Vishwakarma Institute of Technology

Displaying 1-4 of 4 results

  • White Papers // Jul 2011

    Cryptovirology: Virus Approach

    Traditionally, "Cryptography" is a benediction to information processing and communications, it helps people to store information securely and the private communications over long distances. Cryptovirology is the study of applications of cryptography to build the malicious software. It is an investigation, how modern cryptographic tools and paradigms can be used...

    Provided By Vishwakarma Institute of Technology

  • White Papers // Feb 2011

    RDBNorma: - A Semi-Automated Tool for Relational Database Schema Normalization Up to Third Normal Form

    In this paper a tool called RDBNorma is proposed, that uses a novel approach to represent a relational database schema and its functional dependencies in computer memory using only one linked list and used for semi-automating the process of relational database schema normalization up to third normal form. This paper...

    Provided By Vishwakarma Institute of Technology

  • White Papers // Nov 2010

    Diagrammatic Approach for Complete Automation of Relational Database Normalization at Conceptual Level

    AER (Articulated Entity Relationship) diagrams proposed by one, are the extension of Entity Relationship (ER) diagrams to accommodate Functional Dependencies (FDs) as their integral part. Accommodation of FDs in ER diagram helps to achieve total and unconditional automation of relational database normalization. In this paper the authors have implemented a...

    Provided By Vishwakarma Institute of Technology

  • White Papers // Nov 2009

    Review of Multimodal Biometrics: Applications, Challenges and Research Areas

    Biometric systems for today's high security applications must meet stringent performance requirements. The fusion of multiple biometrics helps to minimize the system error rates. Fusion methods include processing biometric modalities sequentially until an acceptable match is obtained. More sophisticated methods combine scores from separate classifiers for each modality. This paper...

    Provided By Vishwakarma Institute of Technology

  • White Papers // Nov 2009

    Review of Multimodal Biometrics: Applications, Challenges and Research Areas

    Biometric systems for today's high security applications must meet stringent performance requirements. The fusion of multiple biometrics helps to minimize the system error rates. Fusion methods include processing biometric modalities sequentially until an acceptable match is obtained. More sophisticated methods combine scores from separate classifiers for each modality. This paper...

    Provided By Vishwakarma Institute of Technology

  • White Papers // Feb 2011

    RDBNorma: - A Semi-Automated Tool for Relational Database Schema Normalization Up to Third Normal Form

    In this paper a tool called RDBNorma is proposed, that uses a novel approach to represent a relational database schema and its functional dependencies in computer memory using only one linked list and used for semi-automating the process of relational database schema normalization up to third normal form. This paper...

    Provided By Vishwakarma Institute of Technology

  • White Papers // Nov 2010

    Diagrammatic Approach for Complete Automation of Relational Database Normalization at Conceptual Level

    AER (Articulated Entity Relationship) diagrams proposed by one, are the extension of Entity Relationship (ER) diagrams to accommodate Functional Dependencies (FDs) as their integral part. Accommodation of FDs in ER diagram helps to achieve total and unconditional automation of relational database normalization. In this paper the authors have implemented a...

    Provided By Vishwakarma Institute of Technology

  • White Papers // Jul 2011

    Cryptovirology: Virus Approach

    Traditionally, "Cryptography" is a benediction to information processing and communications, it helps people to store information securely and the private communications over long distances. Cryptovirology is the study of applications of cryptography to build the malicious software. It is an investigation, how modern cryptographic tools and paradigms can be used...

    Provided By Vishwakarma Institute of Technology