Ganpat University

Displaying 1-8 of 8 results

  • White Papers // Mar 2013

    Cloud Based Conceptual Framework of Service Level Agreement for University

    Cloud Computing means there is no need to buy and install expensive software, only university need to pay for various online services when need it, and it also offers flexibility of various infrastructure, platform and software kind of services which can be quickly and easily scaled up and down according...

    Provided By Ganpat University

  • White Papers // Jul 2012

    Exploratory Data Model for Effective WLAN Anomaly Detection Based on Feature Construction and Reduction

    The efficient and effective Anomaly detection system essentially requires identifying the behavior analysis for each activity. For this purpose unsupervised techniques are used but the accuracy and reliability of them results depend on the data set which have used for modeling. It is essential to identify important input features, missing...

    Provided By Ganpat University

  • White Papers // May 2012

    Components of Fingerprint Biometric System

    The term "Biometrics" is derived from the Greek words "Bio" (life) and "Metrics" (to measure). Automated biometric systems have only become available over the last few decades, due to significant advances in the field of computer processing. Many of these new automated techniques, however, are based on ideas that were...

    Provided By Ganpat University

  • White Papers // Dec 2011

    To Study the Risk or Issues of Firewall: Solution With Different Approach

    Firewalls is very useful things for internet security problems for data transmission or other purpose but some times firewalls have some problems which are discussed in this research paper. Software firewalls that only block inwards traffic such as the Windows XP default firewall are useless at detecting programs on one...

    Provided By Ganpat University

  • White Papers // Dec 2011

    Approach of Data Security in Local Network Using Distributed Firewalls

    Firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and regulation is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass or during the sensitive data transmission. Distributed firewalls allow enforcement of security...

    Provided By Ganpat University

  • White Papers // Dec 2011

    Bluetooth Usage With Architecture View & Security Measures

    The Bluetooth wireless technology was created to solve a simple problem: replace the cables used on mobile devices with radio frequency waves. The technology encompasses a simple low-cost, low power, Global radio system for integration into mobile devices. Such devices can form a quick ad-hoc secure "Piconet" and communicate among...

    Provided By Ganpat University

  • White Papers // Dec 2011

    Web Mining in E-Commerce: Pattern Discovery, Issues and Applications

    The World Wide Web is the key source of information and it is growing rapidly. E-commerce has provided a cost efficient and effective way of ding business. Web mining is the application of data mining technique to discover useful information from World Wide Web. Web mining is applied to e-commerce...

    Provided By Ganpat University

  • White Papers // Jun 2011

    Exploring and Exploiting Opportunistic Network Routing in a DTN Environment

    A communications network that is capable of storing packets temporarily in intermediate nodes, until the time an end-to-end route is re-established or regenerated is known as a delay tolerant network/s, in short, DTN. This paper aims to detail basic & general aspects specific to information needs in DTN routing and...

    Provided By Ganpat University

  • White Papers // Jul 2012

    Exploratory Data Model for Effective WLAN Anomaly Detection Based on Feature Construction and Reduction

    The efficient and effective Anomaly detection system essentially requires identifying the behavior analysis for each activity. For this purpose unsupervised techniques are used but the accuracy and reliability of them results depend on the data set which have used for modeling. It is essential to identify important input features, missing...

    Provided By Ganpat University

  • White Papers // Mar 2013

    Cloud Based Conceptual Framework of Service Level Agreement for University

    Cloud Computing means there is no need to buy and install expensive software, only university need to pay for various online services when need it, and it also offers flexibility of various infrastructure, platform and software kind of services which can be quickly and easily scaled up and down according...

    Provided By Ganpat University

  • White Papers // Dec 2011

    Approach of Data Security in Local Network Using Distributed Firewalls

    Firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and regulation is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass or during the sensitive data transmission. Distributed firewalls allow enforcement of security...

    Provided By Ganpat University

  • White Papers // Dec 2011

    Bluetooth Usage With Architecture View & Security Measures

    The Bluetooth wireless technology was created to solve a simple problem: replace the cables used on mobile devices with radio frequency waves. The technology encompasses a simple low-cost, low power, Global radio system for integration into mobile devices. Such devices can form a quick ad-hoc secure "Piconet" and communicate among...

    Provided By Ganpat University

  • White Papers // Dec 2011

    To Study the Risk or Issues of Firewall: Solution With Different Approach

    Firewalls is very useful things for internet security problems for data transmission or other purpose but some times firewalls have some problems which are discussed in this research paper. Software firewalls that only block inwards traffic such as the Windows XP default firewall are useless at detecting programs on one...

    Provided By Ganpat University

  • White Papers // Dec 2011

    Web Mining in E-Commerce: Pattern Discovery, Issues and Applications

    The World Wide Web is the key source of information and it is growing rapidly. E-commerce has provided a cost efficient and effective way of ding business. Web mining is the application of data mining technique to discover useful information from World Wide Web. Web mining is applied to e-commerce...

    Provided By Ganpat University

  • White Papers // Jun 2011

    Exploring and Exploiting Opportunistic Network Routing in a DTN Environment

    A communications network that is capable of storing packets temporarily in intermediate nodes, until the time an end-to-end route is re-established or regenerated is known as a delay tolerant network/s, in short, DTN. This paper aims to detail basic & general aspects specific to information needs in DTN routing and...

    Provided By Ganpat University

  • White Papers // May 2012

    Components of Fingerprint Biometric System

    The term "Biometrics" is derived from the Greek words "Bio" (life) and "Metrics" (to measure). Automated biometric systems have only become available over the last few decades, due to significant advances in the field of computer processing. Many of these new automated techniques, however, are based on ideas that were...

    Provided By Ganpat University