Osmania University

Displaying 1-25 of 25 results

  • White Papers // Feb 2013

    Web Crawlers for Searching Hidden Pages: A Survey

    Many researchers have addressed the need of a dynamic proven model of web crawler that will address the need of several dynamic commerce, research and ecommerce establishments over the web that majorly runs with the help of a search engine. The entire web architecture is changing from a traditional to...

    Provided By Osmania University

  • White Papers // Feb 2013

    QoS Aware Hierarchical Multi-hop Routing Protocols in MANETs

    Ad hoc wireless networks are multi-hop networks that are dynamic, and are formed by a group of nodes which are mobile in nature, on a shared wireless links. Mobile Ad-hoc NETwork (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi hop radio network....

    Provided By Osmania University

  • White Papers // Sep 2012

    Data as a Service (Daas) in Cloud Computing [Data-As-A-Service in the Age of Data]

    Data has become the enabling technology for many of the recent innovations. \"More data trumps smarter algorithms\" has been the mantra behind this revolution in computing. Given the rate at which the data is produced, there is need for scalable solutions to extract information out of them. Allowing the data...

    Provided By Osmania University

  • White Papers // Sep 2012

    Performance Improvement of Web Page Genre Classification

    The dynamic nature of web and with the increase of the number of web pages, it is very difficult to search required web pages easily and quickly out of thousands of web pages retrieved by a search engine. The solution to this problem is to classify the web pages according...

    Provided By Osmania University

  • White Papers // Jul 2012

    Going Back and Forth: Efficient Multi-Deployment and Multi- Snapshotting on Clouds

    Cloud computing has changed the way people think of using resources. Especially, the IaaS (Infrastructure as a Service) allows users to make use of unlimited resources in pay per use fashion. Virtualization is the technology based on which the cloud service providers are able to provide or share computational resources...

    Provided By Osmania University

  • White Papers // Jun 2012

    Comparitive Study of Advanced Database Replication Strategies

    Database replication is nothing but copying of data from a Database in one server to a Database in another so that all users share the same level of information. The result is a Distributed Database in which users can access data relevant to their tasks without interfering with the work...

    Provided By Osmania University

  • White Papers // May 2012

    A Novel DNAZIP Tool for Zipping of Genome Sequences by Linear Bounded Data Structure

    In Of late due to excessive accumulation of genetic sequences need of vacuuming plays predominant role in database when it reaches to its threshold. Vacuuming refers to data should not be deleted physically but it is superseded. The achieved data can be stored in secondary storage, the authors can access...

    Provided By Osmania University

  • White Papers // Jan 2012

    Semantic Probabilistic Modelling of Novel Routing Protocol with Implication of Cumulative Routing Attack in Mobile Adhoc Network

    The proposed system presents a novel approach for modeling along with mitigating various types of routing attacks in mobile ad-hoc network considering AODV protocol. Majority of the previous research work are either explored differently for security or routing protocols. The system identifies the susceptibility of the routing attack over the...

    Provided By Osmania University

  • White Papers // Nov 2011

    Multidimensional Context Dependent Information Delivery on the Web

    Multidimensional semi structured data MSSD are semi structured data that present deferent facets under deferent contexts i.e., alternative worlds for the representation of MSSD various formalisms have been proposed by the authors both syntactic such as MSSD expressions and MXML as well as graphical such as Multidimensional OEM. In this...

    Provided By Osmania University

  • White Papers // Aug 2011

    Quality of Service for Wireless Mobile Ad-Hoc Networks

    The quality of service in MANET has been improved with the incorporation of a new Adhoc QoS Multicasting (AQM) algorithm. Also, a cross layer frame work is proposed and evaluated for delivering the data effectively. The distributed admission control at every intermediate node is used for avoiding the interaction between...

    Provided By Osmania University

  • White Papers // Jul 2011

    Traffic Grooming in WDM Networks With Path Protection

    For the next generation optical internet to meet the growing traffic needs WDM technology is the key issue to realize high capacity networking infrastructure. In this paper an efficient algorithm is implemented for circuit switching in wide area networks. This algorithm known as semelightpath algorithm has been applied to ARPANET...

    Provided By Osmania University

  • White Papers // Mar 2011

    Performance Evalution of MANET Routing Protocols Using Reference Point Group Mobility and Random WayPoint Models

    An ad hoc network is often defined as an "Infrastructureless" network, meaning a network without the usual routing infrastructure like fixed routers and routing backbones. Typically, the ad hoc nodes are mobile and the underlying communication medium is wireless. Each ad hoc node may be capable of acting as a...

    Provided By Osmania University

  • White Papers // Feb 2011

    Comparison of Multicast Routing Protocols in Ad-Hoc Wireless Networks

    The majority of applications are in the areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions, where participants share information dynamically using their mobile devices. Well established routing protocols do...

    Provided By Osmania University

  • White Papers // Jan 2011

    A Strategy to Reduce the Control Packet Load of AODV Using Weighted Rough Set Model for MANET

    A mobile Ad-hoc network consists of wireless hosts that may move often, movement of host results changes in path. The well known ad-hoc on-demand distance vector routing protocol determines a route when no route exists or route breaks. To establish new path from source to destination, it broadcasts control packets...

    Provided By Osmania University

  • White Papers // Jan 2011

    Social Issues in Wireless Sensor Networks With Healthcare Perspective

    A mobile Ad-hoc networks consists of wireless hosts that may move often, movement of host results changes in path. The well known Ad-Hoc On-demand distance vector routing protocol determines a route when no route exists or route breaks. To establish new path from source to destination, it broadcast control packets...

    Provided By Osmania University

  • White Papers // Dec 2010

    Disconnection Tolerance in Reliable Timeout Based Commit Protocol

    The transaction processing on the mobile network may lead to disconnection due to poor bandwidth. To deploy traditional database applications into the mobile networks the transactions are to be executed consistently without hindrance of blocking. In this paper, the proposal is made to handle the transactions efficiently despite the frequent...

    Provided By Osmania University

  • White Papers // Nov 2010

    Multicast Routing Protocols in Adhoc Mobile Networks

    The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist...

    Provided By Osmania University

  • White Papers // Oct 2010

    Reviewing Some Platforms in Cloud Computing

    Cloud Computing is an emerging technology in which the research community and industries have recently embarked. However, the infrastructures of most cloud computing systems today are invisible to the research community, or are not explicitly designed to the researchers interested in cloud computing systems. This paper depicts the Cloud computing...

    Provided By Osmania University

  • White Papers // Oct 2010

    Drag and Drop: Influences on the Design of Reusable Software Components

    The fundamental unit of large scale software construction is the component. A component is the fundamental user interface object in Java. Everything seen on the display in a java application is a component. The ability to let users drag a component from the Interface and drop into one application is...

    Provided By Osmania University

  • White Papers // Aug 2010

    Commit Protocols in Mobile Environments: Design & Implementation

    In any database environment either wired or wireless, if multiple host access similar data items it may lead to concurrent access anomalies. As disconnections and mobility are the common characteristics in mobile environment, preserving consistency in presence of concurrent access is a challenging issue. Most of the approaches use locking...

    Provided By Osmania University

  • White Papers // Dec 2009

    Quorum Based Distributed Mutual System

    The main goal of a distributed computing system is to connect users and resources in a transparent, open, and scalable way. Ideally this arrangement is drastically more fault tolerant and more powerful than many combinations of stand-alone computer systems. Openness is the property of distributed systems such that each subsystem...

    Provided By Osmania University

  • White Papers // Dec 2009

    Performance Evaluation of Virtualization and Non Virtualization on Different Workloads Using DOE Methodology

    Different workloads utilize system resources at different levels. Depending on the resource utilization pattern some workloads may be better suited for hosting on virtual platform. This study is intended to compare how different workloads such as Online Analytical Processing (OLAP), Online Transaction Processing (OLTP), Web and Email applications perform on...

    Provided By Osmania University

  • White Papers // Oct 2009

    Performance of the Network Intrusion Detection Systems

    Security is an important factor of the Network Protection. Zero-day attacks, new (anamolous) attacks exploiting previously unknown system vulnerabilities, have become potentially serious threats to the very existence of the Network itself. Defending against them is no easy task. However, having identified "Degree of system knowledge" as one difference between...

    Provided By Osmania University

  • White Papers // Sep 2009

    Load Balancing in Genetic Zone Routing Protocol for MANETs

    Genetic Zone Routing Protocol (GZRP) is a new hybrid routing protocol for MANETs which is an extension of ZRP by using Genetic Algorithm (GA). GZRP uses GA on IERP and BRP parts of ZRP to provide a limited set of alternative routes to the destination in order to load balance...

    Provided By Osmania University

  • White Papers // Sep 2008

    Incremental Learning Algorithm for Dynamic Data Streams

    The recent advances in hardware and software have enabled the capture of different measurements of data in a wide range of fields. These measurements are generated continuously and in a very high fluctuating data rates. Examples include sensor networks, web logs, and computer network traffic. The storage, querying and mining...

    Provided By Osmania University

  • White Papers // Jan 2011

    A Strategy to Reduce the Control Packet Load of AODV Using Weighted Rough Set Model for MANET

    A mobile Ad-hoc network consists of wireless hosts that may move often, movement of host results changes in path. The well known ad-hoc on-demand distance vector routing protocol determines a route when no route exists or route breaks. To establish new path from source to destination, it broadcasts control packets...

    Provided By Osmania University

  • White Papers // Mar 2011

    Performance Evalution of MANET Routing Protocols Using Reference Point Group Mobility and Random WayPoint Models

    An ad hoc network is often defined as an "Infrastructureless" network, meaning a network without the usual routing infrastructure like fixed routers and routing backbones. Typically, the ad hoc nodes are mobile and the underlying communication medium is wireless. Each ad hoc node may be capable of acting as a...

    Provided By Osmania University

  • White Papers // Aug 2010

    Commit Protocols in Mobile Environments: Design & Implementation

    In any database environment either wired or wireless, if multiple host access similar data items it may lead to concurrent access anomalies. As disconnections and mobility are the common characteristics in mobile environment, preserving consistency in presence of concurrent access is a challenging issue. Most of the approaches use locking...

    Provided By Osmania University

  • White Papers // Sep 2008

    Incremental Learning Algorithm for Dynamic Data Streams

    The recent advances in hardware and software have enabled the capture of different measurements of data in a wide range of fields. These measurements are generated continuously and in a very high fluctuating data rates. Examples include sensor networks, web logs, and computer network traffic. The storage, querying and mining...

    Provided By Osmania University

  • White Papers // Dec 2009

    Quorum Based Distributed Mutual System

    The main goal of a distributed computing system is to connect users and resources in a transparent, open, and scalable way. Ideally this arrangement is drastically more fault tolerant and more powerful than many combinations of stand-alone computer systems. Openness is the property of distributed systems such that each subsystem...

    Provided By Osmania University

  • White Papers // Feb 2011

    Comparison of Multicast Routing Protocols in Ad-Hoc Wireless Networks

    The majority of applications are in the areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions, where participants share information dynamically using their mobile devices. Well established routing protocols do...

    Provided By Osmania University

  • White Papers // Aug 2011

    Quality of Service for Wireless Mobile Ad-Hoc Networks

    The quality of service in MANET has been improved with the incorporation of a new Adhoc QoS Multicasting (AQM) algorithm. Also, a cross layer frame work is proposed and evaluated for delivering the data effectively. The distributed admission control at every intermediate node is used for avoiding the interaction between...

    Provided By Osmania University

  • White Papers // Jul 2011

    Traffic Grooming in WDM Networks With Path Protection

    For the next generation optical internet to meet the growing traffic needs WDM technology is the key issue to realize high capacity networking infrastructure. In this paper an efficient algorithm is implemented for circuit switching in wide area networks. This algorithm known as semelightpath algorithm has been applied to ARPANET...

    Provided By Osmania University

  • White Papers // Sep 2012

    Performance Improvement of Web Page Genre Classification

    The dynamic nature of web and with the increase of the number of web pages, it is very difficult to search required web pages easily and quickly out of thousands of web pages retrieved by a search engine. The solution to this problem is to classify the web pages according...

    Provided By Osmania University

  • White Papers // Jun 2012

    Comparitive Study of Advanced Database Replication Strategies

    Database replication is nothing but copying of data from a Database in one server to a Database in another so that all users share the same level of information. The result is a Distributed Database in which users can access data relevant to their tasks without interfering with the work...

    Provided By Osmania University

  • White Papers // May 2012

    A Novel DNAZIP Tool for Zipping of Genome Sequences by Linear Bounded Data Structure

    In Of late due to excessive accumulation of genetic sequences need of vacuuming plays predominant role in database when it reaches to its threshold. Vacuuming refers to data should not be deleted physically but it is superseded. The achieved data can be stored in secondary storage, the authors can access...

    Provided By Osmania University

  • White Papers // Feb 2013

    Web Crawlers for Searching Hidden Pages: A Survey

    Many researchers have addressed the need of a dynamic proven model of web crawler that will address the need of several dynamic commerce, research and ecommerce establishments over the web that majorly runs with the help of a search engine. The entire web architecture is changing from a traditional to...

    Provided By Osmania University

  • White Papers // Nov 2011

    Multidimensional Context Dependent Information Delivery on the Web

    Multidimensional semi structured data MSSD are semi structured data that present deferent facets under deferent contexts i.e., alternative worlds for the representation of MSSD various formalisms have been proposed by the authors both syntactic such as MSSD expressions and MXML as well as graphical such as Multidimensional OEM. In this...

    Provided By Osmania University

  • White Papers // Feb 2013

    QoS Aware Hierarchical Multi-hop Routing Protocols in MANETs

    Ad hoc wireless networks are multi-hop networks that are dynamic, and are formed by a group of nodes which are mobile in nature, on a shared wireless links. Mobile Ad-hoc NETwork (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi hop radio network....

    Provided By Osmania University

  • White Papers // Sep 2012

    Data as a Service (Daas) in Cloud Computing [Data-As-A-Service in the Age of Data]

    Data has become the enabling technology for many of the recent innovations. \"More data trumps smarter algorithms\" has been the mantra behind this revolution in computing. Given the rate at which the data is produced, there is need for scalable solutions to extract information out of them. Allowing the data...

    Provided By Osmania University

  • White Papers // Jul 2012

    Going Back and Forth: Efficient Multi-Deployment and Multi- Snapshotting on Clouds

    Cloud computing has changed the way people think of using resources. Especially, the IaaS (Infrastructure as a Service) allows users to make use of unlimited resources in pay per use fashion. Virtualization is the technology based on which the cloud service providers are able to provide or share computational resources...

    Provided By Osmania University

  • White Papers // Jan 2012

    Semantic Probabilistic Modelling of Novel Routing Protocol with Implication of Cumulative Routing Attack in Mobile Adhoc Network

    The proposed system presents a novel approach for modeling along with mitigating various types of routing attacks in mobile ad-hoc network considering AODV protocol. Majority of the previous research work are either explored differently for security or routing protocols. The system identifies the susceptibility of the routing attack over the...

    Provided By Osmania University

  • White Papers // Oct 2009

    Performance of the Network Intrusion Detection Systems

    Security is an important factor of the Network Protection. Zero-day attacks, new (anamolous) attacks exploiting previously unknown system vulnerabilities, have become potentially serious threats to the very existence of the Network itself. Defending against them is no easy task. However, having identified "Degree of system knowledge" as one difference between...

    Provided By Osmania University

  • White Papers // Nov 2010

    Multicast Routing Protocols in Adhoc Mobile Networks

    The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist...

    Provided By Osmania University

  • White Papers // Oct 2010

    Reviewing Some Platforms in Cloud Computing

    Cloud Computing is an emerging technology in which the research community and industries have recently embarked. However, the infrastructures of most cloud computing systems today are invisible to the research community, or are not explicitly designed to the researchers interested in cloud computing systems. This paper depicts the Cloud computing...

    Provided By Osmania University

  • White Papers // Dec 2009

    Performance Evaluation of Virtualization and Non Virtualization on Different Workloads Using DOE Methodology

    Different workloads utilize system resources at different levels. Depending on the resource utilization pattern some workloads may be better suited for hosting on virtual platform. This study is intended to compare how different workloads such as Online Analytical Processing (OLAP), Online Transaction Processing (OLTP), Web and Email applications perform on...

    Provided By Osmania University

  • White Papers // Sep 2009

    Load Balancing in Genetic Zone Routing Protocol for MANETs

    Genetic Zone Routing Protocol (GZRP) is a new hybrid routing protocol for MANETs which is an extension of ZRP by using Genetic Algorithm (GA). GZRP uses GA on IERP and BRP parts of ZRP to provide a limited set of alternative routes to the destination in order to load balance...

    Provided By Osmania University

  • White Papers // Dec 2010

    Disconnection Tolerance in Reliable Timeout Based Commit Protocol

    The transaction processing on the mobile network may lead to disconnection due to poor bandwidth. To deploy traditional database applications into the mobile networks the transactions are to be executed consistently without hindrance of blocking. In this paper, the proposal is made to handle the transactions efficiently despite the frequent...

    Provided By Osmania University

  • White Papers // Oct 2010

    Drag and Drop: Influences on the Design of Reusable Software Components

    The fundamental unit of large scale software construction is the component. A component is the fundamental user interface object in Java. Everything seen on the display in a java application is a component. The ability to let users drag a component from the Interface and drop into one application is...

    Provided By Osmania University

  • White Papers // Jan 2011

    Social Issues in Wireless Sensor Networks With Healthcare Perspective

    A mobile Ad-hoc networks consists of wireless hosts that may move often, movement of host results changes in path. The well known Ad-Hoc On-demand distance vector routing protocol determines a route when no route exists or route breaks. To establish new path from source to destination, it broadcast control packets...

    Provided By Osmania University