Computer Science and Technology-Master Dissertation
Recent Submissions
-
A Novel Approach for Information Hiding in Punjabi Language
(Central University of Punjab, 2016)The Internet is global in scope and rapidly growing. With this growth, internet security threats are also increasing. The Internet is the global information exchange media, which is open and insecure, needs more and better ... -
Devising a Feature Matching Algorithm for Pharmacophore Modelling.
(Central University of Punjab, 2015)Feature Matching is one of the central issues of model-based recognition and an important component of most object recognition systems. The feature matching technique can be applied in image alignment, 3D secure ... -
DWT-SVD Based robust digital image watermarking using adaptive median filter
(Central University of Punjab, 2013)Feature Matching is one of the central issues of model-based recognition and an important component of most object recognition systems. The feature matching technique can be applied in image alignment, 3D secure reconstruction, ... -
Analysis of leach protocol for lifetime optimization of wireless sensor networks
(Central University of Punjab, 2014)A Wireless Sensor Network (WSN) is an emerging field comprised of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor ... -
A fault tolerable load balancing technique in cloud computing
(Central University of Punjab, 2014)As the IT industry is growing day by day, the need of computing and data storage is increasing rapidly. The process of this increasing mass of data requires more computer equipment to meet the various needs of the ... -
Performance evaluation of manet routing protocols dsdv, tora enhanced tora
(Central University of Punjab, 2014)Wireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access and share a wide pool of resources and information across the ... -
Performance analysis of aodv for wormhole attack using different mobility models
(Central University of Punjab, 2014)Mobile Ad-Hoc Network (MANET) is a type of temporary wireless network, in which the nodes are mobile and have dynamic network topology. According to structural arrangement, wireless networks are classified into two main ... -
Security in AODV protocol using and hybrid cryptography
(Central University of Punjab, 2014)A mobile Ad hoc network (MANET) is a wireless decentralized self-configuring network in which nodes communicate with each other either directly or through intermediate nodes. These unique features (self-configuring, ... -
Performance analysis of spin protocol under different security threats in wireless sensor networks
(Central University of Punjab, 2014)The wireless sensor network consists of homogenous sensor nodes with limited energy and computational power which are self organisable. These nodes use radio frequency channels to communicate with each other wirelessly. ... -
Security analysis of AODV, ARAN and improved mobile adhoc networks routing protocols
(Central University of Punjab, 2014)Wireless networks use wireless connections to provide a communication environment between the communicating devices using their radio transmission range. Wireless network doesn?t require any pre-established infrastructure. ... -
Performance evaluation of AODV based congestion control protocols in manet
(Central University of Punjab, 2014)The network in which the users communicate with each other by forming a temporary network without any centralized administration is known as ad hoc network. Every node in ad hoc network acts both as a host as well as a ... -
Improved 2ACK scheme for reducing routing overhead in manet's
(Central University of Punjab, 2014)An autonomous collection of mobile nodes communicating with each other via wireless links either directly or indirectly or relying on other nodes forms the mobile adhoc network (MANET). The routing protocols in MANET are ... -
To verify the data integrity and third party auditor at user side in cloud computing
(Central University of Punjab, 2014)Now-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the Internet based computing which provides users ... -
Improved and rule scheme to increase lifetime of wireless sensor networks
(Central University of Punjab, 2014)Wireless sensor network (WSN) is a network of small light weight wireless nodes which are highly distributed and deployed in large numbers. The sensor nodes scan the environment and provide useful information to the user ... -
Effect of improved IEEE 802.11 DCF on the performance of manets
(Central University of Punjab, 2014)Wireless networks have become the most crucial aspect of the today's wireless communication and information exchange. The rapid advancements in the wireless networking technologies have drastically modified our communication ... -
Securing virtualization to mitigate TCP-DDOS between multiple tenants on the same physical host in cloud computing
(Central University of Punjab, 2014)Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the Internet. The means ... -
Extended stable election protocol with advance probability method in wireless sensor networks
(Central University of Punjab, 2014)Wireless sensor network is an emerging research field. It has gained a lot of attention from industry and academia. Mainly it is used for monitoring and data aggregation from the field. Data is most important in this process ... -
Service level agreement aware energy efficient approach for virtual machine placement in clous data center
(Central University of Punjab, 2014)Generally, the growth of computing systems has been concentrate on performance improvement or fast processing of applications from the view point of customer, scientific and business perspective. However, this type of ...