Singhala Music

Displaying 1-11 of 11 results

  • White Papers // Sep 2013

    Biometric Security: A Grand Challenge

    Authentic person identification is an important problem in many applications. The purpose of such schemes is to ensure that the particular services are accessed only by a legal user and no one else. In the absence of proper recognition schemes, these systems are vulnerable to the wiles of an impostor....

    Provided By Singhala Music

  • White Papers // Apr 2013

    Centralized Access Management and Monitoring as a Service in Cloud Environments-A Critical Study

    The aspect of virtualization and large scale distribution has brought forward the cloud computing phenomenon. Despite its popularity, most of the enterprises are still circumspect in getting into clouds completely. The major part of this circumspection owes to the factors of identity and access management, monitoring, auditing and reporting. The...

    Provided By Singhala Music

  • White Papers // Feb 2013

    Disaster Recovery Center Establishment for T4 Data Center to Run the IT System in Power Utilities

    In this paper, the authors will focus the details of the IT system and business process requirements of IT package need to be installed at disaster recovery center. This paper provide details of the project requirements, which are to be met by the applications and interfaces required within disaster recovery...

    Provided By Singhala Music

  • White Papers // Dec 2012

    Risk Management in Cloud Computing Through Fuzzy Logic

    Cloud computing is an emerging commercial infrastructure and internet based cost-efficient computing where information can be accessed from a web browser by customers according to their requirement. Cloud computing in a generally term is defined for anything that involves delivering hosted services over the Internet. It is based on the...

    Provided By Singhala Music

  • White Papers // Dec 2012

    Human Computer Interpreting With Biometric Recognition System

    Biometric recognition system contains wide variety of recognition techniques using for identification and verification purposes. Wide systems must require reliable personal recognition system due to the security region for the system. The purpose of such system is to ensure that this identification and verification services are accessed only by a...

    Provided By Singhala Music

  • White Papers // Jun 2012

    Data Mining Application to Attract Students in HEI

    In the last two decades, number of Higher Education Institutions (HEI) grows in leaps and bounds. This causes a cut throat competition among these institutions while attracting the student get admission in these institutions. To make reach up to the students institution makes effort of advertisement. Similarly developing and developed...

    Provided By Singhala Music

  • White Papers // Jun 2012

    Wireless Adhoc Networks Security Principles, Issues & Applications

    Privacy and integrity of packets on WANetworks should be expected by the algorithmic mechanisms. This privacy and integrity is very much is to be mandated by regulations. In tradition the security is only based on cryptographic techniques which is not so much secure and leads to unsecure and unauthenticated information....

    Provided By Singhala Music

  • White Papers // Jun 2012

    Mobile Banking in India: Practices, Challenges, and Security Issues

    The increased prevalence of mobile phones provides exciting opportunities for the growth of mobile banking (m-banking). This paper reviews the emerging research literature on m-banking. It presents a classification framework for m-banking research based on 65 m-banking papers published between 2000 and mid-2010 in Information Systems (IS), technology innovation, management,...

    Provided By Singhala Music

  • White Papers // Feb 2012

    Management of Business Process & Database for Power Utilities

    In this paper, the authors would like to underline the particulars of the IT System and business process requirements of IT Package need to be architected for better understanding of ongoing business in power utilities. This paper details the requirements need to be addressed for better synchronization within current system...

    Provided By Singhala Music

  • White Papers // Jan 2012

    Data Center Establishment to Run the IT System in Power Utilities

    In this paper, the authors will focus the details of the IT System and business process requirements of IT Package need to be installed at Data Centers. This research details the project requirements, which are to be met by the applications and interfaces required within Data Center between different hardware...

    Provided By Singhala Music

  • White Papers // Mar 2010

    FP-Tree and COFI Based Approach for Mining of Multiple Level Association Rules in Large Databases

    In recent years, discovery of association rules among itemsets in a large database has been described as an important database-mining problem. The problem of discovering association rules has received considerable research attention and several algorithms for mining frequent itemsets have been developed. Many algorithms have been proposed to discover rules...

    Provided By Singhala Music

  • White Papers // Dec 2012

    Risk Management in Cloud Computing Through Fuzzy Logic

    Cloud computing is an emerging commercial infrastructure and internet based cost-efficient computing where information can be accessed from a web browser by customers according to their requirement. Cloud computing in a generally term is defined for anything that involves delivering hosted services over the Internet. It is based on the...

    Provided By Singhala Music

  • White Papers // Apr 2013

    Centralized Access Management and Monitoring as a Service in Cloud Environments-A Critical Study

    The aspect of virtualization and large scale distribution has brought forward the cloud computing phenomenon. Despite its popularity, most of the enterprises are still circumspect in getting into clouds completely. The major part of this circumspection owes to the factors of identity and access management, monitoring, auditing and reporting. The...

    Provided By Singhala Music

  • White Papers // Sep 2013

    Biometric Security: A Grand Challenge

    Authentic person identification is an important problem in many applications. The purpose of such schemes is to ensure that the particular services are accessed only by a legal user and no one else. In the absence of proper recognition schemes, these systems are vulnerable to the wiles of an impostor....

    Provided By Singhala Music

  • White Papers // Jun 2012

    Wireless Adhoc Networks Security Principles, Issues & Applications

    Privacy and integrity of packets on WANetworks should be expected by the algorithmic mechanisms. This privacy and integrity is very much is to be mandated by regulations. In tradition the security is only based on cryptographic techniques which is not so much secure and leads to unsecure and unauthenticated information....

    Provided By Singhala Music

  • White Papers // Jan 2012

    Data Center Establishment to Run the IT System in Power Utilities

    In this paper, the authors will focus the details of the IT System and business process requirements of IT Package need to be installed at Data Centers. This research details the project requirements, which are to be met by the applications and interfaces required within Data Center between different hardware...

    Provided By Singhala Music

  • White Papers // Feb 2013

    Disaster Recovery Center Establishment for T4 Data Center to Run the IT System in Power Utilities

    In this paper, the authors will focus the details of the IT system and business process requirements of IT package need to be installed at disaster recovery center. This paper provide details of the project requirements, which are to be met by the applications and interfaces required within disaster recovery...

    Provided By Singhala Music

  • White Papers // Feb 2012

    Management of Business Process & Database for Power Utilities

    In this paper, the authors would like to underline the particulars of the IT System and business process requirements of IT Package need to be architected for better understanding of ongoing business in power utilities. This paper details the requirements need to be addressed for better synchronization within current system...

    Provided By Singhala Music

  • White Papers // Dec 2012

    Human Computer Interpreting With Biometric Recognition System

    Biometric recognition system contains wide variety of recognition techniques using for identification and verification purposes. Wide systems must require reliable personal recognition system due to the security region for the system. The purpose of such system is to ensure that this identification and verification services are accessed only by a...

    Provided By Singhala Music

  • White Papers // Jun 2012

    Mobile Banking in India: Practices, Challenges, and Security Issues

    The increased prevalence of mobile phones provides exciting opportunities for the growth of mobile banking (m-banking). This paper reviews the emerging research literature on m-banking. It presents a classification framework for m-banking research based on 65 m-banking papers published between 2000 and mid-2010 in Information Systems (IS), technology innovation, management,...

    Provided By Singhala Music

  • White Papers // Mar 2010

    FP-Tree and COFI Based Approach for Mining of Multiple Level Association Rules in Large Databases

    In recent years, discovery of association rules among itemsets in a large database has been described as an important database-mining problem. The problem of discovering association rules has received considerable research attention and several algorithms for mining frequent itemsets have been developed. Many algorithms have been proposed to discover rules...

    Provided By Singhala Music

  • White Papers // Jun 2012

    Data Mining Application to Attract Students in HEI

    In the last two decades, number of Higher Education Institutions (HEI) grows in leaps and bounds. This causes a cut throat competition among these institutions while attracting the student get admission in these institutions. To make reach up to the students institution makes effort of advertisement. Similarly developing and developed...

    Provided By Singhala Music