Erode Sengunthar Engineering College

Displaying 1-7 of 7 results

  • White Papers // Aug 2013

    Improved Scheduling and Minimized Updates in Data Warehouses

    A data warehouse is a relational database that is designed for query and analysis rather than for transaction processing. Many stream-based applications have sophisticated data processing requirements and real-time performance expectations that need to be met under high-volume; time-varying data streams update scheduling in streaming data warehouses, which combine the...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Nov 2012

    A Review of DDoS Attacks in Mobile Ad-Hoc Networks

    Today secure communication is the primary aspects in the networks. Internet is the primary medium for communication which is used by number of different users across the networks. Distributed Denial of Service (DDoS) attack has become a major problem to networks. Network resources such as network bandwidth, web servers, and...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Oct 2012

    An Effective Fusion Technique of Cloud Computing and Networking Series

    Cloud computing is making it possible to separate the process of building an infrastructure for service provisioning from the business of providing end user services. Today, such infrastructures are normally provided in large data centres and the applications are executed remotely from the users. One reason for this is that...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Oct 2012

    A New Application of Multi Modal Biometrics in Home and Office Security System

    Biometric door lock security systems are used at those places where users have important information and stuffs. In that kind of places multi-biometric electronic door lock security systems that are based on finger print and iris recognization. Multi-biometric door lock security systems are used to prevent the door related burglaries...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Oct 2012

    A New Application of Multimodal Biometrics in Home and Office Security System

    Biometric door lock security systems are used at those places where the people have important information and stuffs. In that kind of places multi-biometric electronic door lock security systems that are based on finger print and iris reorganization. Multi-biometric door lock security systems are used to prevent the door related...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Jan 2012

    Traffic and Security using Randomized Dispersive Routes in Heterogeneous Sensor Network

    Generally traffic and the sensor network security have many challenges in the transmission of data in the network. The existing schemes consider homogeneous sensor networks which have poor performance and scalability. Due to many-to-one traffic pattern, sensors may communicate with small portion of its neighbours. Key management is the critical...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Mar 2011

    Packet Score Based Network Security and Traffic Optimization

    One of the critical threat to internet security is Distributed Denial of Service (DDoS). This paper by the introduction of automated online attack classification and attack packet discarding helps to resolve the network security issue by certain level. The incoming packets are assigned scores based on the priority associated with...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Nov 2012

    A Review of DDoS Attacks in Mobile Ad-Hoc Networks

    Today secure communication is the primary aspects in the networks. Internet is the primary medium for communication which is used by number of different users across the networks. Distributed Denial of Service (DDoS) attack has become a major problem to networks. Network resources such as network bandwidth, web servers, and...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Aug 2013

    Improved Scheduling and Minimized Updates in Data Warehouses

    A data warehouse is a relational database that is designed for query and analysis rather than for transaction processing. Many stream-based applications have sophisticated data processing requirements and real-time performance expectations that need to be met under high-volume; time-varying data streams update scheduling in streaming data warehouses, which combine the...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Oct 2012

    An Effective Fusion Technique of Cloud Computing and Networking Series

    Cloud computing is making it possible to separate the process of building an infrastructure for service provisioning from the business of providing end user services. Today, such infrastructures are normally provided in large data centres and the applications are executed remotely from the users. One reason for this is that...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Oct 2012

    A New Application of Multi Modal Biometrics in Home and Office Security System

    Biometric door lock security systems are used at those places where users have important information and stuffs. In that kind of places multi-biometric electronic door lock security systems that are based on finger print and iris recognization. Multi-biometric door lock security systems are used to prevent the door related burglaries...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Mar 2011

    Packet Score Based Network Security and Traffic Optimization

    One of the critical threat to internet security is Distributed Denial of Service (DDoS). This paper by the introduction of automated online attack classification and attack packet discarding helps to resolve the network security issue by certain level. The incoming packets are assigned scores based on the priority associated with...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Jan 2012

    Traffic and Security using Randomized Dispersive Routes in Heterogeneous Sensor Network

    Generally traffic and the sensor network security have many challenges in the transmission of data in the network. The existing schemes consider homogeneous sensor networks which have poor performance and scalability. Due to many-to-one traffic pattern, sensors may communicate with small portion of its neighbours. Key management is the critical...

    Provided By Erode Sengunthar Engineering College

  • White Papers // Oct 2012

    A New Application of Multimodal Biometrics in Home and Office Security System

    Biometric door lock security systems are used at those places where the people have important information and stuffs. In that kind of places multi-biometric electronic door lock security systems that are based on finger print and iris reorganization. Multi-biometric door lock security systems are used to prevent the door related...

    Provided By Erode Sengunthar Engineering College