Thapar Institute

Displaying 1-25 of 25 results

  • White Papers // Jul 2013

    Enhanced Security for Cloud Storage using Hybrid Encryption

    In the cloud environment, resources are shared among all of the servers, users and individuals. So it is difficult for the cloud provider to ensure file security. As a result it is very easy for an intruder to access, misuse and destroy the original form of data. In case of...

    Provided By Thapar Institute

  • White Papers // Jun 2013

    Impact of Security over System Performance

    Cryptography is concerned with keeping communications private. Today's cryptography is more than secret writing. The purpose of this paper is the implementation of three encryption algorithms and a comparison between them based on CPU execution time, System time and User time. In bibliography, there are three encryption algorithms RSA, DES...

    Provided By Thapar Institute

  • White Papers // May 2013

    Node-Disjoint On-demand Multipath Routing with Route Utilization in Ad-Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a dynamic wireless network without any pre-existing infrastructure and each node therefore operate in a self-organized and decentralized manner, acting as a router. Multipath routing in MANET is a challenging problem. In this paper, an attempt has been made to compare the accomplishment of conspicuous...

    Provided By Thapar Institute

  • White Papers // Apr 2013

    Advance Billing and Metering Architecture for Infrastructure as a Service

    Billing in Infrastructure as a Service (IaaS) is a complex task that is often compromised due to lack of various interactions (consumer, provider, budget manager, agent and online payment) simultaneously along with necessary features like discount, tax, plan, etc. Until Billing is considered as a last essential ability, appropriate framework...

    Provided By Thapar Institute

  • White Papers // Mar 2013

    Classification of Symmetric Key Management Schemes for Wireless Sensor Networks

    WSN is the collection of thousands of tiny sensor nodes, which have the capability of sensing, computing and transmitting the information in the network. Due to the low circuit design, it has some resource constraints but efficient to carry the information through wireless communication. But the exchange of information in...

    Provided By Thapar Institute

  • White Papers // Feb 2013

    Cloud Based Development Issues: A Methodical Analysis

    Cloud based development is a challenging task for various software engineering projects, especifically for those which demand extraordinary quality, reusability and security along with general architecture. In this paper, the authors present a report on a methodical analysis of cloud based development problems published in major computer science and software...

    Provided By Thapar Institute

  • White Papers // Jan 2013

    Comparative Analysis of Anomaly Based and Signature Based Intrusion Detection Systems Using PHAD and Snort

    With the rapid expansion of computer networks during the past few decades, security has become a crucial issue in the computer systems. The purpose of network security is to protect the network from unauthorized access and disclosure. The recent advancements in the field of network security helps in the protection...

    Provided By Thapar Institute

  • White Papers // Oct 2012

    Reusability Framework for Cloud Computing

    Cloud based development is a challenging task for several software engineering projects, especially for those which needs development with reusability. Present time of cloud computing is allowing new professional models for using the software development. The expected upcoming trend of computing is assumed to be this cloud computing because of...

    Provided By Thapar Institute

  • White Papers // Sep 2012

    Behavior based Automated Test Case Generation for Object Oriented Systems

    Software Testing is the process of executing a program with the intention of finding errors. Every software code has been reviewed and verified through SQA activities but these activities are not sufficient. Every time the software delivered to the client has been thoroughly tested by client before sending it to...

    Provided By Thapar Institute

  • White Papers // Sep 2012

    Vulnerability Management for an Enterprise Resource Planning System

    Enterprise Resource Planning (ERP) systems are commonly used in Technical Educational Institutions (TEIs). ERP systems should continue providing services to its users irrespective of the level of failure. There could be many types of failures in the ERP systems. There are different types of measures or characteristics that can be...

    Provided By Thapar Institute

  • White Papers // Aug 2012

    Algorithm for Elimination of Clipping Effects and Ghost Ringing in SIP Initiated IPSec Based VoIP

    The security in Voice over IP using SIP initiated IPSec tunnel with the help of Multimedia Internet KEYing (MIKEY) protocol has been studied in this paper. Call establishment in SIP initiated IPSec deals with cryptographic processing at the caller and the recipient end. Cryptographic parameter negotiation for IPSec is done...

    Provided By Thapar Institute

  • White Papers // Aug 2012

    Design and Deployment of Workflows in Cloud Environment

    Cloud computing is a new benchmark towards enterprise application development that can effectively facilitate the execution of workflows in business process management systems. Workflow applications often require very complex execution environments that are difficult to create otherwise. Integration of the workflow management systems for application deployment with any of the...

    Provided By Thapar Institute

  • White Papers // Aug 2012

    Performance Analysis of ZigBee Protocol in Smart Dust Communication Network

    Smart Dust is the network of small devices (also called as Sensor Nodes) with many electronic components such as memory, CPU, radio and sensor and each of these components consumes power. Sensor nodes have a battery and can work only as long as the battery lasts. In other words, it...

    Provided By Thapar Institute

  • White Papers // Jul 2012

    Distributed and Big Data Storage Management in Grid Computing

    Big data storage management is one of the most challenging issues for Grid computing environments, since large amount of data intensive applications frequently involve a high degree of data access locality. Grid applications typically deal with large amounts of data. In traditional approaches high-performance computing consists dedicated servers that are...

    Provided By Thapar Institute

  • White Papers // Jul 2012

    Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

    Cloud computing is a recent innovation, which provides various services on a usage based payment model. The rapid expansion in data centers has triggered the dramatic increase in energy used, operational cost and its effect on the environment in terms of carbon footprints. To reduce power consumption, it is necessary...

    Provided By Thapar Institute

  • White Papers // Jul 2012

    Enabling Reusability in Agile Software Development

    Software Engineering Discipline is constantly achieving momentum from past two decades. In last decade, remarkable progress has been observed. New process models that are introduced from time to time in order to keep pace with multidimensional demands of the industry. New software development paradigms are finding its place in industry...

    Provided By Thapar Institute

  • White Papers // Jun 2012

    Beyond Pstn: NGN (Next Generation Network)

    In this paper, the authors describes a review of study of NGN technology, its needs, its basic concept, layers in NGN architecture, essential components, various applications etc. Today, most of the telecom service providers are in the race of migrating from the Public Switched Telephone Network (PSTN) to the Next...

    Provided By Thapar Institute

  • White Papers // Jun 2012

    An Efficient Algorithm for Web Page Change Detection

    Internet is actively used for the exchange of information. People upload the web pages and updating the new web pages very frequently. There is a frequent change in the content of the web page hence it become necessary to develop an efficient system which could detect these changes efficiently and...

    Provided By Thapar Institute

  • White Papers // Jun 2012

    Dual Band Defected Ground Microstrip Patch Antenna for WLAN/WiMax and Satellite Application

    A microstrip patch antenna for Wi-Max and GSM application is proposed. The antenna has a frequency bandwidth of 1.24 GHz (4.6053 GHz - 5.8481 GHz) for WLAN and Wi-Max and 1.04 GHz (6.124 GHz - 7.16 GHz) for Satellite application. The microstrip antenna has a planar geometry and consists of...

    Provided By Thapar Institute

  • White Papers // Jun 2012

    An Efficient Algorithm for Data Cleaning of Log File Using File Extensions

    World Wide Web is a monolithic repository of web pages that provides the Internet users with heaps of information. With the growth in number and complexity of Websites, the size of web has become massively large. Web Usage Mining is a division of web mining that involves application of mining...

    Provided By Thapar Institute

  • White Papers // May 2012

    Empirical Evaluation of Cloud-based Testing Techniques: A Systematic Review

    Software testing is a challenging activity for many software engineering projects, especially for large scale systems. The amount of tests cases can range from a few hundred to several thousands, requiring significant computing resources and lengthy execution times. Cloud computing offers the potential to address both of these issues: it...

    Provided By Thapar Institute

  • White Papers // Feb 2012

    Existing Load Balancing Techniques in Cloud Computing: A Systematic Review

    In cloud computing, load balancing is required to distribute the dynamic local workload evenly across all the nodes. It helps to achieve a high user satisfaction and resource utilization ratio by ensuring an efficient and fair allocation of every computing resource. Proper load balancing aids in minimizing resource consumption, implementing...

    Provided By Thapar Institute

  • White Papers // Feb 2012

    Online Financial Algorithms Competitive Analysis

    Analysis of algorithms with complete knowledge of its inputs is sometimes not up to user's expectations. Many times the authors are surrounded with such scenarios where inputs are generated without any prior knowledge. Online Algorithms have found their applicability in broad areas of computer engineering. Among these, an online financial...

    Provided By Thapar Institute

  • White Papers // Oct 2011

    A Framework for Efficient Enterprise Resource Planning (ERP) Implementation in Technical Educational Institutions

    Technical Educational Institutions (TEIs) can use enterprise resource planning for an integrated, better and efficient system for management of all the information related to many users in these Institutions. Though ERP is used in many TEIs in India, but it has not been found to be completely successful. This paper...

    Provided By Thapar Institute

  • White Papers // Jun 2009

    An Improved Resource Discovery Approach Using P2P Model for Condor: A Grid Middleware

    Resource Discovery in Grids is critical for efficient resource allocation and management. Heterogeneous nature and dynamic availability of resources make resource discovery a challenging task. As numbers of nodes are increasing from tens to thousands, scalability is essentially desired. Peer-to-Peer (P2P) techniques, on the other hand, provide effective implementation of...

    Provided By Thapar Institute

  • White Papers // Sep 2012

    Behavior based Automated Test Case Generation for Object Oriented Systems

    Software Testing is the process of executing a program with the intention of finding errors. Every software code has been reviewed and verified through SQA activities but these activities are not sufficient. Every time the software delivered to the client has been thoroughly tested by client before sending it to...

    Provided By Thapar Institute

  • White Papers // Jun 2012

    Beyond Pstn: NGN (Next Generation Network)

    In this paper, the authors describes a review of study of NGN technology, its needs, its basic concept, layers in NGN architecture, essential components, various applications etc. Today, most of the telecom service providers are in the race of migrating from the Public Switched Telephone Network (PSTN) to the Next...

    Provided By Thapar Institute

  • White Papers // Aug 2012

    Algorithm for Elimination of Clipping Effects and Ghost Ringing in SIP Initiated IPSec Based VoIP

    The security in Voice over IP using SIP initiated IPSec tunnel with the help of Multimedia Internet KEYing (MIKEY) protocol has been studied in this paper. Call establishment in SIP initiated IPSec deals with cryptographic processing at the caller and the recipient end. Cryptographic parameter negotiation for IPSec is done...

    Provided By Thapar Institute

  • White Papers // Aug 2012

    Design and Deployment of Workflows in Cloud Environment

    Cloud computing is a new benchmark towards enterprise application development that can effectively facilitate the execution of workflows in business process management systems. Workflow applications often require very complex execution environments that are difficult to create otherwise. Integration of the workflow management systems for application deployment with any of the...

    Provided By Thapar Institute

  • White Papers // Aug 2012

    Performance Analysis of ZigBee Protocol in Smart Dust Communication Network

    Smart Dust is the network of small devices (also called as Sensor Nodes) with many electronic components such as memory, CPU, radio and sensor and each of these components consumes power. Sensor nodes have a battery and can work only as long as the battery lasts. In other words, it...

    Provided By Thapar Institute

  • White Papers // Jul 2012

    Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

    Cloud computing is a recent innovation, which provides various services on a usage based payment model. The rapid expansion in data centers has triggered the dramatic increase in energy used, operational cost and its effect on the environment in terms of carbon footprints. To reduce power consumption, it is necessary...

    Provided By Thapar Institute

  • White Papers // Jul 2012

    Enabling Reusability in Agile Software Development

    Software Engineering Discipline is constantly achieving momentum from past two decades. In last decade, remarkable progress has been observed. New process models that are introduced from time to time in order to keep pace with multidimensional demands of the industry. New software development paradigms are finding its place in industry...

    Provided By Thapar Institute

  • White Papers // Jun 2012

    An Efficient Algorithm for Web Page Change Detection

    Internet is actively used for the exchange of information. People upload the web pages and updating the new web pages very frequently. There is a frequent change in the content of the web page hence it become necessary to develop an efficient system which could detect these changes efficiently and...

    Provided By Thapar Institute

  • White Papers // Jun 2012

    Dual Band Defected Ground Microstrip Patch Antenna for WLAN/WiMax and Satellite Application

    A microstrip patch antenna for Wi-Max and GSM application is proposed. The antenna has a frequency bandwidth of 1.24 GHz (4.6053 GHz - 5.8481 GHz) for WLAN and Wi-Max and 1.04 GHz (6.124 GHz - 7.16 GHz) for Satellite application. The microstrip antenna has a planar geometry and consists of...

    Provided By Thapar Institute

  • White Papers // Jun 2012

    An Efficient Algorithm for Data Cleaning of Log File Using File Extensions

    World Wide Web is a monolithic repository of web pages that provides the Internet users with heaps of information. With the growth in number and complexity of Websites, the size of web has become massively large. Web Usage Mining is a division of web mining that involves application of mining...

    Provided By Thapar Institute

  • White Papers // Mar 2013

    Classification of Symmetric Key Management Schemes for Wireless Sensor Networks

    WSN is the collection of thousands of tiny sensor nodes, which have the capability of sensing, computing and transmitting the information in the network. Due to the low circuit design, it has some resource constraints but efficient to carry the information through wireless communication. But the exchange of information in...

    Provided By Thapar Institute

  • White Papers // May 2013

    Node-Disjoint On-demand Multipath Routing with Route Utilization in Ad-Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a dynamic wireless network without any pre-existing infrastructure and each node therefore operate in a self-organized and decentralized manner, acting as a router. Multipath routing in MANET is a challenging problem. In this paper, an attempt has been made to compare the accomplishment of conspicuous...

    Provided By Thapar Institute

  • White Papers // Jun 2009

    An Improved Resource Discovery Approach Using P2P Model for Condor: A Grid Middleware

    Resource Discovery in Grids is critical for efficient resource allocation and management. Heterogeneous nature and dynamic availability of resources make resource discovery a challenging task. As numbers of nodes are increasing from tens to thousands, scalability is essentially desired. Peer-to-Peer (P2P) techniques, on the other hand, provide effective implementation of...

    Provided By Thapar Institute

  • White Papers // Feb 2012

    Online Financial Algorithms Competitive Analysis

    Analysis of algorithms with complete knowledge of its inputs is sometimes not up to user's expectations. Many times the authors are surrounded with such scenarios where inputs are generated without any prior knowledge. Online Algorithms have found their applicability in broad areas of computer engineering. Among these, an online financial...

    Provided By Thapar Institute

  • White Papers // Oct 2012

    Reusability Framework for Cloud Computing

    Cloud based development is a challenging task for several software engineering projects, especially for those which needs development with reusability. Present time of cloud computing is allowing new professional models for using the software development. The expected upcoming trend of computing is assumed to be this cloud computing because of...

    Provided By Thapar Institute

  • White Papers // Jul 2012

    Distributed and Big Data Storage Management in Grid Computing

    Big data storage management is one of the most challenging issues for Grid computing environments, since large amount of data intensive applications frequently involve a high degree of data access locality. Grid applications typically deal with large amounts of data. In traditional approaches high-performance computing consists dedicated servers that are...

    Provided By Thapar Institute

  • White Papers // Feb 2013

    Cloud Based Development Issues: A Methodical Analysis

    Cloud based development is a challenging task for various software engineering projects, especifically for those which demand extraordinary quality, reusability and security along with general architecture. In this paper, the authors present a report on a methodical analysis of cloud based development problems published in major computer science and software...

    Provided By Thapar Institute

  • White Papers // Apr 2013

    Advance Billing and Metering Architecture for Infrastructure as a Service

    Billing in Infrastructure as a Service (IaaS) is a complex task that is often compromised due to lack of various interactions (consumer, provider, budget manager, agent and online payment) simultaneously along with necessary features like discount, tax, plan, etc. Until Billing is considered as a last essential ability, appropriate framework...

    Provided By Thapar Institute

  • White Papers // Jan 2013

    Comparative Analysis of Anomaly Based and Signature Based Intrusion Detection Systems Using PHAD and Snort

    With the rapid expansion of computer networks during the past few decades, security has become a crucial issue in the computer systems. The purpose of network security is to protect the network from unauthorized access and disclosure. The recent advancements in the field of network security helps in the protection...

    Provided By Thapar Institute

  • White Papers // May 2012

    Empirical Evaluation of Cloud-based Testing Techniques: A Systematic Review

    Software testing is a challenging activity for many software engineering projects, especially for large scale systems. The amount of tests cases can range from a few hundred to several thousands, requiring significant computing resources and lengthy execution times. Cloud computing offers the potential to address both of these issues: it...

    Provided By Thapar Institute

  • White Papers // Feb 2012

    Existing Load Balancing Techniques in Cloud Computing: A Systematic Review

    In cloud computing, load balancing is required to distribute the dynamic local workload evenly across all the nodes. It helps to achieve a high user satisfaction and resource utilization ratio by ensuring an efficient and fair allocation of every computing resource. Proper load balancing aids in minimizing resource consumption, implementing...

    Provided By Thapar Institute

  • White Papers // Jun 2013

    Impact of Security over System Performance

    Cryptography is concerned with keeping communications private. Today's cryptography is more than secret writing. The purpose of this paper is the implementation of three encryption algorithms and a comparison between them based on CPU execution time, System time and User time. In bibliography, there are three encryption algorithms RSA, DES...

    Provided By Thapar Institute

  • White Papers // Oct 2011

    A Framework for Efficient Enterprise Resource Planning (ERP) Implementation in Technical Educational Institutions

    Technical Educational Institutions (TEIs) can use enterprise resource planning for an integrated, better and efficient system for management of all the information related to many users in these Institutions. Though ERP is used in many TEIs in India, but it has not been found to be completely successful. This paper...

    Provided By Thapar Institute

  • White Papers // Sep 2012

    Vulnerability Management for an Enterprise Resource Planning System

    Enterprise Resource Planning (ERP) systems are commonly used in Technical Educational Institutions (TEIs). ERP systems should continue providing services to its users irrespective of the level of failure. There could be many types of failures in the ERP systems. There are different types of measures or characteristics that can be...

    Provided By Thapar Institute

  • White Papers // Jul 2013

    Enhanced Security for Cloud Storage using Hybrid Encryption

    In the cloud environment, resources are shared among all of the servers, users and individuals. So it is difficult for the cloud provider to ensure file security. As a result it is very easy for an intruder to access, misuse and destroy the original form of data. In case of...

    Provided By Thapar Institute