<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="http://dspace.dtu.ac.in:8080/jspui/handle/123456789/54" />
  <subtitle />
  <id>http://dspace.dtu.ac.in:8080/jspui/handle/123456789/54</id>
  <updated>2026-04-28T04:03:52Z</updated>
  <dc:date>2026-04-28T04:03:52Z</dc:date>
  <entry>
    <title>A FRAGMENTATION TECHNIQUE IN DISTRUBUTED DATABASES &amp; ITS IMPLEMENTATION</title>
    <link rel="alternate" href="http://dspace.dtu.ac.in:8080/jspui/handle/repository/13890" />
    <author>
      <name>SHARMA, SHASHI KANT</name>
    </author>
    <id>http://dspace.dtu.ac.in:8080/jspui/handle/repository/13890</id>
    <updated>2014-12-19T11:03:55Z</updated>
    <published>2011-12-15T00:00:00Z</published>
    <summary type="text">Title: A FRAGMENTATION TECHNIQUE IN DISTRUBUTED DATABASES &amp; ITS IMPLEMENTATION
Authors: SHARMA, SHASHI KANT
Abstract: The distributed database design is an optimization problem that includes various subproblems:&#xD;
data fragmentation, allocation and local optimization. Each of these can be&#xD;
solved in various ways. In context of this research we address fragmentation and&#xD;
allocation problems simultaneously for distributed databases management systems&#xD;
(DDBMS) for enhancing the process of server load balancing using Cisco Global Site&#xD;
Selector (GSS).&#xD;
Fragmentation is mainly of three types namely: horizontal, vertical and hybrid (grid)&#xD;
fragmentation. Although there is large work carried out on the design of data&#xD;
fragmentation but most of them are either horizontal or vertical. The core of this thesis&#xD;
defines a new type of grid fragmentation technique in the context of relational databases.&#xD;
Our proposal combines horizontal fragmentation (HF) on the basis of attribute locality&#xD;
precedence and cost model of vertical fragmentation (VF) to generate grid fragments.&#xD;
Both of these two techniques also address the problem of fragment allocation in&#xD;
distributed databases. As part of whole process we discuss and compare various other&#xD;
algorithms for generating candidate vertical and horizontal partition schemes.&#xD;
In the end, we compare our approach with one of the graphical grid fragmentation&#xD;
methods by implementing these techniques as part of Cisco GSS, a product for enhancing&#xD;
the DNS resolution process. Results shows that proposed grid fragmentation is a superior&#xD;
approach and it can solve fragmentation and allocation problem of relational database&#xD;
systems properly.
Description: M.TECH</summary>
    <dc:date>2011-12-15T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>IMPLEMENTATION OF TINY ENCRYPTION ALGORITHM FOR SECURING SYSTEM FILE</title>
    <link rel="alternate" href="http://dspace.dtu.ac.in:8080/jspui/handle/repository/13598" />
    <author>
      <name>KUMAR, RAMAN</name>
    </author>
    <id>http://dspace.dtu.ac.in:8080/jspui/handle/repository/13598</id>
    <updated>2014-12-19T10:58:04Z</updated>
    <published>2009-11-26T00:00:00Z</published>
    <summary type="text">Title: IMPLEMENTATION OF TINY ENCRYPTION ALGORITHM FOR SECURING SYSTEM FILE
Authors: KUMAR, RAMAN
Abstract: The file securing system requires a Tiny Encryption Algorithm (TEA). It basically consist of using a combination of XOR, ADD and SHIFT operations on file blocks to encrypt is using key bits and some junk bits. This algorithm is highly efficient and can satisfy need for a user-friendly encryption system that can be used at homes and offices. The Tiny Encryption Algorithm (TEA) is a block cipher encryption algorithm that is very simple to implement, has fast execution time, and takes minimal storage space. The Tiny Encryption Algorithm (TEA) is a cryptographic algorithm designed to minimize memory footprint and maximize speed. It is a Feistel type cipher that uses operations from mixed (orthogonal) algebraic groups. This thesis presents the cryptanalysis of the Tiny Encryption Algorithm. In this thesis proposed to inspect the most common methods in the cryptanalysis of a block cipher algorithm. TEA seems to be highly resistant to differential cryptanalysis, and achieves comple...
Description: ME THESIS</summary>
    <dc:date>2009-11-26T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>HMM BASED HINDI SPEECH RECOGNITION</title>
    <link rel="alternate" href="http://dspace.dtu.ac.in:8080/jspui/handle/repository/13546" />
    <author>
      <name>BHATT, SHOBHA</name>
    </author>
    <id>http://dspace.dtu.ac.in:8080/jspui/handle/repository/13546</id>
    <updated>2014-12-19T11:22:18Z</updated>
    <published>2007-07-25T00:00:00Z</published>
    <summary type="text">Title: HMM BASED HINDI SPEECH RECOGNITION
Authors: BHATT, SHOBHA
Abstract: Many times key board acts as a barrier between computer and the user. This is true especially for rural areas. We face big challenge in applying this high level specialist knowledge of computers to Community development projects like “Sarva Siksha Abhiyan” so as to quickly bridge the “digital divide”.This barrier can be major hindrance in delivering computer literacy efficiently. Fascinated by the “Hole in the wall” initiative by NIIT, I decided to work on Hindi Speech Recognition so that the users can explore a computer’s potential by interacting with it in their own language thus unlocking the flood gates of development especially for our teeming rural population. This led to start of my work on “HMM BASED HINDI SPEECH RECOGNITION”. The main purpose of this study is to perform speech recognition for isolated words in Hindi language. The railway speech corpus has been included for the study. The speech corpus consists of 207 words spoken by 40 different male, fe...
Description: ME THESIS</summary>
    <dc:date>2007-07-25T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>EXPLORING WEAKNESSES OF RC4 IN DIFFERENT USAGE MODES</title>
    <link rel="alternate" href="http://dspace.dtu.ac.in:8080/jspui/handle/repository/13529" />
    <author>
      <name>MISHRA, S P</name>
    </author>
    <id>http://dspace.dtu.ac.in:8080/jspui/handle/repository/13529</id>
    <updated>2011-03-26T21:11:28Z</updated>
    <published>2008-05-15T00:00:00Z</published>
    <summary type="text">Title: EXPLORING WEAKNESSES OF RC4 IN DIFFERENT USAGE MODES
Authors: MISHRA, S P
Abstract: Cryptography is an important building block used i n communication systems to provide confidentiality and authenticity. Stream ciphers, which encrypt data one bit or byte at a time have been used in applications sherec low delay and hiogh speed are essential requirements.RC4, a stream cipher designed by Rivest for Data Security Inc. has been used in several commercial applications. In this thesis RC4 is described and its various weaknesses have been exploited. It is shown that second binary derivative of the least significant bit of sequence is correlated to 1 with correlation coefficient close to 152 -3n. The result can be used to distinguish RC4 from other key-stream generators. Digraph probabilities gives another method of distinguishing RC4 from random sequence requiring lesser amount of output key-stream bits. 40-bit RC4 was recommended for WEP, the link-layer security protocol for 802.11 networks. An attack was proposed by Fluhrer, Shamir and Mantin based upon non-random be...
Description: ME THESIS</summary>
    <dc:date>2008-05-15T00:00:00Z</dc:date>
  </entry>
</feed>

