Kurukshetra University

Displaying 1-40 of 465 results

  • White Papers // Jan 2014

    Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach

    Today every security expert worries about the security problems and tries to find out the secure solution. Because it is a challenging aspect of communications today which touches many spheres including memory space, processing speed, code development and maintenance issues? The problem, exaggerated when it comes to dealing with lightweight...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Analysis of ANSN Attack on OLSR Based MANETs

    A MANET is a multi-hop ad-hoc wireless network where nodes can move arbitrary in the topology. The network has no given infrastructure and can be set up quickly in any environment. The Optimized Link State Routing (OLSR) protocol is a route management protocols for such mobile ad hoc networks. This...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Securing E-Commerce

    E-commerce provides an important medium for doing business on global based. E-commerce is the electronic automation of business process. E-commerce has become a critical component in any business competitive strategy. Organizations are gaining opportunities and benefits such as global presence and improved competitiveness from web-based e-commerce. In this paper, the...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Information Security in Grid Computing

    The spread of worldwide networks and the technological trend arc feeding the progress of network and distributed computing in different directions (grid, cloud, autonomic, ubiquitous, pervasive, volunteer, etc). With regard to information, great amount of data widely (geographically) spread over the network require adequate management, to ensure availability for authorized...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Risk Management in Information Security System

    In information security system there are always some cases which come up with some risks. To handle the risks there must be risk management in information security system. An appropriate risk management process is an extremely critical component of a successful information security program. The main objective of an organization's...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Big Data Analytics Using Hadoop Components Like Pig and Hive

    In big data world, Hadoop Distributed File System (HDFS) is very popular. It provides a framework for storing data in a distributed environment and also has set of tools to retrieve and process. These data set using map-reduce concept. In this paper, a thorough research has been carried to discuss...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Improving the Performance of IDS Using Genetic Algorithm

    Intrusion Detection System (IDS) aim to detect computer attacks and/or computer misuse, and to alert the proper individuals upon detection. The growing number of Internet threats increasingly inspires the need of applying a defense in depth concepts to protect worldwide computer system from being intruded for grabbing information. The authors...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Wavelet Based Fingerprint Authentication System

    Fingerprint biometric is very useful in application which requires identity to be claimed. It plays a very important role in forensic applications like criminal investigations, terrorist identification and National security issues. Wavelet analysis and its applications to fingerprint verification is one of the fast growing areas for research in recent...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    A Novel Bayesian Approach Against Phishing Attacks Based on Textual and Visual Content

    Phishing attacks are a major concern for preserving internet users' privacy. By combining social engineering and website forgery techniques, phishing attacks spoof the identity of a company (typically a bank or an auction site), to trick Internet users to reveal confidential information. The perfect phishing attack creates a website very...

    Provided By Kurukshetra University

  • White Papers // Jul 2013

    Potential Covert Channel in Distributed Database

    In today's environment. There is need of distributed database in communication. This paper provides a faster access and remove delays throughout the system .the paper will examine the features of distributed database architecture. The learning of distributed database management system will lead them for successful design. The design will improve...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Mining of Web Server Logs Using Extended Apriori Algorithm

    Association rule mining is one of the most significant techniques in the field of data mining. It is very useful in discovering relationships hidden in large transaction datasets such as frequent patterns, associations etc. One of the popular and important algorithms in this category is Apriori algorithm which finds frequent...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Acceptability of Fingerprint as Biometric Traits

    Biometric recognition or, simply, biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics, it is possible to confirm or establish an individual's identity based on \"Who the user is,\" rather than by \"What the users' possesses\" (e.g., an ID card). Among...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Performance of Flow Based Intrusion Detection System Over Traditional Intrusion Detection in High Speed Network

    The vast growth of 1-10Gbps network technology in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services. As users, the authors depend on the Internet in the people daily life for simple tasks such as checking emails, but also for managing private and financial information....

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    A Survey on Security Challenges of Cloud Computing

    Cloud computing has revolutionized the industry because of its benefits like on-demand services, scalability, elasticity, minimization of capital expenditure, etc. It is not a new concept but a fusion of distributed computing, grid computing, parallel computing and so on. It attracts the small enterprises as it eliminates the requirements for...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Highly Available XenApp Cloud

    In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced application and desktop computing costs and provided greater IT and user flexibility compared to traditional application and desktop management models. Among the various SaaS technologies, XenApp that allow numerous end users to connect to their...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Multi Packed Security Addressing Challenges in Cloud Computing

    Cloud computing efficiency, flexibility, greater agility, less capital expenditure is to overcome geographic limitations to compete in a global market. Most of the companies are shifting to Cloud based services, but at the same time they are concerned about the security risks. Hopefully after the definitions and illustrations of Cloud...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Cloud Computing: Performance Implications and Challenges

    Cloud computing is a new paradigm in the field of distributed computing. The objective of cloud computing is to provide various computing resources over the internet in the form of service to number of cloud consumers. Cloud provides the computing environment to organization in a cost effective manner and give...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Information Management Security in Multiple Networks for Development of Business and E-Commerce

    In this paper, the authors will discuss about Internet which has become the information super highway. The evolving Internet and its related technologies have allowed businesses to communicate in new and strategic ways with various types of people and organizations. Over the years, there have been additions of feature upon...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Enhanced Inter-Cloud System Architecture

    Cloud computing gains tremendous importance in the recent past, understanding low-level implications of the cloud infrastructure becomes necessary provided with all the infrastructure facilities that a cloud user needs. But as the no of organizations adopting cloud system increases, the services providers need to ensure availability of various services, infrastructure...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Spoof Attack Detection in Fingerprint Authentication Using Hybrid Fusion

    In the modern era, with the growing need of biometric technologies, spoof attacks are becoming a serious concern. A number of solutions have been proposed to detect the use of fake fingerprints. This paper takes advantage of skin elements in fingerprints, namely: minutiae points and ridge bifurcations to investigate spoof...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Detection and Prevention of Wormhole Attack in MANET: A Review

    Ad hoc networks are vulnerable due to their structure less property. A Mobile Ad-Hoc NETwork (MANET) is an infrastructure less self-configured collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. Security has become a primary...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Survey of Network Intrusion Detection Using K-Mean Algorithm

    Intrusion Detection System (IDS) due to novel attack method or upgraded. Because many current IDSs are constructing by point instruction of professional knowledge, changes to IDSs are costly and slow. Intrusion detection techniques can be categorizes into irregularity detection and mistreats detection. Anomaly detection systems, for example, IDES Intrusion Detection...

    Provided By Kurukshetra University

  • White Papers // Feb 2013

    Wormhole Attack Detection and Prevention Technique in Mobile Ad Hoc Networks: A Review

    MANET (Mobile Ad-hoc NETwork) refers to a multi-hop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time, without using any kind of fixed wired infrastructure. MANET'S are actually self organizing and adaptive networks that can be formed and deformed...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    A Comprehensive Study of Latest Security Models for MANETs: Covering Intrusion Detection and Denial of Service Attacks

    Mobile Ad-hoc NETworks (MANETs) are self organizing devices with no infrastructure control. Concept of security is major concern because of changing topology and no centralized control. Since MANET's are prone to many kind of vulnerabilities it is not necessary that any one kind of attack may be active at a...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    Wireless Sensor Networks: Architecture, Protocols

    Wireless Sensor Networks (WSN) is an interconnection of a large number of nodes deployed for monitoring the system by means of measurement of its parameters. Recent research in wireless sensor networks has led to various new protocols which are particularly designed for sensor networks. To design these networks, the factors...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    The Study of Multimedia Data Model Technology Based on Cloud Computing

    Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. Cloud computing is an emerging computing paradigm in which resources...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    Analysis of Security Criteria for Partner Network

    The authors are allowing people outside their organization access to proprietary data and applications - over the internet. The objectives of this research are to form a secured infrastructure between partner network and internet. In today's competitive business landscape, organizations are compelled to share data, files, and applications with external...

    Provided By Kurukshetra University

  • White Papers // Nov 2012

    A Novel Parallel Domain Focused Crawler for Reduction in Load on the Network

    World Wide Web is a collection of hyperlinked documents available in HTML format. Due to the growing and dynamic nature of the web, it has become a challenge to traverse all the URLs available in the web documents. The list of URL is very huge and so it is difficult...

    Provided By Kurukshetra University

  • White Papers // Oct 2012

    Effect of Malicious Nodes on AODV in Mobile Ad Hoc Networks

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. As mobile ad hoc network applications are deployed, Routing is one of the central requirements. Due to non central control, security is the major issue in...

    Provided By Kurukshetra University

  • White Papers // Aug 2012

    Throughput and Vulnerability Analysis of an IEEE 802.11b Wireless LAN

    Recent years have shown an unprecedented growth in the use of wireless LANs. However, unlike the relative simplicity of wired Ethernet deployments, IEEE 802.11-based wireless LANs uses Radio-Frequency (RF) data which is vulnerable to various attacks. This paper analyzes the IEEE 802.11b wireless LANs to determine variations in throughput so...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Cloud Computing Security and Privacy Concerns

    In last few years, cloud computing concept has groomed a lot which result that it has become the fastest growing business for the IT industry. Because it has became a promising business concept with win-win situation for the clients to shift. Now, recession-hit companies have acknowledged that simply by shifting...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Framework for Enhancing Security and Performance in Multi-Tenant Applications

    The ability to scale a web application or website is tied directly to understanding where the resource constraints lie and what impact the addition of various resources has on the application. Unfortunately, architects more often than not assume that simply adding another server into the mix can fix any performance...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Implementation of Public Key Cryptographic System: RSA

    In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA system generally belongs to the category of PKCS. RSA encryption is one of the public-key methods that have been...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Security Issues of Banking Adopting the Application of Cloud Computing

    Cloud computing has become the most emerging technology now a days. It increases the flexibility scalability over internet. Every field wants to do work with the help of cloud computing because it provides promising business idea to the fastest growing areas of the information technology. One of the fields that...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Systematic Way of Affine Transformation Using Image Registration

    Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessary in order to be able to compare or integrate the data obtained from different measurements such as different viewpoints, different times, and different sensors, etc. Image Registration is a crucial step...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Cloud Computing as a Tool for Infrastructure Management

    In last few years, cloud computing concept has emerged a lot which result that it has become the fastest growing business for the IT industry. Because it has became a promising business concept with win-win situation for the clients to shift. Cloud computing is a latest emerging business concept. Now,...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Component-Based Approach for Test Case Generation

    Component based software engineering is a process that aims to design and construct software systems using reusable software components. Since, the system is to be build with the ready to use components or prefabricated components the testing of these components is of utmost importance. Software testing is an important verification...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Technique of Image Registration in Digital Image Processing - A Review

    Image registration is a process in which final information is gained from different data sources. It is a technique in which the different sets of data are transformed in to one coordinate system. Using registration, the authors can compare and integrate the data obtained from different measurements. Different measurements mean...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Applications' of Cloud Computing in Academic Institutions

    Cloud Computing is making it probable to split the method of building an infrastructure for service provisioning from the Institutions of providing end user services. Today, such infrastructures are usually provided in huge statistics centers and the applications are executed distantly from the users. For institutions, switching to cloud-based services...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Implementing Map-Reduce to Enhance the Computational Abilities of Cloud Computing Platform

    The immense computational and storage power that a cloud infrastructure provides, can be aptly used to calculate large sets of data. Map-Reduce is one technique which can help to build such applications that are capable of executing such tasks. Map-Reduce programs are designed to compute large volumes of data in...

    Provided By Kurukshetra University

  • White Papers // Dec 2011

    Research Scenario of Software Reuse

    The idea of software reuse was projected in late sixties. History of software development describes that area of software reusability was not so innovative. But it is believed that software reuse is still in the development phase and has not achieved its full potential. This paper describes how far the...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Testing of Database Application Using Agent Based Method

    Software testing is indispensable for all software development. As all mature engineering disciplines need to have systematic testing methodologies, software testing is a very important subject of software engineering. Database systems have important and wide popularity among the world. It is common for software applications written in an imperative language...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Neuro Based Approach for Speech Recognition by Using Mel-Frequency Cepstral Coefficients

    This paper presents continuous speech recognition system based on neural network concept. Features are extracted and the data is compressed using Mel-frequency Cepstral coefficients method. These Mel-frequency Cepstral coefficients are used as inputs to train neural networks. Neural networks are useful to solve complex problems which do not require accurate...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Selective Neighbouring Wavelet Coefficients Approach for Image Denoising

    This paper has been widely used in science and engineering applications. However, this denoising scheme tends to kill too many wavelet coefficients that might contain useful image information. In this paper, they propose one selective approach wavelet image thresholding scheme by incorporating neighbouring coefficients, namely Selected NeighShrink. This approach is...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    A New ANN Method for Measuring Overall Reliability and Performance in Growing Computer Networks With Static and Variable Connections

    This paper presents a computational study on the performance of reliability measures by using optimized ANN for computer networks with fixed and varying link reliabilities. This paper focus on the design of minimum cost reliable computer networks when a set of nodes, their topology, and links are given to connect...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Cure: Clustering on Sequential Data for Web Personalization: Tests and Experimental Results

    The world wide web is full of multi-disciplinary data for knowledge data discovery research. In this paper, the authors present CURE (Clustering Usage REpresentatives) algorithm to find clusters on a web usage data. They adopted data from MSNBC.COM website which is a free news data website with different categories of...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Development of CORBA Based Application for Simulation in Distributed Environments

    This paper proposes a simulation framework that effectively uses the Common Object Request Broker Architecture (CORBA) technology to provide a flexible, extensible, platform-independent and language-independent simulation environment in distributed environment. In distributed computing, objects may be distributed on different computers through out a network, living within their own address space...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Context Disambiguation in Web Search Results Using Clustering Algorithm

    In pre-eminence web organization communication plays a significant task. Clusterization of web documents is a smart way for current web stuff. Arranging all documents into collection of similar area make things easier and shorten seek period. Different individual of the humanity are in search for speckled pattern on a periodic...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Comparison of Data Encryption Algorithms

    This paper tries to present a fair comparison between the most common and used algorithms in the data encryption field. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Bluetooth: Real Edge Over IrDA

    The Bluetooth, IRDA technology is a boon of the present era. It's a part of wireless communication as well as mobile communication. Bluetooth use low power and generally do not require a license for spectrum use. InfraRed Data Association (IRDA) is a non profit organization whose goal is to develop...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Secure Transmissions - A Study on the Challenges Faced

    Information and communications systems today transmit vital information. The Internet has brought fundamental changes to the world. The information is vulnerable to threats, from unauthorized access and use. There is a tremendous potential for fraud in this electronic world. The ability to make multiple copies and undetectable alterations of digitized...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Dynamically Updating the Message-Passing in Distributed Systems [Distributed Applications]

    Upgrading the software of long-lived, highly-available distributed systems is difficult. It is not possible to upgrade all the nodes in a system at once, since some nodes may be unavailable and halting the system for an upgrade is unacceptable. Instead, upgrades may happen gradually, and there may be long periods...

    Provided By Kurukshetra University

  • White Papers // Feb 2011

    A Prototype for a Multimodal Biometric Security System Based on Face and Audio Signatures

    Any automatically measurable, robust and distinctive physical characteristic or personal trait that can be used to identify an individual or verify the claimed identity of an individual, referred to as biometrics, has gained significant interest in the wake of heightened concerns about security and rapid advancements in networking, communication and...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Component Interactions From Software Architecture Recovery

    In modern software engineering, Software architecture modeling plays very important role in all phases of software development - like coding, maintenance, testing, etc. Component based software architecture is beneficial as it is useful for reusing system parts represented as components. Most of the existing systems do not have reliable software...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Proper Technique of Software Inspection Using Guarded Command Language

    Michael Fagan introduced the software inspection process in the early 1970 s. The Fagan inspection method, a formalization of review process is based on the application of process management techniques to software development. To generalize software inspections are performed with the intent of finding and correcting defects by identifying situations...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Need of Bandwidth Management and Formulation of Policy Framework for Effective Utilisation of Internet Services wWthin a University Campus

    As the web has evolved from mere an information exchange system to a knowledge creation and dissemination platform, the Internet is being viewed as a critical component of success by the researchers, teachers and students in higher education system especially within the universities and colleges. The IT managers dealing with...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Digit Recognition System Using Back Propagation Neural Network

    Digits are used in different types of data like vehicle number plate, numeric data, written data, meter reading, etc. Digit recognition plays an important role in many user authentication applications in the modern world. In this paper, back propagation neural network based digit recognition system has been developed. Such system...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Grid Storage Scheduler

    Grid computing is the widely used resources sharing mechanism in the large scale distributed environment. Grid system is a dynamic environment where every entity share the resources provided by the other entities. Data grid are one of the storage resources sharing mechanism in the grid environment. This paper includes brief...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Power Saving Strategies in Wireless Sensor Networks

    IEEE 802.16e is an emerging standard for mobile wireless broadband access systems. In any mobile networks, power saving is one of the most important features for the extension of devices' lifetime. IEEE 802.16e is the latest broadband wireless access standard designed to support mobility. To enhance the power efficiency of...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Exploring the Hidden Web: A Review

    World Wide Web (WWW) is broadly divided into two categories. First is Surface web that contains 1% of information content of the web. Search engine crawl along this web to extract and index text from HTML documents on the websites, then make this information searchable through keywords. Second is Hidden...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Improved Data Cache Scheme Using Distributed Spanning Tree in Mobile Adhoc Network

    Mobile Ad hoc NETwork (MANET) is an autonomous collection of mobile nodes that communicate over relatively bandwidth constrained wireless links. The frequent mobility of nodes causes topology change and ineffective communication. So, there need an interconnection technique that should guarantee network connectivity, efficient routing and maintain network performance in MANET....

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Design and Development of Software Process Improvement Model

    Software Process Improvement (SPI) is a systematic approach and continuous improvement of software producing organization's ability to produce and deliver quality software within time and budget constraints. In the course of this project, the researcher developed, verified and validated such a model. This paper work presents a fit for use...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    An Association Rule Based Algorithmic Approach to Mine Frequent Pattern in Spatial Database System

    Emergence of data mining methods in data representation has resulted in discovering knowledge from large database systems. Efficient algorithms to mine frequent patterns are crucial to many tasks in spatial association rule mining. A promising approach for mining such spatial frequent pattern is mining frequent sub-patterns which are closed and...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    ERP a Boon for Contemporary Industries

    Over the past two decades, businesses have changed enormously with growing customer pressure for responsiveness, variety and even lower prices. To meet the customer's expectations in modern times a number of Information Systems have been developed and many more are under development. Enterprise Resource Planning (ERP) is one of the...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    A Perception of Statistical Inference in Data Mining

    As the authors know that data mining is concern with learning from data therefore, completeness, quality and real world data preparation, is a key prerequisite of successful data mining with its aim to discover something new from the facts already recorded in the certain database. Preparation of data is a...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Simulation Base Analysis of TCP Reno and TCP Westwood Over IEEE 802.11 Wireless Ad Hoc Networks

    Mobile ad hoc networking has been a fast growing research area for the last few years. The need for a network when there is no fixed infrastructure is no more limited to military and emergency applications; ad hoc networks can include private and public applications as well. In ad hoc...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Data Scheduling in VANETs: A Review

    Vehicular Ad-hoc NETworks (VANETs), a special kind of Mobile Ad-hoc NETworks (MANETs), where wireless-equipped (road) vehicles form a network without any additional infrastructure. Due to the fast growing number of vehicles and saturation of the transportation infrastructure traffic congestion, accidents and transportation delays become unavoidable. Several measures are implemented in...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Mitigation of Non- Linear Impairments of W-CDMA Power Amplifier

    In this paper a non-linear Power Amplifier (PA) with memory effects is modeled and a Digital pre-distortion algorithm is presented to mitigate non-linearity effects of a power amplifier. Look-Up Table approach is used to design the pre-distorter. Designs also take care of temperature dependence and memory effects of power amplifier....

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Effort Estimation Based on Complexity and Size of Relational Database System

    Software cost estimation is an important activity of software project management. Database plays a very important role in data centric software. In this paper a model for estimating the effort of database development based on complexity and size of the database of relational model has been proposed. The proposed work...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Various Issues in Vehicular Ad Hoc Networks: A Survey

    Vehicular Ad Hoc Networks is a kind of special wireless ad hoc network, which has the characteristics of high node mobility and fast topology changes. The Vehicular Networks can provide wide variety of services, ranges from safety and crash avoidance to Internet access and multimedia applications. So, a lot of...

    Provided By Kurukshetra University

  • White Papers // Jun 2012

    Mining Closed Frequent Intervals From Interval Data

    Interval data is widely encountered in several areas of data mining applications. In the context of discovering interesting temporal patterns in interval data, the notion of closed frequent intervals is proposed in this paper. A pioneering method to determine the set of closed frequent intervals in an interval database is...

    Provided By Kurukshetra University

  • White Papers // Jun 2012

    Design and Development of an Efficient XML Parsing Algorithm: A Review

    The extensible markup language XML has become the de facto standard for information representation and interchange on the Internet. As XML becomes widespread it is critical for application developers to understand the operational and performance characteristics of XML processing. The processing of XML documents has been regarded as the performance...

    Provided By Kurukshetra University

  • White Papers // Jun 2012

    An Algorithm for Detection and Removal of Impulse Noise for Corrupted Images

    In this paper, an algorithm is proposed for removing Impulse (salt and pepper) noise from corrupted image. The proposed filtering algorithm employs two phases. First phase identify the noisy pixels from corrupted image and in second phase a filter is used to reconstruct the noisy pixel. The experimental result shows...

    Provided By Kurukshetra University

  • White Papers // Jun 2012

    An H-Shaped Dual Band Microstrip Patch Antenna for Wireless Applications

    Now-a-days, wireless networks are widely used in the world. With the strong advancements in wireless communications, there is growing demand for miniature, low-cost, easy-to-fabricate, multiband, dual-band and wideband antennas for use in commercial communications systems. Autonomous distributed wireless sensor networks are predicted to have major growth opportunities in the coming...

    Provided By Kurukshetra University

  • White Papers // Jun 2012

    A Framework Based On Hybrid Biometrics for Personal Verification System

    Biometric systems automatically recognize individuals based on their physiological and behavioral characteristics. Soft biometric traits like gender, age, height can not provide reliable user recognition because they are not distinctive and permanent. Although, soft biometric characteristics lack permanence to identify an individual uniquely and reliably, they provide some evidence about...

    Provided By Kurukshetra University

  • White Papers // Jun 2012

    Multimodal Biometric System: A Survey

    A biometric system which relies only on a single biometric trait is often not able to meet the desired performance. In Multi-modal system more than one biometric trait are used to identify a person. The study of methods for uniquely recognizing based upon one or more intrinsic physical or behavioral....

    Provided By Kurukshetra University

  • White Papers // Apr 2011

    Modification of GTD from Flat File Format to OLAP for Data Mining

    Application of Data Mining Tools for Terror Data Mining is a lesser talked about field. Lot of research efforts are going into capturing the data from incident reports in the past and structuring the data for analysis. Unfortunately there are not many sources on the net. One such database available...

    Provided By Kurukshetra University

  • White Papers // Apr 2011

    A Performance Study of Data Mining Techniques: Multiple Linear Regression vs. Factor Analysis

    The growing volume of data usually creates an interesting challenge for the need of data analysis tools that discover regularities in these data. Data mining has emerged as disciplines that contribute tools for data analysis, discovery of hidden knowledge, and autonomous decision making in many application domains. The purpose of...

    Provided By Kurukshetra University

  • White Papers // Aug 2010

    Process Mining: Process Management With Data Mining

    In this paper, the authors propose new methods for ordering the Web pages returned from search engines. Given a few search keywords, nowadays most search engines could retrieve more than a few thousand Web pages. The problem is how to order the retrieved Web pages and then to present the...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    High Speed WAN- Approaches Towards Augmented Performance

    This paper focuses on Quality-of-Service (QOS) provided during sessions in a high-speed wide area network and briefly survey research in this area. Four approaches towards providing Quality of Service guarantees are described and discussed, e.g., the tightly controlled approach, the approximate approach, the bounding approach, and the observation-based approach. A...

    Provided By Kurukshetra University