Guru Nanak Dev Engineering College

Displaying 1-6 of 6 results

  • White Papers // Sep 2012

    A Novel Hybrid Clustering Algorithm: Integrated Partitional and Hierarchical Clustering Algorithm for Categorical Data

    Data clustering became increasingly important in the field of computational statistics and data mining. Many algorithms have been developed in the literature for clustering where k-means clustering and hierarchical clustering are two well-known algorithms to partition the numerical data into groups. Due to the disadvantages of both categories of algorithms,...

    Provided By Guru Nanak Dev Engineering College

  • White Papers // Apr 2012

    Reduction of Blocking Artifacts in JPEG Compressed Image

    In JPEG (DCT based) compresses image data by representing the original image with a small number of transform coefficients. It exploits the fact that for typical images a large amount of signal energy is concentrated in a small number of coefficients. The goal of DCT transform coding is to minimize...

    Provided By Guru Nanak Dev Engineering College

  • White Papers // Aug 2010

    Wireless Sensor Network Based: Design Principles & Measuring Performance of IDS

    Wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because, deployed in open and unprotected environment. For these cases, it is necessary to use some mechanism of intrusion detection. Besides preventing the intruder from causing damages...

    Provided By Guru Nanak Dev Engineering College

  • White Papers // Mar 2010

    Secure Communication Schemes in Wireless Sensor Network

    Wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because they are deployed in open and unprotected environment. It is necessary to use effective mechanisms to protect sensor nodes against many types of attacks because sensor...

    Provided By Guru Nanak Dev Engineering College

  • White Papers // Mar 2010

    A Viable Technique: Speaker Recognition

    Speaker recognition has been an interesting research field for the last decades, which still yields a number of unsolved problems. This paper aims to present a speaker recognition system which recognizes the speaker as opposed to what is being said by the speaker as in case of speech recognition. Speaker...

    Provided By Guru Nanak Dev Engineering College

  • White Papers // Mar 2010

    Signature-Based Botnet Detection and Prevention

    The Internet is used extensively for important services such as banking, business, medicine, education, research, stock trades, weather forecasting etc. Most of these services must be processed in a timely manner. However these services are delayed, degraded and sometimes completely disrupted because of unavailability of internet. The inherent vulnerabilities of...

    Provided By Guru Nanak Dev Engineering College

  • White Papers // Mar 2010

    Secure Communication Schemes in Wireless Sensor Network

    Wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because they are deployed in open and unprotected environment. It is necessary to use effective mechanisms to protect sensor nodes against many types of attacks because sensor...

    Provided By Guru Nanak Dev Engineering College

  • White Papers // Mar 2010

    Signature-Based Botnet Detection and Prevention

    The Internet is used extensively for important services such as banking, business, medicine, education, research, stock trades, weather forecasting etc. Most of these services must be processed in a timely manner. However these services are delayed, degraded and sometimes completely disrupted because of unavailability of internet. The inherent vulnerabilities of...

    Provided By Guru Nanak Dev Engineering College

  • White Papers // Aug 2010

    Wireless Sensor Network Based: Design Principles & Measuring Performance of IDS

    Wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because, deployed in open and unprotected environment. For these cases, it is necessary to use some mechanism of intrusion detection. Besides preventing the intruder from causing damages...

    Provided By Guru Nanak Dev Engineering College

  • White Papers // Mar 2010

    A Viable Technique: Speaker Recognition

    Speaker recognition has been an interesting research field for the last decades, which still yields a number of unsolved problems. This paper aims to present a speaker recognition system which recognizes the speaker as opposed to what is being said by the speaker as in case of speech recognition. Speaker...

    Provided By Guru Nanak Dev Engineering College

  • White Papers // Apr 2012

    Reduction of Blocking Artifacts in JPEG Compressed Image

    In JPEG (DCT based) compresses image data by representing the original image with a small number of transform coefficients. It exploits the fact that for typical images a large amount of signal energy is concentrated in a small number of coefficients. The goal of DCT transform coding is to minimize...

    Provided By Guru Nanak Dev Engineering College

  • White Papers // Sep 2012

    A Novel Hybrid Clustering Algorithm: Integrated Partitional and Hierarchical Clustering Algorithm for Categorical Data

    Data clustering became increasingly important in the field of computational statistics and data mining. Many algorithms have been developed in the literature for clustering where k-means clustering and hierarchical clustering are two well-known algorithms to partition the numerical data into groups. Due to the disadvantages of both categories of algorithms,...

    Provided By Guru Nanak Dev Engineering College