Research In Motion

Displaying 1-40 of 304 results

  • White Papers // Feb 2014

    Cloud SQL Security

    Cloud computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing, dynamic resource pools, virtualization, increases the efficiency of computing and high availability. But there are some drawbacks such as privacy, security is very important aspects. In...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Built-In Self-Repair Mechanism for Embedded Memories Using Totally Self-Checking Logic

    Today's deep submicron technologies allow the integration of multiple memories on a single chip. Embedded memories are one of the most universal cores, which occupy around 90% area in System-on-Chip (SoC) architecture due to the demand for high data storage. So, the embedded memory test process has become an essential...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Performance Evaluation of Bender's Decomposition Algorithm

    In cloud computing, provisioning an optimal resource to consumer gets more and more crucial. Cloud computing consumers are able to use the set of computing resources by net. Cloud providers will receive some amount for these computational resources depending on usage of cloud resource. The provisional resource plans are reservation...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Analysis of Parallelization Techniques and Tools

    Parallel computing solves computationally large problems by partitioning into multiple tasks and running simultaneously on multicore or multiprocessor environment based on shared or distributed memory architectures. New multicore era demands software programmer to develop parallel programs to completely utilize the hardware parallelism. Writing parallel program manually for complex problem is...

    Provided By Research In Motion

  • White Papers // May 2013

    Emulation of FTP Service Using Virtual Honeypot

    Security, over the last decade, has become a huge priority for the network administrators. They dedicate lots of time to make sure that each network has the best and latest security patches, firewalls, and intrusion detection systems. Unfortunately, the security patches such as firewalls and intrusion detection systems are not...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Survey Paper on Workflow Scheduling Algorithms Used in Cloud Computing

    Cloud computing is one of the emerging technologies which expand the boundary of internet by using the centralized servers to maintain data and resources. It enables the users and the consumers to use various applications provided by the cloud provider. But one of the major problems in front of this...

    Provided By Research In Motion

  • White Papers // Jan 2007

    SADS - Self Annihilating Data Storage system in Cloud Storage Service

    Personal data stored in the cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data are cached, copied, and archived by Cloud Service Providers (CSPs), often without users' authorization and control....

    Provided By Research In Motion

  • White Papers // Jan 2007

    Self Annihilating Data Storage and Location Based nonterminating Video Streaming Services for Mobile Users in CLOUD Environment

    Cloud computing has become a popular buzzword and it has been widely used to refer to different technologies, services, and concepts. With the use of cloud computing, here the authors are trying to give the location based efficient video information to the mobile users. Location Based Service (LBS) is an...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Business Process Modeling and Its Perspectives

    In this paper the authors devoted to the analysis of business process modeling and its perspective in the organization. Over the years, the scope of business processes has been increased and it has been become infect interesting field for further research. Business Process Modeling (BPM) is an emerging discipline for...

    Provided By Research In Motion

  • White Papers // Feb 2014

    CMiS: A Cloud Computing Based Management Information System

    Cloud computing is gaining its importance in day to day business scenario because of its scalability, robustness and cost saving capabilities. Management information system is one of the major components of any business organization. It helps to adopt future operating strategy, to determine day to day operating procedure, analysis of...

    Provided By Research In Motion

  • White Papers // May 2013

    Support System- Pioneering approach for Web Data Mining

    World Wide Web is an adequate source to find various kind of information. With an explosive growth of WWW, websites are playing an important role in providing an information and knowledge to the end users. With the broad use of internet, web data mining has gradually become the focus of...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Printer: A Survey

    Cloud printing services enable any application on any device to print to any cloud connected printer. The file is securely sent to the printer over the web .it does not matter printer is in the same room or on another continent. Today, people shift towards cloud based application of web...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Big Data Analytic and Mining with Machine Learning Algorithm

    Big data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, big data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This data-driven model involves demand-driven aggregation of...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Computing with Azure PaaS for Educational Institutions

    Many universities provide the provision for online admissions, filling exam form online, declaring results online. Filling exam form online requires uploading the previous semester mark sheets and verifying subject for the current semester. Lacs of students are hitting the university server at certain duration to fill online exam form, which...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Refinement of Web Search using Word Sense Disambiguation and Intent Mining

    Searching or retrieving information on the Internet using any web search engine displays documents in enormous amounts. Information retrieval is the activity of tracing and obtaining relevant information from a collection of information resources. It is a challenging task for retrieving relevant information over the Internet. Although there are search...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Instant Messaging Service on Android Smartphones and Personal Computers

    Android is an operating system for Smartphone's, tablets and now will be used for personal computers also. It includes a touch screen user interface, widgets, camera, network data monitoring and all the other features that enable a cell phone to be called a Smartphone. Basically, multi-purpose chat application allows users...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Web Usage Mining: Identification of Trends Followed by the User Through Neural Network

    For proper website management it is important that the authors study individual trends followed by the users and then customize website according to customers. One such technique which can be used to mine data stored in web logs is web mining. Web mining has three main thrust areas web usage...

    Provided By Research In Motion

  • White Papers // Oct 2007

    K-Means Clustering Technique on Search Engine Dataset Using Data Mining Tool

    Today World Wide Web is growing wide as its name. It seems a bit difficult to manage all the information with search engine, as new modules have to be added into it. For that purpose, a technique name clustering comes in to everyone's mind. Clustering provided an organized way to...

    Provided By Research In Motion

  • White Papers // Oct 2007

    Search Results Improvement through Ranking Approach

    Recommender systems provide plenty of benefits to both users and the businesses. Due to web related applications, user-generated information is more freestyle and less ordered, which increases the difficulties in mining helpful information from these data sources. Innumerable dissimilar types of recommendations are ready on the web daily, with movies,...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Analysis and Comparison of Algorithms for Lossless Data Compression

    Data compression is an art used to reduce the size of a particular file. The goal of data compression is to eliminate the redundancy in a file's code in order to reduce its size. It is useful in reducing the data storage space and in reducing the time needed to...

    Provided By Research In Motion

  • White Papers // Sep 2013

    A Novel Approach for Optimal File Allocation in Memory and Obtaining an Improved Version of Memory Mapping Technique

    The imperative nature of memory utilization has always been questioned by the users. Always being under the scrutiny, there have been a lot of attempts for its improvisation. A more common approach is to use memory allocation tables and numerous pointers which require an impermissible usage of memory. This paper...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Educational Data Mining using Improved Apriori Algorithm

    Educational Data Mining (EDM) is an emerging interdisciplinary research area that deals with the development of methods to explore data originating in an educational context. EDM uses different computational approaches to analyze educational data in order to study educational questions. Different data mining techniques has been applied in this area....

    Provided By Research In Motion

  • White Papers // Sep 2013

    Intelligent Dynamic Time Quantum Allocation in MLFQ Scheduling

    In today's world, computing systems serve many purposes, the people cannot imagine a world without them. So it gives them the ability to do tasks at great speeds and it opens a new world of possibilities that they are just starting to explore. One of the most important factors of...

    Provided By Research In Motion

  • White Papers // Oct 2007

    BVRA: Bandwidth Assured Virtual Resource Allocation using Multiple Slices of Uplink Communication

    Network virtualization facilitate deploying modified services and resource management elucidation in secluded segments on a shared physical network, in this aspect the authors analyze the effect of multi hop relaying in the throughput of the downstream conduit in mobile systems. In addition to that they propose a cross control strategy...

    Provided By Research In Motion

  • White Papers // Oct 2013

    A Study of Hierarchical Clustering Algorithm

    Clustering is the process of grouping the data into classes or clusters, so that objects within a cluster have high similarity in comparison to one another but these objects are very dissimilar to the objects that are in other clusters. Clustering methods are mainly divided into two groups: hierarchical and...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Low Power SRAM Design with Reduced Read/Write Time

    In this paper the authors explore the design and analysis of Static Random Access Memories (SRAMs) which focuses on optimizing delay and power. CMOS SRAM cell consumes very less power and have less read and write time. Higher cell ratios can decrease the read and write time and improve stability....

    Provided By Research In Motion

  • White Papers // Jan 2007

    MARTE Genetic Algorithm for Uncovering Scenarios Leading to Data Races in Concurrent Systems

    Identifying the concurrency problems early in the design process is most important. Because, these problems caused to disturbance or damage when building larger and more complex systems. The recent trend is Model Driven Development (MDD), so there is a method used for the detecting concurrency problems, which is based on...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Multiple Distinguishing Factors Based Measure for Data Misuseability Detection

    Data Anantapur (Autonomous), India. is valuable for any business. The power of organization lies in the data it maintains. Preserving such data and securing it has to be given paramount importance. Misuse of such data is a challenge to organizations. The data in an organization is used by the insiders....

    Provided By Research In Motion

  • White Papers // Feb 2014

    Accessible Cloud Computing Based E-learning Environment for Disabled People

    Cloud computing is multiple set of services which provide infrastructural resources using internet as network as interconnecting media, applications and data storage on a service provider's server (third party). The basic principle of e-learning is to achieve personal learning goals by acquiring skills and knowledge through computers or other network-enabled...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Data Encryption by Image Steganography

    In modern era data is heavily gaining importance as information is dependent on the raw facts i.e. data. The exchange of information is required to share resources among the distributed users which may be separated by locations. While transferring the data among the users the confidentiality and privacy should be...

    Provided By Research In Motion

  • White Papers // Jan 2007

    A Comparative Performance Analysis of Various Variants of Round Robin Scheduling Algorithm

    As processor is one of the most important computer resources, it becomes obvious to use this resource in a most efficient way such that its utilization is maximum and hence waiting time, turnaround time, response time and context switch of processes submitted to it is reduced. Various scheduling algorithm are...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Security and Privacy issues in Cloud Computing and Providing Platform for E-learning

    Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of the cloud computing is to apply traditional supercomputing or high performance computing power. To do this cloud computing uses network of large group...

    Provided By Research In Motion

  • White Papers // Jan 2007

    A Fully Homomorphic Encryption Implementation on Cloud Computing

    The cloud computing has been the most promising innovation in the computing world in past decade. Its usage is still hindered by the security concerns related with critical data. The encryption of remotely stored data has been the most widely used technique to bridge this security gap. The speculated vast...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Performance Analysis of Optimization Techniques for SQL Multi Query Expressions Over Text Databases in RDBMS

    The introductory section gives brief information on the strategies, an optimizer should follow. In order to examine the role of query optimization process in RDBMS, this paper will look at both static and dynamic process of optimization as well as all the general aspects of query optimization. The paper will...

    Provided By Research In Motion

  • White Papers // Jan 2007

    A Systematic Approach to Big Data Exploration of the Hadoop Framework

    With the growing developments and advancements in the fields of computing, it is necessary for institutions and organizations to handle large masses of data at faster speeds. Not only are the sizes of data increasing, so are the varied file types. Due to the inadequacy of traditional file management systems...

    Provided By Research In Motion

  • White Papers // Jun 2011

    An Effective Two Stage Text Compression and Decompression Technique for Data Communication

    Data compression is a method of encoding rules that allows substantial reduction in the total number of bits to store or transmit a file. Currently, two basic classes of data compression are applied in different areas. One of these is lossy data compression, which is widely used to compress image...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Study on Cost Estimation of Service Delivery in Cloud Computing Environment

    The term cloud computing is sometimes used to refer to a new paradigm; some authors even cited a new technology that offers IT resources and services over the Internet. Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. The economic crisis can bring with enterprise...

    Provided By Research In Motion

  • White Papers // Feb 2014

    IDS in Cloud Environment as Service Based Manner

    Every service of security provided by IDS will work as a subscription based service, so that the host can deploy some part of IDS facilities, as part of their own LAN. Intrusion detection as a part of cloud infrastructure will fulfill the need of proposed work IaaS (Infrastructure as a...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Overview - Snort Intrusion Detection System in Cloud Environment

    Now-a-days cloud computing has become very popular since it reduces infrastructure cost. Hence, the level of security measures also has to be increased. Intrusions Detection Systems (IDSs) are designed to handle attacks but many Intrusion Detection System (IDS) are designed for specific attack/attacks. It is evident that no single technique...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Novel Approach for Query Expansion Using Genetic Algorithm

    In this paper the authors focused towards query expansion, which is an important technique for improving retrieval efficiency of an information retrieval system. Specifically the paper proposes a novel evolutionary approach for improving efficiency of Pseudo Relevance Feedback (PRF) based query expansion. In this method the candidate terms for query...

    Provided By Research In Motion