Lovely Professional University

Displaying 41-63 of 63 results

  • White Papers // Jan 2013

    Cloud Computing (A Survey on Cloud Computing Security Issues and Attacks in Private Clouds)

    Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages...

    Provided By Lovely Professional University

  • White Papers // Dec 2012

    Methodology for Improving Performance of Video Conferencing with Additional Security

    Video conference is becoming so popular in today world. People have to go for Distance places for attending meetings but this problem is solved by the videoconferencing. One person can communicate with other person using their webcam while remain in the one location. He needs not to go distant place...

    Provided By Lovely Professional University

  • White Papers // Nov 2012

    A New Survivability Strategy with Congestion Control in WDM Optical Networks

    Due to huge usage of internet and growing business, bandwidth required prove to be difficult resource to fulfill with normal structure of networks. Moreover to provide a good level of quality service is also a big concern. One big solution comes in form of Wavelength Division Multiplexing (WDM). Wavelength Division...

    Provided By Lovely Professional University

  • White Papers // Oct 2012

    X-Ray View on a Class Using Conceptual Analysis in Java Environment

    Modularity is one of the most important principles in software engineering and a necessity for every practical software. Since the design space of software is generally quite large, it is valuable to provide automatic means to help modularizing it. An automatic technique for software modularization is object-oriented concept analysis (OOCA)....

    Provided By Lovely Professional University

  • White Papers // Oct 2012

    Use of Data Mining Techniques for the Evaluation of Student Performance:A Case Study

    Data and Information or Knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. Due to the importance of extracting knowledge/information from the large data repositories, data mining has...

    Provided By Lovely Professional University

  • White Papers // Sep 2012

    Validating the Applicability of Agile Requirement Generation Model

    The authors all know that agile methodology for software development is an alternative to waterfall methodology for software development. In today's scenario, agile methods have caught the attention of software engineers worldwide. The reasons of this popularity are its iterative nature, quick delivery of software, face to face communication, less...

    Provided By Lovely Professional University

  • White Papers // Aug 2012

    Comparative Study of RKC and GCM Mode of Operation

    In the race of designing an efficient 'Authenticated Encryption (AE) mode of operation' several efforts have been done over past few years. In practical, when the authors have to send any data, they also need integrity and authentication along with the encrypted message. These requirements in real world prioritize Authenticated...

    Provided By Lovely Professional University

  • White Papers // Jun 2012

    Effective Cost Mechanism for Cloudlet Retransmission and Prioritized VM Scheduling Mechanism Over Broker Virtual Machine Communication Framework

    In current scenario cloud computing is most widely increasing platform for task execution. Lot of research is going on to cut down the cost and execution time. In this paper, the authors propose an efficient algorithm to have an effective and fast execution of task assigned by the user. They...

    Provided By Lovely Professional University

  • White Papers // Jun 2012

    Efficient Resource Allocation in Resource Provisioning Policies Over Resource Cloud Communication Paradigm

    Optimal resource utilization for executing tasks within the cloud is one of the biggest challenges. In executing the task over a cloud, the resource provisioner is responsible for providing the resources to create virtual machines. To utilize the resources optimally, the resource provisioner has to take care of the process...

    Provided By Lovely Professional University

  • White Papers // Jun 2012

    Performance Analysis of AODV Using HTTP Traffic Under Black Hole Attack in MANET

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the aid of any established infrastructure or centralized administration. The mobility of nodes in MANETs changes frequently which results in changing network topology, due to changing network topology routing in MANETs a challenging...

    Provided By Lovely Professional University

  • White Papers // Jun 2012

    Intelligent Methods for Resource Allocation in Grid Computing

    In the era of grid computing, resource allocation plays a vital role for assigning the available resources. This paper describes how to reduce the search time for the best available resources and assure instant provisioning of the lately added resources to the grid thereby using clustering and artificial neural networks....

    Provided By Lovely Professional University

  • White Papers // Jun 2012

    Secure Cloud Communication for Effective Cost Management System Through MSBE

    In Cloud Computing Architecture, Brokers are responsible to provide services to the end users. An Effective Cost Management System (ECMS) which works over Secure Cloud Communication Paradigm (SCCP) helps in finding a communication link with overall minimum cost of links. The authors propose an improved Broker Cloud Communication Paradigm (BCCP)...

    Provided By Lovely Professional University

  • White Papers // Jun 2012

    Robust Security System for Critical Computers

    Among the various means of available resource protection including biometrics, password based system is most simple, user friendly, cost effective and commonly used, but this system having high sensitivity with attacks. Most of the advanced methods for authentication based on password encrypt the contents of password before storing or transmitting...

    Provided By Lovely Professional University

  • White Papers // May 2012

    Securing Network Using Network Access Control, User and Resource Management, and Location-Based Security

    The first and primary law of network access control is to limit the access of network resources among the various types of users. NAC basically decides whom to let go onto the network. It decides the validity of user based on their identity and role. But its work does not...

    Provided By Lovely Professional University

  • White Papers // May 2012

    Security Implementation Through PCRE Signature Over Cloud Network

    With invention of new tools and technologies, the attackers are designing new methods to evade present security models. One of such security models is Intrusion detections. Intrusion detection systems work on signature based analysis and anomaly based detection, which makes it vulnerable for new evasion techniques. This paper describes the...

    Provided By Lovely Professional University

  • White Papers // Apr 2012

    Zero Packet Loss Handoff Mechanism in Real Time Applications

    The support for IP mobility has become very important with the increasing growth of mobile applications. One of the key challenges for the deployment of such wireless Internet infrastructure is to efficiently manage user mobility. Mobility is handled by Mobile IP (at the network layer) and Session Initiation Protocol (at...

    Provided By Lovely Professional University

  • White Papers // Apr 2012

    Survey on Intrusion Detection System in W-LAN

    This paper gives the people detailed idea about Intrusion Detection System (IDS).IDS is useful in monitoring of network & hosts so that the people can prevent the intruders from the network. As the internet is growing rapidly the authors have to face numerous problems of attackers on the wireless networks....

    Provided By Lovely Professional University

  • White Papers // Apr 2012

    Enhanced Password Based Security System Based on User Behavior using Neural Networks

    There are multiple numbers of security systems are available to protect the people computer/resources. Among them, password based systems are the most commonly used system due to its simplicity, applicability and cost effectiveness But these types of systems have higher sensitivity to cyber-attack. Most of the advanced methods for authentication...

    Provided By Lovely Professional University

  • White Papers // Oct 2011

    Identifying Reference Objects by Hierarchical Clustering in Java Environment

    Recently Java programming environment has become so popular. Java programming language is a language that is designed to be portable enough to be executed in wide range of computers ranging from cell phones to supercomputers. Computer programs written in Java are compiled into Java Byte code instructions that are suitable...

    Provided By Lovely Professional University

  • White Papers // Jul 2011

    An Approach to Provide Security in Mobile Ad-Hoc Networks Using Counter Mode of Encryption on Mac Layer

    Security in any of the networks became an important issue in this paper, the authors have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here they have...

    Provided By Lovely Professional University

  • White Papers // Oct 2010

    Static Route Analysis Based Multiple Route Configuration Scheme for Adaptive Static Routing

    In spite of inability to dynamically adapt to network topology failures and high management overhead, Static Routing still offers robustness to routing convergence failure, external route spoofing and easy prediction. This paper proposes a Static Routing strategy with an objective of extending its ability to adapt to logical network topology...

    Provided By Lovely Professional University

  • White Papers // Jun 2009

    Wireless Network Security Threats

    This paper presents the process for overcoming the downtrend challenges in the field of networks and security. Wireless networks do not have the inbuilt physical security of wired networks so are more prone to attacks from intruders. Numerous tools, to complicate matters, which attackers could use to detect and connect...

    Provided By Lovely Professional University

  • White Papers // Aug 2008

    Role of Simulation Modeling in Business Process Re-engineering

    Many different methods and techniques can be used for modeling business processes in order to give an understanding of possible scenarios for improvement. The simulation modeling shows the process as whole, drawbacks of the existing process, bottlenecks in the process execution and provides critical insight into process execution. The results...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Black Hole Attack in Kerberos Assisted Authentication Protocol

    Kaman is the extension of Kerberos protocol; with the use of Kaman nodes in the ad hoc network are authenticated by the secure server. This posed the remedial venture to large number of attacks like replay attack, fabrication, eavesdropping etc Kaman provides secure solution to the problem of secure channel...

    Provided By Lovely Professional University

  • White Papers // Oct 2012

    X-Ray View on a Class Using Conceptual Analysis in Java Environment

    Modularity is one of the most important principles in software engineering and a necessity for every practical software. Since the design space of software is generally quite large, it is valuable to provide automatic means to help modularizing it. An automatic technique for software modularization is object-oriented concept analysis (OOCA)....

    Provided By Lovely Professional University

  • White Papers // Oct 2011

    Identifying Reference Objects by Hierarchical Clustering in Java Environment

    Recently Java programming environment has become so popular. Java programming language is a language that is designed to be portable enough to be executed in wide range of computers ranging from cell phones to supercomputers. Computer programs written in Java are compiled into Java Byte code instructions that are suitable...

    Provided By Lovely Professional University

  • White Papers // Oct 2010

    Static Route Analysis Based Multiple Route Configuration Scheme for Adaptive Static Routing

    In spite of inability to dynamically adapt to network topology failures and high management overhead, Static Routing still offers robustness to routing convergence failure, external route spoofing and easy prediction. This paper proposes a Static Routing strategy with an objective of extending its ability to adapt to logical network topology...

    Provided By Lovely Professional University

  • White Papers // Jun 2009

    Wireless Network Security Threats

    This paper presents the process for overcoming the downtrend challenges in the field of networks and security. Wireless networks do not have the inbuilt physical security of wired networks so are more prone to attacks from intruders. Numerous tools, to complicate matters, which attackers could use to detect and connect...

    Provided By Lovely Professional University

  • White Papers // Jul 2011

    An Approach to Provide Security in Mobile Ad-Hoc Networks Using Counter Mode of Encryption on Mac Layer

    Security in any of the networks became an important issue in this paper, the authors have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here they have...

    Provided By Lovely Professional University

  • White Papers // Apr 2012

    Zero Packet Loss Handoff Mechanism in Real Time Applications

    The support for IP mobility has become very important with the increasing growth of mobile applications. One of the key challenges for the deployment of such wireless Internet infrastructure is to efficiently manage user mobility. Mobility is handled by Mobile IP (at the network layer) and Session Initiation Protocol (at...

    Provided By Lovely Professional University

  • White Papers // Apr 2012

    Survey on Intrusion Detection System in W-LAN

    This paper gives the people detailed idea about Intrusion Detection System (IDS).IDS is useful in monitoring of network & hosts so that the people can prevent the intruders from the network. As the internet is growing rapidly the authors have to face numerous problems of attackers on the wireless networks....

    Provided By Lovely Professional University

  • White Papers // May 2012

    Security Implementation Through PCRE Signature Over Cloud Network

    With invention of new tools and technologies, the attackers are designing new methods to evade present security models. One of such security models is Intrusion detections. Intrusion detection systems work on signature based analysis and anomaly based detection, which makes it vulnerable for new evasion techniques. This paper describes the...

    Provided By Lovely Professional University

  • White Papers // Jun 2012

    Secure Cloud Communication for Effective Cost Management System Through MSBE

    In Cloud Computing Architecture, Brokers are responsible to provide services to the end users. An Effective Cost Management System (ECMS) which works over Secure Cloud Communication Paradigm (SCCP) helps in finding a communication link with overall minimum cost of links. The authors propose an improved Broker Cloud Communication Paradigm (BCCP)...

    Provided By Lovely Professional University

  • White Papers // May 2013

    Enhanced AODV for Mobile Ad-hoc Networks

    A mobile ad-hoc network comprises of mobile nodes that can communicate with the nodes within their radio range and also with those which are outside range by using route discovery mechanisms. The nodes in an ad-hoc network can act as a host and also as a router that can route...

    Provided By Lovely Professional University

  • White Papers // Jun 2013

    Virtualization, The Great Thing and Issues in Cloud Computing

    Now within IT industry virtualization is used between today's interfaces to abstract different layers from each other when one layer is updated, the others one needs update too. When one layer is defined, the upper and lower layer cannot be used for anything else. One of the Top must's rapidly...

    Provided By Lovely Professional University

  • White Papers // Oct 2013

    Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security

    In this paper, the authors have proved the diminution in error approximation when identity authentication is done with Ideal Password Authentication Scheme (IPAS) for Network Security. Effectiveness of identity authentication parameters for various attacks and security requirements is verified in the paper. Result of analysis proves that IPAS would enhance...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Enhanced Coherency Technique for XML Keyword Search-A Review

    Keyword search techniques which use advantages of XML structure make it simpler for ordinary users to query XML databases, but latest approaches to processing these queries depend on heuristics that are ultimately ad hoc. These approaches often retrieve not correct answers, overlook appropriate answers, and cannot rank answers properly. To...

    Provided By Lovely Professional University

  • White Papers // Jan 2013

    Cloud Computing (A Survey on Cloud Computing Security Issues and Attacks in Private Clouds)

    Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages...

    Provided By Lovely Professional University

  • White Papers // Apr 2013

    Comparative Analysis of Various Authentication Techniques in Cloud Computing

    Over the recent years, there is a great advancement in the field of Computer Science. Cloud Computing is the result of advancement in the existing technologies. It shares the characteristics with Autonomic Computing, Client-Server Model, Grid Computing, Mainframe Computer, Utility Computing, Peer-to-Peer and Cloud Gaming. Cloud Computing is beneficial not...

    Provided By Lovely Professional University

  • White Papers // Apr 2013

    An Approach of Creating a Private Cloud for Universities and Security Issues in Private Cloud

    Cloud computing is one of the new innovation topic in the field of IT and provides benefits to enterprises as well as organizations. In the traditional technology, the authors download application and software's from internet and install on their own computers but in the era of new technology i.e. cloud...

    Provided By Lovely Professional University

  • White Papers // Aug 2013

    Data Structures and DBMS for CAD Systems-A Review

    The structures for the storage of data in CAD systems influence to a large extent the effectiveness of the system. This paper reviews the wide range of data structures and DataBase Management Systems (DBMS) available for structuring CAD data. The relationship between these basic data types, their composite structures and...

    Provided By Lovely Professional University

  • White Papers // Aug 2008

    Role of Simulation Modeling in Business Process Re-engineering

    Many different methods and techniques can be used for modeling business processes in order to give an understanding of possible scenarios for improvement. The simulation modeling shows the process as whole, drawbacks of the existing process, bottlenecks in the process execution and provides critical insight into process execution. The results...

    Provided By Lovely Professional University

  • White Papers // Jun 2013

    Neuro-Fuzzy based Software Risk Estimation Tool

    To develop the secure software is one of the major concerns in the software industry. To make the easier task of finding and fixing the security flaws, software developers should integrate the security at all stages of Software Development Life Cycle (SDLC).In this paper, based on Neuro-Fuzzy approach software Risk...

    Provided By Lovely Professional University

  • White Papers // Jul 2013

    Multi Round Selective Encryption using AES Over Storage Cloud

    Cloud computing is the re-incarnation of the client-server architecture. It is highly promising technology because of its unlimited resource provisioning and data storage services which help them in managing the data as per requirements. Due to the use of internet and vital remote servers to maintain the data and applications,...

    Provided By Lovely Professional University

  • White Papers // Jun 2012

    Robust Security System for Critical Computers

    Among the various means of available resource protection including biometrics, password based system is most simple, user friendly, cost effective and commonly used, but this system having high sensitivity with attacks. Most of the advanced methods for authentication based on password encrypt the contents of password before storing or transmitting...

    Provided By Lovely Professional University

  • White Papers // Apr 2012

    Enhanced Password Based Security System Based on User Behavior using Neural Networks

    There are multiple numbers of security systems are available to protect the people computer/resources. Among them, password based systems are the most commonly used system due to its simplicity, applicability and cost effectiveness But these types of systems have higher sensitivity to cyber-attack. Most of the advanced methods for authentication...

    Provided By Lovely Professional University