Amity University

Displaying 1-40 of 54 results

  • White Papers // Sep 2013

    An Ingenious Wireless Home Security System and Protocol Based Upon Multi-Hop 802.15.4 Standard, Magnetic Contact and PIR Sensor

    Security is the major part of home automation systems for the people. With the development of network and automatic control technology, a home security monitoring and alarming system becomes more and more practicable today. In this paper, the authors have proposed simple, low cost, low power consumption and a novel...

    Provided By Amity University

  • White Papers // Aug 2013

    Providing ORACLE 10g (Software) as a Service (SAAS) on Cloud

    Now-a-days the use of cloud computing is expanding rapidly. Moving data and applications to Internet and access them through different services. Cloud Computing offers better computing through improved utilization and reduced administration and infrastructure costs. This Technology is still at its infant stage and a very new to this changing...

    Provided By Amity University

  • White Papers // Aug 2013

    Data Protection in Cloud Computing

    The authors are in the middle of an insurgency in cloud computing. In short, cloud computing is \"A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or services provider interaction.\" Current cloud...

    Provided By Amity University

  • White Papers // Jun 2013

    Security: A Key Requirement of Cloud

    Cloud computing is becoming a well-known buzzword nowadays due to its ability to reduce costs associated with computing while increasing scalability and flexibility for computer processes. Cloud manages a variety of different workloads, including the batch of back-end operations and user-oriented interactive applications. Cloud computing is a highly discussed topic...

    Provided By Amity University

  • White Papers // Jun 2013

    Review of Virtual Machine Migration in Datacenters

    In the field of networking the advancements in network infrastructures and the growing size of storage/data centers, the demand for Virtualization and Data Center flexible resource management has become significantly important. A need arises for approach that changes the economics of the data center by unifying compute, storage, networking, virtualization,...

    Provided By Amity University

  • White Papers // Jun 2013

    Secure Detection Technique Against Blackhole Attack for Zone Routing Protocol in MANETS

    Security in Mobile Ad-Hoc NETwork (MANET) is the most important concern for the basic functionality of network. In this paper, the authors focus on analyzing and improving the security against blackhole attack for one of the most popular hybrid ad hoc routing protocol in MANET viz. zone routing protocol. They...

    Provided By Amity University

  • White Papers // May 2013

    Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs)

    In recent years, Mobile Ad-hoc Networks have received an immense attention in both industry and academia as they provide dynamic networking services. Such networks are rapidly deployable in the future, so secure wireless environment will be obligatory. In mobile ad hoc networks, due to unreliable wireless media, lack of fixed...

    Provided By Amity University

  • White Papers // May 2013

    Business Intelligence: A View on Requirements, Process and Tools

    Business Intelligence is the computer based technique, methodology and process that is used to transform raw data to meaningful information for business. It is the architecture that discovers, analyzes and processes business data and presents business statistics to managers and analysts. As the organization tends to take decisions at different...

    Provided By Amity University

  • White Papers // May 2013

    Defining The Boundaries Of Computer Crime

    In the current era of online processing, maximum of the information is online and prone to cyber threats. There are a huge number of cyber threats and their behavior is difficult to early understanding hence difficult to restrict in the early phases of the cyber attacks. Cyber attacks may have...

    Provided By Amity University

  • White Papers // Apr 2013

    Mobile Virtualization: A Futuristic Approach

    At present Smartphone's clam computing skills as of mainframe computers and workstations. Mobile CPU functions at mega to giga hertz with 32 bit processor get into GBs of memory. With 3G, 4G and 5G technology, mobiles stream data at the speed of broadband. With coming of desktop virtualization by VMware...

    Provided By Amity University

  • White Papers // Apr 2013

    Social Networking Sites and Their Security Issues

    Social networking sites offer a straightforward way for people to have a simple social presence through web. They provide a virtual environment for people to share each and every activity, their interests, and their circle of acquaintance with their family, friends, or even the unknown. With so much sharing, hackers...

    Provided By Amity University

  • White Papers // Apr 2013

    Fuzzy Sets in Data Mining-A Review

    Data mining, also called knowledge discovery in databases, is regarded as a non-trivial process of identifying valid, novel, potentially useful, and ultimately understandable knowledge in large-scale data. This paper briefly reviews some typical applications and highlights potential contributions that fuzzy set theory can make to data mining. In this connection,...

    Provided By Amity University

  • White Papers // Mar 2013

    Authentication System with Graphical Security and Sound Signature

    This paper provides guidelines for implementing an authentication system which works on graphical password and includes sound signature. Click based graphical password provides security from brute force and dictionary attacks and they are not predictive thus it's not easy to breach them and a sound signature is integrated along with...

    Provided By Amity University

  • White Papers // Mar 2013

    Issues and Flaws in Endpoint Based Call Admission Control for Voice Over WLAN

    This paper presents the various issues and drawbacks of the popular and existing scenario of carrying the Voice over the WLAN. The existing scenario that manages the Voice over Internet Protocol (VoIP), over an IEEE 802.11 WLAN is the Endpoint based Call Admission Control (CAC). Even though the most researches...

    Provided By Amity University

  • White Papers // Mar 2013

    Comparative Study on Secure Biometrics for Human Identification

    Information Security has been the primary concern for the user while using any devices. Many techniques provide information security to the devices but using biometrics in devices help to provide more security and privacy of the information & it also put a restriction to unauthorized user to access the information....

    Provided By Amity University

  • White Papers // Mar 2013

    Cloud Computing: Security Issues And Description Of Encryption Based Algorithms To Overcome Them

    Cloud computing today is the latest buzzword in the software industry, an evolutionary step which encompasses elements from grid computing, utility computing and autonomic computing, into inventive deployment architecture. Although Cloud computing has achieved a great success in various industries whether it be a software industry, a Government Organization or...

    Provided By Amity University

  • White Papers // Mar 2013

    A Review of the Cognitive Information Retrieval Concept, Process and Techniques

    The word "Cognitive" refers to the thought process toward awareness or knowledge. In terms of Cognitive Science, it provides bridge between information processing, conceptualization of the resources, perceptual skills and topics related to the cognitive psychology. By retrieving information that based on cognitive concepts, process and techniques one can represent...

    Provided By Amity University

  • White Papers // Mar 2013

    Techniques of Power Optimization for Wireless Sensor Network

    Wireless Sensor Networks is one of the hottest topic and growing area now days. WSN have become popular due to its wide range applications. There are lots of problems in Wireless sensor networks related to Power, Cost, and Bandwidth etc. Power optimization is the main constraint in WSN and this...

    Provided By Amity University

  • White Papers // Feb 2013

    Addressing the Cloud Computing Security Menace

    Cloud Computing is fast gaining popularity today with its scalable, flexible and on-demand service provision. It brings cost saving and agility to organization with pay-as-you-go approach. Abundant resources are available and the user has a huge range to select from. Cloud facilitates virtualization, simplification, automation and accelerated delivery of application...

    Provided By Amity University

  • White Papers // Feb 2013

    Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes

    Sensor networks are dense wireless networks of small, low-cost sensors, which collect and disseminate environmental data. Wireless sensor networks facilitate monitoring and controlling of physical environments from remote locations with better accuracy. They have applications in a variety of fields such as environmental monitoring, indoor climate control, surveillance, and structural...

    Provided By Amity University

  • White Papers // Feb 2013

    Eliminating Homogeneous Cluster Setup for Efficient Parallel Data Processing

    This project proposes to eliminate homogeneous cluster setup in a parallel data processing environment. A homogeneous cluster setup supports static nature of processing which is a huge disadvantage for optimizing the response time towards clients. Parallel data processing is performed more often in today's internet and it is very important...

    Provided By Amity University

  • White Papers // Feb 2013

    A Review on Intrusion Detection System Based on Artificial Immune System

    Various approaches from different fields have been proposed to improve the security of computer system. One such approach is Intrusion detection system monitors computer system in real-time for activities indicating attempted or actual access by unauthorized users. To build an effective intrusion detection system many techniques are available which gathers...

    Provided By Amity University

  • White Papers // Feb 2013

    Clustering Based Load Balanced Gateway Placement Approach

    Wireless Mesh Networks (WMN) is a promising technology to provide broadband Internet access. Gateway placement is an important part of WMN design that determines how to place the gateways in WMN. Various approaches have been given by various researchers for Gateway placement taking care of various parameters. In this paper,...

    Provided By Amity University

  • White Papers // Feb 2013

    Apple IPhone Operating System

    A drastic change has been seen since from past 2 years in mobile technology. The world's most advance and popular phone is iPhone which runs on apple ios. ios provides a platform which is flexible, scalable, reliability and security. Apple ios is in a closed environment no one can sell...

    Provided By Amity University

  • White Papers // Feb 2013

    Testing JavaScript

    JS is the defacto standard for rich application development on the web supported by many browsers on many different platforms. The paper is about the work that is being done in Google on JS (JavaScript) and describing the growing popularity of this language among all other languages inside the Google....

    Provided By Amity University

  • White Papers // Jan 2013

    A Novel Analysis of T Mac and S Mac Protocol for Wireless Sensor Networks Using Castalia

    Wireless sensor networks have been kept evolving due to the advancements in various technologies like radio, battery and operating systems in sensor elements but mac protocols are still most important in WSN because the exact implementation of communication among sensors is derived by the mac protocols. Battery consumption, network lifetime,...

    Provided By Amity University

  • White Papers // Jan 2013

    Secure Transaction on the Peer to Peer Based Virtual Network

    Distributed Hash Tables or the DHT is a very crucial and attention seeking topic as far as the field of P2P network overlays is concerned; since the latter has set a new benchmark in the arena of file sharing. The use of DHTs in P2P network involves the cause of...

    Provided By Amity University

  • White Papers // Nov 2012

    GSM Based Operating of Embedded System Cloud Computing, Mobile Application Development and Artificial Intelligence Based System

    In this paper, the authors identify and explore the challenges for potential solutions in the field of mobile application, cloud computing, artificial intelligence, robotics and home - made devices (television, refrigerator, air conditioner, air cooler, and mixer grinder) in embedded systems. This paper is an attempt to introduce the reader...

    Provided By Amity University

  • White Papers // Oct 2012

    Trends in Cloud-ERP for SMB's : A Review

    In the world of competition, customer's disloyalty, globalization and uncertainity deploying ERP solutions is not only necessary but also mandatory. On premise ERP is associated with lots of overhead and requires spending of money and time. SAAS based ERP has many advantages which makes it the right choice for the...

    Provided By Amity University

  • White Papers // Oct 2012

    CPW Feed Patch Antenna for GPS Applications

    In this paper, the authors are proposing a CPW-Fed patch antenna. This paper presents the design of rectangular patch micro-strip antenna for the frequencies at L1 (1.67 GHz to 1.90 GHz) and L2 (2.65 GHz to 3.05GHz). The simulation is done by using the HFSS software, which is a full-wave...

    Provided By Amity University

  • White Papers // Oct 2012

    A Survey on Regression Test Selection Techniques for Dot Net and BPEL Programs

    Regression testing is an important and expensive activity that is undertaken every time a program is modified to ensure that the modifications do not introduce new bugs into previously validated code. An important research problem, in this context, is the selection of a relevant subset of test cases from the...

    Provided By Amity University

  • White Papers // Sep 2012

    Boltzmann Machine Algorithm Based Learning of OLSR Protocol: An Energy Efficient Approach

    In this paper, a proposal for OLSR protocol based upon Boltzmann learning algorithm is made. The main focus is to tune OLSR by using Boltzmann learning algorithm. The proposed work deals with the standardized OLSR routing protocol, to make it more reliable, more energy efficient and more adaptable to the...

    Provided By Amity University

  • White Papers // Aug 2012

    Merging of Data Flow Diagram With Unified Modeling Language

    In this paper, the authors present an approach that combines the DFD with the UML diagrams. DFD is a structured approach which provides the functional view of the system whereas UML is an object oriented approach provides the structural view of the embedded system. Structured methods are very commonly used...

    Provided By Amity University

  • White Papers // Aug 2012

    Cloud Computing in Mobile Applications

    Mobile devices like iPhone, Blackberry, Android are becoming popular clients to consume any Web resources, especially Web Services (WS). This paper discusses cloud computing as a currently exploring way to deliver remote mobile applications to mobile devices through internet providing a remedy to the lack of resources in mobile devices...

    Provided By Amity University

  • White Papers // Aug 2012

    Impact of New Highly Secure Scheme on Wireless Network 802.11 Performance

    Wireless Local Area Networks (WLAN) are beginning to play a much larger role in corporate network environments and are already very popular for home networking applications. This increase in accessibility has created large security holes for hackers and thieves to abuse, that is finally being addressed by stronger security protocols...

    Provided By Amity University

  • White Papers // Jul 2012

    A Fuzzy Approach for Evaluation of Maintainability of Object Oriented Software System

    The demand for efficient software system is increasing day by day. Maintainability is considered as an important quality factor for developing the efficient software system. Recent trends show that mostly software systems are using object-oriented technique to develop the quality software products. Object-oriented approach enhances the maintainability of software system....

    Provided By Amity University

  • White Papers // Jul 2012

    Analytical Evaluation of Usability of Object Oriented Software System

    The usability plays an important role in success or failure of the quality of software system. Object-oriented technology showed its importance to develop usable and efficient software system. There is a lack of usability models based on object-oriented technology as well as few efforts have done to evaluate usability qualitatively....

    Provided By Amity University

  • White Papers // Jun 2012

    Features, Benefits, Futuristic Projections of Cloud & Intercloud Extensions to the NET

    Cloud has become an everyday term in majority of the large scale IT enterprises. Clouds now are the new building blocks of major businesses spread around the world. They help in transporting platforms and services across the globe to support various infrastructures. The actual term "Cloud" borrows from telephony in...

    Provided By Amity University

  • White Papers // Jun 2012

    A Survey on Social Engineering and the Art of Deception

    Now-a-days security of data and information is the area for which and every organization is concerned about. Each and every organization is using advanced technologies for protecting its data and information from theft and fraud. But even after using best security technologies, organizations are totally vulnerable. It is because of...

    Provided By Amity University

  • White Papers // Jun 2012

    Agent Based Decentralized and Fault Tolerant Intrusion Detection System

    An intrusion detection system has become a standard component of security infrastructure. Mobile agents transportable in network, gather information, evaluate and guide the alarm to network administrator. Advantage of having the mobile agent based approach in IDS that there is no centralized failure, less latency rate of data transmission and...

    Provided By Amity University

  • White Papers // Jan 2012

    A Petri-net Based Approach to Control the Information Access Procedure of Sensors in Distributed Wireless Sensor Network System

    Distributed Wireless Sensor Network (DWSN), comprises of small sensor nodes with sensing, computation, and communication capabilities. Due to advancement in technology today's small and cheaper sensors are used for as sensing units for measurement of physical conditions in the people environment surrounding. These sensors convert the information into electrical signals....

    Provided By Amity University

  • White Papers // Jan 2011

    Online Recharging of Wireless Sensor Nodes Using RF Energy

    The main problem in wireless communication networks is the field nodes (mobile or stationary) are battery resource constrained. Consider a situation of multi-hop wireless communication in a sensor network in which the information from a node is transferred to the base station using ad hoc multi hop network. That is,...

    Provided By Amity University

  • White Papers // Aug 2012

    Merging of Data Flow Diagram With Unified Modeling Language

    In this paper, the authors present an approach that combines the DFD with the UML diagrams. DFD is a structured approach which provides the functional view of the system whereas UML is an object oriented approach provides the structural view of the embedded system. Structured methods are very commonly used...

    Provided By Amity University

  • White Papers // Aug 2012

    Cloud Computing in Mobile Applications

    Mobile devices like iPhone, Blackberry, Android are becoming popular clients to consume any Web resources, especially Web Services (WS). This paper discusses cloud computing as a currently exploring way to deliver remote mobile applications to mobile devices through internet providing a remedy to the lack of resources in mobile devices...

    Provided By Amity University

  • White Papers // Nov 2011

    Role of Multiple Encryption in Secure Electronic Transaction

    Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the data security. The...

    Provided By Amity University

  • White Papers // Mar 2012

    Bandwidth Optimization Using Genetic Algorithm for Video Over Wireless Network

    This paper is to design an optimization algorithm to achieve optimum bandwidth allocation in wireless networks using Genetic Algorithm (GA). It investigates the channel allocation methods for a video transmission over wireless network. Transporting MPEG-4 video over the wireless network is expected to be an important component of many emerging...

    Provided By Amity University

  • White Papers // Mar 2013

    Authentication System with Graphical Security and Sound Signature

    This paper provides guidelines for implementing an authentication system which works on graphical password and includes sound signature. Click based graphical password provides security from brute force and dictionary attacks and they are not predictive thus it's not easy to breach them and a sound signature is integrated along with...

    Provided By Amity University

  • White Papers // Mar 2013

    Issues and Flaws in Endpoint Based Call Admission Control for Voice Over WLAN

    This paper presents the various issues and drawbacks of the popular and existing scenario of carrying the Voice over the WLAN. The existing scenario that manages the Voice over Internet Protocol (VoIP), over an IEEE 802.11 WLAN is the Endpoint based Call Admission Control (CAC). Even though the most researches...

    Provided By Amity University

  • White Papers // Mar 2013

    Comparative Study on Secure Biometrics for Human Identification

    Information Security has been the primary concern for the user while using any devices. Many techniques provide information security to the devices but using biometrics in devices help to provide more security and privacy of the information & it also put a restriction to unauthorized user to access the information....

    Provided By Amity University

  • White Papers // Feb 2013

    Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes

    Sensor networks are dense wireless networks of small, low-cost sensors, which collect and disseminate environmental data. Wireless sensor networks facilitate monitoring and controlling of physical environments from remote locations with better accuracy. They have applications in a variety of fields such as environmental monitoring, indoor climate control, surveillance, and structural...

    Provided By Amity University

  • White Papers // Feb 2013

    Eliminating Homogeneous Cluster Setup for Efficient Parallel Data Processing

    This project proposes to eliminate homogeneous cluster setup in a parallel data processing environment. A homogeneous cluster setup supports static nature of processing which is a huge disadvantage for optimizing the response time towards clients. Parallel data processing is performed more often in today's internet and it is very important...

    Provided By Amity University

  • White Papers // Feb 2013

    A Review on Intrusion Detection System Based on Artificial Immune System

    Various approaches from different fields have been proposed to improve the security of computer system. One such approach is Intrusion detection system monitors computer system in real-time for activities indicating attempted or actual access by unauthorized users. To build an effective intrusion detection system many techniques are available which gathers...

    Provided By Amity University

  • White Papers // Feb 2013

    Clustering Based Load Balanced Gateway Placement Approach

    Wireless Mesh Networks (WMN) is a promising technology to provide broadband Internet access. Gateway placement is an important part of WMN design that determines how to place the gateways in WMN. Various approaches have been given by various researchers for Gateway placement taking care of various parameters. In this paper,...

    Provided By Amity University

  • White Papers // Mar 2013

    Cloud Computing: Security Issues And Description Of Encryption Based Algorithms To Overcome Them

    Cloud computing today is the latest buzzword in the software industry, an evolutionary step which encompasses elements from grid computing, utility computing and autonomic computing, into inventive deployment architecture. Although Cloud computing has achieved a great success in various industries whether it be a software industry, a Government Organization or...

    Provided By Amity University

  • White Papers // Mar 2013

    A Review of the Cognitive Information Retrieval Concept, Process and Techniques

    The word "Cognitive" refers to the thought process toward awareness or knowledge. In terms of Cognitive Science, it provides bridge between information processing, conceptualization of the resources, perceptual skills and topics related to the cognitive psychology. By retrieving information that based on cognitive concepts, process and techniques one can represent...

    Provided By Amity University

  • White Papers // May 2013

    Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs)

    In recent years, Mobile Ad-hoc Networks have received an immense attention in both industry and academia as they provide dynamic networking services. Such networks are rapidly deployable in the future, so secure wireless environment will be obligatory. In mobile ad hoc networks, due to unreliable wireless media, lack of fixed...

    Provided By Amity University

  • White Papers // Feb 2013

    Addressing the Cloud Computing Security Menace

    Cloud Computing is fast gaining popularity today with its scalable, flexible and on-demand service provision. It brings cost saving and agility to organization with pay-as-you-go approach. Abundant resources are available and the user has a huge range to select from. Cloud facilitates virtualization, simplification, automation and accelerated delivery of application...

    Provided By Amity University

  • White Papers // Apr 2013

    Mobile Virtualization: A Futuristic Approach

    At present Smartphone's clam computing skills as of mainframe computers and workstations. Mobile CPU functions at mega to giga hertz with 32 bit processor get into GBs of memory. With 3G, 4G and 5G technology, mobiles stream data at the speed of broadband. With coming of desktop virtualization by VMware...

    Provided By Amity University

  • White Papers // Oct 2012

    Trends in Cloud-ERP for SMB's : A Review

    In the world of competition, customer's disloyalty, globalization and uncertainity deploying ERP solutions is not only necessary but also mandatory. On premise ERP is associated with lots of overhead and requires spending of money and time. SAAS based ERP has many advantages which makes it the right choice for the...

    Provided By Amity University

  • White Papers // Jun 2013

    Security: A Key Requirement of Cloud

    Cloud computing is becoming a well-known buzzword nowadays due to its ability to reduce costs associated with computing while increasing scalability and flexibility for computer processes. Cloud manages a variety of different workloads, including the batch of back-end operations and user-oriented interactive applications. Cloud computing is a highly discussed topic...

    Provided By Amity University

  • White Papers // Jun 2013

    Review of Virtual Machine Migration in Datacenters

    In the field of networking the advancements in network infrastructures and the growing size of storage/data centers, the demand for Virtualization and Data Center flexible resource management has become significantly important. A need arises for approach that changes the economics of the data center by unifying compute, storage, networking, virtualization,...

    Provided By Amity University

  • White Papers // Apr 2013

    Social Networking Sites and Their Security Issues

    Social networking sites offer a straightforward way for people to have a simple social presence through web. They provide a virtual environment for people to share each and every activity, their interests, and their circle of acquaintance with their family, friends, or even the unknown. With so much sharing, hackers...

    Provided By Amity University

  • White Papers // Aug 2013

    Providing ORACLE 10g (Software) as a Service (SAAS) on Cloud

    Now-a-days the use of cloud computing is expanding rapidly. Moving data and applications to Internet and access them through different services. Cloud Computing offers better computing through improved utilization and reduced administration and infrastructure costs. This Technology is still at its infant stage and a very new to this changing...

    Provided By Amity University

  • White Papers // Aug 2013

    Data Protection in Cloud Computing

    The authors are in the middle of an insurgency in cloud computing. In short, cloud computing is \"A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or services provider interaction.\" Current cloud...

    Provided By Amity University

  • White Papers // May 2013

    Business Intelligence: A View on Requirements, Process and Tools

    Business Intelligence is the computer based technique, methodology and process that is used to transform raw data to meaningful information for business. It is the architecture that discovers, analyzes and processes business data and presents business statistics to managers and analysts. As the organization tends to take decisions at different...

    Provided By Amity University

  • White Papers // Nov 2012

    GSM Based Operating of Embedded System Cloud Computing, Mobile Application Development and Artificial Intelligence Based System

    In this paper, the authors identify and explore the challenges for potential solutions in the field of mobile application, cloud computing, artificial intelligence, robotics and home - made devices (television, refrigerator, air conditioner, air cooler, and mixer grinder) in embedded systems. This paper is an attempt to introduce the reader...

    Provided By Amity University

  • White Papers // Jun 2012

    Features, Benefits, Futuristic Projections of Cloud & Intercloud Extensions to the NET

    Cloud has become an everyday term in majority of the large scale IT enterprises. Clouds now are the new building blocks of major businesses spread around the world. They help in transporting platforms and services across the globe to support various infrastructures. The actual term "Cloud" borrows from telephony in...

    Provided By Amity University

  • White Papers // Jun 2012

    A Survey on Social Engineering and the Art of Deception

    Now-a-days security of data and information is the area for which and every organization is concerned about. Each and every organization is using advanced technologies for protecting its data and information from theft and fraud. But even after using best security technologies, organizations are totally vulnerable. It is because of...

    Provided By Amity University

  • White Papers // Jul 2012

    A Fuzzy Approach for Evaluation of Maintainability of Object Oriented Software System

    The demand for efficient software system is increasing day by day. Maintainability is considered as an important quality factor for developing the efficient software system. Recent trends show that mostly software systems are using object-oriented technique to develop the quality software products. Object-oriented approach enhances the maintainability of software system....

    Provided By Amity University

  • White Papers // Jul 2012

    Analytical Evaluation of Usability of Object Oriented Software System

    The usability plays an important role in success or failure of the quality of software system. Object-oriented technology showed its importance to develop usable and efficient software system. There is a lack of usability models based on object-oriented technology as well as few efforts have done to evaluate usability qualitatively....

    Provided By Amity University

  • White Papers // Jun 2012

    Agent Based Decentralized and Fault Tolerant Intrusion Detection System

    An intrusion detection system has become a standard component of security infrastructure. Mobile agents transportable in network, gather information, evaluate and guide the alarm to network administrator. Advantage of having the mobile agent based approach in IDS that there is no centralized failure, less latency rate of data transmission and...

    Provided By Amity University

  • White Papers // Jun 2012

    Performance Analysis of DSR and AODV in Manets: Using WLAN Parameters

    In these days it is no longer optional to have security solutions predictable for every type of organizations and individuals. Security is one of the main issues in the MANET in particular with respect to size and complexity of the network. The aim of the paper is to discuss special...

    Provided By Amity University

  • White Papers // Jun 2012

    Community Detection in Complex Network via BGLL Algorithm

    A large number of networks in nature, society and technology are defined by a mesoscopic level of organization, in which groups of nodes form tightly connected units, called communities, that are sparsely inter-linked to each other .Identifying this community structure is one of the most important problems in understanding of...

    Provided By Amity University

  • White Papers // Jun 2012

    Correlation Between Various Quality Characteristics for Aspect-Oriented Systems

    Aspect-oriented system is a new emerging technique of software development that provides mechanism for implementing cross-cutting concerns. Quality assessment of important characteristics like cohesion, coupling, complexity, reusability, maintaibility, etc. is fairly unexplored for Aspect oriented systems. Through this paper, the authors have tried to find out the correlation between some...

    Provided By Amity University

  • White Papers // May 2012

    Process Resource Allocation in Grid Computing Using Priority Scheduler

    Grid Computing has emerged as an important new field focusing on resource sharing. One of the most challenging issues in Grid Computing is efficient scheduling of tasks. Load Balancing is a technique to improve parallelism, utilization of resources increasing throughput managing and to reduce response time through proper distribution of...

    Provided By Amity University

  • White Papers // Mar 2013

    Techniques of Power Optimization for Wireless Sensor Network

    Wireless Sensor Networks is one of the hottest topic and growing area now days. WSN have become popular due to its wide range applications. There are lots of problems in Wireless sensor networks related to Power, Cost, and Bandwidth etc. Power optimization is the main constraint in WSN and this...

    Provided By Amity University

  • White Papers // Apr 2013

    Fuzzy Sets in Data Mining-A Review

    Data mining, also called knowledge discovery in databases, is regarded as a non-trivial process of identifying valid, novel, potentially useful, and ultimately understandable knowledge in large-scale data. This paper briefly reviews some typical applications and highlights potential contributions that fuzzy set theory can make to data mining. In this connection,...

    Provided By Amity University

  • White Papers // Jun 2013

    Secure Detection Technique Against Blackhole Attack for Zone Routing Protocol in MANETS

    Security in Mobile Ad-Hoc NETwork (MANET) is the most important concern for the basic functionality of network. In this paper, the authors focus on analyzing and improving the security against blackhole attack for one of the most popular hybrid ad hoc routing protocol in MANET viz. zone routing protocol. They...

    Provided By Amity University

  • White Papers // Sep 2013

    An Ingenious Wireless Home Security System and Protocol Based Upon Multi-Hop 802.15.4 Standard, Magnetic Contact and PIR Sensor

    Security is the major part of home automation systems for the people. With the development of network and automatic control technology, a home security monitoring and alarming system becomes more and more practicable today. In this paper, the authors have proposed simple, low cost, low power consumption and a novel...

    Provided By Amity University

  • White Papers // Jan 2012

    Middleware Privacy Protection in Databases

    In this paper, a solution has been developed for mitigating privacy violation in databases, as per legislatives requirements. The paper developed a modified P3P to use it as a privacy enforcement language while in parallel, the peer research community developed standard privacy enforcement languages like E-P3P and EPAL. The privacy...

    Provided By Amity University