<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="http://dspace.dtu.ac.in:8080/jspui/handle/123456789/55">
    <title>DSpace Collection:</title>
    <link>http://dspace.dtu.ac.in:8080/jspui/handle/123456789/55</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="http://dspace.dtu.ac.in:8080/jspui/handle/repository/17548" />
        <rdf:li rdf:resource="http://dspace.dtu.ac.in:8080/jspui/handle/repository/17547" />
        <rdf:li rdf:resource="http://dspace.dtu.ac.in:8080/jspui/handle/repository/17546" />
        <rdf:li rdf:resource="http://dspace.dtu.ac.in:8080/jspui/handle/repository/17545" />
      </rdf:Seq>
    </items>
    <dc:date>2026-04-28T04:03:24Z</dc:date>
  </channel>
  <item rdf:about="http://dspace.dtu.ac.in:8080/jspui/handle/repository/17548">
    <title>ALTERNATIVE “IS ALIVE” BASED APPROACH FOR ALTERED FINGERPRINT IDENTIFICATION</title>
    <link>http://dspace.dtu.ac.in:8080/jspui/handle/repository/17548</link>
    <description>Title: ALTERNATIVE “IS ALIVE” BASED APPROACH FOR ALTERED FINGERPRINT IDENTIFICATION
Authors: SHARMA, SAVITA
Abstract: Fingerprint recognition for unique identification suffers from a disadvantage of being easy to imitate when compared to other forms of biometric authentications where surgical procedure is necessary. Different material can be used to mould and reproduce exact copy of a fingerprint with its detailed shape and extended characteristics (e.g. minutiae point locations). Recent research in this field shows the lack of aliveness detection mechanism in fingerprint sensors technology. Security issues with authentication device are a major concern in many applications. This work proposes the use of heartbeat as means of “is-alive” detection along with minutiae based fingerprint recognition to overcome the above stated challenges.</description>
    <dc:date>2010-08-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://dspace.dtu.ac.in:8080/jspui/handle/repository/17547">
    <title>FRACTAL IMAGE COMPRESSION</title>
    <link>http://dspace.dtu.ac.in:8080/jspui/handle/repository/17547</link>
    <description>Title: FRACTAL IMAGE COMPRESSION
Authors: ANWAR, TARIQUE
Abstract: In context of medical imaging or satellite images, the change in conditions is to be observed at different times. There is a fact that the images captured of the same scene or the same object at different times may not have the same orientation. For the sake of automating the observation of the progress or the change in the condition of the object, there needs to be a technique to align the input image to the reference image. The technique used for the above process is known as image registration. The work under this project is divided in two phases. The first phase is about the image registration of the medical images. It is implemented using MATLAB. Second phase of the project deals with the compression of the images. The method of image compression chosen is Fractal image compression. Since the data in medical images are very crucial, It is not appreciable to loose data in compression-decompression process. As in fractal image compression, the decoding process involves the iteration on the image. If we increase the number of iterations, more accurate picture we can get back. The above mentioned fact is the reason to choose fractal image compression for the purpose of image compression. We realize the importance of compression methods in our daily life when we store files in a limited storage space or when we have to send a file on a slower network. In this thesis, the methods of compression of images is dealt with. Again, there are different approaches for image compression among which jpeg is a well known one. We judge the ability of a compression method by the compression ratio it provides. It is noted that for the images having fractal properties in terms of self similarity or the images having similar regions, the image compression method known as Fractal Image Compression can give better compression ratio. The fractal image compression algorithms have a common approach which involves the partitioning of the image into smaller non overlapping square subsections range blocks of predefined size. Then, a search codebook (domain pool ) is created from the image taking all the square blocks (domain blocks) of size double of the range blocks and ultimately for each each range block, the most appropriate domain block is selected from the domain pool. It is noted that that what transformations are required to be performed on the range block to match with the domain block.</description>
    <dc:date>2010-11-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://dspace.dtu.ac.in:8080/jspui/handle/repository/17546">
    <title>STUDY OF SOFT HANDOVER IN THIRD GENERATION</title>
    <link>http://dspace.dtu.ac.in:8080/jspui/handle/repository/17546</link>
    <description>Title: STUDY OF SOFT HANDOVER IN THIRD GENERATION
Authors: HASDAH, RAJARSHI
Abstract: UMTS is an emerging cell phone technology and it is basically another name for 3G mobile communication  systems.  It  provides  an  enhanced  range  of  multimedia  services  like  video conferencing and high speed internet access. &#xD;
 &#xD;
Sometimes UMTS is marketed as 3GSM emphasizing the both 3G nature and GSM standards which it was designed to succeed. UMTS is also European term for wireless systems based on the IMT-2000 standards. To utilize various merits in mobile telecommunication system which consist of various radio access networks, UMTS as Third Generation wireless technology utilizes a wideband CDMA or TD/CDMA transceiver and also cover large area. Handover is basically a function which continues the communication between users without any gaps when the hardware goes  to  a  place  where  it  finds  no  network  coverage.  When  we  talk  in  terms  of  cellular communications systems, handover is a process which is referred to the transfer of a connection from one cell to another. Handover time is generally between 200 and 1,200 milliseconds (ms), which accounts for the delay. In  this thesis we are going to find the reasons for these factors which affect the Quality of service of handover. &#xD;
 &#xD;
The main focus of this research is to study the some factors which really affect the handover phenomenon in UMTS that basically affect the overall quality of mobile network. For this we intend to find the solution for problems which born during the handover. Handover provides the mobility to users which are the main theme of  wireless technology and it is also make the interoperability between different network technologies.</description>
    <dc:date>2010-11-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://dspace.dtu.ac.in:8080/jspui/handle/repository/17545">
    <title>HANDLING ARP BASED SPOOFING ATTACKS</title>
    <link>http://dspace.dtu.ac.in:8080/jspui/handle/repository/17545</link>
    <description>Title: HANDLING ARP BASED SPOOFING ATTACKS
Authors: GARHEWAL, VINEET
Abstract: he  classic  Man-in-the-Middle(ARP  Spoofing)  attack  relies  upon  convincing  two  hosts  that  the  computer  in  the  middle  is  the  other  host.    This  can  be  accomplished  with  a  domain  name  spoof  if  the  system  is  using  DNS  to  identify  the  other  host  or  address  resolution  protocol  (ARP)  spoofing  on the LAN.  This thesis is designed to introduce  and  explain  ARP  spoofing  and  DNS  spoofing  and  their  prevention  measures.    Throughout the Internet, IP is used for communications.  Once an IP packet comes into  a  Local  Area  Network  (LAN)  it  must  be  converted  into  a  packet  that  the  LAN  can  understand.    An  IP  packet  is  encapsulated  into  an  Ethernet  frame  for  local  handling.    Ethernet  is  the  most  common  type  of  network  and  other  types  of  networks  handle  communications  differently.    Ethernet  does  not  communicate  via  IP  addresses,  but  uses  the  hardware  address  instead.    Ethernet  uses  the  Address  Resolution  Protocol  (ARP)  to  resolve  IP  addresses  into  hardware  addresses.    This  hardware  address  is  also  called  the  Media  Access  Controllers  (MAC)  addresses.    Once  the  destination’s  MAC  address  is  determined,  the  encapsulated  IP  packet  can  be  transmitted  to  the  host.    Every  network device must have an unique MAC address for the Ethernet LAN to function correctly.   All Ethernet hosts and switches keep a list of MAC and IP address in a table and will request this information from the network when a new IP address is requested or a table entry expires. The TCP/IP protocol based host trusts on its IP/MAC table.ARP  spoofing  attacks  involve  tricking  a  system  into  modifying  its  MAC  table  and  sending  the  data  to  the  attacker  instead.    The  purpose  of  this  thesis  is  to  look  at  several  ways  and  methods  for  modifying  ARP  cache  information  and  how  to  defend the network against ARP spoofing attacks.</description>
    <dc:date>2006-08-01T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

