Birla Institute of Technology

Displaying 1-14 of 14 results

  • White Papers // Aug 2013

    Securing Software as a Service Model of Cloud Computing: Issues and Solutions

    Cloud computing, undoubtedly, has become the buzzword in the IT industry today. Looking at the potential impact it has on numerous business applications as well as in the people everyday life, it can certainly be said that this disruptive technology is here to stay. Many of the features that make...

    Provided By Birla Institute of Technology

  • White Papers // Jul 2013

    Towards Securing APIs in Cloud Computing

    Every organization today wants to adopt cloud computing paradigm and leverage its various advantages. Today everyone is aware of its characteristics which have made it so popular and how it can help the organizations focus on their core activities leaving all IT services development and maintenance to the cloud service...

    Provided By Birla Institute of Technology

  • White Papers // Jul 2013

    Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets

    In the era of information and communication technology, Security is an important issue. A lot of effort and finance are being invested in this sector. Intrusion detection is one of the most prominent fields in this area. Data mining in network intrusion detection can automate the network intrusion detection field...

    Provided By Birla Institute of Technology

  • White Papers // Mar 2013

    Pair Programming \"Potential Benefits and Threats\"

    Agile software methodologies are preferred over traditional methods in a variety of industry projects. Pair programming is a key practice of Extreme Programming; an agile software development technique, in which two students/programmers/co-workers work together at one terminal. One, the writer, writes code while the other, the analyst, reviews each line...

    Provided By Birla Institute of Technology

  • White Papers // Dec 2012

    An Improved Certified E-Mail Protocol Based on Author Based Selective Receipt

    Now-a-days, e-mail has become one of the most widely used communication medium. Because of its low cost characteristics and rapid delivery of messages, e-mail is increasingly used in place of ordinary mail. However, the e-mail service exposes users to several risks related to the lack of security during the message...

    Provided By Birla Institute of Technology

  • White Papers // Apr 2012

    Augmented Reality on GPS Navigation (ARGPS)

    Augmented Reality is a new and upcoming field of technology aimed at providing information to the user via Optical methods. It consists of portable hardware and light software that enable the user to get extra information about his environment that would generally require a desktop computer or some form of...

    Provided By Birla Institute of Technology

  • White Papers // Dec 2011

    Integration of Biometric Authentication Procedure in Customer Oriented Payment System in Trusted Mobile Devices

    Mobile payments have become an important application in daily activities. The unique advantage of mobile payments over traditional payments has led to tremendous growth of mobile phones. The strong demand of mobile applications raised increased concern on the security of mobile applications as well as devices. New mobile devices are...

    Provided By Birla Institute of Technology

  • White Papers // Jul 2011

    Network Security Based on Quantum Cryptography & Multiqubit Hadamard Matrices

    An approach is described for generating a secret key using polarized photons in quantum systems. A message is encoded and decoded by using code generated through the properties of Hadamard matrices. The algorithm uses the features of certain existing algorithms and makes the transmission of data through an insecure channel...

    Provided By Birla Institute of Technology

  • White Papers // May 2011

    Electronic Seal Stamping Based on Group Signature

    CNBAB is an e-commerce platform which constructs a credit worthy trade environment and provides financing channels for Chinese Small and Medium-sized Enterprise (SME) and even small enterprises. CNBAB has carried an operation in Shandong province and achieved a great success. CNBAB adopts a brand new business pattern called BAB (Business...

    Provided By Birla Institute of Technology

  • White Papers // Dec 2010

    Inheritance Metrics for Object-Oriented Design

    The inheritance metrics gives the people information about the inheritance tree of the system. Inheritance is a key feature of the Object-Oriented (OO) paradigm. This mechanism supports the class hierarchy design and captures the IS-A relationship between a super class and its subclass. Several OO inheritance metrics have been proposed...

    Provided By Birla Institute of Technology

  • White Papers // Nov 2010

    Green Cloud: An Algorithmic Approach

    Cloud computing has opened a new era to a shared IT infrastructure in which large pools of systems are linked together via the internet to provide IT services, such as different utility services of the authors' day to day lives like tax calculation web services, weather information web services etc;...

    Provided By Birla Institute of Technology

  • White Papers // Jun 2010

    A Novel Data Mining Algorithm for Semantic Web Based Data Cloud

    By a cloud, the authors mean an infrastructure that provides resources and/or services over the Internet. A storage cloud provides storage services, while a compute cloud provides compute services. The authors describe the design of the Sector storage cloud and how it provides the storage services required by the Sphere...

    Provided By Birla Institute of Technology

  • White Papers // Jun 2010

    Traffic Grooming in WDM Network Using ILP

    In the modern communication systems, there is a high amount of increase in demand of higher network bandwidth at lower costs. The tremendous growth of internet and worldwide-web has brought more and more users online consuming large amounts of bandwidth due to data transfer involving the video and images. Optical...

    Provided By Birla Institute of Technology

  • White Papers // Jun 2009

    Compact Slotted Broadband Antenna for Wireless Applications

    This paper presents the theoretical investigation of a slotted patch antenna. The main objective of proposed work is to obtain a large bandwidth antenna with reduced size. The antenna has a compact size of 21.1mm x 20.25mm x 8.5mm. Two designs with minor variation are studied which provide wide impedance...

    Provided By Birla Institute of Technology

  • White Papers // Dec 2012

    An Improved Certified E-Mail Protocol Based on Author Based Selective Receipt

    Now-a-days, e-mail has become one of the most widely used communication medium. Because of its low cost characteristics and rapid delivery of messages, e-mail is increasingly used in place of ordinary mail. However, the e-mail service exposes users to several risks related to the lack of security during the message...

    Provided By Birla Institute of Technology

  • White Papers // Apr 2012

    Augmented Reality on GPS Navigation (ARGPS)

    Augmented Reality is a new and upcoming field of technology aimed at providing information to the user via Optical methods. It consists of portable hardware and light software that enable the user to get extra information about his environment that would generally require a desktop computer or some form of...

    Provided By Birla Institute of Technology

  • White Papers // Jul 2013

    Towards Securing APIs in Cloud Computing

    Every organization today wants to adopt cloud computing paradigm and leverage its various advantages. Today everyone is aware of its characteristics which have made it so popular and how it can help the organizations focus on their core activities leaving all IT services development and maintenance to the cloud service...

    Provided By Birla Institute of Technology

  • White Papers // Aug 2013

    Securing Software as a Service Model of Cloud Computing: Issues and Solutions

    Cloud computing, undoubtedly, has become the buzzword in the IT industry today. Looking at the potential impact it has on numerous business applications as well as in the people everyday life, it can certainly be said that this disruptive technology is here to stay. Many of the features that make...

    Provided By Birla Institute of Technology

  • White Papers // Jul 2011

    Network Security Based on Quantum Cryptography & Multiqubit Hadamard Matrices

    An approach is described for generating a secret key using polarized photons in quantum systems. A message is encoded and decoded by using code generated through the properties of Hadamard matrices. The algorithm uses the features of certain existing algorithms and makes the transmission of data through an insecure channel...

    Provided By Birla Institute of Technology

  • White Papers // Jul 2013

    Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets

    In the era of information and communication technology, Security is an important issue. A lot of effort and finance are being invested in this sector. Intrusion detection is one of the most prominent fields in this area. Data mining in network intrusion detection can automate the network intrusion detection field...

    Provided By Birla Institute of Technology

  • White Papers // Mar 2013

    Pair Programming \"Potential Benefits and Threats\"

    Agile software methodologies are preferred over traditional methods in a variety of industry projects. Pair programming is a key practice of Extreme Programming; an agile software development technique, in which two students/programmers/co-workers work together at one terminal. One, the writer, writes code while the other, the analyst, reviews each line...

    Provided By Birla Institute of Technology

  • White Papers // Jun 2010

    Traffic Grooming in WDM Network Using ILP

    In the modern communication systems, there is a high amount of increase in demand of higher network bandwidth at lower costs. The tremendous growth of internet and worldwide-web has brought more and more users online consuming large amounts of bandwidth due to data transfer involving the video and images. Optical...

    Provided By Birla Institute of Technology

  • White Papers // Jun 2010

    A Novel Data Mining Algorithm for Semantic Web Based Data Cloud

    By a cloud, the authors mean an infrastructure that provides resources and/or services over the Internet. A storage cloud provides storage services, while a compute cloud provides compute services. The authors describe the design of the Sector storage cloud and how it provides the storage services required by the Sphere...

    Provided By Birla Institute of Technology

  • White Papers // Dec 2010

    Inheritance Metrics for Object-Oriented Design

    The inheritance metrics gives the people information about the inheritance tree of the system. Inheritance is a key feature of the Object-Oriented (OO) paradigm. This mechanism supports the class hierarchy design and captures the IS-A relationship between a super class and its subclass. Several OO inheritance metrics have been proposed...

    Provided By Birla Institute of Technology

  • White Papers // May 2011

    Electronic Seal Stamping Based on Group Signature

    CNBAB is an e-commerce platform which constructs a credit worthy trade environment and provides financing channels for Chinese Small and Medium-sized Enterprise (SME) and even small enterprises. CNBAB has carried an operation in Shandong province and achieved a great success. CNBAB adopts a brand new business pattern called BAB (Business...

    Provided By Birla Institute of Technology

  • White Papers // Jun 2009

    Compact Slotted Broadband Antenna for Wireless Applications

    This paper presents the theoretical investigation of a slotted patch antenna. The main objective of proposed work is to obtain a large bandwidth antenna with reduced size. The antenna has a compact size of 21.1mm x 20.25mm x 8.5mm. Two designs with minor variation are studied which provide wide impedance...

    Provided By Birla Institute of Technology

  • White Papers // Nov 2010

    Green Cloud: An Algorithmic Approach

    Cloud computing has opened a new era to a shared IT infrastructure in which large pools of systems are linked together via the internet to provide IT services, such as different utility services of the authors' day to day lives like tax calculation web services, weather information web services etc;...

    Provided By Birla Institute of Technology

  • White Papers // Dec 2011

    Integration of Biometric Authentication Procedure in Customer Oriented Payment System in Trusted Mobile Devices

    Mobile payments have become an important application in daily activities. The unique advantage of mobile payments over traditional payments has led to tremendous growth of mobile phones. The strong demand of mobile applications raised increased concern on the security of mobile applications as well as devices. New mobile devices are...

    Provided By Birla Institute of Technology