University of Delhi

Displaying 1-22 of 22 results

  • White Papers // Oct 2011

    Bug Tracking and Reliability Assessment System (BTRAS)

    Tracking of a reported bug for fixing is a fascinating area of research in software engineering. Many open source, free and commercial bug tracking tools have been developed and are currently under development. The industry needs criteria to select the best tool among the available set of tools that will...

    Provided By University of Delhi

  • White Papers // Jan 2011

    Real Time Scheduling for Wireless Sensor Networks

    In this paper the authors propose a new scheduling algorithm called Real Time Scheduling (RTS) which deals with all the contributing components of the end-to-end travelling delay of data packets in sensor network. RTS delays packets at intermediate hops (not just prioritizes them) for a duration that is a function...

    Provided By University of Delhi

  • White Papers // Jan 2011

    COTT - A Testability Framework for Object-Oriented Software Testing

    Testable software has two inherent properties - observability and controllability. Observability facilitates observation of internal behavior of software to required degree of detail. Controllability allows creation of difficult-to-achieve states prior to execution of various tests. In this paper, the authors describe COTT, a Controllability and Observability Testing Tool, to create...

    Provided By University of Delhi

  • White Papers // Jan 2011

    System Performance Comparison of Turbo and Trellis Coded Optical CDMA Systems

    In this paper, the authors have compared the performance of a Turbo and Trellis coded Optical Code Division Multiple Access (OCDMA) system. The comparison of the two codes has been accomplished by employing Optical Orthogonal Codes (OOCs). The Bit Error Rate (BER) performances have been compared by varying the code...

    Provided By University of Delhi

  • White Papers // Dec 2010

    Novelty as a Measure of Interestingness in Knowledge Discovery

    Rule Discovery is an important technique for mining knowledge from large databases. Use of objective measures for discovering interesting rules leads to another data mining problem, although of reduced complexity. Data mining researchers have studied subjective measures of interestingness to reduce the volume of discovered rules to ultimately improve the...

    Provided By University of Delhi

  • White Papers // Dec 2010

    Monetary Policy, Capital Flows, And The Exchange Rate

    The use of monetary policy in India has been constrained by a loose fiscal policy and capital flows. Capital inflows have the potential to cause a Dutch Disease-type situation. The RBI has carried out sterilized intervention to prevent this. In spite of this, the trade balance and, more often than...

    Provided By University of Delhi

  • White Papers // Dec 2010

    Singapore~s Exchange Rate-Based Monetary Policy: A Critical Evaluation

    Macroeconomic policy making is, more than other branches of economics, given to fads and fashions. For instance, money supply targets have been given a quiet burial; inflation targeting has taken over the commanding heights of policy-making without any soul-searching that should accompany such a major shift in thinking - almost...

    Provided By University of Delhi

  • White Papers // Nov 2010

    Use of XML to Persist and Transfer Offline Data for Personalized Profiles

    As the internet proliferates a web of interlinked data wider across the globe and deeper into the remotest areas, many more users across the globe are getting access to the web. Wit the advent of Web 2.0 the pattern of internet usage has undergone a paradigm shift. Every user enjoys...

    Provided By University of Delhi

  • White Papers // Oct 2010

    Finding The Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets

    Managed Security Service Providers (MSSPs) must manage and monitor thousands of intrusion detection sensors. The sensors often vary by manufacturer and software version, making the problem of creating generalized tools to separate true attacks from false positives particularly difficult. Often times it is useful from an operations perspective to know...

    Provided By University of Delhi

  • White Papers // Sep 2010

    Liberalization Of Foreign Institutional Investments (FIIS) In India: Magnitude, Impact Assessment, Policy Initiatives And Issues

    In this age of transnational capitalism, a significant amount of capital is flowing from developed world to emerging economies. Portfolio investments brought in by FIIs have been the most dynamic source of capital to emerging markets since 1990s. Since the beginning of liberalization in 1990s, FII flows to India have...

    Provided By University of Delhi

  • White Papers // Sep 2010

    Social Ties And The Job Search Of Recent Immigrants

    The authors show that increasing the probability of obtaining a job offer through the network should raise the observed mean wage in jobs found through formal (non-network) channels relative to that in jobs found through the network. This prediction also holds at all percentiles of the observed wage distribution, except...

    Provided By University of Delhi

  • White Papers // Jul 2010

    Skills, Informality, And Development

    This paper makes an attempt to estimate the index of informal sector employment which can be attributed to the supply-push phenomenon. Factors which explain the inter-state variations include the industrial-informal sector wage gap, revenue expenditure, and development expenditure incurred by the government. Increased development expenditure brings in a decline in...

    Provided By University of Delhi

  • White Papers // Jul 2010

    TCP Performance Through Simulation and Testbed in Multi-Hop Mobile Ad Hoc Network

    When a packet is sent through wireless network it can be lost due to either environmental noise or due to congestion in the network. Traditional TCP protocols do not perform well in the wireless network because they were designed for wired networks with the assumption that the transmission medium is...

    Provided By University of Delhi

  • White Papers // Jun 2010

    Effective Morphological Extraction of True Fingerprint Minutiae Based on the Hit or Miss Transform

    Fingerprints are the most widely used parameter for personal identification amongst all biometrics based personal authentication systems. As most Automatic Fingerprint Recognition Systems are based on local ridge features known as minutiae, marking minutiae accurately and rejecting false ones is critically important. In this paper the authors propose an algorithm...

    Provided By University of Delhi

  • White Papers // Feb 2010

    Detection and Prevention of Wormhole Attack in Mobile Adhoc Networks

    Wireless networks are suspectible to many attacks, including an attack known as the wormhole attack. The wormhole attack is very powerful, and preventing the attack has proven to be very difficult. A strategic placement of the wormhole can result in a significant breakdown in communication across a wireless network. In...

    Provided By University of Delhi

  • White Papers // Dec 2009

    Centralized Lifetime Maximizing Tree for Wireless Sensor Networks

    To enable data aggregation among the event sources in wireless sensor networks and to reduce the communication cost there is a need to establish a coveraged tree structure inside any given event region to allow data reports to be aggregated at a single processing point prior to transmission to the...

    Provided By University of Delhi

  • White Papers // Oct 2009

    Future Trend of Education - Mobile Learning Problems and Prospects

    This paper describes a mobile learning development and future trends of education, where mobile devices are used for educational activities. The main focus of this paper is to find out the problem of the incorporation of mobile learning into mainstream education and training. Find out the answer that how one...

    Provided By University of Delhi

  • White Papers // Jun 2009

    A Dynamic Decision Model for Vertical Handoffs Across Heterogeneous Wireless Networks

    The convergence of heterogeneous wireless access technologies characterizes the 4G wireless networks. In such converged systems, the seamless and efficient handoff between different access technologies (vertical handoff) is essential and remains a challenging problem. The heterogeneous co-existence of access technologies with largely different characteristics creates a decision problem of determining...

    Provided By University of Delhi

  • White Papers // Apr 2009

    Determination Of Inflation In An Open Economy Phillips Curve Framework: The Case Of Developed And Developing Asian Countries

    This paper investigates the determination of inflation in the framework of an open economy forward-looking as well as conventional backward-looking Phillips curve for eight Asian countries - Japan, Hong Kong, Korea, Singapore, Philippines, Thailand, China Mainland and India. Using quarterly data from the 1990s to 2005 and applying the instrumental...

    Provided By University of Delhi

  • White Papers // Apr 2009

    Intellectual Property Protection And Technology Transfer The Case Of Overseas R&D

    This paper investigates whether, in what direction, and to what extent one mode of technology transfer-namely, overseas R&D - is influenced by the strength of intellectual property protection that host nations provide. Using data spanning the period 1977-2004, the authors find weak support at best for the claim that strengthening...

    Provided By University of Delhi

  • White Papers // Nov 2008

    Vertical FDI Versus Outsourcing: A Welfare Comparison From The Perspective Of The Host Country

    The theory on organization of offshore production is most often viewed through the lens of a source country. Moreover, internalization literature in a vertical production transfer context is divorced from its welfare consequences. That is, the decision to "Make or buy" offshore input is usually not connected with the welfare...

    Provided By University of Delhi

  • White Papers // Sep 2008

    Fixed Costs, The Balanced-Budget Multiplier And Welfare

    In a two-sector model, where one of the sectors is monopolistically competitive and subject to increasing returns to scale but without love for variety, the author analyzes the effects of a balanced budget fiscal expansion. Such an expansion could increase the welfare of the representative individual, if elasticities of substitution...

    Provided By University of Delhi

  • White Papers // Oct 2009

    Future Trend of Education - Mobile Learning Problems and Prospects

    This paper describes a mobile learning development and future trends of education, where mobile devices are used for educational activities. The main focus of this paper is to find out the problem of the incorporation of mobile learning into mainstream education and training. Find out the answer that how one...

    Provided By University of Delhi

  • White Papers // Nov 2010

    Use of XML to Persist and Transfer Offline Data for Personalized Profiles

    As the internet proliferates a web of interlinked data wider across the globe and deeper into the remotest areas, many more users across the globe are getting access to the web. Wit the advent of Web 2.0 the pattern of internet usage has undergone a paradigm shift. Every user enjoys...

    Provided By University of Delhi

  • White Papers // Dec 2009

    Centralized Lifetime Maximizing Tree for Wireless Sensor Networks

    To enable data aggregation among the event sources in wireless sensor networks and to reduce the communication cost there is a need to establish a coveraged tree structure inside any given event region to allow data reports to be aggregated at a single processing point prior to transmission to the...

    Provided By University of Delhi

  • White Papers // Feb 2010

    Detection and Prevention of Wormhole Attack in Mobile Adhoc Networks

    Wireless networks are suspectible to many attacks, including an attack known as the wormhole attack. The wormhole attack is very powerful, and preventing the attack has proven to be very difficult. A strategic placement of the wormhole can result in a significant breakdown in communication across a wireless network. In...

    Provided By University of Delhi

  • White Papers // Sep 2010

    Liberalization Of Foreign Institutional Investments (FIIS) In India: Magnitude, Impact Assessment, Policy Initiatives And Issues

    In this age of transnational capitalism, a significant amount of capital is flowing from developed world to emerging economies. Portfolio investments brought in by FIIs have been the most dynamic source of capital to emerging markets since 1990s. Since the beginning of liberalization in 1990s, FII flows to India have...

    Provided By University of Delhi

  • White Papers // Dec 2010

    Monetary Policy, Capital Flows, And The Exchange Rate

    The use of monetary policy in India has been constrained by a loose fiscal policy and capital flows. Capital inflows have the potential to cause a Dutch Disease-type situation. The RBI has carried out sterilized intervention to prevent this. In spite of this, the trade balance and, more often than...

    Provided By University of Delhi

  • White Papers // Sep 2010

    Social Ties And The Job Search Of Recent Immigrants

    The authors show that increasing the probability of obtaining a job offer through the network should raise the observed mean wage in jobs found through formal (non-network) channels relative to that in jobs found through the network. This prediction also holds at all percentiles of the observed wage distribution, except...

    Provided By University of Delhi

  • White Papers // Apr 2009

    Determination Of Inflation In An Open Economy Phillips Curve Framework: The Case Of Developed And Developing Asian Countries

    This paper investigates the determination of inflation in the framework of an open economy forward-looking as well as conventional backward-looking Phillips curve for eight Asian countries - Japan, Hong Kong, Korea, Singapore, Philippines, Thailand, China Mainland and India. Using quarterly data from the 1990s to 2005 and applying the instrumental...

    Provided By University of Delhi

  • White Papers // Sep 2008

    Fixed Costs, The Balanced-Budget Multiplier And Welfare

    In a two-sector model, where one of the sectors is monopolistically competitive and subject to increasing returns to scale but without love for variety, the author analyzes the effects of a balanced budget fiscal expansion. Such an expansion could increase the welfare of the representative individual, if elasticities of substitution...

    Provided By University of Delhi

  • White Papers // Jul 2010

    Skills, Informality, And Development

    This paper makes an attempt to estimate the index of informal sector employment which can be attributed to the supply-push phenomenon. Factors which explain the inter-state variations include the industrial-informal sector wage gap, revenue expenditure, and development expenditure incurred by the government. Increased development expenditure brings in a decline in...

    Provided By University of Delhi

  • White Papers // Jun 2010

    Effective Morphological Extraction of True Fingerprint Minutiae Based on the Hit or Miss Transform

    Fingerprints are the most widely used parameter for personal identification amongst all biometrics based personal authentication systems. As most Automatic Fingerprint Recognition Systems are based on local ridge features known as minutiae, marking minutiae accurately and rejecting false ones is critically important. In this paper the authors propose an algorithm...

    Provided By University of Delhi

  • White Papers // Jan 2011

    Real Time Scheduling for Wireless Sensor Networks

    In this paper the authors propose a new scheduling algorithm called Real Time Scheduling (RTS) which deals with all the contributing components of the end-to-end travelling delay of data packets in sensor network. RTS delays packets at intermediate hops (not just prioritizes them) for a duration that is a function...

    Provided By University of Delhi

  • White Papers // Apr 2009

    Intellectual Property Protection And Technology Transfer The Case Of Overseas R&D

    This paper investigates whether, in what direction, and to what extent one mode of technology transfer-namely, overseas R&D - is influenced by the strength of intellectual property protection that host nations provide. Using data spanning the period 1977-2004, the authors find weak support at best for the claim that strengthening...

    Provided By University of Delhi

  • White Papers // Dec 2010

    Singapore~s Exchange Rate-Based Monetary Policy: A Critical Evaluation

    Macroeconomic policy making is, more than other branches of economics, given to fads and fashions. For instance, money supply targets have been given a quiet burial; inflation targeting has taken over the commanding heights of policy-making without any soul-searching that should accompany such a major shift in thinking - almost...

    Provided By University of Delhi

  • White Papers // Jul 2010

    TCP Performance Through Simulation and Testbed in Multi-Hop Mobile Ad Hoc Network

    When a packet is sent through wireless network it can be lost due to either environmental noise or due to congestion in the network. Traditional TCP protocols do not perform well in the wireless network because they were designed for wired networks with the assumption that the transmission medium is...

    Provided By University of Delhi

  • White Papers // Dec 2010

    Novelty as a Measure of Interestingness in Knowledge Discovery

    Rule Discovery is an important technique for mining knowledge from large databases. Use of objective measures for discovering interesting rules leads to another data mining problem, although of reduced complexity. Data mining researchers have studied subjective measures of interestingness to reduce the volume of discovered rules to ultimately improve the...

    Provided By University of Delhi

  • White Papers // Jan 2011

    System Performance Comparison of Turbo and Trellis Coded Optical CDMA Systems

    In this paper, the authors have compared the performance of a Turbo and Trellis coded Optical Code Division Multiple Access (OCDMA) system. The comparison of the two codes has been accomplished by employing Optical Orthogonal Codes (OOCs). The Bit Error Rate (BER) performances have been compared by varying the code...

    Provided By University of Delhi

  • White Papers // Jun 2009

    A Dynamic Decision Model for Vertical Handoffs Across Heterogeneous Wireless Networks

    The convergence of heterogeneous wireless access technologies characterizes the 4G wireless networks. In such converged systems, the seamless and efficient handoff between different access technologies (vertical handoff) is essential and remains a challenging problem. The heterogeneous co-existence of access technologies with largely different characteristics creates a decision problem of determining...

    Provided By University of Delhi

  • White Papers // Jan 2011

    COTT - A Testability Framework for Object-Oriented Software Testing

    Testable software has two inherent properties - observability and controllability. Observability facilitates observation of internal behavior of software to required degree of detail. Controllability allows creation of difficult-to-achieve states prior to execution of various tests. In this paper, the authors describe COTT, a Controllability and Observability Testing Tool, to create...

    Provided By University of Delhi

  • White Papers // Nov 2008

    Vertical FDI Versus Outsourcing: A Welfare Comparison From The Perspective Of The Host Country

    The theory on organization of offshore production is most often viewed through the lens of a source country. Moreover, internalization literature in a vertical production transfer context is divorced from its welfare consequences. That is, the decision to "Make or buy" offshore input is usually not connected with the welfare...

    Provided By University of Delhi

  • White Papers // Oct 2011

    Bug Tracking and Reliability Assessment System (BTRAS)

    Tracking of a reported bug for fixing is a fascinating area of research in software engineering. Many open source, free and commercial bug tracking tools have been developed and are currently under development. The industry needs criteria to select the best tool among the available set of tools that will...

    Provided By University of Delhi

  • White Papers // Oct 2010

    Finding The Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets

    Managed Security Service Providers (MSSPs) must manage and monitor thousands of intrusion detection sensors. The sensors often vary by manufacturer and software version, making the problem of creating generalized tools to separate true attacks from false positives particularly difficult. Often times it is useful from an operations perspective to know...

    Provided By University of Delhi