ER & DCI, Noida, (IIT Roorkee): Recent submissions

  • N., Sandhya (2003)
    Image processing refers to all the various operations, which can be applied to the image data. One can imagine various real-life applications, which needs images to be manipulated. Images form an important helper in ...
  • Arya, Ritu Raj (2003)
    conference rooms of the company utilized by the employees of the organization. To make )t an easy to use GUI application, it should make reservations, cancellations and modifications from any terminal in the company and ...
  • Kumar, S. Suresh (2003)
    The security and portability of Java cards provide a safe, reliable, convenient, and effective way to ensure secure e-business and to enable a broad range of new applications. Java . cards represents one of the smallest ...
  • Sabbarwal, Sandeep (2003)
    Decision making in an imprecise and vague environment has been an area of research for dealing with many real life problems. The decision making process uses inference based on the input information. The information can ...
  • Kumar, Vivek (2003)
    This work is an attempt to develop software for carrying out the various pre-processing operations on the scanned image of a Devanagari text document that are essential for Optical Character Recognition. An Optical Character ...
  • Singh, Balbir (2003)
    The security of many cryptographic systems depends upon the generation of unpredictable quantities. Examples include the secret key in the DES encryption algorithm the primes p, q in the RSA encryption and digital signature ...
  • Kumar, Ajay (2003)
    Unix explorer is a GUI style plain-text editor. The system provides the user with a user friendly GUI and helps him in browsing his Unix account. It provides the user with a set of features like user directory traversal, ...
  • Sankhla, Saket (2003)
    Every second the amount of data in and around us is increasing and there's no end to the sight. Data Mining is done to ease the understanding of large amounts of data by discovering interesting exceptions or regularities. ...
  • Babu, Ayithepalli Deepak (2003)
    Computers and the networks that connect them are highly pervasive and have infiltrated almost every aspect of our daily lives. Technology, when it works, becomes transparent and invisible to the end-user. When technology ...
  • Rao A., Venat Rama (2003)
    Windows is just the thing for keeping employees, students or children from coming in and fiddling around with the computers. It has all the needed features to keep people from viewing or changing what users do not want ...
  • Singh, Rajeev T. (2003)
    This - project is an attempt to simplify the task of software distribution by using mobile agents. The aim of this work is to provide the network administrator with a tool, which saves him from the tedious routine of ...
  • Kumar, Naveen (2003)
    The project entitled "Implementing Client/Server Communication Security "is concerned with end-to-end security mechanisms for file transfer using the client/server infrastructure. The application allows client and server ...
  • Lohan, Sujeet (2003)
    Today , a digital TV requires a Set-Top Box (STB) i.e. box which is on top of analog TV which is used to decode and tune digital signals, and converts them to a format that is understood by analog TV. The broadcasters and ...
  • Ramteke, Sanghamitra B. (2003)
    The overall aim of this dissertation is to develop a database link between remote locations. This communication link is established by first connecting to remote machine by dial up networking, using remote access services ...
  • Kaushik, Shilpa (2003)
    Security, in today's digital world, of stored data is of prime concern, as the data has to be prevented from falling into the hands of unscrupulous people. In view of the security threats, cryptography, the art and science ...
  • Policetti, Shyam Sundar (2004)
    In this dissertation, application of soft computing techniques in speech recognition has been explored. At present the prevailing technology for speech recognition is predominantly Hidden Markov Model based. a statistical ...
  • Dasari, Prem (2004)
    Internet system is a collection of hosts, connected to each other. Communication among the hosts needs to have a protocol, which can be understood by each host in the Internet. IPv4 and the later version IPv6 protocols are ...
  • Valasa, Maheedhar (2004)
    Network management fundamentally involves monitoring and controlling the devices connected in a network by collecting and analyzing data from them. Majority of present day network management systems operate SNMP (Simple ...
  • Mohan, Thota Madana (2004)
    In this dissertation, a new mechanism called Real-Time Enhancement Assistance Mechanism (REAM) is proposed over the MAC layer which uses distributed control algorithms to deliver service differentiation between real-time ...
  • Ch, Sekhar Babu (2004)
    The capability of Asynchronous Transfer Mode (ATM) networks to provide large bandwidth and to handle multiple Quality Of Service (QOS) support can only be realized by preparing effective traffic management mechanisms. ATM ...