Research In Motion

Displaying 1-40 of 134 results

  • White Papers // Mar 2014

    Information Technology & Business Management

    Business management is often about information management more than any other skill, as today's manager has quick access to every type of report about the operation of the business. An effective manager must be able to analyze all of the available information and sort out what is pertinent to the...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud SQL Security

    Cloud computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing, dynamic resource pools, virtualization, increases the efficiency of computing and high availability. But there are some drawbacks such as privacy, security is very important aspects. In...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Overview - Snort Intrusion Detection System in Cloud Environment

    Now-a-days cloud computing has become very popular since it reduces infrastructure cost. Hence, the level of security measures also has to be increased. Intrusions Detection Systems (IDSs) are designed to handle attacks but many Intrusion Detection System (IDS) are designed for specific attack/attacks. It is evident that no single technique...

    Provided By Research In Motion

  • White Papers // Feb 2014

    CAGDI: A New Conceptual Model of Early and Late Requirement Engineering for Non Fading Dataware House

    Building a data warehouse is a very challenging task. Most of the data ware house project fails to meet the business requirements and business goals because of the improper requirement engineering phase. The chaos all through the development of requirements evolves due to disparity between users and developers resulting in...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Java Based Distributed File System

    There are distributed file systems that are being used in businesses and individuals but still users face various challenges and problems in using those systems. The distributed file system based on Java resolve the difficulties that were occurring in the past systems and provides various functionalities to users such as...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Clustering - A New Perspective

    Although there has been a demarcation between development and evolution (maintenance) of software, this is increasingly irrelevant as fewer and very fewer systems are completely new. Additionally, after the system had gone through many changes during the maintenance, remembering the system's structure is less possible one. Software architecture is a...

    Provided By Research In Motion

  • White Papers // Feb 2014

    A Survey on Association Rule Mining in Market Basket Analysis

    Data mining refers to extracting knowledge from large amount of data. Market basket analysis is a data mining technique to discover associations between datasets. Association rule mining identifies relationship between a large set of data items. When large quantity of data is constantly obtained and stored in databases, several industries...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Finding Execution Faults in Dynamic Web Application

    Pin down is a framework for root cause analysis on dynamic web application. Fault localization in dynamic web application is the problem of decisive where in the source code modifies has to be completed in order to fix the perceived failures. The cause of the failure is called as execution...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Efficient Data Mining Algorithm for Reducing High Toll Transactions

    Mining cost efficient item-sets from a transactional database refers to the discovery of transaction sets with cost efficient characteristics improving overall profits. Although a number of relevant algorithms have been proposed in recent years, they incur the problem of producing a large number of candidate item-sets for cost efficient item-sets....

    Provided By Research In Motion

  • White Papers // Feb 2014

    A Comparative Approach to Reduce the Waiting Time Using Queuing Theory in Cloud Computing Environment

    Cloud computing is a model to provide different type of services like SaaS, PaaS and IaaS over the internet. Cloud is a collection of virtualized and interconnected computers dynamically presented as one or more unified computing resources based on service level agreement. Job scheduling is the very important issue in...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Selection of n in K-Means Algorithm

    One of the most popular and widely used algorithms in data clustering is K-means algorithm. However, one of its main downsides is that user has to specify number of clusters that is n, before the algorithm is to be implemented anywhere. This paper reviews existing methods for choosing the available...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Security and Privacy issues in Cloud Computing and Providing Platform for E-learning

    Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of the cloud computing is to apply traditional supercomputing or high performance computing power. To do this cloud computing uses network of large group...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Data Encryption by Image Steganography

    In modern era data is heavily gaining importance as information is dependent on the raw facts i.e. data. The exchange of information is required to share resources among the distributed users which may be separated by locations. While transferring the data among the users the confidentiality and privacy should be...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Computing with Azure PaaS for Educational Institutions

    Many universities provide the provision for online admissions, filling exam form online, declaring results online. Filling exam form online requires uploading the previous semester mark sheets and verifying subject for the current semester. Lacs of students are hitting the university server at certain duration to fill online exam form, which...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Refinement of Web Search using Word Sense Disambiguation and Intent Mining

    Searching or retrieving information on the Internet using any web search engine displays documents in enormous amounts. Information retrieval is the activity of tracing and obtaining relevant information from a collection of information resources. It is a challenging task for retrieving relevant information over the Internet. Although there are search...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Instant Messaging Service on Android Smartphones and Personal Computers

    Android is an operating system for Smartphone's, tablets and now will be used for personal computers also. It includes a touch screen user interface, widgets, camera, network data monitoring and all the other features that enable a cell phone to be called a Smartphone. Basically, multi-purpose chat application allows users...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Study on Cost Estimation of Service Delivery in Cloud Computing Environment

    The term cloud computing is sometimes used to refer to a new paradigm; some authors even cited a new technology that offers IT resources and services over the Internet. Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. The economic crisis can bring with enterprise...

    Provided By Research In Motion

  • White Papers // Feb 2014

    IDS in Cloud Environment as Service Based Manner

    Every service of security provided by IDS will work as a subscription based service, so that the host can deploy some part of IDS facilities, as part of their own LAN. Intrusion detection as a part of cloud infrastructure will fulfill the need of proposed work IaaS (Infrastructure as a...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Novel Approach for Query Expansion Using Genetic Algorithm

    In this paper the authors focused towards query expansion, which is an important technique for improving retrieval efficiency of an information retrieval system. Specifically the paper proposes a novel evolutionary approach for improving efficiency of Pseudo Relevance Feedback (PRF) based query expansion. In this method the candidate terms for query...

    Provided By Research In Motion

  • White Papers // Feb 2014

    An Overview of Distributed Databases

    A database is a collection of data describing the activities of one or more related organizations with a specific well defined structure and purpose. A database is controlled by DataBase Management System (DBMS) by maintaining and utilizing large collections of data. A distributed system is the one in which hardware...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Accessible Cloud Computing Based E-learning Environment for Disabled People

    Cloud computing is multiple set of services which provide infrastructural resources using internet as network as interconnecting media, applications and data storage on a service provider's server (third party). The basic principle of e-learning is to achieve personal learning goals by acquiring skills and knowledge through computers or other network-enabled...

    Provided By Research In Motion

  • White Papers // Feb 2014

    CMiS: A Cloud Computing Based Management Information System

    Cloud computing is gaining its importance in day to day business scenario because of its scalability, robustness and cost saving capabilities. Management information system is one of the major components of any business organization. It helps to adopt future operating strategy, to determine day to day operating procedure, analysis of...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Printer: A Survey

    Cloud printing services enable any application on any device to print to any cloud connected printer. The file is securely sent to the printer over the web .it does not matter printer is in the same room or on another continent. Today, people shift towards cloud based application of web...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Big Data Analytic and Mining with Machine Learning Algorithm

    Big data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, big data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This data-driven model involves demand-driven aggregation of...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Analysis of Palmprint Authentication System Using Wavelet Based Multi-Resolution Analysis

    A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. Biometric has gained much attention in the security world recently. Many types of personal identification systems have been developed and palmprint...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

    In this paper, the authors discuss about the improvement of security and privacy issues in wireless ad-hoc network, wireless mesh network and wireless sensor network with the help of routing protocols, authentication and cryptographic tools. Ad hoc network is a collection of nodes that is connected through a wireless medium...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Well-Known Gartner's Seven Security Issues Which Cloud Clients Should Advert

    In this paper, the authors present an applied research study on cloud computing process based on Gartner's security issues. The main objective of this research study is to get knowledge about cloud computing security and the important role which will they pay for the selection of resources. Cloud computing is...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Cloud Computing Services and its Application

    Cloud computing is a web-based, distributed computing using which information, resources and software's are distributed among different types of users. This computing approach allows much easier, flexible and high availability of resources at a very lower cost. The distribution of resources and services are on web, so this has opened...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Authentication & Verification of Secure Parking Using OCR Technique

    Intelligent Transportation System (ITS) has become an integral part of the Transportation Industry these days and it consists of License Plate Recognition (LPR) System. License Plate Recognition is also called Car Plate Recognition (CPR) or Automatic Number Plate Recognition (ANPR) System. In this paper an attempt has been made to...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Public Key Cryptanalysis Scheme Using Hierarchical Structure in Wireless Sensor Networks

    The growth of wireless sensor networks is widely spread over different applications, need of security mechanism is been the main issue nowadays. Therefore it is necessary to communicate between the sensor node protectively .The key management mechanism plays a major role in providing security in wireless sensor network. The authors...

    Provided By Research In Motion

  • White Papers // Nov 2013

    Increased MSME and Global Entrepreneurship Due to Cloud Computing

    There has been a significant increase in the number of Medium, Small and Micro scale Enterprises (MSME) around the world which has helped young Entrepreneurs to build small scale businesses. Cloud computing has been one of the primary enabler of the same because of the multi-tenant, ubiquitous, on demand computing...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Knowledge Management in Libraries

    The library will play a very crucial role in the extension and modification of knowledge. The development of knowledge management in recent years has become the key concern for librarian and libraries. Knowledge management requires more effective methods of information handling, speedy transfer of information. This paper is intended to...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Network Security-The Biggest Challenge in Communication

    Today one of the biggest challenges is to secure the internal network in communication. Understanding the fundamentals of any technology is vital if ever going to fully understand that technology. Without putting in ample time learning and practicing the fundamentals of security, it won't be able to learn the more...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Data Communication through Mobile Agent with Pre- Processing Techniques in Electronic Environment

    Mobile agents are emerging as a major trend of distributed systems. Different mobile agent frameworks are being actively developed in the research community. Electronic commerce and information retrieval are two prospective directions for application of mobile agents. Nevertheless, security and reliability are two crucial concerns for such systems, especially when...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Data Warehousing

    Data warehouse and On-Line Analytical Processing (OLAP) are essential elements of decision support, which has increasingly become a focus of the database industry. Data warehouse provides an effective way for the analysis and statistic to the mass data and helps to do the decision making. In recent years, data warehousing...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Automobile Security System Based on Face Recognition Structure Using GSM Network

    In this paper, the authors proposed embedded automobile security system Face Detection System (FDS) is used to detect the face of the driver and compare it with the predefined face. In the night when the vehicle owner is sleeping and someone has theft the vehicle, then FDS obtains the images...

    Provided By Research In Motion

  • White Papers // Oct 2013

    A Study of Hierarchical Clustering Algorithm

    Clustering is the process of grouping the data into classes or clusters, so that objects within a cluster have high similarity in comparison to one another but these objects are very dissimilar to the objects that are in other clusters. Clustering methods are mainly divided into two groups: hierarchical and...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Combating Packet Sniffing

    For years, computer-network administrators have used packet sniffers to monitor their networks to diagnose and solve problems. However, sniffers today have the potential to cause personal harm because they allow a hacker to confiscate confidential information. Organizations cannot afford inside agents to sniff out important data which could harm their...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Ensuring Cloud Security Using Cloud Control Matrix

    Cloud computing is the most evolutionary technology prevalent today, which is widely accepted by organizations due to cost-affordability, efficiency and flexibility. It enables the virtual organization to share geographically distributed resources as they pursue common goals, assuming the absence of central location, omniscience and an existing trust relationship. It shifts...

    Provided By Research In Motion

  • White Papers // Oct 2013

    A Novel Technique of Securing Mobile Adhoc Networks using Shared Trust Model

    Mobile Ad-hoc NETworks (MANETs) are mostly used in the conditions where any fixed backbone infrastructure is not available. They are easy to implement but they are more prone to attacks and threats. Being mobile and using distributed services are few of the weak points of security in MANETs. As the...

    Provided By Research In Motion

  • White Papers // Nov 2012

    An Efficient Approach for Cloud Computing Based on Hierarchical Secure Paravirtualization System Resource Model

    Paravirtualization is an enhancement of virtualization technology in which guest operating system is recompiled prior to installation inside a virtual machine. Paravirtualization allows for an interface to the virtual machine that can differ from an underlying hardware. Cloud computing depends on paravirtualization for more efficient system resources like processors and...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Cloud Computing: Security and Privacy Issues

    Cloud computing is the most growing technology these days. It has a flexible architecture with the concept of pay-as-the user-go. It has proper cost and time management those servers the clients satisfactorily. Being a promising technology, cloud still poses privacy and security as the major challenges. This paper deep dives...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Ensuring Cloud Security Using Cloud Control Matrix

    Cloud computing is the most evolutionary technology prevalent today, which is widely accepted by organizations due to cost-affordability, efficiency and flexibility. It enables the virtual organization to share geographically distributed resources as they pursue common goals, assuming the absence of central location, omniscience and an existing trust relationship. It shifts...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Network Security-The Biggest Challenge in Communication

    Today one of the biggest challenges is to secure the internal network in communication. Understanding the fundamentals of any technology is vital if ever going to fully understand that technology. Without putting in ample time learning and practicing the fundamentals of security, it won't be able to learn the more...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Security Issues in WiMAX: A Critical Review

    WiMAX (Worldwide interoperability for Microwave Access) IEEE802.16 is a technology which provide the facility of wireless broadband access with the high speed data rates across whole cities or countries. WiMAX is the emerging technology of this generation. WiMax uses radio channel, which are open channel that's why security problem arises....

    Provided By Research In Motion

  • White Papers // Jan 2007

    An Approach to Improve the Data Security using Encryption and Decryption Technique

    Cryptography is an art and science. It is a playing major role in information and security division. The main aim of the cryptography is protecting the data from unauthorized users or hackers. \"Cryptography is subject contains two parts one is encryption and another one decryption. Encryption is a process converting...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud SQL Security

    Cloud computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing, dynamic resource pools, virtualization, increases the efficiency of computing and high availability. But there are some drawbacks such as privacy, security is very important aspects. In...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Built-In Self-Repair Mechanism for Embedded Memories Using Totally Self-Checking Logic

    Today's deep submicron technologies allow the integration of multiple memories on a single chip. Embedded memories are one of the most universal cores, which occupy around 90% area in System-on-Chip (SoC) architecture due to the demand for high data storage. So, the embedded memory test process has become an essential...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Performance Evaluation of Bender's Decomposition Algorithm

    In cloud computing, provisioning an optimal resource to consumer gets more and more crucial. Cloud computing consumers are able to use the set of computing resources by net. Cloud providers will receive some amount for these computational resources depending on usage of cloud resource. The provisional resource plans are reservation...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Web Usage Mining: Identification of Trends Followed by the User Through Neural Network

    For proper website management it is important that the authors study individual trends followed by the users and then customize website according to customers. One such technique which can be used to mine data stored in web logs is web mining. Web mining has three main thrust areas web usage...

    Provided By Research In Motion

  • White Papers // Oct 2007

    K-Means Clustering Technique on Search Engine Dataset Using Data Mining Tool

    Today World Wide Web is growing wide as its name. It seems a bit difficult to manage all the information with search engine, as new modules have to be added into it. For that purpose, a technique name clustering comes in to everyone's mind. Clustering provided an organized way to...

    Provided By Research In Motion

  • White Papers // Oct 2007

    Search Results Improvement through Ranking Approach

    Recommender systems provide plenty of benefits to both users and the businesses. Due to web related applications, user-generated information is more freestyle and less ordered, which increases the difficulties in mining helpful information from these data sources. Innumerable dissimilar types of recommendations are ready on the web daily, with movies,...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Analysis and Comparison of Algorithms for Lossless Data Compression

    Data compression is an art used to reduce the size of a particular file. The goal of data compression is to eliminate the redundancy in a file's code in order to reduce its size. It is useful in reducing the data storage space and in reducing the time needed to...

    Provided By Research In Motion

  • White Papers // Sep 2013

    A Novel Approach for Optimal File Allocation in Memory and Obtaining an Improved Version of Memory Mapping Technique

    The imperative nature of memory utilization has always been questioned by the users. Always being under the scrutiny, there have been a lot of attempts for its improvisation. A more common approach is to use memory allocation tables and numerous pointers which require an impermissible usage of memory. This paper...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Educational Data Mining using Improved Apriori Algorithm

    Educational Data Mining (EDM) is an emerging interdisciplinary research area that deals with the development of methods to explore data originating in an educational context. EDM uses different computational approaches to analyze educational data in order to study educational questions. Different data mining techniques has been applied in this area....

    Provided By Research In Motion

  • White Papers // Sep 2013

    Intelligent Dynamic Time Quantum Allocation in MLFQ Scheduling

    In today's world, computing systems serve many purposes, the people cannot imagine a world without them. So it gives them the ability to do tasks at great speeds and it opens a new world of possibilities that they are just starting to explore. One of the most important factors of...

    Provided By Research In Motion

  • White Papers // Oct 2007

    BVRA: Bandwidth Assured Virtual Resource Allocation using Multiple Slices of Uplink Communication

    Network virtualization facilitate deploying modified services and resource management elucidation in secluded segments on a shared physical network, in this aspect the authors analyze the effect of multi hop relaying in the throughput of the downstream conduit in mobile systems. In addition to that they propose a cross control strategy...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Business Process Modeling and Its Perspectives

    In this paper the authors devoted to the analysis of business process modeling and its perspective in the organization. Over the years, the scope of business processes has been increased and it has been become infect interesting field for further research. Business Process Modeling (BPM) is an emerging discipline for...

    Provided By Research In Motion

  • White Papers // Oct 2013

    A Study of Hierarchical Clustering Algorithm

    Clustering is the process of grouping the data into classes or clusters, so that objects within a cluster have high similarity in comparison to one another but these objects are very dissimilar to the objects that are in other clusters. Clustering methods are mainly divided into two groups: hierarchical and...

    Provided By Research In Motion

  • White Papers // Feb 2014

    CMiS: A Cloud Computing Based Management Information System

    Cloud computing is gaining its importance in day to day business scenario because of its scalability, robustness and cost saving capabilities. Management information system is one of the major components of any business organization. It helps to adopt future operating strategy, to determine day to day operating procedure, analysis of...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Low Power SRAM Design with Reduced Read/Write Time

    In this paper the authors explore the design and analysis of Static Random Access Memories (SRAMs) which focuses on optimizing delay and power. CMOS SRAM cell consumes very less power and have less read and write time. Higher cell ratios can decrease the read and write time and improve stability....

    Provided By Research In Motion

  • White Papers // May 2013

    Support System- Pioneering approach for Web Data Mining

    World Wide Web is an adequate source to find various kind of information. With an explosive growth of WWW, websites are playing an important role in providing an information and knowledge to the end users. With the broad use of internet, web data mining has gradually become the focus of...

    Provided By Research In Motion

  • White Papers // Jan 2007

    MARTE Genetic Algorithm for Uncovering Scenarios Leading to Data Races in Concurrent Systems

    Identifying the concurrency problems early in the design process is most important. Because, these problems caused to disturbance or damage when building larger and more complex systems. The recent trend is Model Driven Development (MDD), so there is a method used for the detecting concurrency problems, which is based on...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Printer: A Survey

    Cloud printing services enable any application on any device to print to any cloud connected printer. The file is securely sent to the printer over the web .it does not matter printer is in the same room or on another continent. Today, people shift towards cloud based application of web...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Multiple Distinguishing Factors Based Measure for Data Misuseability Detection

    Data Anantapur (Autonomous), India. is valuable for any business. The power of organization lies in the data it maintains. Preserving such data and securing it has to be given paramount importance. Misuse of such data is a challenge to organizations. The data in an organization is used by the insiders....

    Provided By Research In Motion

  • White Papers // Feb 2014

    Big Data Analytic and Mining with Machine Learning Algorithm

    Big data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, big data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This data-driven model involves demand-driven aggregation of...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Analysis of Parallelization Techniques and Tools

    Parallel computing solves computationally large problems by partitioning into multiple tasks and running simultaneously on multicore or multiprocessor environment based on shared or distributed memory architectures. New multicore era demands software programmer to develop parallel programs to completely utilize the hardware parallelism. Writing parallel program manually for complex problem is...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Computing with Azure PaaS for Educational Institutions

    Many universities provide the provision for online admissions, filling exam form online, declaring results online. Filling exam form online requires uploading the previous semester mark sheets and verifying subject for the current semester. Lacs of students are hitting the university server at certain duration to fill online exam form, which...

    Provided By Research In Motion

  • White Papers // May 2013

    Emulation of FTP Service Using Virtual Honeypot

    Security, over the last decade, has become a huge priority for the network administrators. They dedicate lots of time to make sure that each network has the best and latest security patches, firewalls, and intrusion detection systems. Unfortunately, the security patches such as firewalls and intrusion detection systems are not...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Refinement of Web Search using Word Sense Disambiguation and Intent Mining

    Searching or retrieving information on the Internet using any web search engine displays documents in enormous amounts. Information retrieval is the activity of tracing and obtaining relevant information from a collection of information resources. It is a challenging task for retrieving relevant information over the Internet. Although there are search...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Survey Paper on Workflow Scheduling Algorithms Used in Cloud Computing

    Cloud computing is one of the emerging technologies which expand the boundary of internet by using the centralized servers to maintain data and resources. It enables the users and the consumers to use various applications provided by the cloud provider. But one of the major problems in front of this...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Instant Messaging Service on Android Smartphones and Personal Computers

    Android is an operating system for Smartphone's, tablets and now will be used for personal computers also. It includes a touch screen user interface, widgets, camera, network data monitoring and all the other features that enable a cell phone to be called a Smartphone. Basically, multi-purpose chat application allows users...

    Provided By Research In Motion

  • White Papers // Jan 2007

    SADS - Self Annihilating Data Storage system in Cloud Storage Service

    Personal data stored in the cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data are cached, copied, and archived by Cloud Service Providers (CSPs), often without users' authorization and control....

    Provided By Research In Motion

  • White Papers // Feb 2014

    Study on Cost Estimation of Service Delivery in Cloud Computing Environment

    The term cloud computing is sometimes used to refer to a new paradigm; some authors even cited a new technology that offers IT resources and services over the Internet. Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. The economic crisis can bring with enterprise...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Self Annihilating Data Storage and Location Based nonterminating Video Streaming Services for Mobile Users in CLOUD Environment

    Cloud computing has become a popular buzzword and it has been widely used to refer to different technologies, services, and concepts. With the use of cloud computing, here the authors are trying to give the location based efficient video information to the mobile users. Location Based Service (LBS) is an...

    Provided By Research In Motion

  • White Papers // Feb 2014

    IDS in Cloud Environment as Service Based Manner

    Every service of security provided by IDS will work as a subscription based service, so that the host can deploy some part of IDS facilities, as part of their own LAN. Intrusion detection as a part of cloud infrastructure will fulfill the need of proposed work IaaS (Infrastructure as a...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Combating Packet Sniffing

    For years, computer-network administrators have used packet sniffers to monitor their networks to diagnose and solve problems. However, sniffers today have the potential to cause personal harm because they allow a hacker to confiscate confidential information. Organizations cannot afford inside agents to sniff out important data which could harm their...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Data Communication through Mobile Agent with Pre- Processing Techniques in Electronic Environment

    Mobile agents are emerging as a major trend of distributed systems. Different mobile agent frameworks are being actively developed in the research community. Electronic commerce and information retrieval are two prospective directions for application of mobile agents. Nevertheless, security and reliability are two crucial concerns for such systems, especially when...

    Provided By Research In Motion

  • White Papers // Aug 2011

    A Conceptual Study of Vulnerability Detection

    In this paper, the authors give an overview of current vulnerability detection and Vulnerability Scanner (VS) products. Since each VS product available on the software market today is developed by a separate vendor, there are significant differences in these VS products. Some VS products can detect more vulnerabilities than others....

    Provided By Research In Motion

  • White Papers // Sep 2013

    Efficient and Feasible Methods to Detect Sybil Attack in VANET

    Large scale node-to-node systems face security threats from malfunction or hostile remote computing elements. Node-to-node system commonly relies on the existence of multiple independent remote entities to mitigate the threat of hostile nodes. Sometime single faulty node can produce various identities leading to control of substantial fraction of the system....

    Provided By Research In Motion