University of Pune

Displaying 1-25 of 25 results

  • White Papers // Nov 2012

    Fair Resource Allocation for Device-to-Device Communications in Wireless Cellular Networks

    In this paper, the authors consider the fair resource allocation problem for Device-To-Device (D2D) communications in Orthogonal Frequency Division Multiple Access (OFDMA)-based wireless cellular networks. In particular, they propose a two-phase solution approach where resource allocation for cellular downlink and uplink flows with max-min fairness is performed in the first...

    Provided By University of Pune

  • White Papers // Nov 2012

    On the Problem of Mapping Virtual Machines to Physical Machines for Delay Sensitive Services

    - Server virtualization is usually used to consolidate multiple virtual machines in the same physical server for power consumption and cost reduction purposes. On the other hand, several virtual machines' killer applications are delay sensitive since they

    Provided By University of Pune

  • White Papers // May 2012

    Performance Evaluation of Multi-Hop Multi-Branch Relaying Networks With Multiple Co-Channel Interferers

    In this paper, the performance of opportunistic amplify-and-forward multi-hop multi-branch relaying systems operating in the presence of co-channel interferences is investigated. Considering transmissions over independent non-identical Rayleigh fading channels, exact and upper-bound expressions for the end-to-end Signal-to-Interference-plus-Noise Ratio (SINR) are obtained. Then, the Cumulative Distribution Function (CDF) and the Probability...

    Provided By University of Pune

  • White Papers // May 2012

    Joint Load Balancing and Admission Control in OFDMA-Based Femtocell Networks

    In this paper, the authors consider the admission control problem for hybrid access in OFDMA-based femtocell networks. They assume that Macrocell User Equipments (MUEs) can establish connections with Femtocell Base Stations (FBSs) to improve their QoSs. Both MUEs and Femtocell User Equipments (FUEs) have minimum rate requirements, which depend on...

    Provided By University of Pune

  • White Papers // May 2012

    On the Performance of Two-Way Amplify-and-Forward Relaying in the Presence of Co-Channel Interferences

    In this paper, the authors study the error performance of two-way Amplify-and-Forward (AF) relaying over independent but not necessarily identically distributed Rayleigh fading channels, in the presence of co-channel interfering signals affecting the network nodes. Closed-form expressions for the Cumulative Distribution Function (CDF) of the Signal-to-Interference-plus Noise Ratio (SINR) and...

    Provided By University of Pune

  • White Papers // Apr 2012

    HMM Based Enhanced Security System for ATM Payment

    A Hidden Markov Model (HMM) is a statistical model using a Markov process with observed state thus is clearly a dynamic Bayesian network of statistical assumption technique. Mobile device induced distributed security environment is proposed for meeting pass code challenge to complicate security by making the ATM payment frauds impossible....

    Provided By University of Pune

  • White Papers // Feb 2012

    Performance Evaluation of Constant Envelope OFDM Working in 60 GHz Band

    The 60 GHz band is of much interest since this is the band in which a massive amount of spectral space (5 GHz) has been allocated unlicensed worldwide for dense wireless local communications. OFDM has gained much popularity in the field of wireless communication because of its ability to transfer...

    Provided By University of Pune

  • White Papers // Feb 2012

    Web Caching and XML Prefetching for Accessing Social Sites From Mobile Environment

    As the authors know Web caching and pre-fetching is a ubiquitous technique that can increase the speed of Web loading process. Because of mobile context has limited resources like speed and memory, a better technique for Web loading process is needed. In this paper, they are going to study a...

    Provided By University of Pune

  • White Papers // Jan 2012

    An Overview of Privacy and Security in SNS

    The use of Social Networking web sites and applications is rising day by day, many users are not properly informed of the risks associated with using these sites and application. User should understand these risks and challenges to avoid potential loss of private and personal information. Here, the authors are...

    Provided By University of Pune

  • White Papers // Jan 2012

    Infringement Preclusion System Via SADEC: Stealthy Attack Detection and Countermeasure

    In this paper, the authors are providing a implementation details about simulated solution of stealthy packet drop attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from reaching to it's...

    Provided By University of Pune

  • White Papers // Nov 2011

    Comparison of LTE and WiMAX on the Basis of Qualities

    The explosive growth of the mobile broadband usage and that increases the traffic volume. To better meet these future requirement various technology standard explore options for 4G technology. The explored new emerging wireless broadband technologies are LTE and WiMAX. The next-generation mobile broadband technologies i.e. LTE and WiMAX are leading...

    Provided By University of Pune

  • White Papers // Nov 2011

    Mapping of Virtual Machines in Private Cloud

    Over the past few years, the concept of cloud computing and virtualization has gained much momentum and has become popular technology in IT field. Infrastructure as a Service providers use virtualization to abstract their hardware and to create a dynamic data center. Virtualization enables the consolidation of virtual machines as...

    Provided By University of Pune

  • White Papers // Nov 2011

    Compression and Decompression of Virtual Disk Using Deduplication

    The basic goal of virtualization is to centralize administrative tasks while improving scalability and workload. One of the biggest challenges to the data storage community is how to effectively store data without taking the exact same data and storing again and again in different locations on the back end servers....

    Provided By University of Pune

  • White Papers // Jul 2011

    A Distributed Dynamic Channel Allocation in Cellular Communication

    Now a day, mobile users are growing rapidly and the available frequency spectrum is limited. Therefore the available spectrum must be efficiently utilized. In response a large number of channel assignment and allocation policies have been proposed. Mostly Dynamic Channel Allocation (DCA) has become an important subject of research and...

    Provided By University of Pune

  • White Papers // Apr 2011

    Requirements of Vertical Handoff Mechanism in 4G Wireless Networks

    The importance of wireless communication is increasing day by day throughout the world due to cellular and broadband technologies. Everyone around the world would like to be connected seamlessly anytime anywhere through the best network. The 4G wireless system must have the capability to provide high data transfer rates, quality...

    Provided By University of Pune

  • White Papers // Apr 2011

    SOM and PCA Approach for Face Recognition - A Survey

    Wouldn't one love to replace password based access control to avoid having to reset forgotten password and worry about the integrity of one system? Wouldn't one like to rest secure in comfort that one healthcare system does not merely on one social security number as proof of their identity for...

    Provided By University of Pune

  • White Papers // Feb 2011

    Resource Management Using I-Cluster in Cloud

    In today's "E-World" computing is taking up an essential part of business. Computing is coming up as the fifth utility after water, gas, electricity and telephony. This has led to the development of various computing paradigms like grid computing and Cluster computing. This paper deals with cloud computing as the...

    Provided By University of Pune

  • White Papers // Feb 2011

    Hybrid Mobile Positioning Management Framework Based on Radio Communication and Global Positioning Approaches

    Mobile devices location systems for remote objects (vehicle, person, commodity, etc.), such as RTLS (Real Time Location System) in general and AVL (Automatic Vehicle Location) particularly for vehicles and persons, are increasingly used today by several enterprises. Indeed, this facilitates the management of personal, products, increases productivity, and so on....

    Provided By University of Pune

  • White Papers // Dec 2010

    Pattern Recognition Using Neural Networks

    Face Recognition has been identified as one of the attracting research areas and it has drawn the attention of many researchers due to its varying applications such as security systems, medical systems, entertainment, etc. Face recognition is the preferred mode of identification by humans: it is natural, robust and non-intrusive....

    Provided By University of Pune

  • White Papers // Sep 2010

    An Overview of Registration Based and Registration Free Methods for Cancelable Fingerprint Template

    Cancelable biometric techniques are becoming popular as they provide the advantages of privacy and security, not provided by biometric authentication system. It transforms a biometric signal or feature into a new signal or feature by some transformation. These are non invertible transforms to make sure that the original biometric template...

    Provided By University of Pune

  • White Papers // Aug 2010

    Performance Analysis of MUSIC and ESPRIT DOA Estimation Algorithms for Adaptive Array Smart Antenna in Mobile Communication

    Adaptive array smart antenna involves the array processing to manipulate the signals induced on various antenna elements in such way that the main beam directing towards the desired signal and forming the nulls towards the interferers. Such smart antennas are widely used in wireless mobile communications as they can increase...

    Provided By University of Pune

  • White Papers // Apr 2010

    Wrapper Generator Using Java Native Interface

    The purpose of this paper is to provide a complete automated solution to the wrapping and compilation of legacy code in order to facilitate the use of native libraries in effective ways through Java Native Interface. Legacy codes are those libraries, command line applications or other types of systems that...

    Provided By University of Pune

  • White Papers // Mar 2010

    A Case Study on Multiparty Calls Differentiation in the IP Multimedia

    The IP Multimedia Subsystem (IMS) is a key component of 3G networks aimed at enabling the seamless provisioning of IP multimedia services to end users. Multiparty sessions (or conferences), which enable the conversational exchange of multimedia content between several parties, represent one of the specialized services supported by the IMS....

    Provided By University of Pune

  • White Papers // Jan 2010

    M-Banking Security - A Futuristic Improved Security Approach

    In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill their dreams. Any sector needs to understand the changing needs of customers. In order to satisfy the financial need of customers, banks are taking...

    Provided By University of Pune

  • White Papers // Jun 2009

    Issues in Deploying Smart Antennas in Mobile Radio Networks

    With the exponentially increasing demand for wireless communications the capacity of current cellular systems will soon become incapable of handling the growing traffic. Since radio frequencies are diminishing natural resources, there seems to be a fundamental barrier to further capacity increase. The solution can be found in smart antenna systems....

    Provided By University of Pune

  • White Papers // May 2012

    Performance Evaluation of Multi-Hop Multi-Branch Relaying Networks With Multiple Co-Channel Interferers

    In this paper, the performance of opportunistic amplify-and-forward multi-hop multi-branch relaying systems operating in the presence of co-channel interferences is investigated. Considering transmissions over independent non-identical Rayleigh fading channels, exact and upper-bound expressions for the end-to-end Signal-to-Interference-plus-Noise Ratio (SINR) are obtained. Then, the Cumulative Distribution Function (CDF) and the Probability...

    Provided By University of Pune

  • White Papers // May 2012

    Joint Load Balancing and Admission Control in OFDMA-Based Femtocell Networks

    In this paper, the authors consider the admission control problem for hybrid access in OFDMA-based femtocell networks. They assume that Macrocell User Equipments (MUEs) can establish connections with Femtocell Base Stations (FBSs) to improve their QoSs. Both MUEs and Femtocell User Equipments (FUEs) have minimum rate requirements, which depend on...

    Provided By University of Pune

  • White Papers // Sep 2010

    An Overview of Registration Based and Registration Free Methods for Cancelable Fingerprint Template

    Cancelable biometric techniques are becoming popular as they provide the advantages of privacy and security, not provided by biometric authentication system. It transforms a biometric signal or feature into a new signal or feature by some transformation. These are non invertible transforms to make sure that the original biometric template...

    Provided By University of Pune

  • White Papers // Dec 2010

    Pattern Recognition Using Neural Networks

    Face Recognition has been identified as one of the attracting research areas and it has drawn the attention of many researchers due to its varying applications such as security systems, medical systems, entertainment, etc. Face recognition is the preferred mode of identification by humans: it is natural, robust and non-intrusive....

    Provided By University of Pune

  • White Papers // Apr 2011

    Requirements of Vertical Handoff Mechanism in 4G Wireless Networks

    The importance of wireless communication is increasing day by day throughout the world due to cellular and broadband technologies. Everyone around the world would like to be connected seamlessly anytime anywhere through the best network. The 4G wireless system must have the capability to provide high data transfer rates, quality...

    Provided By University of Pune

  • White Papers // Jan 2010

    M-Banking Security - A Futuristic Improved Security Approach

    In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill their dreams. Any sector needs to understand the changing needs of customers. In order to satisfy the financial need of customers, banks are taking...

    Provided By University of Pune

  • White Papers // Feb 2011

    Resource Management Using I-Cluster in Cloud

    In today's "E-World" computing is taking up an essential part of business. Computing is coming up as the fifth utility after water, gas, electricity and telephony. This has led to the development of various computing paradigms like grid computing and Cluster computing. This paper deals with cloud computing as the...

    Provided By University of Pune

  • White Papers // Aug 2010

    Performance Analysis of MUSIC and ESPRIT DOA Estimation Algorithms for Adaptive Array Smart Antenna in Mobile Communication

    Adaptive array smart antenna involves the array processing to manipulate the signals induced on various antenna elements in such way that the main beam directing towards the desired signal and forming the nulls towards the interferers. Such smart antennas are widely used in wireless mobile communications as they can increase...

    Provided By University of Pune

  • White Papers // Jul 2011

    A Distributed Dynamic Channel Allocation in Cellular Communication

    Now a day, mobile users are growing rapidly and the available frequency spectrum is limited. Therefore the available spectrum must be efficiently utilized. In response a large number of channel assignment and allocation policies have been proposed. Mostly Dynamic Channel Allocation (DCA) has become an important subject of research and...

    Provided By University of Pune

  • White Papers // Apr 2011

    SOM and PCA Approach for Face Recognition - A Survey

    Wouldn't one love to replace password based access control to avoid having to reset forgotten password and worry about the integrity of one system? Wouldn't one like to rest secure in comfort that one healthcare system does not merely on one social security number as proof of their identity for...

    Provided By University of Pune

  • White Papers // Nov 2011

    Compression and Decompression of Virtual Disk Using Deduplication

    The basic goal of virtualization is to centralize administrative tasks while improving scalability and workload. One of the biggest challenges to the data storage community is how to effectively store data without taking the exact same data and storing again and again in different locations on the back end servers....

    Provided By University of Pune

  • White Papers // Nov 2011

    Mapping of Virtual Machines in Private Cloud

    Over the past few years, the concept of cloud computing and virtualization has gained much momentum and has become popular technology in IT field. Infrastructure as a Service providers use virtualization to abstract their hardware and to create a dynamic data center. Virtualization enables the consolidation of virtual machines as...

    Provided By University of Pune

  • White Papers // Jan 2012

    An Overview of Privacy and Security in SNS

    The use of Social Networking web sites and applications is rising day by day, many users are not properly informed of the risks associated with using these sites and application. User should understand these risks and challenges to avoid potential loss of private and personal information. Here, the authors are...

    Provided By University of Pune

  • White Papers // Feb 2012

    Web Caching and XML Prefetching for Accessing Social Sites From Mobile Environment

    As the authors know Web caching and pre-fetching is a ubiquitous technique that can increase the speed of Web loading process. Because of mobile context has limited resources like speed and memory, a better technique for Web loading process is needed. In this paper, they are going to study a...

    Provided By University of Pune

  • White Papers // Nov 2011

    Comparison of LTE and WiMAX on the Basis of Qualities

    The explosive growth of the mobile broadband usage and that increases the traffic volume. To better meet these future requirement various technology standard explore options for 4G technology. The explored new emerging wireless broadband technologies are LTE and WiMAX. The next-generation mobile broadband technologies i.e. LTE and WiMAX are leading...

    Provided By University of Pune

  • White Papers // Feb 2012

    Performance Evaluation of Constant Envelope OFDM Working in 60 GHz Band

    The 60 GHz band is of much interest since this is the band in which a massive amount of spectral space (5 GHz) has been allocated unlicensed worldwide for dense wireless local communications. OFDM has gained much popularity in the field of wireless communication because of its ability to transfer...

    Provided By University of Pune

  • White Papers // Apr 2012

    HMM Based Enhanced Security System for ATM Payment

    A Hidden Markov Model (HMM) is a statistical model using a Markov process with observed state thus is clearly a dynamic Bayesian network of statistical assumption technique. Mobile device induced distributed security environment is proposed for meeting pass code challenge to complicate security by making the ATM payment frauds impossible....

    Provided By University of Pune

  • White Papers // Jan 2012

    Infringement Preclusion System Via SADEC: Stealthy Attack Detection and Countermeasure

    In this paper, the authors are providing a implementation details about simulated solution of stealthy packet drop attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from reaching to it's...

    Provided By University of Pune

  • White Papers // Feb 2011

    Hybrid Mobile Positioning Management Framework Based on Radio Communication and Global Positioning Approaches

    Mobile devices location systems for remote objects (vehicle, person, commodity, etc.), such as RTLS (Real Time Location System) in general and AVL (Automatic Vehicle Location) particularly for vehicles and persons, are increasingly used today by several enterprises. Indeed, this facilitates the management of personal, products, increases productivity, and so on....

    Provided By University of Pune

  • White Papers // Mar 2010

    A Case Study on Multiparty Calls Differentiation in the IP Multimedia

    The IP Multimedia Subsystem (IMS) is a key component of 3G networks aimed at enabling the seamless provisioning of IP multimedia services to end users. Multiparty sessions (or conferences), which enable the conversational exchange of multimedia content between several parties, represent one of the specialized services supported by the IMS....

    Provided By University of Pune

  • White Papers // May 2012

    On the Performance of Two-Way Amplify-and-Forward Relaying in the Presence of Co-Channel Interferences

    In this paper, the authors study the error performance of two-way Amplify-and-Forward (AF) relaying over independent but not necessarily identically distributed Rayleigh fading channels, in the presence of co-channel interfering signals affecting the network nodes. Closed-form expressions for the Cumulative Distribution Function (CDF) of the Signal-to-Interference-plus Noise Ratio (SINR) and...

    Provided By University of Pune

  • White Papers // Nov 2012

    Fair Resource Allocation for Device-to-Device Communications in Wireless Cellular Networks

    In this paper, the authors consider the fair resource allocation problem for Device-To-Device (D2D) communications in Orthogonal Frequency Division Multiple Access (OFDMA)-based wireless cellular networks. In particular, they propose a two-phase solution approach where resource allocation for cellular downlink and uplink flows with max-min fairness is performed in the first...

    Provided By University of Pune

  • White Papers // Nov 2012

    On the Problem of Mapping Virtual Machines to Physical Machines for Delay Sensitive Services

    - Server virtualization is usually used to consolidate multiple virtual machines in the same physical server for power consumption and cost reduction purposes. On the other hand, several virtual machines' killer applications are delay sensitive since they

    Provided By University of Pune

  • White Papers // Apr 2010

    Wrapper Generator Using Java Native Interface

    The purpose of this paper is to provide a complete automated solution to the wrapping and compilation of legacy code in order to facilitate the use of native libraries in effective ways through Java Native Interface. Legacy codes are those libraries, command line applications or other types of systems that...

    Provided By University of Pune

  • White Papers // Jun 2009

    Issues in Deploying Smart Antennas in Mobile Radio Networks

    With the exponentially increasing demand for wireless communications the capacity of current cellular systems will soon become incapable of handling the growing traffic. Since radio frequencies are diminishing natural resources, there seems to be a fundamental barrier to further capacity increase. The solution can be found in smart antenna systems....

    Provided By University of Pune