Guru Nanak Dev University

Displaying 1-21 of 21 results

  • White Papers // Dec 2013

    Data Security and Privacy Issues in Cloud Computing: A Survey

    Cloud computing is a new business model that have generated revolution in Information Technology (IT) industry. Distributed computation and storage are two main features of cloud computing. The applications and data pertaining to different clients are placed in the cloud, where the management of data is under the direct control...

    Provided By Guru Nanak Dev University

  • White Papers // Mar 2013

    Simulative Investigation of QoS Parameters for VoIP Over WiMAX Networks

    WiMAX is a wireless broadband access technology which provides high data rates, long coverage and IP based connectivity to the stationary as well as mobile users. Voice over Internet Protocol (VoIP) through WiMAX is found to be very promising. In this paper, simulative investigations have been done to identify the...

    Provided By Guru Nanak Dev University

  • White Papers // Feb 2013

    A Survey on Reactive Routing Protocols of the Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANET) are wireless networks without an infrastructure, which are usually set up on a temporary basis to serve a particular purpose within a specific period of time. An efficient routing protocol for MANET has become a necessary and important issue to be considered before deploying any...

    Provided By Guru Nanak Dev University

  • White Papers // Oct 2012

    Efficient Signal Quality Improvement Approach for Wideband VoIP System in Pervasive Environment

    Voice over Internet Protocol (VoIP) is a the best alternative to the traditional voice communication system, since VoIP system converges the data, voice and video data and reduces the cost of call transmission by passing packets through the available bandwidth through internet protocol. Since the environmental noise may affect the...

    Provided By Guru Nanak Dev University

  • White Papers // Aug 2012

    A Framework for Authentication Using Fingerprint and Electroencephalogram as Biometrics Modalities

    In today's scenario security is becoming a crucial concern due to increased number of frauds, theft and hooligans. This paper proposes a multimodal biometrics system by combining two unimodal modalities that is fingerprint and EEG. Fingerprint unimodal Systems can be spoofed using artificial fingers and fingerprints made from readily available...

    Provided By Guru Nanak Dev University

  • White Papers // Jul 2012

    Analysis of Joins and Semi Joins in a Distributed Database Query

    Database is defined as collection of files or table, where as DBMS stands for Database Management System which is collection of unified programs used to manage overall activities of the database. The two dominant approaches used for storing and managing database are centralized database management system and distributed database management...

    Provided By Guru Nanak Dev University

  • White Papers // Jun 2012

    Physical Characteristics Based MANET Routing Protocols for Campus Network

    Mobile Ad-hoc NETworks (MANETs) consist of mobile devices that rely on wireless media for bilateral communication. These can be set up anywhere and at any time because these require neither infrastructure nor central administration. This paper concentrates on the comparative performance evaluation of three reactive routing protocols Ad Hoc On-demand...

    Provided By Guru Nanak Dev University

  • White Papers // Jun 2012

    MANET Link Performance Parameters Using Ant Colony Optimization Approach

    End-to-end delay of routing packets from the source to destination in a Mobile ad-hoc network is a major challenge for a large number of network scientists. This paper presents a new routing approach for Mobile Ad hoc NETworks (MANETs) which takes into consideration the Ant Colony Optimization (ACO) technique in...

    Provided By Guru Nanak Dev University

  • White Papers // Jun 2012

    OPNET Based Wireless LAN Performance Improvisation

    In order to analyze the performance of Wireless Local Area Networks (WLANs) effectively, it is important to identify those network settings that can cause the networks performance to go from good to poor. Low throughput, high packet loss rate, delayed round trip time (RTT), increased retransmissions, and increased collisions are...

    Provided By Guru Nanak Dev University

  • White Papers // Sep 2011

    WLAN Metrics Enhancement Using Buffer Size Optimization

    Wireless Local Area Network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum), and usually providing a connection through an access point to the wider internet. Therefore, it is very important to improve their signal to noise performance. In this paper, the authors' main aim is...

    Provided By Guru Nanak Dev University

  • White Papers // Sep 2011

    Analysis of Various Crosstalk Avoidance Techniques in Optical Multistage Interconnection Network

    This paper presents the various crosstalk avoidance algorithms in optical multistage interconnection network. The major problem introduced by optical multistage interconnection networks is crosstalk which is caused by the coupling of two signals within same switching element. To avoid a crosstalk, many approaches have been proposed such as time domain...

    Provided By Guru Nanak Dev University

  • White Papers // Sep 2011

    Performance Analysis and Comparison of MANET Routing Protocols

    Advances in wireless technology and portable computing along with demands for greater user mobility have provided a major movement towards development of ad-hoc networks. The main Method for evaluating the performance of MANET's is simulation. An extensive simulation is performed using NS-2 simulator and end to end delay, packet delivery...

    Provided By Guru Nanak Dev University

  • White Papers // Jan 2011

    Experimentally Analyzing Influence of DDoS Attacks on Web Services During Flash Events

    The phenomenal growth of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defense are operated. In present era, the Internet is considered as main infrastructure of the global information society. Therefore, the availability of Internet is very critical. Distributed Denial-of-Service (DDoS) attacks pose...

    Provided By Guru Nanak Dev University

  • White Papers // Dec 2010

    A Reusability Evaluation Model for OO-Based Software Components

    The requirement to improve software productivity has promoted the research on software metric technology. There are metrics for identifying the quality of reusable components but the function that makes use of these metrics to find reusability of software components is still not clear. These metrics if identified in the design...

    Provided By Guru Nanak Dev University

  • White Papers // Nov 2010

    Performance Evaluation of QoS Parameters in UMTS Network Using Qualnet

    UMTS network based on the Wide Band-CDMA technology is a 3rd generation telecommunication system which provides various multimedia applications along with the conventional telephony service. These various multimedia applications fall into four different categories, which are differentiated from each other on the basis of required bit rate and delay tolerance...

    Provided By Guru Nanak Dev University

  • White Papers // Feb 2010

    Neural Network-A Novel Technique for Software Effort Estimation

    Estimating software development effort is an important task in the management of large software projects. The task is challenging and it has been receiving the attentions of researchers ever since software was developed for commercial purpose. A number of estimation models exist for effort prediction. However, there is a need...

    Provided By Guru Nanak Dev University

  • White Papers // Jan 2010

    DDoS Incidents and Their Impact: A Review

    The phenomenal growth and success of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defence are operated. Now they are being progressively replaced by cheaper and more efficient Internet-based applications. In present era, the world is highly dependent on the Internet and it...

    Provided By Guru Nanak Dev University

  • White Papers // Dec 2009

    A Comprehensive Survey of Distributed Defense Techniques Against DDoS Attacks

    Distributed Denial of Service Attacks imposes a major threat to the availability of Internet services. Most of the applications like banking, trade, and e-commerce are dependent on availability of Internet. Defending Internet from these attacks has become the need of the hour. A typical DDoS defense comprises of three modules...

    Provided By Guru Nanak Dev University

  • White Papers // Jul 2009

    Secure Data Processing in MNN Using S-Boxes and Multiple Keys

    Security attacks against network are increasing dramatically with time. Data security in Multi Node Network (MNN) decreases with increase in the number of nodes. One common technique is utilizes the concept of multiple keys to provide resistance against the virtual attacks made by the hacker. Paper deals with the analysis...

    Provided By Guru Nanak Dev University

  • White Papers // Jan 2009

    Knowledge-Based Modeling Approach for Performance Measurement of Parallel Systems

    Parallel systems are important computing platforms because they offer tremendous potential to solve inherently parallel and computation intensive applications. Performance is always a key consideration in determining the success of such systems. Evaluating and analyzing parallel system is difficult due to the complex interaction between application characteristics and architectural features....

    Provided By Guru Nanak Dev University

  • White Papers // May 2008

    On a Class of Multistage Interconnection Network in Parallel Processing

    Parallel processing is an efficient form of information processing system, which emphasizes the exploitation of concurrent events in the computing process. To achieve parallel processing it's required to develop more capable and cost-effective systems. In order to operate more efficiently a network is required to provide low latency and be...

    Provided By Guru Nanak Dev University

  • White Papers // Dec 2013

    Data Security and Privacy Issues in Cloud Computing: A Survey

    Cloud computing is a new business model that have generated revolution in Information Technology (IT) industry. Distributed computation and storage are two main features of cloud computing. The applications and data pertaining to different clients are placed in the cloud, where the management of data is under the direct control...

    Provided By Guru Nanak Dev University

  • White Papers // Jun 2012

    Physical Characteristics Based MANET Routing Protocols for Campus Network

    Mobile Ad-hoc NETworks (MANETs) consist of mobile devices that rely on wireless media for bilateral communication. These can be set up anywhere and at any time because these require neither infrastructure nor central administration. This paper concentrates on the comparative performance evaluation of three reactive routing protocols Ad Hoc On-demand...

    Provided By Guru Nanak Dev University

  • White Papers // Feb 2013

    A Survey on Reactive Routing Protocols of the Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANET) are wireless networks without an infrastructure, which are usually set up on a temporary basis to serve a particular purpose within a specific period of time. An efficient routing protocol for MANET has become a necessary and important issue to be considered before deploying any...

    Provided By Guru Nanak Dev University

  • White Papers // Mar 2013

    Simulative Investigation of QoS Parameters for VoIP Over WiMAX Networks

    WiMAX is a wireless broadband access technology which provides high data rates, long coverage and IP based connectivity to the stationary as well as mobile users. Voice over Internet Protocol (VoIP) through WiMAX is found to be very promising. In this paper, simulative investigations have been done to identify the...

    Provided By Guru Nanak Dev University

  • White Papers // Jul 2009

    Secure Data Processing in MNN Using S-Boxes and Multiple Keys

    Security attacks against network are increasing dramatically with time. Data security in Multi Node Network (MNN) decreases with increase in the number of nodes. One common technique is utilizes the concept of multiple keys to provide resistance against the virtual attacks made by the hacker. Paper deals with the analysis...

    Provided By Guru Nanak Dev University

  • White Papers // May 2008

    On a Class of Multistage Interconnection Network in Parallel Processing

    Parallel processing is an efficient form of information processing system, which emphasizes the exploitation of concurrent events in the computing process. To achieve parallel processing it's required to develop more capable and cost-effective systems. In order to operate more efficiently a network is required to provide low latency and be...

    Provided By Guru Nanak Dev University

  • White Papers // Jan 2011

    Experimentally Analyzing Influence of DDoS Attacks on Web Services During Flash Events

    The phenomenal growth of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defense are operated. In present era, the Internet is considered as main infrastructure of the global information society. Therefore, the availability of Internet is very critical. Distributed Denial-of-Service (DDoS) attacks pose...

    Provided By Guru Nanak Dev University

  • White Papers // Jan 2009

    Knowledge-Based Modeling Approach for Performance Measurement of Parallel Systems

    Parallel systems are important computing platforms because they offer tremendous potential to solve inherently parallel and computation intensive applications. Performance is always a key consideration in determining the success of such systems. Evaluating and analyzing parallel system is difficult due to the complex interaction between application characteristics and architectural features....

    Provided By Guru Nanak Dev University

  • White Papers // Jan 2010

    DDoS Incidents and Their Impact: A Review

    The phenomenal growth and success of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defence are operated. Now they are being progressively replaced by cheaper and more efficient Internet-based applications. In present era, the world is highly dependent on the Internet and it...

    Provided By Guru Nanak Dev University

  • White Papers // Nov 2010

    Performance Evaluation of QoS Parameters in UMTS Network Using Qualnet

    UMTS network based on the Wide Band-CDMA technology is a 3rd generation telecommunication system which provides various multimedia applications along with the conventional telephony service. These various multimedia applications fall into four different categories, which are differentiated from each other on the basis of required bit rate and delay tolerance...

    Provided By Guru Nanak Dev University

  • White Papers // Dec 2010

    A Reusability Evaluation Model for OO-Based Software Components

    The requirement to improve software productivity has promoted the research on software metric technology. There are metrics for identifying the quality of reusable components but the function that makes use of these metrics to find reusability of software components is still not clear. These metrics if identified in the design...

    Provided By Guru Nanak Dev University

  • White Papers // Dec 2009

    A Comprehensive Survey of Distributed Defense Techniques Against DDoS Attacks

    Distributed Denial of Service Attacks imposes a major threat to the availability of Internet services. Most of the applications like banking, trade, and e-commerce are dependent on availability of Internet. Defending Internet from these attacks has become the need of the hour. A typical DDoS defense comprises of three modules...

    Provided By Guru Nanak Dev University

  • White Papers // Feb 2010

    Neural Network-A Novel Technique for Software Effort Estimation

    Estimating software development effort is an important task in the management of large software projects. The task is challenging and it has been receiving the attentions of researchers ever since software was developed for commercial purpose. A number of estimation models exist for effort prediction. However, there is a need...

    Provided By Guru Nanak Dev University

  • White Papers // Sep 2011

    Performance Analysis and Comparison of MANET Routing Protocols

    Advances in wireless technology and portable computing along with demands for greater user mobility have provided a major movement towards development of ad-hoc networks. The main Method for evaluating the performance of MANET's is simulation. An extensive simulation is performed using NS-2 simulator and end to end delay, packet delivery...

    Provided By Guru Nanak Dev University

  • White Papers // Sep 2011

    WLAN Metrics Enhancement Using Buffer Size Optimization

    Wireless Local Area Network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum), and usually providing a connection through an access point to the wider internet. Therefore, it is very important to improve their signal to noise performance. In this paper, the authors' main aim is...

    Provided By Guru Nanak Dev University

  • White Papers // Sep 2011

    Analysis of Various Crosstalk Avoidance Techniques in Optical Multistage Interconnection Network

    This paper presents the various crosstalk avoidance algorithms in optical multistage interconnection network. The major problem introduced by optical multistage interconnection networks is crosstalk which is caused by the coupling of two signals within same switching element. To avoid a crosstalk, many approaches have been proposed such as time domain...

    Provided By Guru Nanak Dev University

  • White Papers // Aug 2012

    A Framework for Authentication Using Fingerprint and Electroencephalogram as Biometrics Modalities

    In today's scenario security is becoming a crucial concern due to increased number of frauds, theft and hooligans. This paper proposes a multimodal biometrics system by combining two unimodal modalities that is fingerprint and EEG. Fingerprint unimodal Systems can be spoofed using artificial fingers and fingerprints made from readily available...

    Provided By Guru Nanak Dev University

  • White Papers // Oct 2012

    Efficient Signal Quality Improvement Approach for Wideband VoIP System in Pervasive Environment

    Voice over Internet Protocol (VoIP) is a the best alternative to the traditional voice communication system, since VoIP system converges the data, voice and video data and reduces the cost of call transmission by passing packets through the available bandwidth through internet protocol. Since the environmental noise may affect the...

    Provided By Guru Nanak Dev University

  • White Papers // Jul 2012

    Analysis of Joins and Semi Joins in a Distributed Database Query

    Database is defined as collection of files or table, where as DBMS stands for Database Management System which is collection of unified programs used to manage overall activities of the database. The two dominant approaches used for storing and managing database are centralized database management system and distributed database management...

    Provided By Guru Nanak Dev University

  • White Papers // Jun 2012

    MANET Link Performance Parameters Using Ant Colony Optimization Approach

    End-to-end delay of routing packets from the source to destination in a Mobile ad-hoc network is a major challenge for a large number of network scientists. This paper presents a new routing approach for Mobile Ad hoc NETworks (MANETs) which takes into consideration the Ant Colony Optimization (ACO) technique in...

    Provided By Guru Nanak Dev University

  • White Papers // Jun 2012

    OPNET Based Wireless LAN Performance Improvisation

    In order to analyze the performance of Wireless Local Area Networks (WLANs) effectively, it is important to identify those network settings that can cause the networks performance to go from good to poor. Low throughput, high packet loss rate, delayed round trip time (RTT), increased retransmissions, and increased collisions are...

    Provided By Guru Nanak Dev University