Acharya Nagarjuna University

Displaying 1-9 of 9 results

  • White Papers // Nov 2012

    Analysis of Advanced Text Mining Methods on the Internet

    Large amounts of data have been collected routinely in the course of day-to-day management in business, administration, banking, the delivery of social and health services, environmental protection, security and in politics. Such data is primarily used for accounting and for management of the customer base. Manufacturers selling product on the...

    Provided By Acharya Nagarjuna University

  • White Papers // Mar 2012

    PKI Key Generation Using Multimodal Biometrics Fusion of Fingerprint and Iris

    In this paper, the authors introduce an efficient approach for the secure PKI key generation on the idea of multiple modalities Iris and fingerprint. Contributions include a general approach for trivialities purpose generation, distinguishable iris feature generation and a PKI key generation mechanism. The image processing techniques are used to...

    Provided By Acharya Nagarjuna University

  • White Papers // Oct 2011

    Monitoring Software Reliability Using Statistical Process Control: An Ordered Statistics Approach

    The nature and complexity of software have changed significantly in the last few decades. With the easy availability of computing power, deeper and broader applications are made. It has been extremely necessary to produce good quality software with high precession of reliability right in the first place. Olden day's software...

    Provided By Acharya Nagarjuna University

  • White Papers // May 2011

    The Role of Commercial Websites in the Improvements of E-Business

    Electronic Business (e-Business) is revolutionizing the way of communication between internal and external stakeholders in an organization. E-business can lead to competitive advantage and at the same time, increase profitability. There are several factors resulting on the success of e-business. One of the most important factors is trust. Acquiring customers'...

    Provided By Acharya Nagarjuna University

  • White Papers // May 2011

    A Cross Layered Architecture and Its Proposed Security Mechanism to Lessen Attacks Vulnerability in Mobile Ad Hoc Networks

    A Mobile Ad Hoc NETwork (MANET) is a network that does not have underlying infrastructure. Hosts in MANET are connected by wireless links with multi-hop communication. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks...

    Provided By Acharya Nagarjuna University

  • White Papers // May 2011

    SPC for Software Reliability: Imperfect Software Debugging Model

    Software reliability process can be monitored efficiently by using Statistical Process Control (SPC). It assists the software development team to identify failures and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors consider a software reliability growth model of Non-Homogenous...

    Provided By Acharya Nagarjuna University

  • White Papers // Dec 2010

    Analysis and Diminution of Security Attacks on Mobile Ad Hoc Network

    Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. The nature of ad hoc networks poses a great challenge to system security designers due to the following reasons: firstly, the wireless network...

    Provided By Acharya Nagarjuna University

  • White Papers // Apr 2010

    SRGM With Imperfect Debugging by Genetic Algorithms

    Computer software has progressively turned out to be an essential component in modern technologies. Penalty costs resulting from software failures are often more considerable than software developing costs. Debugging decreases the error content but expands the software development costs. To improve the software quality, software reliability engineering plays an important...

    Provided By Acharya Nagarjuna University

  • White Papers // Feb 2009

    RLL-MAC: Reliable and Low Latency MAC for Event Critical Applications in Wireless Sensor Networks

    Wireless Sensor Networks are appealing to researchers due to their wide range of applications like target detection and tracking, surveillance and localization. Energy management is a critical issue to prolong the network lifetime in senor networks. Clustering is an effective technique to improve energy efficiency and network lifetime. In addition...

    Provided By Acharya Nagarjuna University

  • White Papers // Nov 2012

    Analysis of Advanced Text Mining Methods on the Internet

    Large amounts of data have been collected routinely in the course of day-to-day management in business, administration, banking, the delivery of social and health services, environmental protection, security and in politics. Such data is primarily used for accounting and for management of the customer base. Manufacturers selling product on the...

    Provided By Acharya Nagarjuna University

  • White Papers // May 2011

    The Role of Commercial Websites in the Improvements of E-Business

    Electronic Business (e-Business) is revolutionizing the way of communication between internal and external stakeholders in an organization. E-business can lead to competitive advantage and at the same time, increase profitability. There are several factors resulting on the success of e-business. One of the most important factors is trust. Acquiring customers'...

    Provided By Acharya Nagarjuna University

  • White Papers // Feb 2009

    RLL-MAC: Reliable and Low Latency MAC for Event Critical Applications in Wireless Sensor Networks

    Wireless Sensor Networks are appealing to researchers due to their wide range of applications like target detection and tracking, surveillance and localization. Energy management is a critical issue to prolong the network lifetime in senor networks. Clustering is an effective technique to improve energy efficiency and network lifetime. In addition...

    Provided By Acharya Nagarjuna University

  • White Papers // Apr 2010

    SRGM With Imperfect Debugging by Genetic Algorithms

    Computer software has progressively turned out to be an essential component in modern technologies. Penalty costs resulting from software failures are often more considerable than software developing costs. Debugging decreases the error content but expands the software development costs. To improve the software quality, software reliability engineering plays an important...

    Provided By Acharya Nagarjuna University

  • White Papers // Dec 2010

    Analysis and Diminution of Security Attacks on Mobile Ad Hoc Network

    Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. The nature of ad hoc networks poses a great challenge to system security designers due to the following reasons: firstly, the wireless network...

    Provided By Acharya Nagarjuna University

  • White Papers // May 2011

    SPC for Software Reliability: Imperfect Software Debugging Model

    Software reliability process can be monitored efficiently by using Statistical Process Control (SPC). It assists the software development team to identify failures and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors consider a software reliability growth model of Non-Homogenous...

    Provided By Acharya Nagarjuna University

  • White Papers // May 2011

    A Cross Layered Architecture and Its Proposed Security Mechanism to Lessen Attacks Vulnerability in Mobile Ad Hoc Networks

    A Mobile Ad Hoc NETwork (MANET) is a network that does not have underlying infrastructure. Hosts in MANET are connected by wireless links with multi-hop communication. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks...

    Provided By Acharya Nagarjuna University

  • White Papers // Mar 2012

    PKI Key Generation Using Multimodal Biometrics Fusion of Fingerprint and Iris

    In this paper, the authors introduce an efficient approach for the secure PKI key generation on the idea of multiple modalities Iris and fingerprint. Contributions include a general approach for trivialities purpose generation, distinguishable iris feature generation and a PKI key generation mechanism. The image processing techniques are used to...

    Provided By Acharya Nagarjuna University

  • White Papers // Oct 2011

    Monitoring Software Reliability Using Statistical Process Control: An Ordered Statistics Approach

    The nature and complexity of software have changed significantly in the last few decades. With the easy availability of computing power, deeper and broader applications are made. It has been extremely necessary to produce good quality software with high precession of reliability right in the first place. Olden day's software...

    Provided By Acharya Nagarjuna University