Skip to main content

Showing 1–8 of 8 results for author: Jagli, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:1906.08600  [pdf

    cs.SE

    CBC Approach for Evaluating Potential SaaS on the Cloud

    Authors: Mrs. Dhanamma Jagli, Sunita Mahajan, Dr. N. Subhash Chandra

    Abstract: The cloud computing is evolving as a key computing platform for sharing resources like infrastructure, platform, software etc. This has proven to be an essential requirement for extending many existing applications. Software as a service (SaaS) is referred as on-demand software supplied by service providers in which software and associated data are hosted on the cloud and it can be accessed by ser… ▽ More

    Submitted 25 May, 2019; originally announced June 2019.

    Comments: 7 Pages

    Journal ref: (I-TechCON), Jan. 03 -- 04, 2014

  2. SaaS CloudQual: A Quality Model for Evaluating Software as a Service on the Cloud Computing Environment

    Authors: Dhanamma Jagli, Seema Purohit, N. Subash Chandra

    Abstract: Abstract The cloud computing is a key computing approach adopted by many organizations in order to share resources. It provides Everything As-A-Service (XaaS). Software-As-A-Service is an important resource on the cloud computing environment. Without installing any software locally, service user can use software as a utility. And enjoy the benefits of SaaS model. Hence SaaS usage is increased dras… ▽ More

    Submitted 25 May, 2019; originally announced May 2019.

    Comments: 8 Pages

    Journal ref: Springer Nature Singapore Pte Ltd. 2017

  3. arXiv:1905.10531  [pdf

    cs.SE

    SAASQUAL: A Quality Model For Evaluating SaaS on The Cloud Computing Environment

    Authors: Dhanamma Jagli, Seema Purohit, N. Subhash Chandra

    Abstract: Cloud computing is a Technology that has come out in the last decade and that is transforming the IT industry in huge. The Cloud computing is playing a vital role as a backbone component of the Internet of Things (IoT). In a Cloud Computing scenario, cloud services are accessible via Internet. Cloud computing is providing ondemand resources like Infrastructure, platform, and software as it is do n… ▽ More

    Submitted 25 May, 2019; originally announced May 2019.

    Comments: 6 Pages

  4. arXiv:1310.2375  [pdf

    cs.DB cs.IR

    Web Usage Mining: Pattern Discovery and Forecasting

    Authors: Dhanamma Jagli, Sangeeta Oswal

    Abstract: Web usage mining: automatic discovery of patterns in clickstreams and associated data collected or generated as a result of user interactions with one or more Web sites. This paper describes web usage mining for our college log files to analyze the behavioral patterns and profiles of users interacting with a Web site. The discovered patterns are represented as clusters that are frequently accessed… ▽ More

    Submitted 9 October, 2013; originally announced October 2013.

    Journal ref: IFRSA International Journal of Data Warehousing & Mining |Vol 2|issue4|November 2012

  5. arXiv:1310.2369  [pdf

    cs.SE cs.DC

    Semi Symmetric Method Of SAN Storage Virtualization

    Authors: Dhanamma Jagli, Ramesh Solanki, Rohini Temkar, Laxmi Veshapogu

    Abstract: Virtualization is one of the biggest buzzwords of the technology industry right at this moment. The fast growth in storage capacity and processing power in enterprise installations coupled with the need for high availability, requires Storage Area Network (SAN) architecture to provide seamless addition of storage and performance elements without downtime. The usual goal of virtualization is to cen… ▽ More

    Submitted 9 October, 2013; originally announced October 2013.

  6. arXiv:1310.2367  [pdf

    cs.DB

    Handy Annotations within Oracle 10g

    Authors: Mrs. Dhanamma Jagli, Ms. Priyanka Gaikwad, Ms. Shubhangi Gunjal, Mr. Chaitanya Bilaware

    Abstract: This paper describes practical observations during the Database system Lab. Oracle 10g DBMS is used in the data base system lab and performed SQL queries based many concepts like Data Definition Language Commands (DDL), Data Modification Language Commands ((DML), Views, Integrity Constraints, Aggregate functions, Joins and Abstract type . While performing practical during the lab session, many pro… ▽ More

    Submitted 9 October, 2013; originally announced October 2013.

    Comments: 5Pages,2Figures

    Journal ref: International Journal of Scientific & Engineering Research Volume 4, Issue 1, January-2013

  7. The Unified Approach For Organizational Network Vulnerability Assessment

    Authors: Mrs. Dhanamma Jagli, Mrs. Rohini Temkar

    Abstract: The present business network infrastructure is quickly varying with latest servers, services, connections, and ports added often, at times day by day, and with a uncontrollably inflow of laptops, storage media and wireless networks. With the increasing amount of vulnerabilities and exploits coupled with the recurrent evolution of IT infrastructure, organizations at present require more numerous vu… ▽ More

    Submitted 9 October, 2013; originally announced October 2013.

    Comments: 12 pages,5Figures

    Journal ref: International Journal of Software Engineering & Applications (IJSEA),Vol.4, No.5, September 2013

  8. arXiv:1212.3067  [pdf

    cs.SE

    The application of cause effect graph for the college placement process

    Authors: Dhanamma Jagli, Mamatha T, Swetha Mahalingam, Namrata Ojha

    Abstract: This paper presents a case study on the application of cause effect graph for representing the college placement process. This paper begins with giving a brief overview of the college placement process which will serve as the basis for developing the cause effect graph and the decision table for the same in a systematic manner. Finally, it concludes with the design of test cases thus giving a comp… ▽ More

    Submitted 13 December, 2012; originally announced December 2012.

    Comments: 9 pages,5 figures,IJSEA

    Journal ref: International Journal of Software Engineering & Applications (IJSEA), Vol.3, No.6, November 2012