Theses and Dissertations
Permanent URI for this collectionhttp://ir.daiict.ac.in/handle/123456789/1
Browse
5 results
Search Results
Item Open Access ANGADITHERUV - E-Agri Marketing portal(Dhirubhai Ambani Institute of Information and Communication Technology, 2018) K, Sarath; Mazumdar, Madhumita; Kehtan, LokeshThe project 'AGADITHERUV E-Agri Marketing Portal' is the study of agricultural scenarios in Kannur district of Kerala and to develop a better agricultural marketing platform. The project will address the crisis and to try and find solutions through design and technology. For better communication, a portal is devised to list Sellers in advance, which will help them to find more Buyers which can help them to reduce the exploitations by middlemen. The portal also gives users access to modern farming techniques to increase their productivity and improve the quality of their produce. Through working together induce a feeling of positivity and motivate the farmers to produce more and sell all. This led to collaborative action with producers and buyers to try and create a more just system, where trade is not just to make the profit but is an exchange with a human face.Item Open Access Ontology development and query execution for an agro-advisory system(Dhirubhai Ambani Institute of Information and Communication Technology, 2014) Mordiya, Chetankumar; Bhise, Minal; Chaudhary, SanjayIn agriculture domain, farmers have queries regarding crop, soil, climate, cultivation process, disease, and pest. They express their queries in a natural language which are usually answered by agriculture experts. Due to lake of access, distance or time, the expert is usually not present physically to answer all the queries of the farmers. Hence, the farmers may not understand clearly what the experts wanted to convey. In such situation, there is a possibility of communication gap between farmers and knowledge of agriculture experts. It is desirable to capture agriculture experts’ knowledge in a system that understands farmers’ queries appropriately and gives the recommendations for it. An Agro-Advisory System is developed to fulfil these requirements. It is acknowledged based system. The knowledge base is maintained in the form of ontology. Ontology is integrated with services developed for this system. Ontology contains cotton crop knowledge of Gujarat region. Farmers can ask their queries related to cotton crop cultivation by Android device and get recommendations to improve crop productivity. The system is able to send notification and alert to farmers. Thesis work includes development of ontology for the cotton crop model and corresponding SPARQL (Simple Protocol and RDF Query Language) queries are executed on RDF (Resource Description Framework) data. Simple, complex and reasoning based queries are identified during thesis work.Item Open Access Approach for scalability in software as a service(Dhirubhai Ambani Institute of Information and Communication Technology, 2013) Parekh, Deep Ashvinbhai; Chaudhary, SanjaySoftware as a Service (SaaS) is a software service delivery model. Software is centrally hosted on cloud infrastructure and delivered as a service through the Internet. Scalability is one of the major issues in SaaS. One of the ways to achieve scalability is to use proper caching mechanism. Memcached is a well known, high performance < key, value > distributed cache used for the Internet applications. High frequently used data and costly data (takes more time to decompress) is stored in memcached server node. Data is not persistent in memcached server node. The data is lost if memcached server node fails. In memcached server node, data is not durable. Durability of high frequently used data and costly data should be high. To achieve availability and durability of stored data is very difficult in pool of memcached server nodes. Frequency of data being accessed, data that takes more time to decompress and number of write operations in pool of memcached server nodes are the characteristics that needs to be considered in order to decide the durability of the data. To achieve high durability, data needs to be replicated among several memcached server nodes. Based on the term durability, data is replicated among several memcached server nodes. Data replication is done by memcacheS server node. MemcacheS server node acts as a central entity which supports read and write operations to memcached server nodes. In write operation, memcacheS server node creates replication of data in available memcached server nodes according to durability. When memcached client node needs data for particular key, it sends request to memcacheS server node. MemcacheS server node provides information of owner memcached server nodes. Memcached client node requests the data for particular key and gets the value of the data. Durable data storage provides high availability of the data. Performed set of experiments are based on the proposed approach. After failure of any memcached server node, value of stored data could be retrieved from other memcached server node with durability of data more than 1. The results indicate that, availability of data is increased, as it can be fetched from other memcached server nodes too. Durable data storage provides high availability of the data. The proposed approach. is helpful in dynamic web application and Software as a Service (SaaS) applications where time to satisfy millions of requests is critical issue.Item Open Access Path complexity of maximum segment sum problem(Dhirubhai Ambani Institute of Information and Communication Technology, 2009) Mishra, Devesh; Amin, Ashok T.Various software complexity metrics have been proposed in literature. A program complexity measure called path complexity is proposed in [1]. Path complexity P(A,n) of an algorithm A is defined to be the number of program execution paths of A over all inputs of size n. It defines a partition of input space of program A into equivalence classes on the basis of different program execution paths. All the inputs belonging to an equivalence class are equivalent to each other in a sense that they follow same execution path. We present path complexity analysis of four different algorithms for one-dimensional maximum segment sum problem which shows that algorithms with different computational complexity may be equivalent to each other in their path complexity. We also present lower bounds on one dimensional as well as two dimensional maximum segment-sum problems. A different perspective and several observations on one dimensional problem are givenItem Open Access Improvement of tagged architecture for preventing software vulnerabilities(Dhirubhai Ambani Institute of Information and Communication Technology, 2008) Shah, Tejaskumar; Mathuria, Anish M.In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to programming mistakes which allows security bugs to be exploited. Buffer overflow occurs when buffer is given more data than the capacity of it. Format string vulnerability arises when data supplied by attacker is passed to formatting functions as format string argument. Integer vulnerability occurs when program evaluates an integer to unexpected value due to integer overflows, underflows, truncation errors or signed conversion errors. The hardware based solution called tagged architecture protects a system against mentioned vulnerabilities. In tagged architecture, each memory byte is appended with one tag bit to mark data that comes from I/O. Whenever I/O supplied data is used to transfer control of a system or to access memory, an alert is raised and program is terminated. This thesis proposes a weakness of tagged architecture by finding false positives and false negatives on it. It also proposes the improvements to the tagged architecture to avoid found false positives on it. The prototype implementation of improved tagged architecture is done in SimpleScalar simulator. The SimpleScalar simulator is a architectural simulator. The security evaluation is done for tagged architecture and improved tagged architecture through benchmarks and synthetic vulnerable programs.