A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Singh, Jaswinder
- Performance Analysis of 32 × 2.5 Gb/S DWDM Metropolitan Area Network using SMF-28 and MetroCor Optical Fibres
Authors
1 ACET, Amritsar, Punjab, IN
2 GNDU Regional Campus, Gurdaspur, Punjab, IN
3 BCET, Gurdaspur, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 4 (2011), Pagination: 11-18Abstract
In this paper, we present the simulative analysis of 32 × 2.5 Gb/s DWDM metro system with 100GHz channel spacing using SMF-28 and the Negative Dispersion Fibre (NDF) such as MetroCor which enhances the capabilities of the metropolitan area optical systems while at the same time reducing the system cost by eliminating the need of dispersion compensation. It is observed that MetroCor fibre outperforms SMF-28 fibre and the faithful transmission distance achieved is upto 300 km without dispersion compensation.Keywords
DML, NDF, MetroCor, SMF-28.- Secured ATM Transaction Using Fingerprint and Voice Recognition Interface
Authors
1 Department of Computer Engineering, Punjabi University, Patiala, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 56-62Abstract
This paper open a new vista for financial operation. The safe ATM system based on biometric identification and will bring its safe use for the customers. It will also bring the negative use of card based transactions. Now a day's new kind of ATM Machine fraud has come into high in the field of banking system. The life has become so fast that people prefer ATM transactions since it has many benefits. It relieves the people from long queue in the banks.
Moreover it opens our uses. People trust on ATM's. Traditional ATM systems are activated through card and PIN no. But now a day, ATM card and PIN no. does not give exact identity of customers. In order to reduce such kind of fraud and misuse. We can secure transaction using fingerprint and voice recognition. C# programming language is used to make the interface and MS-Access for the database.
Keywords
Fingerprint Interface, ATM, Voice Interface, Authentication, Security.- Penetration Testing-Assessing all the Vulnerabilities before an Intruder can Do
Authors
1 Department of Computer Engineering, Punjabi University, Patiala, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 612-620Abstract
Penetration testing is the testing to verify the security of a Website, server and network by safely trying to exploit vulnerabilities. Security is the most important issue in today's world.This paper outlined various features of penetration testing such as importance of penetration testing, steps of performance and identification of vulnerabilities. This paper reviewed the various online Penetration testing tools and comparison between them. Kali linux has wonderful set of inbuilt tools of kali linux for the penetration testing. Some of these inbuilt tools have been discussed in this paper.Keywords
Penetration Testing, Vulnerabilities, Kali Linux, Metasploit.- Digital India:The Roadmap Ahead
Authors
1 Punjabi University, Patiala, Punjab, IN