Kurukshetra University

Displaying 1-40 of 465 results

  • White Papers // Jan 2014

    Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach

    Today every security expert worries about the security problems and tries to find out the secure solution. Because it is a challenging aspect of communications today which touches many spheres including memory space, processing speed, code development and maintenance issues? The problem, exaggerated when it comes to dealing with lightweight...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Information Security in Grid Computing

    The spread of worldwide networks and the technological trend arc feeding the progress of network and distributed computing in different directions (grid, cloud, autonomic, ubiquitous, pervasive, volunteer, etc). With regard to information, great amount of data widely (geographically) spread over the network require adequate management, to ensure availability for authorized...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Risk Management in Information Security System

    In information security system there are always some cases which come up with some risks. To handle the risks there must be risk management in information security system. An appropriate risk management process is an extremely critical component of a successful information security program. The main objective of an organization's...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Analysis of ANSN Attack on OLSR Based MANETs

    A MANET is a multi-hop ad-hoc wireless network where nodes can move arbitrary in the topology. The network has no given infrastructure and can be set up quickly in any environment. The Optimized Link State Routing (OLSR) protocol is a route management protocols for such mobile ad hoc networks. This...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Securing E-Commerce

    E-commerce provides an important medium for doing business on global based. E-commerce is the electronic automation of business process. E-commerce has become a critical component in any business competitive strategy. Organizations are gaining opportunities and benefits such as global presence and improved competitiveness from web-based e-commerce. In this paper, the...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Big Data Analytics Using Hadoop Components Like Pig and Hive

    In big data world, Hadoop Distributed File System (HDFS) is very popular. It provides a framework for storing data in a distributed environment and also has set of tools to retrieve and process. These data set using map-reduce concept. In this paper, a thorough research has been carried to discuss...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Improving the Performance of IDS Using Genetic Algorithm

    Intrusion Detection System (IDS) aim to detect computer attacks and/or computer misuse, and to alert the proper individuals upon detection. The growing number of Internet threats increasingly inspires the need of applying a defense in depth concepts to protect worldwide computer system from being intruded for grabbing information. The authors...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Wavelet Based Fingerprint Authentication System

    Fingerprint biometric is very useful in application which requires identity to be claimed. It plays a very important role in forensic applications like criminal investigations, terrorist identification and National security issues. Wavelet analysis and its applications to fingerprint verification is one of the fast growing areas for research in recent...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    A Novel Bayesian Approach Against Phishing Attacks Based on Textual and Visual Content

    Phishing attacks are a major concern for preserving internet users' privacy. By combining social engineering and website forgery techniques, phishing attacks spoof the identity of a company (typically a bank or an auction site), to trick Internet users to reveal confidential information. The perfect phishing attack creates a website very...

    Provided By Kurukshetra University

  • White Papers // Jul 2013

    Potential Covert Channel in Distributed Database

    In today's environment. There is need of distributed database in communication. This paper provides a faster access and remove delays throughout the system .the paper will examine the features of distributed database architecture. The learning of distributed database management system will lead them for successful design. The design will improve...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Mining of Web Server Logs Using Extended Apriori Algorithm

    Association rule mining is one of the most significant techniques in the field of data mining. It is very useful in discovering relationships hidden in large transaction datasets such as frequent patterns, associations etc. One of the popular and important algorithms in this category is Apriori algorithm which finds frequent...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Highly Available XenApp Cloud

    In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced application and desktop computing costs and provided greater IT and user flexibility compared to traditional application and desktop management models. Among the various SaaS technologies, XenApp that allow numerous end users to connect to their...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    A Survey on Security Challenges of Cloud Computing

    Cloud computing has revolutionized the industry because of its benefits like on-demand services, scalability, elasticity, minimization of capital expenditure, etc. It is not a new concept but a fusion of distributed computing, grid computing, parallel computing and so on. It attracts the small enterprises as it eliminates the requirements for...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Acceptability of Fingerprint as Biometric Traits

    Biometric recognition or, simply, biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics, it is possible to confirm or establish an individual's identity based on \"Who the user is,\" rather than by \"What the users' possesses\" (e.g., an ID card). Among...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Performance of Flow Based Intrusion Detection System Over Traditional Intrusion Detection in High Speed Network

    The vast growth of 1-10Gbps network technology in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services. As users, the authors depend on the Internet in the people daily life for simple tasks such as checking emails, but also for managing private and financial information....

    Provided By Kurukshetra University

  • White Papers // May 2013

    Multi Packed Security Addressing Challenges in Cloud Computing

    Cloud computing efficiency, flexibility, greater agility, less capital expenditure is to overcome geographic limitations to compete in a global market. Most of the companies are shifting to Cloud based services, but at the same time they are concerned about the security risks. Hopefully after the definitions and illustrations of Cloud...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Cloud Computing: Performance Implications and Challenges

    Cloud computing is a new paradigm in the field of distributed computing. The objective of cloud computing is to provide various computing resources over the internet in the form of service to number of cloud consumers. Cloud provides the computing environment to organization in a cost effective manner and give...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Information Management Security in Multiple Networks for Development of Business and E-Commerce

    In this paper, the authors will discuss about Internet which has become the information super highway. The evolving Internet and its related technologies have allowed businesses to communicate in new and strategic ways with various types of people and organizations. Over the years, there have been additions of feature upon...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Enhanced Inter-Cloud System Architecture

    Cloud computing gains tremendous importance in the recent past, understanding low-level implications of the cloud infrastructure becomes necessary provided with all the infrastructure facilities that a cloud user needs. But as the no of organizations adopting cloud system increases, the services providers need to ensure availability of various services, infrastructure...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Spoof Attack Detection in Fingerprint Authentication Using Hybrid Fusion

    In the modern era, with the growing need of biometric technologies, spoof attacks are becoming a serious concern. A number of solutions have been proposed to detect the use of fake fingerprints. This paper takes advantage of skin elements in fingerprints, namely: minutiae points and ridge bifurcations to investigate spoof...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Detection and Prevention of Wormhole Attack in MANET: A Review

    Ad hoc networks are vulnerable due to their structure less property. A Mobile Ad-Hoc NETwork (MANET) is an infrastructure less self-configured collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. Security has become a primary...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Survey of Network Intrusion Detection Using K-Mean Algorithm

    Intrusion Detection System (IDS) due to novel attack method or upgraded. Because many current IDSs are constructing by point instruction of professional knowledge, changes to IDSs are costly and slow. Intrusion detection techniques can be categorizes into irregularity detection and mistreats detection. Anomaly detection systems, for example, IDES Intrusion Detection...

    Provided By Kurukshetra University

  • White Papers // Feb 2013

    Wormhole Attack Detection and Prevention Technique in Mobile Ad Hoc Networks: A Review

    MANET (Mobile Ad-hoc NETwork) refers to a multi-hop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time, without using any kind of fixed wired infrastructure. MANET'S are actually self organizing and adaptive networks that can be formed and deformed...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    A Comprehensive Study of Latest Security Models for MANETs: Covering Intrusion Detection and Denial of Service Attacks

    Mobile Ad-hoc NETworks (MANETs) are self organizing devices with no infrastructure control. Concept of security is major concern because of changing topology and no centralized control. Since MANET's are prone to many kind of vulnerabilities it is not necessary that any one kind of attack may be active at a...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    Wireless Sensor Networks: Architecture, Protocols

    Wireless Sensor Networks (WSN) is an interconnection of a large number of nodes deployed for monitoring the system by means of measurement of its parameters. Recent research in wireless sensor networks has led to various new protocols which are particularly designed for sensor networks. To design these networks, the factors...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    Analysis of Security Criteria for Partner Network

    The authors are allowing people outside their organization access to proprietary data and applications - over the internet. The objectives of this research are to form a secured infrastructure between partner network and internet. In today's competitive business landscape, organizations are compelled to share data, files, and applications with external...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    The Study of Multimedia Data Model Technology Based on Cloud Computing

    Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. Cloud computing is an emerging computing paradigm in which resources...

    Provided By Kurukshetra University

  • White Papers // Nov 2012

    A Novel Parallel Domain Focused Crawler for Reduction in Load on the Network

    World Wide Web is a collection of hyperlinked documents available in HTML format. Due to the growing and dynamic nature of the web, it has become a challenge to traverse all the URLs available in the web documents. The list of URL is very huge and so it is difficult...

    Provided By Kurukshetra University

  • White Papers // Oct 2012

    Effect of Malicious Nodes on AODV in Mobile Ad Hoc Networks

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. As mobile ad hoc network applications are deployed, Routing is one of the central requirements. Due to non central control, security is the major issue in...

    Provided By Kurukshetra University

  • White Papers // Aug 2012

    Throughput and Vulnerability Analysis of an IEEE 802.11b Wireless LAN

    Recent years have shown an unprecedented growth in the use of wireless LANs. However, unlike the relative simplicity of wired Ethernet deployments, IEEE 802.11-based wireless LANs uses Radio-Frequency (RF) data which is vulnerable to various attacks. This paper analyzes the IEEE 802.11b wireless LANs to determine variations in throughput so...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Cloud Computing Security and Privacy Concerns

    In last few years, cloud computing concept has groomed a lot which result that it has become the fastest growing business for the IT industry. Because it has became a promising business concept with win-win situation for the clients to shift. Now, recession-hit companies have acknowledged that simply by shifting...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    GLAAR: Geographic Location Aware Adaptive Routing in Mobile Ad Hoc Networks (MANETs)

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring, wireless, low range/power, mobile infrastructure less network where each participating node itself manages the communication over the network. Node Location information may reduce the overall communication overhead for packet forwarding in Mobile Ad-Hoc NETworks (MANETs). This paper proposes a novel Geographic Location...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Study on a Routing Protocol SPIN in WSN

    The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a Wireless Sensor Network (WSN). Sensor networks are recently rapidly growing research area in wireless communications and distributed...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Intelligent Clutter Rejection for Vehicular RADAR

    Externalities of road traffic include congestion, accidents, conception of scare space. One of the measures to control these externalities are by Intelligent Transportation System (ITS). Clutter is the major problem for outdoor Radar operations and there is no standard measure to reject it. Moving Target Indicator (MTI) is a proven...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Development of MIMO - WIMAX Based Communication System for Transportation

    The geographical coverage area of communication is increased for the efficiency of the ITS (Intelligent Transportation System) customers. The maximum extent of coverage area provides the beneficiary of satisfying the customers with the desired needs of the customers, as it keeps changing rapidly. Convergence of the noble technologies WIMAX and...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Face Recognition Techniques: Classification and Comparisons

    Human brains can remember and recognize a vast array of faces, getting a computer to do the same is difficult but in modern world there would be many uses of such systems. Face reorganization has been a fast growing, challenging and interesting area in real time application. It can be...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Novel Reconfiguration Technique for High Capacity WDM Network

    Optical Wavelength Division Multiplexing (WDM) networks are high capacity telecommunications networks based on optical technologies and components that provide routing and restoration at wavelength level. High Capacity Optical WDM Networks are reconfigured to meet the dynamic traffic demand of the various applications. However, the demand varies with time and infrastructural...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Empirical Analysis of Fault Predication Techniques for Improving Software Process Control

    In this paper, the authors present the application of the neural network for the identification of Reusable Software modules in Oriented Software System. Metrics are used for the structural analysis of the different procedures. The values of Metrics will become the input dataset for the neural network systems and Fuzzy...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Analysis of Resilient Back-Propagation for Improving Software Process Control

    In this paper, the authors present the application of the neural network for the identification of Reusable Software modules in Oriented Software System. Metrics are used for the structural analysis of the different procedures. The values of Metrics will become the input dataset for the neural network systems. Training Algorithm...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    How Cloud Computing Will Affect College Libraries

    Past few years concept of cloud computing libraries become very popular. Even countries which are affected by recession started recognizing that by computer clouding fast access to data will enhance there productivity. Data and information about libraries can be placed in the cloud. In this paper, the authors will study...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Web Services: Composition and Integration for Easy Use

    Web services have become essential tools for efficient functioning of today's corporate sector. Web services are designed to achieve seamless operation that enables sharing of information amongst isolated computer systems. Interoperability and composition of web services is an issue. There are set of standardized rules and specifications to makes them...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Web Crawler - An Overview

    A Web crawler is a computer program that browses the World Wide Web in a methodical, automated manner or in an orderly fashion. Web crawling is an important method for collecting data on, and keeping up with, the rapidly expanding Internet. A vast number of web pages are continually being...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Comaprison of Data Mining and Auditing Tools

    Auditing means the review of transaction in order to detect frauds and errors in the transactions. For the process of auditing auditor has to analyze a large volume of data that is very difficult to perform manual so the authors apply some computer based auditing tools. In this paper, they...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Second Generation Curvelet Shrinkage Model Based Image Denoising

    In this paper, a Second Generation based curvelet shrinkage is proposed for discontinuity-preserving denoising using a combination of a new second Generation curvelets with a nonlinear diffusion scheme. In order to suppress the pseudo-Gibbs and curvelet-like artifacts, the conventional shrinkage results are further processed by a projected total variation diffusion,...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Object Oriented Vs Procedural Programming in Embedded Systems

    The use of Object-Oriented Technology (OOT) has been shown to be of great value in many market sectors, but to the use of such technology within embedded systems remain a challenge. Such systems require high execution speed and have high memory constraints. Object oriented model severely conflicts with the highly...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Design and Implementation of a Dynamic CORDIC Processor

    This paper presents a Dynamic CORDIC Processor that uses variable radices for trigonometric function computation. The CORDIC algorithm is a well known hardware algorithm for computing various elementary functions. When the authors use these algorithms in real time signal processing significant reduction in processing latency is required, due to its...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    B+ Tree Based Indexing Scheme for FLOWR Queries on XML Databases

    XML is emerging as a de facto standard for information exchange over internet. To perform this task different languages are developed among them XPath and superset XQuery is popular language. XQuery is a strongly typed, functional language which supports the common processing and querying tasks. XQuery uses the label paths...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Performance Comparison of Image Compression Using Wavelets

    This paper describes how the Fractal image coding takes the long time in its computation. It is its block searching and matching which takes long time. So to overcome this, the authors use the combination of fractal and wavelet this reduces the computation time. Based on this, they proposed an...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Effective Realization of QoS , Network Scalability in Term of Network Security Using Symmetric Algorithm

    Computer networks able to support multimedia applications with diverse QoS performance requirements are evolving. To ensure that multimedia applications will be guaranteed the required QoS, Presently, there are various kinds of networks; wired and wireless that co-exists with each other. These networks have QoS characteristics that are drastically different and...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    A Survey on Improving the Web Search Ranking by User Behavior Information

    In this paper, the authors propose new methods for ordering the Web pages returned from search engines. Given a few search keywords, nowadays most search engines could retrieve more than a few thousand Web pages. The problem is how to order the retrieved Web pages and then to present the...

    Provided By Kurukshetra University

  • White Papers // Aug 2010

    Process Mining: Process Management With Data Mining

    In this paper, the authors propose new methods for ordering the Web pages returned from search engines. Given a few search keywords, nowadays most search engines could retrieve more than a few thousand Web pages. The problem is how to order the retrieved Web pages and then to present the...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    High Speed WAN- Approaches Towards Augmented Performance

    This paper focuses on Quality-of-Service (QOS) provided during sessions in a high-speed wide area network and briefly survey research in this area. Four approaches towards providing Quality of Service guarantees are described and discussed, e.g., the tightly controlled approach, the approximate approach, the bounding approach, and the observation-based approach. A...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Design, Implementation & Evaluation of Grid Environment for DV to MPEG4 Video Conversion

    Grid computing deals with large scale resource sharing and can be exploited to carry out storage and compute intensive tasks which are otherwise not practical to be executed on a single system. Video encoding is a lengthy, CPU intensive task, involving the conversion of video media from one format to...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Image Segmentation by Improved Watershed Transformation in Programming Environment MATLAB

    Image segmentation is the foundation of object recognition and computer vision. Watershed transform is usually adopted for image segmentation in the area of image processing and image analysis because it always generates closed contours for each region in the original image. The concept of watershed transform is based on a...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Photon Sources : Quantum Cryptography Challenge

    Quantum cryptography is based on the use of single photon Fock states. Unfortunately, these states are difficult to realize experimentally. Now-a-days, practical implementations rely on faint laser pulses or entangled photon pairs, where both the photon as well as the photon-pair number distribution obeys Poisson statistics. Hence, both possibilities suffer...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Proposed Hybrid Data Warehouse Architecture Based on Data Model

    Data warehousing has come a long way from its inception. In the present scenario, data warehousing is evolving into rich system which is capable of furnishing key performance metrics to top-level management, capability of analytical strength to middle-level management and corrective data back to bottom-level based on information derived from...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    New Scheme of Adaptive Zone Routing Protocol

    This paper proposed a routing protocol named adaptive Zone Routing Protocol (NSAZRP) that is more stable and has achieved better routing performance than ZRP in Mobile Ad-hoc Networks by taking into consideration that nodes are mobile with a non-uniform speed. NSAZRP allows different nodes to choose different zone radius according...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Distributed Database & SD-SQL Server Architecture

    Databases are now often huge and growing at a high rate. Large tables are then typically hash or range partitioned into segments stored at different storage sites. Current Data Base Management Systems (DBSs), e.g., SQL Server, Oracle or DB2, provide static partitioning only. The DataBase Administrator (DBA) in need to...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Design Patterns Vs Aspect Oriented Programming - A Qualitative and a Quantitative Assessment

    Design patterns offer flexible solutions to common problems in software development. Recent studies have shown that several design patterns involve crosscutting concerns. Unfortunately, Object-Oriented (OO) abstractions are often not able to modularize those crosscutting concerns, which in turn decrease the system reusability and maintainability. Hence, it is important to verifying...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Machine Learning Approach for Attack Prediction and Classification Using Supervised Learning Algorithms

    Due to the large volumes of data as well as the complex and dynamic properties of intrusion behaviors, data mining based intrusion detection techniques have been applied to network-based traffic data. With recent advances in computer technology large amounts of data could be collected and stored. Machine Learning techniques can...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Vehicle Detection Using Image Processing and Fuzzy Logic

    Vehicles moving on road are of importance because problems like traffic congestion, economic waste, jamming on the underpasses and over-bridges (if the vehicle passing through is not of the permissible size) are associated with them. These problems can be dealt with; by using various morphological processes based image processing techniques...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Centralized Integrated Spectrum Sensing for Cognitive Radios

    Spectrum sensing is the challenge for cognitive radio design and implementation, which allows the secondary user to access the primary bands without interference with primary users. Cognitive radios should decide on the best spectrum band to meet the quality of service requirements over all available spectrum bands. This paper investigates...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    ECG as Biometric in the Automated World

    Biometrics based authentication system provides better security solutions than conventional systems. But, some biological parameters that are used as biometric do not provide the guarantee of the presence and aliveness of the person as voice can be copied through microphone, finger print can be collect on silicon surface and iris...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Sequence Forecast Algorithm Based on Nonlinear Regression Technique for Stream Data

    Data mining is the process of extracting knowledge structures from continuous, rapid and extremely large stream data which handles quality and data analysis. In such traditional transaction environment it is impossible to perform frequent items mining because it requires analyzing which item is a frequent one to continuously incoming stream...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Task Scheduling in Wireless Sensor Nodes With Multiple Sensing Units: Survey

    A wireless sensor network consists of a large number of such sensor nodes which are densely deployed in wide area. The technological improvement has made these low-power devices very cost effective. Sensor nodes are able to gather information about data processing, and communication. Information gathering is done by actual sensors,...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Multi Agent Based Knowledge Management: Issues and Challenges

    Multi-Agent Systems (MAS) attracted the interest of researchers far beyond traditional computer science. Knowledge management, supply chain management was also growing areas for agent research and development, especially where the complex interactions of people in a team as well as with other agents in the same environment make it extremely...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    3G Networking

    3G is the third generation of tele standards and technology for mobile networking, superseding 2.5G. It is based on the International Telecommunication Union (ITU) family of standards under the IMT-2000. 3G networks enable network operators to offer users a wider range of more advanced services while achieving greater network capacity...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Web Forensics System on the Basis of Evidence Gathering With Code Injection Attack

    In web environment a major challenge facing by the law enforcing agency is to collect accurate & effective evidences from the growing volumes of crime data. In cyber space multi-step attack involve group of action where some of these actions may be legitimate but when combine together constitute malicious activity....

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    An Efficient Framework for Requirement Engineering

    Software engineering is an engineering discipline and use of sound engineering principles that concerned with the theories, method and tools with all aspect of software production. Requirement engineering is a branch of software engineering concerned with the real world goals for function and constraints on software systems. Requirement engineering is...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Metric Based Efficient Traffic Management in Intranets Using Incremental Advanced DST Approach

    In the recent computing network environment based on reliability and data availability data availability plays a vital role in Network environment. Traffic Management(TM) is widely used in distributed network environment to reduce access cost and improve data availability. It also focuses in maintaining the effective availability of data and maintaining...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Improved Data Cache Scheme Using Distributed Spanning Tree in Mobile Adhoc Network

    Mobile Ad hoc NETwork (MANET) is an autonomous collection of mobile nodes that communicate over relatively bandwidth constrained wireless links. The frequent mobility of nodes causes topology change and ineffective communication. So, there need an interconnection technique that should guarantee network connectivity, efficient routing and maintain network performance in MANET....

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Design and Development of Software Process Improvement Model

    Software Process Improvement (SPI) is a systematic approach and continuous improvement of software producing organization's ability to produce and deliver quality software within time and budget constraints. In the course of this project, the researcher developed, verified and validated such a model. This paper work presents a fit for use...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    An Association Rule Based Algorithmic Approach to Mine Frequent Pattern in Spatial Database System

    Emergence of data mining methods in data representation has resulted in discovering knowledge from large database systems. Efficient algorithms to mine frequent patterns are crucial to many tasks in spatial association rule mining. A promising approach for mining such spatial frequent pattern is mining frequent sub-patterns which are closed and...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    ERP a Boon for Contemporary Industries

    Over the past two decades, businesses have changed enormously with growing customer pressure for responsiveness, variety and even lower prices. To meet the customer's expectations in modern times a number of Information Systems have been developed and many more are under development. Enterprise Resource Planning (ERP) is one of the...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    A Perception of Statistical Inference in Data Mining

    As the authors know that data mining is concern with learning from data therefore, completeness, quality and real world data preparation, is a key prerequisite of successful data mining with its aim to discover something new from the facts already recorded in the certain database. Preparation of data is a...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Simulation Base Analysis of TCP Reno and TCP Westwood Over IEEE 802.11 Wireless Ad Hoc Networks

    Mobile ad hoc networking has been a fast growing research area for the last few years. The need for a network when there is no fixed infrastructure is no more limited to military and emergency applications; ad hoc networks can include private and public applications as well. In ad hoc...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Data Scheduling in VANETs: A Review

    Vehicular Ad-hoc NETworks (VANETs), a special kind of Mobile Ad-hoc NETworks (MANETs), where wireless-equipped (road) vehicles form a network without any additional infrastructure. Due to the fast growing number of vehicles and saturation of the transportation infrastructure traffic congestion, accidents and transportation delays become unavoidable. Several measures are implemented in...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Mitigation of Non- Linear Impairments of W-CDMA Power Amplifier

    In this paper a non-linear Power Amplifier (PA) with memory effects is modeled and a Digital pre-distortion algorithm is presented to mitigate non-linearity effects of a power amplifier. Look-Up Table approach is used to design the pre-distorter. Designs also take care of temperature dependence and memory effects of power amplifier....

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Effort Estimation Based on Complexity and Size of Relational Database System

    Software cost estimation is an important activity of software project management. Database plays a very important role in data centric software. In this paper a model for estimating the effort of database development based on complexity and size of the database of relational model has been proposed. The proposed work...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Various Issues in Vehicular Ad Hoc Networks: A Survey

    Vehicular Ad Hoc Networks is a kind of special wireless ad hoc network, which has the characteristics of high node mobility and fast topology changes. The Vehicular Networks can provide wide variety of services, ranges from safety and crash avoidance to Internet access and multimedia applications. So, a lot of...

    Provided By Kurukshetra University