DSpace Repository

Browsing ER & DCI, Noida, (IIT Roorkee) by Issue Date

Browsing ER & DCI, Noida, (IIT Roorkee) by Issue Date

Sort by: Order: Results:

  • Singh, Balbir (2003)
    The security of many cryptographic systems depends upon the generation of unpredictable quantities. Examples include the secret key in the DES encryption algorithm the primes p, q in the RSA encryption and digital signature ...
  • N., Sandhya (2003)
    Image processing refers to all the various operations, which can be applied to the image data. One can imagine various real-life applications, which needs images to be manipulated. Images form an important helper in ...
  • Arya, Ritu Raj (2003)
    conference rooms of the company utilized by the employees of the organization. To make )t an easy to use GUI application, it should make reservations, cancellations and modifications from any terminal in the company and ...
  • Agarwal, Richa (2003)
    Protecting Mobile Agents against hosts is a key element of Mobile Agents Security. Security threats from a host/hosts to a mobile agent include masquerading, denial of service, eavesdropping, and alteration. In this thesis, ...
  • Pathya, Ramvati (2003)
    The problem of automatic collision-free path planning is central to mobile Robot applications. The basic problem of a mobile robot is that of navigation (moving from one place to another) by the coordination of planning, ...
  • Kumar, Anil (2003)
    In the recent years, a lot of work has been done in the field of Information technology for Health care. A complete digital representation of human body has been made which is a huge database (known as visible human database) ...
  • Kumar, Vivek (2003)
    This work is an attempt to develop software for carrying out the various pre-processing operations on the scanned image of a Devanagari text document that are essential for Optical Character Recognition. An Optical Character ...
  • Singh, Rajeev T. (2003)
    This - project is an attempt to simplify the task of software distribution by using mobile agents. The aim of this work is to provide the network administrator with a tool, which saves him from the tedious routine of ...
  • Kumar, Naveen (2003)
    The project entitled "Implementing Client/Server Communication Security "is concerned with end-to-end security mechanisms for file transfer using the client/server infrastructure. The application allows client and server ...
  • Jayant, Naveen Kumar (2003)
    This work is an attempt to develop "Embedded Spell Checker Module for Indian Language (Hindi)". The spell checker module developed to identify various types of errors and to correct them in Hindi text. The OCR recognizes ...
  • Jain, Gaurav (2003)
    Growth of Internet as a fundamental network has resulted in very slow Internet access. This situation is further exacerbated by a small number of users who use a disproportionate share of the available bandwidth for file ...
  • Kaushik, Shilpa (2003)
    Security, in today's digital world, of stored data is of prime concern, as the data has to be prevented from falling into the hands of unscrupulous people. In view of the security threats, cryptography, the art and science ...
  • Kumar, Avnendra (2003)
    Since time immemorial, preparation of maps is taking place. In the process of map preparation size of the paper or drawing material plays a major role and defines the requirement of scale factor. When the size of presentation ...
  • Sankhla, Saket (2003)
    Every second the amount of data in and around us is increasing and there's no end to the sight. Data Mining is done to ease the understanding of large amounts of data by discovering interesting exceptions or regularities. ...
  • Yadav, Neelam (2003)
    The introduction of the Asynchronous Transfer Mode (ATM) is currently being propelled by the need for fast data communication in public and private networks. ATM is the switching and multiplexing technique employed for ...
  • Bansal, Kanika (2003)
    In today's world of globalization, every industry is going to be more and more customers oriented. They are trying to provide better facilities to the customers to increase their customers. Bank are no more exception in ...
  • Babu, Ayithepalli Deepak (2003)
    Computers and the networks that connect them are highly pervasive and have infiltrated almost every aspect of our daily lives. Technology, when it works, becomes transparent and invisible to the end-user. When technology ...
  • Gautam, Ashwani Kumar (2003)
    This Dissertation work gives an account of the Land Management Information System conceived and designed for Delhi Development Authority, Delhi. The dissertation also outlines a brief account of back ground history. The ...
  • Kumar, Ajay (2003)
    Unix explorer is a GUI style plain-text editor. The system provides the user with a user friendly GUI and helps him in browsing his Unix account. It provides the user with a set of features like user directory traversal, ...