Punjabi University

Displaying 1-17 of 17 results

  • White Papers // Sep 2012

    A Genetic Algorithm for Regression Test Sequence Optimization

    Regression testing is the process of validating modified software to assure that changed parts of software behave as intended and unchanged parts of software have not been adversely affected by the modification. The regression test suite is typically large and needs an intelligent method to choose those test cases which...

    Provided By Punjabi University

  • White Papers // Sep 2012

    Malicious Data Detection in VANET

    Vehicular networks are becoming wide technology in traffic system. The entities that are part of a vehicular communication system can be private or public vehicles, road-side infrastructure, and authorities, with the latter considered primarily as network entities. Poorly designed VANETs that permit serious attacks on the network can jeopardize the...

    Provided By Punjabi University

  • White Papers // May 2012

    Ontological Engineering Approach Towards Trust Oriented Security Framework for Adhoc Networks

    Conventionally, user authentication and access control mechanisms would be almost enough, to handle security for stand-alone computers and small networks. Ad hoc networks are illustrated by multi-hop wireless connectivity and recurrently changing network topology which have made them infrastructure less. Adding trust to the existing security infrastructures would improvise the...

    Provided By Punjabi University

  • White Papers // Aug 2011

    Identification of Land and Water Regions in a Satellite Image: A Texture Based Approach

    Vision is the most important resource of information for human beings which contain several activities. Amongst these activities, object recognition and classification are widely used. Although, images are representation of vision which can be interpreted by machines, some images often do not exhibit regions of uniform intensity, but these images...

    Provided By Punjabi University

  • White Papers // Aug 2011

    Performance Analysis of Routing Protocols for Ad Hoc Networks

    Traditional routing protocols were developed to support user communication in networks with a fixed infrastructure with reliable, high-capacity links. On the other hand Mobile Ad-hoc Network is a collection of wireless mobile nodes which dynamically forms a temporary network without the use of any existing network infrastructure or centralized administration....

    Provided By Punjabi University

  • White Papers // Jul 2011

    Routing Schemes for Wireless Networks Using Artificial Intelligence

    With the increasing demand and penetration of wireless services, users of wireless networks now expect Quality of Service (QoS) and performance comparable to what is available from fixed networks. Providing QoS requirements like good throughput and minimum access delay are challenging tasks with regard to 802.11 WLAN protocols and Medium...

    Provided By Punjabi University

  • White Papers // May 2011

    Simulation Based Performance Evaluation and Comparison of Proactive and Reactive Routing Protocols in Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the aid of any established infrastructure or centralized administration. The mobility of nodes in MANETs results in frequent changes of network topology making routing in MANETs a challenging task. Routing protocols in MANET...

    Provided By Punjabi University

  • White Papers // May 2011

    Node Density Based Performance Analysis of Two Reactive Routing Protocols in Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. MANET has the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment. In this paper, the performance of two reactive...

    Provided By Punjabi University

  • White Papers // May 2011

    Enhancement of Network Security Techniques Using Quantum Cryptography

    Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies completely on the hardness of a mathematical equation. The advances in quantum computing has threatened the computational security of classical cryptography,...

    Provided By Punjabi University

  • White Papers // May 2011

    A Study of Performance Comparisons of Simulated Ad Hoc Network Routing Protocols

    Security has become a prime concern so as to present protected communication in Wireless as well as wired environment. Ad hoc networks are illustrated by multi-hop wireless connectivity and recurrently changing network topology which have made them infrastructure less. The wireless links in this network are very error prone and...

    Provided By Punjabi University

  • White Papers // Feb 2011

    Identification of Reusable Software Modules in Function Oriented Software Systems Using Neural Network Based Technique

    The cost of developing the software from scratch can be saved by identifying and extracting the reusable components from already developed and existing software systems or legacy systems. But the issue of how to identify reusable components from existing systems has remained relatively unexplored. The authors have used metric based...

    Provided By Punjabi University

  • White Papers // Dec 2010

    Evolution of Mobile Wireless Communication Networks: 1G to 4G

    Mobile communications systems revolutionized the way people communicate, joining together communications and mobility. A long way in a remarkably short time has been achieved in the history of wireless. Evolution of wireless access technologies is about to reach its Fourth Generation (4G). Looking past, wireless access technologies have followed different...

    Provided By Punjabi University

  • White Papers // Dec 2010

    Mitigation of Non-Linear Impairments of W-CDMA Power Amplifier

    In this paper a non-linear Power Amplifier (PA) with memory effects is modeled and a Digital pre-distortion algorithm is presented to mitigate non-linearity effects of a power amplifier. Look-Up Table approach is used to design the pre-distorter. Designs also take care of temperature dependence and memory effects of power amplifier....

    Provided By Punjabi University

  • White Papers // Sep 2010

    LTE-Advanced and Mobile WiMAX: Meeting the IMT-Advanced Specifications for 4G

    The increased customer demand for high bandwidth data services has accelerated the urgency for operators to deploy broadband 4G networks. WiMAX (Worldwide Interoperability for Microwave Access) is the IEEE 802.16 standards-based wireless technology where as the LTE- Advanced (Long Term Evolution-Advanced) is the 3GPP (Third Generation Partnership Project) standard, for...

    Provided By Punjabi University

  • White Papers // Feb 2010

    Performance Evaluation of IEEE 802.11 MAC Layer in Supporting Delay Sensitive Services

    Providing QoS requirements like good throughput and minimum access delay are challenging tasks with regard to 802.11 WLAN protocols and Medium Access Control (MAC) functions. IEEE 802.11 MAC layer supports two main protocols: DCF (Distributed Coordination Function) and EDCF (Enhanced Distributed Coordination Function). During the evaluation of EDCF, the performance...

    Provided By Punjabi University

  • White Papers // Jul 2009

    Analysis of Intrusion Detection Tools for Wireless Local Area Networks

    Intrusion-detection systems endeavor at detecting attacks against networks or, in general, against information systems. Undeniably, it is convoluted to provide provably secure network and to maintain them in such a secure state during their lifetime and utilization. Sometimes, legacy or operational constraints do not even allow the definition of a...

    Provided By Punjabi University

  • White Papers // Apr 2009

    A Formal Policy Oriented Access Control Model for Secure Enterprise Network Environment

    This paper uses Security Evaluation Criteria as basis to develop the Network access control model for enterprise wide network computing environment. The Network access control model addresses both the access control and information flow control requirements of the enterprise network system. The security architecture of the model attempts to ensure...

    Provided By Punjabi University

  • White Papers // Dec 2010

    Evolution of Mobile Wireless Communication Networks: 1G to 4G

    Mobile communications systems revolutionized the way people communicate, joining together communications and mobility. A long way in a remarkably short time has been achieved in the history of wireless. Evolution of wireless access technologies is about to reach its Fourth Generation (4G). Looking past, wireless access technologies have followed different...

    Provided By Punjabi University

  • White Papers // Apr 2009

    A Formal Policy Oriented Access Control Model for Secure Enterprise Network Environment

    This paper uses Security Evaluation Criteria as basis to develop the Network access control model for enterprise wide network computing environment. The Network access control model addresses both the access control and information flow control requirements of the enterprise network system. The security architecture of the model attempts to ensure...

    Provided By Punjabi University

  • White Papers // Jul 2009

    Analysis of Intrusion Detection Tools for Wireless Local Area Networks

    Intrusion-detection systems endeavor at detecting attacks against networks or, in general, against information systems. Undeniably, it is convoluted to provide provably secure network and to maintain them in such a secure state during their lifetime and utilization. Sometimes, legacy or operational constraints do not even allow the definition of a...

    Provided By Punjabi University

  • White Papers // Sep 2010

    LTE-Advanced and Mobile WiMAX: Meeting the IMT-Advanced Specifications for 4G

    The increased customer demand for high bandwidth data services has accelerated the urgency for operators to deploy broadband 4G networks. WiMAX (Worldwide Interoperability for Microwave Access) is the IEEE 802.16 standards-based wireless technology where as the LTE- Advanced (Long Term Evolution-Advanced) is the 3GPP (Third Generation Partnership Project) standard, for...

    Provided By Punjabi University

  • White Papers // Feb 2010

    Performance Evaluation of IEEE 802.11 MAC Layer in Supporting Delay Sensitive Services

    Providing QoS requirements like good throughput and minimum access delay are challenging tasks with regard to 802.11 WLAN protocols and Medium Access Control (MAC) functions. IEEE 802.11 MAC layer supports two main protocols: DCF (Distributed Coordination Function) and EDCF (Enhanced Distributed Coordination Function). During the evaluation of EDCF, the performance...

    Provided By Punjabi University

  • White Papers // Feb 2011

    Identification of Reusable Software Modules in Function Oriented Software Systems Using Neural Network Based Technique

    The cost of developing the software from scratch can be saved by identifying and extracting the reusable components from already developed and existing software systems or legacy systems. But the issue of how to identify reusable components from existing systems has remained relatively unexplored. The authors have used metric based...

    Provided By Punjabi University

  • White Papers // May 2011

    Enhancement of Network Security Techniques Using Quantum Cryptography

    Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies completely on the hardness of a mathematical equation. The advances in quantum computing has threatened the computational security of classical cryptography,...

    Provided By Punjabi University

  • White Papers // Sep 2012

    A Genetic Algorithm for Regression Test Sequence Optimization

    Regression testing is the process of validating modified software to assure that changed parts of software behave as intended and unchanged parts of software have not been adversely affected by the modification. The regression test suite is typically large and needs an intelligent method to choose those test cases which...

    Provided By Punjabi University

  • White Papers // Aug 2011

    Identification of Land and Water Regions in a Satellite Image: A Texture Based Approach

    Vision is the most important resource of information for human beings which contain several activities. Amongst these activities, object recognition and classification are widely used. Although, images are representation of vision which can be interpreted by machines, some images often do not exhibit regions of uniform intensity, but these images...

    Provided By Punjabi University

  • White Papers // Dec 2010

    Mitigation of Non-Linear Impairments of W-CDMA Power Amplifier

    In this paper a non-linear Power Amplifier (PA) with memory effects is modeled and a Digital pre-distortion algorithm is presented to mitigate non-linearity effects of a power amplifier. Look-Up Table approach is used to design the pre-distorter. Designs also take care of temperature dependence and memory effects of power amplifier....

    Provided By Punjabi University

  • White Papers // May 2011

    A Study of Performance Comparisons of Simulated Ad Hoc Network Routing Protocols

    Security has become a prime concern so as to present protected communication in Wireless as well as wired environment. Ad hoc networks are illustrated by multi-hop wireless connectivity and recurrently changing network topology which have made them infrastructure less. The wireless links in this network are very error prone and...

    Provided By Punjabi University

  • White Papers // Aug 2011

    Performance Analysis of Routing Protocols for Ad Hoc Networks

    Traditional routing protocols were developed to support user communication in networks with a fixed infrastructure with reliable, high-capacity links. On the other hand Mobile Ad-hoc Network is a collection of wireless mobile nodes which dynamically forms a temporary network without the use of any existing network infrastructure or centralized administration....

    Provided By Punjabi University

  • White Papers // May 2011

    Simulation Based Performance Evaluation and Comparison of Proactive and Reactive Routing Protocols in Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the aid of any established infrastructure or centralized administration. The mobility of nodes in MANETs results in frequent changes of network topology making routing in MANETs a challenging task. Routing protocols in MANET...

    Provided By Punjabi University

  • White Papers // May 2011

    Node Density Based Performance Analysis of Two Reactive Routing Protocols in Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. MANET has the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment. In this paper, the performance of two reactive...

    Provided By Punjabi University

  • White Papers // Jul 2011

    Routing Schemes for Wireless Networks Using Artificial Intelligence

    With the increasing demand and penetration of wireless services, users of wireless networks now expect Quality of Service (QoS) and performance comparable to what is available from fixed networks. Providing QoS requirements like good throughput and minimum access delay are challenging tasks with regard to 802.11 WLAN protocols and Medium...

    Provided By Punjabi University

  • White Papers // May 2012

    Ontological Engineering Approach Towards Trust Oriented Security Framework for Adhoc Networks

    Conventionally, user authentication and access control mechanisms would be almost enough, to handle security for stand-alone computers and small networks. Ad hoc networks are illustrated by multi-hop wireless connectivity and recurrently changing network topology which have made them infrastructure less. Adding trust to the existing security infrastructures would improvise the...

    Provided By Punjabi University

  • White Papers // Sep 2012

    Malicious Data Detection in VANET

    Vehicular networks are becoming wide technology in traffic system. The entities that are part of a vehicular communication system can be private or public vehicles, road-side infrastructure, and authorities, with the latter considered primarily as network entities. Poorly designed VANETs that permit serious attacks on the network can jeopardize the...

    Provided By Punjabi University