Banaras Hindu University

Displaying 1-13 of 13 results

  • White Papers // Mar 2013

    Policy-Based Framework for Access Control in Cloud Computing

    One of the most challenging issue in cloud computing is access control and data security because User of the cloud outsourced their sensitive data and information to cloud provider's servers which is not within the same trusted domain as data owner. Cloud Computing is a large-scale distributed computing paradigm which...

    Provided By Banaras Hindu University

  • White Papers // Mar 2013

    Hook-Test: An Aid to the Hook-Driven Test-First Development of Framework Based Application

    Enhanced quality with reduced cost and reduced time-to-market is the primary goal of any software industry. Researchers and practitioners are trying to aspire it with many techniques. Object-oriented framework is the promising technology to promote reuse, thus realizing desired goal. Inherently complex design and large size of a framework make...

    Provided By Banaras Hindu University

  • White Papers // Mar 2013

    Open Source Cloud Computing Software and Solutions for Libraries

    Open Source and Cloud computing are two facets of service offerings where the open source provides an essential foundation for cloud computing services through the Internet. Cloud Computing is an emerging concept that strives to democratize computing power making it location and device independent. This paper attempts to investigate and...

    Provided By Banaras Hindu University

  • White Papers // Oct 2012

    Policy-based Access Control in Cloud Computing

    Cloud Computing is a large-scale distributed computing paradigm which is based on Web Services over the Internet. Internet has many inherent security defects because of its openness. It has many other attacks and threats. One of the most challenging issue in cloud computing is access control and data security. User...

    Provided By Banaras Hindu University

  • White Papers // Aug 2012

    Intelligent Method for Face Recognition of Infant

    Mixing, abduction and illegal adoption of infant is a global challenge and the research done to solve this problem is minimal. Traditional methods of biometric and non biometric techniques have their own limitations and fail to provide required level of security. The task of face recognition has been actively researched...

    Provided By Banaras Hindu University

  • White Papers // Jan 2012

    Imperialist Approach to Cluster Head Selection in WSN

    Wireless Sensor Networks (WSNs) have gained importance in many scientific, military and other areas over the past decade. WSN consists of a large number of sensor nodes normally deployed randomly in the application environment. Sensors are battery-operated (impossible to be replaced or recharged in the field), and usually equipped with...

    Provided By Banaras Hindu University

  • White Papers // Jan 2012

    Evaluation of Electrocardiogram for Biometric Authentication

    In this paper, the authors present an evaluation of a new biometric ElectroCardioGram (ECG) for individual authentication. They report the potential of ECG as a biometric and address the research concerns to use ECG-enabled biometric authentication system across a range of conditions. They present a method to delineate ECG waveforms...

    Provided By Banaras Hindu University

  • White Papers // Jul 2011

    Ontology Development and Analysis for Software Development Life Cycle Models

    In this current era of software development, a large number of life cycle models are available for the systematic development of computer software and projects such as waterfall model, iterative waterfall model, prototyping model, spiral model etc. These models have their own unique characteristics and are suited to a particular...

    Provided By Banaras Hindu University

  • White Papers // Jun 2011

    Performance Metric Comparison of AODV and DSDV Routing Protocols in Manets Using NS-2

    Efficient routing protocols can provide significant benefits to mobile ad hoc networks in terms of both performance and reliability. Mobile Ad-hoc NETwork (MANET) is an infrastructure less and decentralized network which need a robust dynamic routing protocol. Many routing protocols for such networks have been proposed so far. Amongst the...

    Provided By Banaras Hindu University

  • White Papers // Apr 2011

    Energy Efficient Task Scheduling of Sendreceive Task Graphs on Distributed Multicore Processors With Software Controlled Dynamic Voltage Scaling

    In this paper the authors propose a model of distributed multi-core processors with software controlled dynamic voltage scaling. They consider the problem of energy efficient task scheduling with a given deadline on this model. They consider send-receive task graphs in which the initial task sends data to multiple intermediate tasks,...

    Provided By Banaras Hindu University

  • White Papers // Apr 2011

    Configurable Task Mapping for Multiple Objectives in Macro-Programming of Wireless Sensor Networks

    Macro-programming is the new generation advanced method of using Wireless Sensor Network (WSNs), where application developers can extract data from sensor nodes through a high level abstraction of the system. Instead of developing the entire application, task graph representation of the WSN model presents simplified approach of data collection. However,...

    Provided By Banaras Hindu University

  • White Papers // Apr 2011

    Design Patterns Mining Using Subgraph Isomorphism: Relational View

    Design Pattern Detection is a part of many solutions to Software Engineering difficulties. The usage of design patterns leads to benefits for new and young developers by enabling them to reuse the knowledge of their experienced colleagues. Mining of design pattern instances is important for program understanding and software maintenance....

    Provided By Banaras Hindu University

  • White Papers // Oct 2010

    A Clustering Heuristic for Multiprocessor Environments Using Computation and Communication Loads of Modules

    A multiprocessor environment consists of a number of processors that are connected through a communication network. The processors are generally identical and are fully connected with identical links. Multiprocessor environments are used to solve large-scale software applications. The availability of multiple processors helps in concurrent execution of processes. Task allocation...

    Provided By Banaras Hindu University

  • White Papers // Jan 2012

    Imperialist Approach to Cluster Head Selection in WSN

    Wireless Sensor Networks (WSNs) have gained importance in many scientific, military and other areas over the past decade. WSN consists of a large number of sensor nodes normally deployed randomly in the application environment. Sensors are battery-operated (impossible to be replaced or recharged in the field), and usually equipped with...

    Provided By Banaras Hindu University

  • White Papers // Aug 2012

    Intelligent Method for Face Recognition of Infant

    Mixing, abduction and illegal adoption of infant is a global challenge and the research done to solve this problem is minimal. Traditional methods of biometric and non biometric techniques have their own limitations and fail to provide required level of security. The task of face recognition has been actively researched...

    Provided By Banaras Hindu University

  • White Papers // Mar 2013

    Hook-Test: An Aid to the Hook-Driven Test-First Development of Framework Based Application

    Enhanced quality with reduced cost and reduced time-to-market is the primary goal of any software industry. Researchers and practitioners are trying to aspire it with many techniques. Object-oriented framework is the promising technology to promote reuse, thus realizing desired goal. Inherently complex design and large size of a framework make...

    Provided By Banaras Hindu University

  • White Papers // Mar 2013

    Policy-Based Framework for Access Control in Cloud Computing

    One of the most challenging issue in cloud computing is access control and data security because User of the cloud outsourced their sensitive data and information to cloud provider's servers which is not within the same trusted domain as data owner. Cloud Computing is a large-scale distributed computing paradigm which...

    Provided By Banaras Hindu University

  • White Papers // Apr 2011

    Energy Efficient Task Scheduling of Sendreceive Task Graphs on Distributed Multicore Processors With Software Controlled Dynamic Voltage Scaling

    In this paper the authors propose a model of distributed multi-core processors with software controlled dynamic voltage scaling. They consider the problem of energy efficient task scheduling with a given deadline on this model. They consider send-receive task graphs in which the initial task sends data to multiple intermediate tasks,...

    Provided By Banaras Hindu University

  • White Papers // Oct 2010

    A Clustering Heuristic for Multiprocessor Environments Using Computation and Communication Loads of Modules

    A multiprocessor environment consists of a number of processors that are connected through a communication network. The processors are generally identical and are fully connected with identical links. Multiprocessor environments are used to solve large-scale software applications. The availability of multiple processors helps in concurrent execution of processes. Task allocation...

    Provided By Banaras Hindu University

  • White Papers // Jun 2011

    Performance Metric Comparison of AODV and DSDV Routing Protocols in Manets Using NS-2

    Efficient routing protocols can provide significant benefits to mobile ad hoc networks in terms of both performance and reliability. Mobile Ad-hoc NETwork (MANET) is an infrastructure less and decentralized network which need a robust dynamic routing protocol. Many routing protocols for such networks have been proposed so far. Amongst the...

    Provided By Banaras Hindu University

  • White Papers // Apr 2011

    Configurable Task Mapping for Multiple Objectives in Macro-Programming of Wireless Sensor Networks

    Macro-programming is the new generation advanced method of using Wireless Sensor Network (WSNs), where application developers can extract data from sensor nodes through a high level abstraction of the system. Instead of developing the entire application, task graph representation of the WSN model presents simplified approach of data collection. However,...

    Provided By Banaras Hindu University

  • White Papers // Jul 2011

    Ontology Development and Analysis for Software Development Life Cycle Models

    In this current era of software development, a large number of life cycle models are available for the systematic development of computer software and projects such as waterfall model, iterative waterfall model, prototyping model, spiral model etc. These models have their own unique characteristics and are suited to a particular...

    Provided By Banaras Hindu University

  • White Papers // Apr 2011

    Design Patterns Mining Using Subgraph Isomorphism: Relational View

    Design Pattern Detection is a part of many solutions to Software Engineering difficulties. The usage of design patterns leads to benefits for new and young developers by enabling them to reuse the knowledge of their experienced colleagues. Mining of design pattern instances is important for program understanding and software maintenance....

    Provided By Banaras Hindu University

  • White Papers // Oct 2012

    Policy-based Access Control in Cloud Computing

    Cloud Computing is a large-scale distributed computing paradigm which is based on Web Services over the Internet. Internet has many inherent security defects because of its openness. It has many other attacks and threats. One of the most challenging issue in cloud computing is access control and data security. User...

    Provided By Banaras Hindu University

  • White Papers // Jan 2012

    Evaluation of Electrocardiogram for Biometric Authentication

    In this paper, the authors present an evaluation of a new biometric ElectroCardioGram (ECG) for individual authentication. They report the potential of ECG as a biometric and address the research concerns to use ECG-enabled biometric authentication system across a range of conditions. They present a method to delineate ECG waveforms...

    Provided By Banaras Hindu University

  • White Papers // Mar 2013

    Open Source Cloud Computing Software and Solutions for Libraries

    Open Source and Cloud computing are two facets of service offerings where the open source provides an essential foundation for cloud computing services through the Internet. Cloud Computing is an emerging concept that strives to democratize computing power making it location and device independent. This paper attempts to investigate and...

    Provided By Banaras Hindu University