Madurai Kamaraj University

Displaying 1-10 of 10 results

  • White Papers // Feb 2013

    Architecture of GSM Based WSN for Greenhouse Monitoring System in Ambient Intelligence Environment

    Greenhouse monitoring is an essential one for variable climate changes. GSM technologies have been rapidly developing wireless technology during recent years. Starting from telecommunication and industrial controls, it is now being applied in environmental monitoring and agriculture. The old wired greenhouse network would make the measurement system expensive and vulnerable....

    Provided By Madurai Kamaraj University

  • White Papers // Dec 2011

    An Enhanced FDPM Method for Network IP Attacks

    Internet Protocol trace back is the technology to control Internet frauds. Currently a large number of Distributed-Denial of Service attack incidents make people aware of the importance of the IP trace back technique. IP trace back is the ability to trace the IP packets to their origins. It provides a...

    Provided By Madurai Kamaraj University

  • White Papers // Sep 2011

    Data Mining Approach in Software Analysis

    Data mining and knowledge discovery have proved to be valuable tools in various domains such as production, health care and management. Data mining also has potential to address some highly challenging areas of software engineering such as adaptability and security. In software engineering process analyst play an important role for...

    Provided By Madurai Kamaraj University

  • White Papers // Jun 2011

    Secured Authentication Protocol System Using Images for Mobile

    The evolution of mobile networks and terminals has changed the way of communication with people, increasingly able to stay in touch with greater mobility and flexibility than ever before. Mobile security is not simply a type of software or solution: it is a combination of solutions that together best meet...

    Provided By Madurai Kamaraj University

  • White Papers // Apr 2011

    Text Analyzer

    The web has become a resourceful tool for almost all domains today. Search engines prominently use inverted indexing technique to locate the web pages having the users query. The performance of inverted index fundamentally depends upon the searching of keyword in the list maintained by search engine. Text matching is...

    Provided By Madurai Kamaraj University

  • White Papers // Mar 2011

    A Stake Holder Based Model for Software Security Metrics

    It is common wisdom that any process that cannot be measured cannot be managed. This applies to security as well. Security metrics are assuming tremendous importance as they are vital for assessing the current security status, to develop operational best practices and for guiding future security research. This paper is...

    Provided By Madurai Kamaraj University

  • White Papers // Dec 2010

    A Formal Suite of Object Relational Database Metrics

    Object Relational DataBases (ORDB) are complex in nature than traditional relational databases because they combine the characteristics of both object oriented concepts and relational features of conventional databases. Design of an ORDB demands efficient and quality schema considering the structural, functional and componential traits. This internal quality of the schema...

    Provided By Madurai Kamaraj University

  • White Papers // Nov 2010

    Secured Authentication Protocol: System Using Images

    In order to protect secret information from sensitive and various applications, secured authentication system should be incorporated; it should contain security and confidentiality. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the system itself may have weaknesses that can be...

    Provided By Madurai Kamaraj University

  • White Papers // Jan 2010

    Ontology Generation From Session Data for Web Personalization

    With an increasing continuous growth of information in WWW it is very difficult for the users to access the interested web pages from the website. Because day by day the information in the web is growing in an increasing manner so without any help system the user may spend more...

    Provided By Madurai Kamaraj University

  • White Papers // Jan 2010

    A CHAID Based Performance Prediction Model in Educational Data Mining

    The performance in higher secondary school education in India is a turning point in the academic lives of all students. As this academic performance is influenced by many factors, it is essential to develop predictive data mining model for students' performance so as to identify the slow learners and study...

    Provided By Madurai Kamaraj University

  • White Papers // Jan 2010

    Ontology Generation From Session Data for Web Personalization

    With an increasing continuous growth of information in WWW it is very difficult for the users to access the interested web pages from the website. Because day by day the information in the web is growing in an increasing manner so without any help system the user may spend more...

    Provided By Madurai Kamaraj University

  • White Papers // Jan 2010

    A CHAID Based Performance Prediction Model in Educational Data Mining

    The performance in higher secondary school education in India is a turning point in the academic lives of all students. As this academic performance is influenced by many factors, it is essential to develop predictive data mining model for students' performance so as to identify the slow learners and study...

    Provided By Madurai Kamaraj University

  • White Papers // Dec 2010

    A Formal Suite of Object Relational Database Metrics

    Object Relational DataBases (ORDB) are complex in nature than traditional relational databases because they combine the characteristics of both object oriented concepts and relational features of conventional databases. Design of an ORDB demands efficient and quality schema considering the structural, functional and componential traits. This internal quality of the schema...

    Provided By Madurai Kamaraj University

  • White Papers // Nov 2010

    Secured Authentication Protocol: System Using Images

    In order to protect secret information from sensitive and various applications, secured authentication system should be incorporated; it should contain security and confidentiality. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the system itself may have weaknesses that can be...

    Provided By Madurai Kamaraj University

  • White Papers // Jun 2011

    Secured Authentication Protocol System Using Images for Mobile

    The evolution of mobile networks and terminals has changed the way of communication with people, increasingly able to stay in touch with greater mobility and flexibility than ever before. Mobile security is not simply a type of software or solution: it is a combination of solutions that together best meet...

    Provided By Madurai Kamaraj University

  • White Papers // Feb 2013

    Architecture of GSM Based WSN for Greenhouse Monitoring System in Ambient Intelligence Environment

    Greenhouse monitoring is an essential one for variable climate changes. GSM technologies have been rapidly developing wireless technology during recent years. Starting from telecommunication and industrial controls, it is now being applied in environmental monitoring and agriculture. The old wired greenhouse network would make the measurement system expensive and vulnerable....

    Provided By Madurai Kamaraj University

  • White Papers // Apr 2011

    Text Analyzer

    The web has become a resourceful tool for almost all domains today. Search engines prominently use inverted indexing technique to locate the web pages having the users query. The performance of inverted index fundamentally depends upon the searching of keyword in the list maintained by search engine. Text matching is...

    Provided By Madurai Kamaraj University

  • White Papers // Dec 2011

    An Enhanced FDPM Method for Network IP Attacks

    Internet Protocol trace back is the technology to control Internet frauds. Currently a large number of Distributed-Denial of Service attack incidents make people aware of the importance of the IP trace back technique. IP trace back is the ability to trace the IP packets to their origins. It provides a...

    Provided By Madurai Kamaraj University

  • White Papers // Sep 2011

    Data Mining Approach in Software Analysis

    Data mining and knowledge discovery have proved to be valuable tools in various domains such as production, health care and management. Data mining also has potential to address some highly challenging areas of software engineering such as adaptability and security. In software engineering process analyst play an important role for...

    Provided By Madurai Kamaraj University

  • White Papers // Mar 2011

    A Stake Holder Based Model for Software Security Metrics

    It is common wisdom that any process that cannot be measured cannot be managed. This applies to security as well. Security metrics are assuming tremendous importance as they are vital for assessing the current security status, to develop operational best practices and for guiding future security research. This paper is...

    Provided By Madurai Kamaraj University