which have proposed very interesting methods for improving the efficiency of a computer keyboard. Some interesting inventions include, adding toolbar buttons on the keyboard, power saving method, keyboard-cooling mechanism, robust keyboard for public use, keyboard enhancement for …