Khushdeep Kaur

Learn More
Security is the one of the biggest concern in different type of networks. Due to diversify nature of network, security breaching became a common issue in different form of networks. Solutions for network security comes with concepts like cryptography in which distribution of keys have been done. If you want to send data to some other persons through network(More)
This paper introduces a new approach to multiplication of ternary numbers. The whole multiplication is based on the efficient Booth Encoding technique that multiplies both positive as well as negative ternary numbers. Verilog HDL has been used to implement the ternary multipliers of 3bit, 8bit and 12bit. The HDL design is based on the Finite State Machine(More)
In this research paper, additional constrains have been considered to progress a holistic analysis based algorithm based on Max-Min algorithm, which work on principle of sorting jobs(cloudlets) based on completion time of cloudlets. The improved algorithms here also reviews the job characteristics in method of size, pattern, payload ratio and available(More)
  • Sushma Lakshkar, Geet Kalani, Vinod Todwal, Seyed Reza Pakize, Ashwini, Kanawade +22 others
  • 2015
In recent years, there are various sources that generates data in petabyte and terabyte, known as big data and its generated by human, machine, sensor etc. So the solution leds with big data is Apache Hadoop has attracted strong attention because of its applicability on processing for the large data sets. This paper present the review about the big data and(More)
—The use of optical fiber which offers large bandwidth in the telecommunication sector has shown a lot of developments in the last decade mainly in television cables and cell phone cables. But these are not fully efficient and to do this, the fiber should allow multiple access which means allowing various users to send and receive data in the fiber at the(More)
  • 1