Ambedkar Institute of Technology

Displaying 1-9 of 9 results

  • White Papers // Jul 2013

    Cloud-Vision: Real-Time Face Recognition Using MOCHA Acceleration Architecture

    Face recognition applications for airport security and surveillance can benefit from the collaborative coupling of mobile and cloud computing as they become widely available today. The challenge lies with how to perform task partitioning from mobile devices to cloud and distribute compute load among cloud servers (cloudlet) to minimize the...

    Provided By Ambedkar Institute of Technology

  • White Papers // Apr 2013

    Preventing SQL-Based Attacks Using Intrusion Detection System

    With the advancement of technology everyone is using computer and web applications. These web applications can be easily made by using rapid application development environments by developers. But they do not consider security aspect necessary in the process of providing attractive functionalities & also they are not experts in that...

    Provided By Ambedkar Institute of Technology

  • White Papers // Sep 2012

    Dynamic Allocation Method for Efficient Load Balancing in Virtual Machines for Cloud Computing Environment

    In this paper, the authors propose a Dynamic resource allocation method for Cloud computing. Cloud computing is a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Users can set up and...

    Provided By Ambedkar Institute of Technology

  • White Papers // Aug 2012

    Software Security Analysis, Static and Dynamic Testing in Java and C Environment, a Comparative Study

    The main stretch in the paper is buffer overflow anomaly occurring in major source codes, designed in various programming language. It describes the various as to how to improve user's code and increase its strength to withstand security theft occurring at vulnerable areas in the code. The main language used...

    Provided By Ambedkar Institute of Technology

  • White Papers // Aug 2012

    Software Security Analysis Dynamic and Static Buffer Code Analysis within Java and C Programming Environment a Comparative Study

    The main language used is JAVA, regarded as one of the most object oriented language still create lot of error like stack overflow, illegal/inappropriate method overriding. The author used tools confined to JAVA to test as how weak points in the code can be rectified before compiled. The byte code...

    Provided By Ambedkar Institute of Technology

  • White Papers // Jul 2012

    A Review on Key Management Schemes in MANET

    Mobile Ad-hoc network is spontaneous and infrastructure less network, which consist of wireless mobile nodes. MANET is formed on-the-fly and also provides various operations like packet forwarding, routing, network management, communication, etc between mobile nodes. MANET is one of the types of wireless network, in which any mobile node can...

    Provided By Ambedkar Institute of Technology

  • White Papers // Apr 2012

    Malware Analysis & its Application to Digital Forensic

    In this paper, the authors present study about how to analyze the malware on the system for digital investigation and also give the superficial knowledge and comparison about forensic model. This paper proposes a plan for achieving a dramatic improvement in research and operational efficiency through the adoption of systematic...

    Provided By Ambedkar Institute of Technology

  • White Papers // Jul 2011

    Defining Malicious Behavior of a Node and its Defensive Techniques in Ad Hoc Networks

    Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. In this situation, the entire operation of a network gets disturbed and to preclude such malicious behavior several security solutions have been discovered. In this paper, malicious behavior of a node is defined and...

    Provided By Ambedkar Institute of Technology

  • White Papers // Apr 2011

    Apprehension of Threats and Countermeasures in Semantic Web Services

    In today's world, data is important and confidential on World Wide Web. Many organizations have become important sources of data. Use and exchange of data and extracting information from data and use of information have become important need. The data is not only integrated from the various sources but extracting...

    Provided By Ambedkar Institute of Technology

  • White Papers // Jul 2012

    A Review on Key Management Schemes in MANET

    Mobile Ad-hoc network is spontaneous and infrastructure less network, which consist of wireless mobile nodes. MANET is formed on-the-fly and also provides various operations like packet forwarding, routing, network management, communication, etc between mobile nodes. MANET is one of the types of wireless network, in which any mobile node can...

    Provided By Ambedkar Institute of Technology

  • White Papers // Sep 2012

    Dynamic Allocation Method for Efficient Load Balancing in Virtual Machines for Cloud Computing Environment

    In this paper, the authors propose a Dynamic resource allocation method for Cloud computing. Cloud computing is a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Users can set up and...

    Provided By Ambedkar Institute of Technology

  • White Papers // Apr 2012

    Malware Analysis & its Application to Digital Forensic

    In this paper, the authors present study about how to analyze the malware on the system for digital investigation and also give the superficial knowledge and comparison about forensic model. This paper proposes a plan for achieving a dramatic improvement in research and operational efficiency through the adoption of systematic...

    Provided By Ambedkar Institute of Technology

  • White Papers // Apr 2013

    Preventing SQL-Based Attacks Using Intrusion Detection System

    With the advancement of technology everyone is using computer and web applications. These web applications can be easily made by using rapid application development environments by developers. But they do not consider security aspect necessary in the process of providing attractive functionalities & also they are not experts in that...

    Provided By Ambedkar Institute of Technology

  • White Papers // Jul 2013

    Cloud-Vision: Real-Time Face Recognition Using MOCHA Acceleration Architecture

    Face recognition applications for airport security and surveillance can benefit from the collaborative coupling of mobile and cloud computing as they become widely available today. The challenge lies with how to perform task partitioning from mobile devices to cloud and distribute compute load among cloud servers (cloudlet) to minimize the...

    Provided By Ambedkar Institute of Technology

  • White Papers // Apr 2011

    Apprehension of Threats and Countermeasures in Semantic Web Services

    In today's world, data is important and confidential on World Wide Web. Many organizations have become important sources of data. Use and exchange of data and extracting information from data and use of information have become important need. The data is not only integrated from the various sources but extracting...

    Provided By Ambedkar Institute of Technology

  • White Papers // Jul 2011

    Defining Malicious Behavior of a Node and its Defensive Techniques in Ad Hoc Networks

    Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. In this situation, the entire operation of a network gets disturbed and to preclude such malicious behavior several security solutions have been discovered. In this paper, malicious behavior of a node is defined and...

    Provided By Ambedkar Institute of Technology

  • White Papers // Aug 2012

    Software Security Analysis, Static and Dynamic Testing in Java and C Environment, a Comparative Study

    The main stretch in the paper is buffer overflow anomaly occurring in major source codes, designed in various programming language. It describes the various as to how to improve user's code and increase its strength to withstand security theft occurring at vulnerable areas in the code. The main language used...

    Provided By Ambedkar Institute of Technology

  • White Papers // Aug 2012

    Software Security Analysis Dynamic and Static Buffer Code Analysis within Java and C Programming Environment a Comparative Study

    The main language used is JAVA, regarded as one of the most object oriented language still create lot of error like stack overflow, illegal/inappropriate method overriding. The author used tools confined to JAVA to test as how weak points in the code can be rectified before compiled. The byte code...

    Provided By Ambedkar Institute of Technology