Punjab Technical University

Displaying 1-22 of 22 results

  • White Papers // Sep 2013

    A Comparative Performance Evaluation of Distributed Load Balancing Algorithms in Cloud Computing

    Cloud computing offers internet based paradigm which enables the providing and managing of the resources and services. It differs from traditional computing methods in various ways. All the data and resources are moved to cloud servers where services are provided by the cloud owner on the pay-per-use basis. In this...

    Provided By Punjab Technical University

  • White Papers // Aug 2013

    Authentication Using Hand Geometry and Finger Geometry Biometric Techniques

    As increase of security requirements, a person has to remember lots of pin numbers, passwords and other security codes. Biometric authentication systems are gaining importance in the today's world where information security is essential. Hand geometry verification systems use geometric measurements of hand for authentication of individuals. It is believed...

    Provided By Punjab Technical University

  • White Papers // Jun 2013

    Campus Network Security Policies: Problems And Its Solutions

    With the growth of internet the need for a secure network has also grown. Internet is used in various educational institutes and universities by the students and research scholars. It is convenient on the other hand unsafe to use internet. Therefore network security management has become one of the important...

    Provided By Punjab Technical University

  • White Papers // Mar 2013

    Design of M-Commerce Based Model for e-Enablement of Land Record Information System

    The latest trends related with enhancement of the mobile devices and mobile technologies have lead to the need to model such unique & innovative applications. This is necessary in order to have wide adoption and impact of such devices and their applications in today's fast paced life of a common...

    Provided By Punjab Technical University

  • White Papers // Dec 2012

    In Sync: Cloud Computing Solution and SME Industry IT Requirement

    Cloud Computing is a computational service that provide user based access to computational resources. It has helped to convert a product based IT infrastructure requirement of an organisation to a service based approach. For SME industries with limited IT budgets and growing requirements for efficiency and quick customer response rate,...

    Provided By Punjab Technical University

  • White Papers // Oct 2012

    PAPR Reduction as an Enhancement in OFDM

    This paper is engrossed on the critical issue of high PAPR in the most promising high speed communication system using Orthogonal Frequency Division Multiplexing (OFDM). However, OFDM, as an attractive modulation scheme, has shown noteworthy attention across multipath fading channels. It transmits the large amount of data over radio waves...

    Provided By Punjab Technical University

  • White Papers // Sep 2012

    Performance Analysis of Proactive, Reactive and Hybrid MANET Routing Protocols on IEEE 802.11 Standard

    MANET consists of mobile nodes which exchange information dynamically among them over wireless links. The most important element of MANET is routing protocols which are needed to handle dynamic communication and also find route so as to deliver data packets to the correct destination. Performance of routing protocols is an...

    Provided By Punjab Technical University

  • White Papers // Sep 2012

    Performance Comparison of UDP and UDP-Lite for Different Video Codecs

    In recent years, usage of Mobile Ad-hoc NETworks (MANETs) for communication has grown at a faster rate due to its ease of implementation and flexibility. Also, transmission of multimedia contents over Internet is one of the most widely used technologies being used globally. According to the ongoing trends in technology,...

    Provided By Punjab Technical University

  • White Papers // Sep 2012

    Performance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks

    Wireless Sensor Networks are an active research area in diverse fields like military surveillance, habitat monitoring, weather and others. In WSN, the sensor nodes have a limited transmission range, processing, storage capabilities and energy resources. In this paper, the authors illustrate the existing routing protocol ORMMA-WSN and analyze various parameters...

    Provided By Punjab Technical University

  • White Papers // Jul 2012

    A Comprehensive Appraisal of Ad hoc Networks

    An ad hoc network is a group of wireless mobile hosts that are connected momentarily through wireless connections in the dearth of any centralized control or some supporting services. The circumstances where it is likely unrealistic or infeasible to deploy infrastructure, in these cases mobile devices could set up a...

    Provided By Punjab Technical University

  • White Papers // Jun 2012

    Integrating SOA and Cloud Computing for SME Business Objective

    There is a need to understand the existing and future state architecture before the users begin selecting platforms and technology, Service Oriented Architecture (SOA) and Cloud, together can provide a complete service based solutions for SMEs. Both SOA and cloud deals with delivering services to business with improved agility, increased...

    Provided By Punjab Technical University

  • White Papers // Jun 2012

    Spoofing Attacks of Domain Name System Internet

    The Domain Name System (DNS) is a hierarchical naming system that is built on a distributed database for computers, services or any other resource connected to the Internet or a private network. It translates the domain names meaningful to humans into the numerical identifiers associated with the networking equipment for...

    Provided By Punjab Technical University

  • White Papers // Jun 2012

    Review of Domain Name System

    In this paper, the authors focuses on performance optimization of network by using co-located domain name systems. The paper involves understanding of the flow of traffic from source to the destination, load balancing among servers evenly in order to provide sufficient quality of service to end-users, and the need of...

    Provided By Punjab Technical University

  • White Papers // Jun 2012

    Internet Security - Bridge to Prevent Cyber Crimes

    Since internet security is in the forefront of cyber crimes for protection from attackers, it is crucial to have a good understanding of threats of internet security. This paper evaluates the importance and need of the internet security with different kinds of threats related to internet security. Different kinds of...

    Provided By Punjab Technical University

  • White Papers // Jun 2012

    Security Issues in Cloud Based E-Governance Model

    Government bodies and it departments of any state in India can make considerable savings switching from in-house e-governance systems to cloud-based e-governance solutions using Software-as-a-Service (SaaS) model of cloud computing, large government offices should consider using the cloud model for e-governance services delivery. Just like a traditional e-governance software solution,...

    Provided By Punjab Technical University

  • White Papers // Jun 2012

    Analytical Study of Position Based Routing Protocols in VANET

    Vehicular Ad-hoc Network is one of the emerging technologies which will make the life easy. Most of the people are dying because of road accidents. VANETs will reduce it to larger extent by providing important knowledge to drivers. This knowledge is provided by one vehicle to other using inter vehicle...

    Provided By Punjab Technical University

  • White Papers // May 2012

    A Cross-Layer Based Intrusion Detection Technique for Wireless Networks

    In this paper, the authors propose to design a cross-layer based intrusion detection technique for wireless networks. In this technique a combined weight value is computed from the Received Signal Strength (RSS) and Time Taken for RTS-CTS handshake between sender and receiver (TT). Since it is not possible for an...

    Provided By Punjab Technical University

  • White Papers // Jan 2012

    Effect of Mobility Parameters on the Performance of AODV Routing Protocol

    Routing in an ad hoc network is always a challenging task because of the free and random movement of nodes. This high node mobility sometimes results in route failures and decreased network performance. It further degrades the overall performance of the routing protocol. In this paper, the authors have analyzed...

    Provided By Punjab Technical University

  • White Papers // Oct 2011

    Performance Analysis and Modelling Wireless Local Area Network Metrics

    Wireless Local Area Network (WLAN) uses high frequency radio waves rather than wires to communicate and transmit data. In wireless local area network links, two or more devices using some wireless distribution method and usually providing a connection through an access point to the wider internet. This gives users the...

    Provided By Punjab Technical University

  • White Papers // Oct 2011

    Designing a SOA Based Model

    Service Oriented Architecture (SOA) is an architectural approach that can be shared and reused. Shortage of studies, research thrust and limited expertise in the area of SOA keeps the application of SOA in Small and Medium Enterprises (SMEs) limited. Also in a country like India, whose major economy is dependent...

    Provided By Punjab Technical University

  • White Papers // Apr 2011

    Cloud Computing Databases: Latest Trends and Architectural Concepts

    The Economic factors are leading to the rise of infrastructures provides software and computing facilities as a service, known as cloud services or cloud computing. Cloud services can provide efficiencies for application providers, both by limiting up-front capital expenses, and by reducing the cost of ownership over time. Such services...

    Provided By Punjab Technical University

  • White Papers // Oct 2009

    Statistically Analyzing the Impact of Automated ETL Testing on the Data Quality of a Data Warehouse

    For truthful reporting and decision-making a major challenge in data warehouse industry is to ensure quality data. The Extraction, Transformation and Loading (ETL) module is crucial to attain high quality data for a data warehouse. In-house development of ETL solutions with improvised algorithms may result in unknown errors at logical...

    Provided By Punjab Technical University

  • White Papers // Oct 2009

    Statistically Analyzing the Impact of Automated ETL Testing on the Data Quality of a Data Warehouse

    For truthful reporting and decision-making a major challenge in data warehouse industry is to ensure quality data. The Extraction, Transformation and Loading (ETL) module is crucial to attain high quality data for a data warehouse. In-house development of ETL solutions with improvised algorithms may result in unknown errors at logical...

    Provided By Punjab Technical University

  • White Papers // Oct 2012

    PAPR Reduction as an Enhancement in OFDM

    This paper is engrossed on the critical issue of high PAPR in the most promising high speed communication system using Orthogonal Frequency Division Multiplexing (OFDM). However, OFDM, as an attractive modulation scheme, has shown noteworthy attention across multipath fading channels. It transmits the large amount of data over radio waves...

    Provided By Punjab Technical University

  • White Papers // Jun 2012

    Integrating SOA and Cloud Computing for SME Business Objective

    There is a need to understand the existing and future state architecture before the users begin selecting platforms and technology, Service Oriented Architecture (SOA) and Cloud, together can provide a complete service based solutions for SMEs. Both SOA and cloud deals with delivering services to business with improved agility, increased...

    Provided By Punjab Technical University

  • White Papers // Dec 2012

    In Sync: Cloud Computing Solution and SME Industry IT Requirement

    Cloud Computing is a computational service that provide user based access to computational resources. It has helped to convert a product based IT infrastructure requirement of an organisation to a service based approach. For SME industries with limited IT budgets and growing requirements for efficiency and quick customer response rate,...

    Provided By Punjab Technical University

  • White Papers // Oct 2011

    Designing a SOA Based Model

    Service Oriented Architecture (SOA) is an architectural approach that can be shared and reused. Shortage of studies, research thrust and limited expertise in the area of SOA keeps the application of SOA in Small and Medium Enterprises (SMEs) limited. Also in a country like India, whose major economy is dependent...

    Provided By Punjab Technical University

  • White Papers // Jun 2013

    Campus Network Security Policies: Problems And Its Solutions

    With the growth of internet the need for a secure network has also grown. Internet is used in various educational institutes and universities by the students and research scholars. It is convenient on the other hand unsafe to use internet. Therefore network security management has become one of the important...

    Provided By Punjab Technical University

  • White Papers // Aug 2013

    Authentication Using Hand Geometry and Finger Geometry Biometric Techniques

    As increase of security requirements, a person has to remember lots of pin numbers, passwords and other security codes. Biometric authentication systems are gaining importance in the today's world where information security is essential. Hand geometry verification systems use geometric measurements of hand for authentication of individuals. It is believed...

    Provided By Punjab Technical University

  • White Papers // Sep 2013

    A Comparative Performance Evaluation of Distributed Load Balancing Algorithms in Cloud Computing

    Cloud computing offers internet based paradigm which enables the providing and managing of the resources and services. It differs from traditional computing methods in various ways. All the data and resources are moved to cloud servers where services are provided by the cloud owner on the pay-per-use basis. In this...

    Provided By Punjab Technical University

  • White Papers // Jun 2012

    Security Issues in Cloud Based E-Governance Model

    Government bodies and it departments of any state in India can make considerable savings switching from in-house e-governance systems to cloud-based e-governance solutions using Software-as-a-Service (SaaS) model of cloud computing, large government offices should consider using the cloud model for e-governance services delivery. Just like a traditional e-governance software solution,...

    Provided By Punjab Technical University

  • White Papers // May 2012

    A Cross-Layer Based Intrusion Detection Technique for Wireless Networks

    In this paper, the authors propose to design a cross-layer based intrusion detection technique for wireless networks. In this technique a combined weight value is computed from the Received Signal Strength (RSS) and Time Taken for RTS-CTS handshake between sender and receiver (TT). Since it is not possible for an...

    Provided By Punjab Technical University

  • White Papers // Apr 2011

    Cloud Computing Databases: Latest Trends and Architectural Concepts

    The Economic factors are leading to the rise of infrastructures provides software and computing facilities as a service, known as cloud services or cloud computing. Cloud services can provide efficiencies for application providers, both by limiting up-front capital expenses, and by reducing the cost of ownership over time. Such services...

    Provided By Punjab Technical University

  • White Papers // Oct 2011

    Performance Analysis and Modelling Wireless Local Area Network Metrics

    Wireless Local Area Network (WLAN) uses high frequency radio waves rather than wires to communicate and transmit data. In wireless local area network links, two or more devices using some wireless distribution method and usually providing a connection through an access point to the wider internet. This gives users the...

    Provided By Punjab Technical University

  • White Papers // Jan 2012

    Effect of Mobility Parameters on the Performance of AODV Routing Protocol

    Routing in an ad hoc network is always a challenging task because of the free and random movement of nodes. This high node mobility sometimes results in route failures and decreased network performance. It further degrades the overall performance of the routing protocol. In this paper, the authors have analyzed...

    Provided By Punjab Technical University

  • White Papers // Sep 2012

    Performance Analysis of Proactive, Reactive and Hybrid MANET Routing Protocols on IEEE 802.11 Standard

    MANET consists of mobile nodes which exchange information dynamically among them over wireless links. The most important element of MANET is routing protocols which are needed to handle dynamic communication and also find route so as to deliver data packets to the correct destination. Performance of routing protocols is an...

    Provided By Punjab Technical University

  • White Papers // Sep 2012

    Performance Comparison of UDP and UDP-Lite for Different Video Codecs

    In recent years, usage of Mobile Ad-hoc NETworks (MANETs) for communication has grown at a faster rate due to its ease of implementation and flexibility. Also, transmission of multimedia contents over Internet is one of the most widely used technologies being used globally. According to the ongoing trends in technology,...

    Provided By Punjab Technical University

  • White Papers // Sep 2012

    Performance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks

    Wireless Sensor Networks are an active research area in diverse fields like military surveillance, habitat monitoring, weather and others. In WSN, the sensor nodes have a limited transmission range, processing, storage capabilities and energy resources. In this paper, the authors illustrate the existing routing protocol ORMMA-WSN and analyze various parameters...

    Provided By Punjab Technical University

  • White Papers // Jun 2012

    Internet Security - Bridge to Prevent Cyber Crimes

    Since internet security is in the forefront of cyber crimes for protection from attackers, it is crucial to have a good understanding of threats of internet security. This paper evaluates the importance and need of the internet security with different kinds of threats related to internet security. Different kinds of...

    Provided By Punjab Technical University

  • White Papers // Jun 2012

    Spoofing Attacks of Domain Name System Internet

    The Domain Name System (DNS) is a hierarchical naming system that is built on a distributed database for computers, services or any other resource connected to the Internet or a private network. It translates the domain names meaningful to humans into the numerical identifiers associated with the networking equipment for...

    Provided By Punjab Technical University

  • White Papers // Jun 2012

    Review of Domain Name System

    In this paper, the authors focuses on performance optimization of network by using co-located domain name systems. The paper involves understanding of the flow of traffic from source to the destination, load balancing among servers evenly in order to provide sufficient quality of service to end-users, and the need of...

    Provided By Punjab Technical University

  • White Papers // Jul 2012

    A Comprehensive Appraisal of Ad hoc Networks

    An ad hoc network is a group of wireless mobile hosts that are connected momentarily through wireless connections in the dearth of any centralized control or some supporting services. The circumstances where it is likely unrealistic or infeasible to deploy infrastructure, in these cases mobile devices could set up a...

    Provided By Punjab Technical University

  • White Papers // Jun 2012

    Analytical Study of Position Based Routing Protocols in VANET

    Vehicular Ad-hoc Network is one of the emerging technologies which will make the life easy. Most of the people are dying because of road accidents. VANETs will reduce it to larger extent by providing important knowledge to drivers. This knowledge is provided by one vehicle to other using inter vehicle...

    Provided By Punjab Technical University

  • White Papers // Mar 2013

    Design of M-Commerce Based Model for e-Enablement of Land Record Information System

    The latest trends related with enhancement of the mobile devices and mobile technologies have lead to the need to model such unique & innovative applications. This is necessary in order to have wide adoption and impact of such devices and their applications in today's fast paced life of a common...

    Provided By Punjab Technical University