K L University

Displaying 1-27 of 27 results

  • White Papers // Oct 2013

    BSC: A Novel Scheme for Providing Security using Biometric Smart Card

    Technology advances day by day and the new things are being developed. There are many new technologies being introduced and developed in any discipline. Data Security plays a vital role and Biometric security systems is one of the new trends to be developed, which has its advantages for controlling access,...

    Provided By K L University

  • White Papers // Jun 2013

    An Effective Comprehensive Approach of Intrusion Detection System for AMI

    The security of Advanced Metering Infrastructures (AMIs) is of critical importance. The use of secure protocols and the enforcement of strong security properties have the potential to prevent vulnerabilities from being exploited and from having costly consequences. However, as learned from experiences in IT security, prevention is one aspect of...

    Provided By K L University

  • White Papers // May 2013

    Optimum Directivity Patterns of Concentric Ring Arrays with Dipole Radiators for Wireless Communications

    In the literature survey concentric ring arrays using isotropic radiators are reported. Sufficient data is not available to optimization of the first side lobe level, null to null beam width and directivity. In this paper, the author is proposed the problem of designing concentric ring arrays with practical radiating element....

    Provided By K L University

  • White Papers // May 2013

    Learning Structure in Cloud (Implementing SaaS)

    To re manipulative the educational system to meet industrial needs better introduce cloud computing concepts in education organization. Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while escalating plasticity and scalability for computer processes. Research and Development (R&D) head...

    Provided By K L University

  • White Papers // May 2013

    Data Slice: An Efficient Scheme For Preserve And Publish Data

    Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing. Recent work has shown that generalization loses considerable amount of information, especially for high dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do...

    Provided By K L University

  • White Papers // May 2013

    E-Recruitment Portal Aided By Cloud Computing

    Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Ever since cloud computing came into existence, it has progressively become popular and emerged to be an indispensable technology with an unprecedented demand in the contemporary IT field. This paper discusses about...

    Provided By K L University

  • White Papers // Apr 2013

    HADOOP the Ultimate Solution for BIG DATA Problems

    The World of Internet started with data. In the 1st generation web, data was the foremost aim and it is used for display in the webpage of a user. In 2nd generation data with colors are main attraction. The demand for analyzing the data has augmented drastically. Big data is...

    Provided By K L University

  • White Papers // Mar 2013

    Data Leakage Detection Using Encrypted Fake Objects

    Data leakage is a budding security threat to organizations, particularly when data leakage is carried out by trusted agents. In this paper, the authors present unobtrusive techniques for detecting data leakage and assessing the "Guilt" of agents. Water marking is the long-established technique used for data leakage detection which involves...

    Provided By K L University

  • White Papers // Jun 2012

    Auto Regressive Ionospheric Prediction Model for GPS Applications

    Global Positioning System (GPS) is a satellite based navigation system. The GPS system positional accuracy is limited by ionospheric error. Ionospheric delay is a function of Total Electron Content (TEC). Prediction of ionospheric delays is very important for high precision application such as civil aircraft landing and missile guidance application....

    Provided By K L University

  • White Papers // Jun 2012

    PS2-VGA Peripheral Based Character Display Using FPGA

    The aim of this paper is to print characters by providing the interfaces to connect a VGA port for graphical output and a PS/2 port for keyboard input. This system is then to be synthesized on an FPGA board, and should be capable of running a program to display characters...

    Provided By K L University

  • White Papers // Jun 2012

    An Efficient Implementation of E-MULET with Unicode Standard

    The science of cryptology is a boon to the Internet era. In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, security matters the most. Ever since Ceasar's time a variety of encryption techniques have used but the cryptanalysis has simultaneously cracked these...

    Provided By K L University

  • White Papers // May 2012

    Pilgrims Tracking and Identification Using RFID Technology

    Now-a-days there were so many problems regarding the crowd control and security issues in the holy areas. Especially during pilgrimage, the pilgrimage authority is facing so many problems regarding crowd control, security issues, and identification of the pilgrims and the tracking of the pilgrims. India is a multi-religious country, in...

    Provided By K L University

  • White Papers // May 2012

    Embedded Web Server for Web-Based Network Element Management Using Arm Technology

    The emergence of the World Wide Web (WWW) is likely to have a lasting impact on organizational IT in the years to come. The popularity of the WWW is due in no small part to the simple and adaptable user interface. It provides and its capability to integrate many disparate...

    Provided By K L University

  • White Papers // May 2012

    Optimal Implementation Methods for Audio Crosstalk Cancellation on DSP Processors

    In general, frequency domain based techniques are preferred to time domain techniques for the implementation of audio crosstalk cancellation due to time domain techniques suffer from more computations. In this paper, the computational difficulty of real FFT on DSP processors is analyzed and to overcome the disadvantages, two optimization methods...

    Provided By K L University

  • White Papers // Apr 2012

    Authentication Techniques for Engendering Session Passwords with Colors and Text

    A highly severe menace to any computing device is the impersonation of an authenticate user. The most frequent computer authentication scheme is to use alphanumerical usernames and passwords. But the textual passwords are prone to dictionary attacks, eves dropping, shoulder surfing and social engineering. As such, graphical passwords have been...

    Provided By K L University

  • White Papers // Apr 2012

    A Real Time Implementation of Cryptographic System to Enhance Security Over Systems

    This is an endeavor to implement a real time cryptographic system to enhance security over the systems. There are about various encrypting techniques available for secure transmission of data. But, the authors use here the standard algorithms namely RSA, RABIN, TDES and PC-1 working on text messages. The transmission of...

    Provided By K L University

  • White Papers // Mar 2012

    Investigation of Dielectric Material Changes on the Performance of Multi Band Inverted Triangular Serrated Aperture Patch Antenna

    This paper quantizes the gain, matching bandwidth variations and other output parameters investigation on the performance of the special type of inverted triangular serrated aperture patch antenna. The current antenna is studied with different substrates for the radiating patch of fixed dimensions of 22 mm X 16 mm. The effects...

    Provided By K L University

  • White Papers // Mar 2012

    Novel Approach for the Propagation and Detection of Active Worm in a Virtual System

    Active worms are one of the major security threats to the Internet. This is because of their ability to propagate in an automated fashion as they continuously compromise computers on the Internet. Camouflaging Worm (C-Worm in short) is one of the active worms. The C-Worm is different from traditional worms...

    Provided By K L University

  • White Papers // Jan 2012

    Data Transferring Mechanisms for Multipath Routing Using Concentrated Dissimilate Algorithm in Wireless Networks

    Wireless networks usually consist of sensors perceiving data and sinks gather the data. However, it is complex for such approaches about mobility to develop the offered multipath routing algorithms and also for the mobile sinks to function as gateways to join with infrastructure. To look up the shortcomings, Unreliability at...

    Provided By K L University

  • White Papers // Jan 2012

    Efficacious Distributed Arbitrary Node Duplication Attacks in Wireless Networks

    Due to the off-the-shelf hardware components in unshielded network, nodes leave them vulnerable to compromise with little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network it is generally assumed that an adversary can capture and compromise a...

    Provided By K L University

  • White Papers // Jan 2012

    Capacity (Cut-Set) Bounds for Multi-Hop Relay Networks in Erasure Channels

    This paper deals with the finding of capacity bounds for multi-hop relay networks in erasure channels. As importance of complex networks of nodes and relays and significance of erasure channels are well identified, this paper gives the way of finding upper and lower capacity bounds by using mutual information concept...

    Provided By K L University

  • White Papers // Dec 2011

    Metaphor: Elucidate the System Architecture in XP

    System Metaphor is one of the core practices of XP as proposed by Kent Beck. The Metaphor is intended to contribute to the XP value of communication. Metaphor can be described as a means of communication among team members and clients. Unfortunately, Metaphor is poorly understood and this practice is...

    Provided By K L University

  • White Papers // Nov 2011

    Survey on Extreme Programming in Software Engineering

    EXtreme Programming (XP) is an agile software development methodology composed of several practices that purportedly yield high quality and high customer satisfaction. In this paper, the authors discuss how the XP helps in the projects, and the process how it is been done, and its practices and their advantages, and...

    Provided By K L University

  • White Papers // Sep 2011

    Intrusion Detection System Using Genetic Algorithm

    This paper shows how network connection information can be modeled as chromosomes. The objective of the system is to create a new set of rules during run time. So the intruder cannot be able to attack the system with virus. The Intrusion Detection System in Networking Using Genetic Algorithm (IDS)...

    Provided By K L University

  • White Papers // Aug 2011

    Analysis of Finite State Machine and Classical Iterative Cluster Labeling for 3D Images on Mobile Computing Strategies

    The paper presents an efficient Finite State Machine on Hoshen-Kopelman (HK) using the nearest eight neighborhood rule. This approach uses the classical iterative Cluster Labeling method for the digital 3-D images. The model is going to propose the system where classical iterative can be implemented in passes and concentrates on...

    Provided By K L University

  • White Papers // Mar 2011

    A Contemporary Approach for ECG Signal Compression Using Wavelet Transforms

    Signal compression is an important problem encountered in many applications. Various techniques have been proposed over the years for addressing the problem. In this project transform based signal compression is proposed. This method is used to exploit the redundancy in the signal. This paper uses Wavelet Transform to compress the...

    Provided By K L University

  • White Papers // Dec 2009

    A Novel Fingerprints Identification System Based on the Edge Detection

    This paper describes an efficient fingerprints identification technique which uses a gray level watershed method to find out the ridges present on a particular fingerprint image. Fingerprint system is an important biometric technique for personal identification. The metric used for performance of identification techniques are directly scanned fingerprints or inked...

    Provided By K L University

  • White Papers // Jun 2012

    Auto Regressive Ionospheric Prediction Model for GPS Applications

    Global Positioning System (GPS) is a satellite based navigation system. The GPS system positional accuracy is limited by ionospheric error. Ionospheric delay is a function of Total Electron Content (TEC). Prediction of ionospheric delays is very important for high precision application such as civil aircraft landing and missile guidance application....

    Provided By K L University

  • White Papers // Jun 2012

    PS2-VGA Peripheral Based Character Display Using FPGA

    The aim of this paper is to print characters by providing the interfaces to connect a VGA port for graphical output and a PS/2 port for keyboard input. This system is then to be synthesized on an FPGA board, and should be capable of running a program to display characters...

    Provided By K L University

  • White Papers // Mar 2013

    Data Leakage Detection Using Encrypted Fake Objects

    Data leakage is a budding security threat to organizations, particularly when data leakage is carried out by trusted agents. In this paper, the authors present unobtrusive techniques for detecting data leakage and assessing the "Guilt" of agents. Water marking is the long-established technique used for data leakage detection which involves...

    Provided By K L University

  • White Papers // May 2013

    Optimum Directivity Patterns of Concentric Ring Arrays with Dipole Radiators for Wireless Communications

    In the literature survey concentric ring arrays using isotropic radiators are reported. Sufficient data is not available to optimization of the first side lobe level, null to null beam width and directivity. In this paper, the author is proposed the problem of designing concentric ring arrays with practical radiating element....

    Provided By K L University

  • White Papers // Dec 2009

    A Novel Fingerprints Identification System Based on the Edge Detection

    This paper describes an efficient fingerprints identification technique which uses a gray level watershed method to find out the ridges present on a particular fingerprint image. Fingerprint system is an important biometric technique for personal identification. The metric used for performance of identification techniques are directly scanned fingerprints or inked...

    Provided By K L University

  • White Papers // Mar 2011

    A Contemporary Approach for ECG Signal Compression Using Wavelet Transforms

    Signal compression is an important problem encountered in many applications. Various techniques have been proposed over the years for addressing the problem. In this project transform based signal compression is proposed. This method is used to exploit the redundancy in the signal. This paper uses Wavelet Transform to compress the...

    Provided By K L University

  • White Papers // Aug 2011

    Analysis of Finite State Machine and Classical Iterative Cluster Labeling for 3D Images on Mobile Computing Strategies

    The paper presents an efficient Finite State Machine on Hoshen-Kopelman (HK) using the nearest eight neighborhood rule. This approach uses the classical iterative Cluster Labeling method for the digital 3-D images. The model is going to propose the system where classical iterative can be implemented in passes and concentrates on...

    Provided By K L University

  • White Papers // Jan 2012

    Capacity (Cut-Set) Bounds for Multi-Hop Relay Networks in Erasure Channels

    This paper deals with the finding of capacity bounds for multi-hop relay networks in erasure channels. As importance of complex networks of nodes and relays and significance of erasure channels are well identified, this paper gives the way of finding upper and lower capacity bounds by using mutual information concept...

    Provided By K L University

  • White Papers // Nov 2011

    Survey on Extreme Programming in Software Engineering

    EXtreme Programming (XP) is an agile software development methodology composed of several practices that purportedly yield high quality and high customer satisfaction. In this paper, the authors discuss how the XP helps in the projects, and the process how it is been done, and its practices and their advantages, and...

    Provided By K L University

  • White Papers // Dec 2011

    Metaphor: Elucidate the System Architecture in XP

    System Metaphor is one of the core practices of XP as proposed by Kent Beck. The Metaphor is intended to contribute to the XP value of communication. Metaphor can be described as a means of communication among team members and clients. Unfortunately, Metaphor is poorly understood and this practice is...

    Provided By K L University

  • White Papers // Jan 2012

    Data Transferring Mechanisms for Multipath Routing Using Concentrated Dissimilate Algorithm in Wireless Networks

    Wireless networks usually consist of sensors perceiving data and sinks gather the data. However, it is complex for such approaches about mobility to develop the offered multipath routing algorithms and also for the mobile sinks to function as gateways to join with infrastructure. To look up the shortcomings, Unreliability at...

    Provided By K L University

  • White Papers // Jan 2012

    Efficacious Distributed Arbitrary Node Duplication Attacks in Wireless Networks

    Due to the off-the-shelf hardware components in unshielded network, nodes leave them vulnerable to compromise with little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network it is generally assumed that an adversary can capture and compromise a...

    Provided By K L University

  • White Papers // Sep 2011

    Intrusion Detection System Using Genetic Algorithm

    This paper shows how network connection information can be modeled as chromosomes. The objective of the system is to create a new set of rules during run time. So the intruder cannot be able to attack the system with virus. The Intrusion Detection System in Networking Using Genetic Algorithm (IDS)...

    Provided By K L University

  • White Papers // Mar 2012

    Investigation of Dielectric Material Changes on the Performance of Multi Band Inverted Triangular Serrated Aperture Patch Antenna

    This paper quantizes the gain, matching bandwidth variations and other output parameters investigation on the performance of the special type of inverted triangular serrated aperture patch antenna. The current antenna is studied with different substrates for the radiating patch of fixed dimensions of 22 mm X 16 mm. The effects...

    Provided By K L University

  • White Papers // May 2012

    Optimal Implementation Methods for Audio Crosstalk Cancellation on DSP Processors

    In general, frequency domain based techniques are preferred to time domain techniques for the implementation of audio crosstalk cancellation due to time domain techniques suffer from more computations. In this paper, the computational difficulty of real FFT on DSP processors is analyzed and to overcome the disadvantages, two optimization methods...

    Provided By K L University

  • White Papers // May 2012

    Embedded Web Server for Web-Based Network Element Management Using Arm Technology

    The emergence of the World Wide Web (WWW) is likely to have a lasting impact on organizational IT in the years to come. The popularity of the WWW is due in no small part to the simple and adaptable user interface. It provides and its capability to integrate many disparate...

    Provided By K L University

  • White Papers // May 2012

    Pilgrims Tracking and Identification Using RFID Technology

    Now-a-days there were so many problems regarding the crowd control and security issues in the holy areas. Especially during pilgrimage, the pilgrimage authority is facing so many problems regarding crowd control, security issues, and identification of the pilgrims and the tracking of the pilgrims. India is a multi-religious country, in...

    Provided By K L University

  • White Papers // Apr 2012

    A Real Time Implementation of Cryptographic System to Enhance Security Over Systems

    This is an endeavor to implement a real time cryptographic system to enhance security over the systems. There are about various encrypting techniques available for secure transmission of data. But, the authors use here the standard algorithms namely RSA, RABIN, TDES and PC-1 working on text messages. The transmission of...

    Provided By K L University

  • White Papers // Mar 2012

    Novel Approach for the Propagation and Detection of Active Worm in a Virtual System

    Active worms are one of the major security threats to the Internet. This is because of their ability to propagate in an automated fashion as they continuously compromise computers on the Internet. Camouflaging Worm (C-Worm in short) is one of the active worms. The C-Worm is different from traditional worms...

    Provided By K L University

  • White Papers // Jun 2012

    An Efficient Implementation of E-MULET with Unicode Standard

    The science of cryptology is a boon to the Internet era. In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, security matters the most. Ever since Ceasar's time a variety of encryption techniques have used but the cryptanalysis has simultaneously cracked these...

    Provided By K L University

  • White Papers // Apr 2012

    Authentication Techniques for Engendering Session Passwords with Colors and Text

    A highly severe menace to any computing device is the impersonation of an authenticate user. The most frequent computer authentication scheme is to use alphanumerical usernames and passwords. But the textual passwords are prone to dictionary attacks, eves dropping, shoulder surfing and social engineering. As such, graphical passwords have been...

    Provided By K L University

  • White Papers // May 2013

    Learning Structure in Cloud (Implementing SaaS)

    To re manipulative the educational system to meet industrial needs better introduce cloud computing concepts in education organization. Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while escalating plasticity and scalability for computer processes. Research and Development (R&D) head...

    Provided By K L University

  • White Papers // May 2013

    Data Slice: An Efficient Scheme For Preserve And Publish Data

    Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing. Recent work has shown that generalization loses considerable amount of information, especially for high dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do...

    Provided By K L University

  • White Papers // May 2013

    E-Recruitment Portal Aided By Cloud Computing

    Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Ever since cloud computing came into existence, it has progressively become popular and emerged to be an indispensable technology with an unprecedented demand in the contemporary IT field. This paper discusses about...

    Provided By K L University

  • White Papers // Apr 2013

    HADOOP the Ultimate Solution for BIG DATA Problems

    The World of Internet started with data. In the 1st generation web, data was the foremost aim and it is used for display in the webpage of a user. In 2nd generation data with colors are main attraction. The demand for analyzing the data has augmented drastically. Big data is...

    Provided By K L University

  • White Papers // Jun 2013

    An Effective Comprehensive Approach of Intrusion Detection System for AMI

    The security of Advanced Metering Infrastructures (AMIs) is of critical importance. The use of secure protocols and the enforcement of strong security properties have the potential to prevent vulnerabilities from being exploited and from having costly consequences. However, as learned from experiences in IT security, prevention is one aspect of...

    Provided By K L University

  • White Papers // Oct 2013

    BSC: A Novel Scheme for Providing Security using Biometric Smart Card

    Technology advances day by day and the new things are being developed. There are many new technologies being introduced and developed in any discipline. Data Security plays a vital role and Biometric security systems is one of the new trends to be developed, which has its advantages for controlling access,...

    Provided By K L University