Jamia Millia Islamia

Displaying 1-11 of 11 results

  • White Papers // Mar 2013

    Cloud Database Management System Architecture

    One of the major challenges for the IT companies today is how to manage large growing volumes of data and how to produce a quality driven software product ensuring optimal utilization of resources with minimum cost. The database management system is a software system i.e. a set of programs that...

    Provided By Jamia Millia Islamia

  • White Papers // Dec 2012

    Performance Evaluation of Energy Traffic in Ipv6 Networks

    In this paper, the authors present a study of energy traffic based simulative and analytical methods in IPv6 networks. This research examine to find out which MANET routing protocol performs better in the case of TCP/IP (Application and Physical layer) under congested IPv6 networks. They investigates & undertakes simulation based...

    Provided By Jamia Millia Islamia

  • White Papers // Sep 2012

    Securing IPv6's Neighbour Discovery, Using Locally Authentication Process

    Internet Engineering Task Force (IETF), in IPv6, allowed nodes to Auto-configure using neighbour discovery protocol. Neighbour Discovery (ND) and Address auto-configuration mechanisms may be protected with IPSec Authentication Header (AH). Protecting all traffic will include Address Resolution Protocol. To protect this, IPSec will need agreed Key. For Key setup, UDP...

    Provided By Jamia Millia Islamia

  • White Papers // Sep 2011

    A Comprehensive Study of CRM Through Data Mining Techniques

    In today's competitive scenario in corporate world, "Customer Retention" strategy in Customer Relationship Management (CRM) is an increasingly pressed issue. Data mining techniques play a vital role in better CRM. This paper attempts to bring a new perspective by focusing the issue of data mining applications, opportunities and challenges in...

    Provided By Jamia Millia Islamia

  • White Papers // Feb 2011

    A Review and Comparison of Quality of Service Routing in Wireless Ad Hoc Networks

    Quality of Service (QoS) guarantees must be supported in a network that intends to carry real time and multimedia traffic. IETF RFC 2386 defines QoS as a set of service requirements to be met by the network while transporting a packet stream from source to the destination. The dynamic network...

    Provided By Jamia Millia Islamia

  • White Papers // Oct 2010

    Smart Cards: The Future Gate

    Smart Cards are one of the latest applications of Information Technology whose use is growing with each passing day. Like computers today, it is presumed that smart cards, which in fact contain tiny computers, will be used extensively in future for a variety of purposes. In Europe, US and many...

    Provided By Jamia Millia Islamia

  • White Papers // Aug 2010

    Application Of Data Mining In Bioinformatics

    This paper highlights some of the basic concepts of bioinformatics and data mining. The major research areas of bioinformatics are highlighted. The application of data mining in the domain of bioinformatics is explained. It also highlights some of the current challenges and opportunities of data mining in bioinformatics. In recent...

    Provided By Jamia Millia Islamia

  • White Papers // Jul 2010

    Design Network Intrusion Detection System Using Hybrid Fuzzy-Neural Network

    As networks grow both in importance and size, there is an increasing need for effective security monitors such as Network Intrusion Detection System to prevent such illicit accesses. Intrusion Detection Systems technology is an effective approach in dealing with the problems of network security. In this paper, the authors present...

    Provided By Jamia Millia Islamia

  • White Papers // Feb 2010

    An Architecture Model of Mobile Ad Hoc Network and Its Performance in Disaster Area Architecture

    A mobile ad hoc network is a set of mobile nodes connected and communicating with each other without any centralized computing and physical infrastructure. Due to the lack of physical infrastructure, unpredictable resources centralized computing, mobility of the nodes and highly dynamic topology, the QoS provisioning is a challenging task...

    Provided By Jamia Millia Islamia

  • White Papers // Sep 2009

    Electronic Authority Variation

    The problem of authorization was raised in 1990 by Fischer for he confirmation of the originality of source. Russell in 1994 described the problem in detail and suggested various options available to the receiver. He suggested some basic principles of authorization at source like auditing by receiver, trusted third party...

    Provided By Jamia Millia Islamia

  • White Papers // May 2008

    Virtual Password: Virtual Environment Based User Authentication

    Computer and communication systems depend largely on passwords to identify and authenticate users. Typically, passwords are strings of characters and digits. Alphanumeric passwords are convoluted to remember for users because a safe password should be long and arbitrary, however users pick short, simple, and insecure passwords. Image passwords have been...

    Provided By Jamia Millia Islamia

  • White Papers // Sep 2012

    Securing IPv6's Neighbour Discovery, Using Locally Authentication Process

    Internet Engineering Task Force (IETF), in IPv6, allowed nodes to Auto-configure using neighbour discovery protocol. Neighbour Discovery (ND) and Address auto-configuration mechanisms may be protected with IPSec Authentication Header (AH). Protecting all traffic will include Address Resolution Protocol. To protect this, IPSec will need agreed Key. For Key setup, UDP...

    Provided By Jamia Millia Islamia

  • White Papers // Dec 2012

    Performance Evaluation of Energy Traffic in Ipv6 Networks

    In this paper, the authors present a study of energy traffic based simulative and analytical methods in IPv6 networks. This research examine to find out which MANET routing protocol performs better in the case of TCP/IP (Application and Physical layer) under congested IPv6 networks. They investigates & undertakes simulation based...

    Provided By Jamia Millia Islamia

  • White Papers // Mar 2013

    Cloud Database Management System Architecture

    One of the major challenges for the IT companies today is how to manage large growing volumes of data and how to produce a quality driven software product ensuring optimal utilization of resources with minimum cost. The database management system is a software system i.e. a set of programs that...

    Provided By Jamia Millia Islamia

  • White Papers // Oct 2010

    Smart Cards: The Future Gate

    Smart Cards are one of the latest applications of Information Technology whose use is growing with each passing day. Like computers today, it is presumed that smart cards, which in fact contain tiny computers, will be used extensively in future for a variety of purposes. In Europe, US and many...

    Provided By Jamia Millia Islamia

  • White Papers // Jul 2010

    Design Network Intrusion Detection System Using Hybrid Fuzzy-Neural Network

    As networks grow both in importance and size, there is an increasing need for effective security monitors such as Network Intrusion Detection System to prevent such illicit accesses. Intrusion Detection Systems technology is an effective approach in dealing with the problems of network security. In this paper, the authors present...

    Provided By Jamia Millia Islamia

  • White Papers // Feb 2011

    A Review and Comparison of Quality of Service Routing in Wireless Ad Hoc Networks

    Quality of Service (QoS) guarantees must be supported in a network that intends to carry real time and multimedia traffic. IETF RFC 2386 defines QoS as a set of service requirements to be met by the network while transporting a packet stream from source to the destination. The dynamic network...

    Provided By Jamia Millia Islamia

  • White Papers // Sep 2009

    Electronic Authority Variation

    The problem of authorization was raised in 1990 by Fischer for he confirmation of the originality of source. Russell in 1994 described the problem in detail and suggested various options available to the receiver. He suggested some basic principles of authorization at source like auditing by receiver, trusted third party...

    Provided By Jamia Millia Islamia

  • White Papers // May 2008

    Virtual Password: Virtual Environment Based User Authentication

    Computer and communication systems depend largely on passwords to identify and authenticate users. Typically, passwords are strings of characters and digits. Alphanumeric passwords are convoluted to remember for users because a safe password should be long and arbitrary, however users pick short, simple, and insecure passwords. Image passwords have been...

    Provided By Jamia Millia Islamia

  • White Papers // Feb 2010

    An Architecture Model of Mobile Ad Hoc Network and Its Performance in Disaster Area Architecture

    A mobile ad hoc network is a set of mobile nodes connected and communicating with each other without any centralized computing and physical infrastructure. Due to the lack of physical infrastructure, unpredictable resources centralized computing, mobility of the nodes and highly dynamic topology, the QoS provisioning is a challenging task...

    Provided By Jamia Millia Islamia

  • White Papers // Sep 2011

    A Comprehensive Study of CRM Through Data Mining Techniques

    In today's competitive scenario in corporate world, "Customer Retention" strategy in Customer Relationship Management (CRM) is an increasingly pressed issue. Data mining techniques play a vital role in better CRM. This paper attempts to bring a new perspective by focusing the issue of data mining applications, opportunities and challenges in...

    Provided By Jamia Millia Islamia

  • White Papers // Aug 2010

    Application Of Data Mining In Bioinformatics

    This paper highlights some of the basic concepts of bioinformatics and data mining. The major research areas of bioinformatics are highlighted. The application of data mining in the domain of bioinformatics is explained. It also highlights some of the current challenges and opportunities of data mining in bioinformatics. In recent...

    Provided By Jamia Millia Islamia