Bharati Vidyapeeth University

Displaying 1-11 of 11 results

  • White Papers // Feb 2014

    Effective Use of Virtualization in Computer Laboratory Management

    Virtualization is a framework of dividing the resources of a computer into multiple execution environments, by applying one or more technologies. The laboratories at colleges are widely used by students and teaching staff. Colleges and universities today are facing several challenges with current technologies for example; in case of machine...

    Provided By Bharati Vidyapeeth University

  • White Papers // Jul 2013

    Enforcing Multi-User Security Policies in Cloud Computing

    The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential data can be secured from the unauthorized access and internal threats. Cloud servers use smart techniques...

    Provided By Bharati Vidyapeeth University

  • White Papers // Aug 2011

    WLAN Intrusion Detection System

    This is an implementation of the Wireless LAN Intrusion Detection System (WIDS) using clock-skews as a fingerprinting property as suggested by Jana-Kasera. The authors' objective is to detect the presence of a fake Access Point (AP) in a Wireless LAN (WLAN). Use of clock-skew enables one to effectively detect Medium...

    Provided By Bharati Vidyapeeth University

  • White Papers // May 2011

    Load Balancing in Structured Peer to Peer Systems

    A peer-to-peer, commonly abbreviated to P2P, is any distributed network architecture composed of participants that make a portion of their resources (such as processing power, disk storage or network bandwidth) directly available to other network participants, without the need for central coordination instances (such as servers or stable hosts). Peers...

    Provided By Bharati Vidyapeeth University

  • White Papers // Jan 2011

    Detection of Rouge Access Point in 802.11g Using Ma

    In the recent years, growth of the network has exploded with the appearance of information age today, network and computer technology along with the services and information available on the network are growing so fast that the authors will soon reach to the point where hundreds of millions of people...

    Provided By Bharati Vidyapeeth University

  • White Papers // Dec 2010

    Factors Influencing Implementation of 4G With Mobile Ad-Hoc Networks in m-Governance Environment

    Mobile Governance is at implementation stage in various countries including India. The m-Governance can be a whole range of government services and applications, available via various mobile networks which are designed for a broad range of devices. The m-Governance environment need low cost infrastructure which must also provide high quality...

    Provided By Bharati Vidyapeeth University

  • White Papers // Jul 2010

    Wireless Security Measurement Using Data Value Index

    Nowadays, use of wireless technology in organizations is a regular act, and the authors can see this technology erupted in all possible different areas. Related to employing wireless technology those organizations need to apply properly security level, depend on security policy which already defined. If security system applied but not...

    Provided By Bharati Vidyapeeth University

  • White Papers // Feb 2010

    Aspect Oriented Java RMI Server

    This paper discusses the impact of Aspect oriented programming (AOP) on Java-based communication middleware (Java RMI) server and need to introduce aspects in Java RMI systems. There are certain properties like tracing, exception handling, distribution and profiling in Java RMI server which the authors cannot encapsulate properly using object oriented...

    Provided By Bharati Vidyapeeth University

  • White Papers // Jun 2009

    Novel Security Strategy for Real Time Digital Videos

    Now a day's video data embedding approach is a very challenging and interesting task towards keeping real time video data secure. The authors can implement and use this technique with high-level applications. As the rate-distortion of any image is not confirmed, because the gain provided by accurate image frame segmentation...

    Provided By Bharati Vidyapeeth University

  • White Papers // Jun 2009

    Object Oriented Data Modeling for Data Warehousing

    All are familiar with the growth rate of the public Web. Regardless of the metric used to measure its growth attached networks, servers, users or pages the growth rate continues to exhibit an exponential pattern. In the same vein, the adoption rate of intranet and extranet data warehouses (i.e., Web...

    Provided By Bharati Vidyapeeth University

  • White Papers // Dec 2008

    An Automated Forecasting Tool (AFT) Achieved by Clustering Entity Relationship Model

    The authors have described an algorithm (AFT) for decomposing ERDs into various modules / clusters, forming various tables equivalent to number of clusters generated and forecasting based on available raw data and generated clusters. Unlike earlier efforts, the algorithm clusters not only the entities but also the relationships involved. While...

    Provided By Bharati Vidyapeeth University

  • White Papers // Jun 2009

    Object Oriented Data Modeling for Data Warehousing

    All are familiar with the growth rate of the public Web. Regardless of the metric used to measure its growth attached networks, servers, users or pages the growth rate continues to exhibit an exponential pattern. In the same vein, the adoption rate of intranet and extranet data warehouses (i.e., Web...

    Provided By Bharati Vidyapeeth University

  • White Papers // Feb 2010

    Aspect Oriented Java RMI Server

    This paper discusses the impact of Aspect oriented programming (AOP) on Java-based communication middleware (Java RMI) server and need to introduce aspects in Java RMI systems. There are certain properties like tracing, exception handling, distribution and profiling in Java RMI server which the authors cannot encapsulate properly using object oriented...

    Provided By Bharati Vidyapeeth University

  • White Papers // Dec 2010

    Factors Influencing Implementation of 4G With Mobile Ad-Hoc Networks in m-Governance Environment

    Mobile Governance is at implementation stage in various countries including India. The m-Governance can be a whole range of government services and applications, available via various mobile networks which are designed for a broad range of devices. The m-Governance environment need low cost infrastructure which must also provide high quality...

    Provided By Bharati Vidyapeeth University

  • White Papers // Jul 2010

    Wireless Security Measurement Using Data Value Index

    Nowadays, use of wireless technology in organizations is a regular act, and the authors can see this technology erupted in all possible different areas. Related to employing wireless technology those organizations need to apply properly security level, depend on security policy which already defined. If security system applied but not...

    Provided By Bharati Vidyapeeth University

  • White Papers // Dec 2008

    An Automated Forecasting Tool (AFT) Achieved by Clustering Entity Relationship Model

    The authors have described an algorithm (AFT) for decomposing ERDs into various modules / clusters, forming various tables equivalent to number of clusters generated and forecasting based on available raw data and generated clusters. Unlike earlier efforts, the algorithm clusters not only the entities but also the relationships involved. While...

    Provided By Bharati Vidyapeeth University

  • White Papers // Jun 2009

    Novel Security Strategy for Real Time Digital Videos

    Now a day's video data embedding approach is a very challenging and interesting task towards keeping real time video data secure. The authors can implement and use this technique with high-level applications. As the rate-distortion of any image is not confirmed, because the gain provided by accurate image frame segmentation...

    Provided By Bharati Vidyapeeth University

  • White Papers // Jan 2011

    Detection of Rouge Access Point in 802.11g Using Ma

    In the recent years, growth of the network has exploded with the appearance of information age today, network and computer technology along with the services and information available on the network are growing so fast that the authors will soon reach to the point where hundreds of millions of people...

    Provided By Bharati Vidyapeeth University

  • White Papers // Aug 2011

    WLAN Intrusion Detection System

    This is an implementation of the Wireless LAN Intrusion Detection System (WIDS) using clock-skews as a fingerprinting property as suggested by Jana-Kasera. The authors' objective is to detect the presence of a fake Access Point (AP) in a Wireless LAN (WLAN). Use of clock-skew enables one to effectively detect Medium...

    Provided By Bharati Vidyapeeth University

  • White Papers // May 2011

    Load Balancing in Structured Peer to Peer Systems

    A peer-to-peer, commonly abbreviated to P2P, is any distributed network architecture composed of participants that make a portion of their resources (such as processing power, disk storage or network bandwidth) directly available to other network participants, without the need for central coordination instances (such as servers or stable hosts). Peers...

    Provided By Bharati Vidyapeeth University

  • White Papers // Jul 2013

    Enforcing Multi-User Security Policies in Cloud Computing

    The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential data can be secured from the unauthorized access and internal threats. Cloud servers use smart techniques...

    Provided By Bharati Vidyapeeth University

  • White Papers // Feb 2014

    Effective Use of Virtualization in Computer Laboratory Management

    Virtualization is a framework of dividing the resources of a computer into multiple execution environments, by applying one or more technologies. The laboratories at colleges are widely used by students and teaching staff. Colleges and universities today are facing several challenges with current technologies for example; in case of machine...

    Provided By Bharati Vidyapeeth University