Jaypee Institute of Information Technology

Displaying 1-6 of 6 results

  • White Papers // May 2012

    Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks

    The purpose of this paper is to survey the key management protocols for wired and wireless networks and study their security aspects in terms of key generation, agreement and distribution. The central research challenge is exhaustive survey of secure and efficient key management protocols. In this paper, it is shown...

    Provided By Jaypee Institute of Information Technology

  • White Papers // Jul 2011

    Mobility Based Proactive and Reactive Routing Algorithm in Mobile Ad Hoc Networks (MANETs)

    A Mobile Ad hoc NETwork (MANET) is a selfconfigured, infrastructure less network. In MANETs wireless mobile nodes form a dynamic temporary network Due to mobility of nodes routing is a very critical issue in MANETs. Finding and selecting an optimal and reliable path that can exist as long as possible...

    Provided By Jaypee Institute of Information Technology

  • White Papers // Feb 2011

    Relational Algebra Interpreter in Context of Query Languages

    Relational database systems have succeeded commercially because of their openness and sturdy theoretical groundwork. The contribution of this title "Relational Algebra Interpreter in context of query languages" is presentation of new implementation in such a way so that queries written in relational algebra can be compiled into SQL and executed...

    Provided By Jaypee Institute of Information Technology

  • White Papers // Jan 2011

    Regression Testing in the Presence of Non-Code Changes

    Regression testing is an important activity performed to validate modified software, and one of its key tasks is Regression Test Selection (RTS) - selecting a subset of existing test cases to run on the modified software. Most existing RTS techniques focus on changes made to code components and completely ignore...

    Provided By Jaypee Institute of Information Technology

  • White Papers // Aug 2010

    Face Recognition Using Eigen Faces and Artificial Neural Network

    Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The paper presents a methodology for face recognition based on information theory approach of coding and decoding the face image. Proposed methodology is connection of two stages - Feature extraction using principle component...

    Provided By Jaypee Institute of Information Technology

  • White Papers // Feb 2010

    A Secure Hash Function MD-192 With Modified Message Expansion

    Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new...

    Provided By Jaypee Institute of Information Technology

  • White Papers // Aug 2010

    Face Recognition Using Eigen Faces and Artificial Neural Network

    Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The paper presents a methodology for face recognition based on information theory approach of coding and decoding the face image. Proposed methodology is connection of two stages - Feature extraction using principle component...

    Provided By Jaypee Institute of Information Technology

  • White Papers // Feb 2011

    Relational Algebra Interpreter in Context of Query Languages

    Relational database systems have succeeded commercially because of their openness and sturdy theoretical groundwork. The contribution of this title "Relational Algebra Interpreter in context of query languages" is presentation of new implementation in such a way so that queries written in relational algebra can be compiled into SQL and executed...

    Provided By Jaypee Institute of Information Technology

  • White Papers // Jul 2011

    Mobility Based Proactive and Reactive Routing Algorithm in Mobile Ad Hoc Networks (MANETs)

    A Mobile Ad hoc NETwork (MANET) is a selfconfigured, infrastructure less network. In MANETs wireless mobile nodes form a dynamic temporary network Due to mobility of nodes routing is a very critical issue in MANETs. Finding and selecting an optimal and reliable path that can exist as long as possible...

    Provided By Jaypee Institute of Information Technology

  • White Papers // Jan 2011

    Regression Testing in the Presence of Non-Code Changes

    Regression testing is an important activity performed to validate modified software, and one of its key tasks is Regression Test Selection (RTS) - selecting a subset of existing test cases to run on the modified software. Most existing RTS techniques focus on changes made to code components and completely ignore...

    Provided By Jaypee Institute of Information Technology

  • White Papers // May 2012

    Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks

    The purpose of this paper is to survey the key management protocols for wired and wireless networks and study their security aspects in terms of key generation, agreement and distribution. The central research challenge is exhaustive survey of secure and efficient key management protocols. In this paper, it is shown...

    Provided By Jaypee Institute of Information Technology

  • White Papers // Feb 2010

    A Secure Hash Function MD-192 With Modified Message Expansion

    Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new...

    Provided By Jaypee Institute of Information Technology