BVICAM's International Journal of Information Technology (BIJIT)

Displaying 1-40 of 43 results

  • White Papers // Jan 2012

    Performance Comparison of XY, OE and DY Ad Routing Algorithm by Load Variation Analysis of 2-Dimensional Mesh Topology Based Network-on-Chip

    Network on chip is a scalable and flexible communication architecture for the design of core based System-on-Chip. Communication performance of a NOC heavily depends on routing algorithm. XY routing algorithm is distributed deterministic routing algorithm. Odd-Even (OE) routing algorithm is distributed adaptive routing algorithm with deadlock-free ability. DyAD combines the...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Jan 2012

    Determination of Efficiency of Hybrid Photovoltaic Thermal Air Collectors Using Aritificial Neural Network Approach for Different PV Technology

    In this paper an attempt has been made to determine efficiency of semi transparent hybrid photovoltaic thermal double pass air collector for different PV technology and compare it with single pass air collector using Artificial Neural Network (ANN) technique for New Delhi weather station of India. The MATLAB 7.1 neural...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Jan 2012

    Optimization of Material Procurement Plan - A Database Oriented Decision Support System

    Recently, the business in steel has undergone a sea change. Customer requirements for steel products have become increasingly demanding in terms of better quality and specification. Globalization has thrown open the market to intense competition. The rise in raw material cost has put pressure on steel industry to optimize the...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    A Framework for Hierarchical Clustering Based Indexing in Search Engines

    Granting efficient and fast accesses to the index is a key issue for performances of Web Search Engines. In order to enhance memory utilization and favor fast query resolution, WSEs use Inverted File (IF) indexes that consist of an array of the posting lists where each posting list is associated...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    Measuring IT Effectiveness in Banks of India for Sustainable Development

    Banks in India have invested heavily on deployment of Information Technology (IT) in the past one decade. IT over the years has become business driver rather than a business enabler. Sustainable development of banks depends heavily on effective use of IT. This calls for measuring the effectiveness of IT in...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    Two Level Caching Techniques for Improving Result Ranking

    Due to the rapid growth of the Web from a few thousand pages in 2000 to its current size of several billion pages, users increasingly depend on web search engines for locating relevant information. One of the main challenges for search engines is to provide a good ranking function that...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    Exploring Alternatives Topologies for Network-on-Chip Architectures

    With increase in integration density and complexity of the System-On-Chip (SOC), the conventional interconnects are not suitable to fulfill the demands. The application of traditional network technologies in the form of Network-on-Chip is a potential solution. NoC design space has many variables. Selection of a better topology results in lesser...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    Process Benchmarking Through Lean Six Sigma for ERP Sustainability in Small & Medium Enterprises

    Enterprise Resource Planning was a term restricted purely to elite class. ERP for small business calls for voluminous investments. But the question that kept ringing in the market was can everyone afford it? The answer was a stubborn no initially but not anymore. The world is changing, and new opportunities...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    Study of Impact of Mobile Ad Hoc Networking and Its Future Applications

    Today, many people carry numerous portable devices, such as laptops, mobile phones, PDAs and mp3 players, for use in their professional and private lives. For the most part, these devices are used separately-that is, their applications do not interact. Imagine, however, if they could interact directly: participants at a meeting...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    Applications of Public Key Watermarking for Authentication of Job-Card in MGNREGA

    According to New Oxford English Dictionary, Government is the sum total of the systems by which a state or community is governed. The Government of India has specified e-governance as nothing but "Using IT to bring about SMART (Simple, Moral, Accountable, Responsive, Transparent) governance". The benefits of e-governance suggest that...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Nov 2011

    Rough Set Techniques for 24 Hour Knowledge Factory

    24 Hour Knowledge Factory is the work culture that incorporates different people contributing together in collaborated manner on various modules of the same project. But as advancements occurred, it was found that the approach is as difficult to realize as it is to imagine. The smooth work flow amidst the...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Nov 2011

    Open Source Software Reliablity Growth Model by Considering Change-Point

    The modeling technique for Software Reliability is reaching its prosperity. Software reliability growth models have been used extensively for closed source software. The design and development of Open Source Software (OSS) is different from closed source software. The authors observed some basic characteristics for open source software like more instructions...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Sep 2011

    Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software

    Software Reliability Growth Models (SRGM) are used to assess modular software quantitatively and predict the reliability of each of the modules during module testing phase. In the last few decades various SRGM's have been proposed in literature. However, it is difficult to select the best model from a plethora of...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Jul 2011

    Web 3.0 in Education & Research

    The continuous evolution of the Internet has opened unimaginable opportunities and challenges in web based education and learning. The traditional version of web, i.e., web 1.0 started as a read only medium; the next version web 2.0 established itself as read/write medium. Now the currently evolving version of web, viz.,...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Robust Source Coding Steganographic Technique Using Wavelet Transforms

    Information hiding has emerged as an important research field to resolve the problems in network security, quality of service control and secure communications through public and private channels. Keeping the network in a desired state is the utmost requirement of network communications. The paper is being done in different fields...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Comparative Study of Distributed Computing Paradigms

    The mobile agent paradigm has revolutionised the distributed computing environment. There are different paradigms used in distributed computing, such as - client-server paradigm, remote procedure paradigm and mobile agent paradigm. The client-server is based upon the concept of a server, which serves the various request of the clients and in...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Service Oriented Architecture for Business Dynamics: An Agent Based Business Modeling Approach

    In today's rapidly changing environment the industries are interested in executing business functions that has scope in multiple applications. Business dynamics and technological innovations have felt organizations to comply with a disparate mix of operating systems, applications and databases. This makes it difficult, time-consuming and costly for IT departments to...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Resource Optimization Using XML

    EXtensible Markup Language [XML] database is one of the hot areas of research now days. Number of developers and research organizations are working on the capabilities and efficiency of using EXtensible Markup Language [XML] database because of its unique structure and processing speed. In any web based database search, there...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Web Document Clustering for Finding Expertise in Research Area

    Researchers often need to find expertise in their chosen area of research. Finding expertise is very useful as relevant research papers can be studied and the experts could be identified. Therefore, finding expertise in the chosen area of research has always attracted interest among academic community. These days research institutions...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Performance Analysis of High Speed Data Networks Using Priority Discipline

    Recent advancements in network technology allow integration of different services on the same networking infrastructure. Thus, voice, data and video or multimedia traffic share the same transmission, switching and storage resources over a single network. This integration offers the user a single access facility to all communication services through a...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Optimized Image Representation in Memory Using Linear Arrays

    Various Image representation methods consume very large amounts of memory and takes large transmission time over the network. In this paper, the authors have tried to reduce memory requirements for storing images which can get transmitted in small time period. Initially, the preamble of a digital image as well as...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    EECHDA: Energy Effecient Clustering Hierarchy and Data Accumulation for Sensor Networks

    A wireless sensor network with a large number of tiny sensor nodes can be used as an effective tool for gathering data for various applications under different situations. One of the major issues in wireless sensor network is developing an energy - efficient routing protocol which has a significant impact...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    A Novel Metric For Detection of Jellyfish Reorder Attack on Adhoc Network

    Ad Hoc networks are susceptible to many attacks due to its unique characteristics such as open network architecture, stringent resource constraints, shared wireless medium and highly dynamic topology. The attacks can be of different types out of which denial of service is one of the most difficult attacks to detect...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Replication Strategies in Mobile Environments

    Transaction management in wireless environment poses challenging issues in preserving data consistency and fault tolerance. As the mobile databases are prone to frequent disconnections, bandwidth limitations, and mobility, etc. efficient execution of the transaction may not always be guaranteed. Replicating data at several sites is a powerful mechanism which not...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    An Effective Technique For Data Security in Modern Cryptosystem

    Present paper provides a conceptual framework on the proposed C-QUBITS Key exchange technique, which is used as a base for the data security through quantum computing in the modern cryptosystem. In the first phase a detailed description of the BB84 Cryptographic protocol is given, which is used as a standard...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    On Lattice Based Cryptographic Sampling: An Algorithmic Approach

    In this paper, the authors propose a practical lattice based reduction by sampling to avoid any dependence on Schnorr's Geometric Series Assumption. It is a generalization of Schnorr's RSR algorithm. It is also well defined for bases where this algorithm is not applicable. It demonstrates that the sampling reduction can...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    A Comparative Study of Software Requirement Tools for Secure Software Development

    Requirement is the foundation of the entire software development life cycle. With proper requirement management a project can deliver the right solution on time and within budget. Requirement elicitation, requirement specification, and requirement validation are important to assure the quality of requirement documentations. All these three activities can be better...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Application of Fuzzy Relations in Convalescing Link Structure

    The link structure of website allows them to spread the link power of home page to the individual pages of the site. In this paper, the authors define the content and web pages as two important and prominent factors in website navigation and restate the enhancement in the website navigation...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    System Versus Process Prespective of Enterprise Resource Planning Implementations

    This paper reviews literature concerning implementation of Enterprise Resource Planning (ERP), its successful and unsuccessful cases, and the critical success factors of its implementation, in order to identify gaps in academic thinking and propose future research opportunities. ERP implementation research often takes only a systems-oriented view of the implementation process...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Design Patterns for Successful Service Oriented Architecture Implementation

    The successful implementation of Service Oriented Architecture (SOA) relies on a careful and holistic approach to business planning. One of the most important tools in the evaluation, purchase, and ongoing use of SOA is the best practices that vendors, consultants, and customers have developed and used. The promise of business...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    A Secure Private Key Encryption Technique for Data Security in Modern Cryptosystem

    The paper provides a conceptual framework on the proposed private key encryption technique that can be used for data security in modern cryptosystem. This encryption technique uses the concept of arithmetic coding and can be used as an independent system as well as can be clubbed with any of the...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Apr 2011

    Simulation and Proportional Evaluation of AODV and DSR in Different Environment of WSN

    Simulation and comparison of the routing protocols for network topology hold a significant position in the performance evaluation of wireless networks. This paper, discusses performance evaluation of Ad-hoc On demand Distance Vector (AODV) and Dynamic Source Routing (DSR), routing protocols for static WSN using NS-2. Energy efficiency, latency, throughput and...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Apr 2011

    Load Balancing in Integrated MANET, WLAN and Cellular Network

    This paper integrates mobile ad-hoc network, wireless local area network and cellular network. It balances the load among the three networks in the integrated heterogeneous environment. It uses a home agent for the selection of the optimal network depending upon the type of session of the mobile nodes. It uses...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Apr 2011

    Iterative Self Organized Data Algorithm for Fault Classification of Mechanical System

    The challenging issue for mechanical industry is to develop fast & reliable fault diagnosis systems before total breakdown of machine. Fault diagnosis & classification of faults of mechanical systems is a difficult task. It improves productivity & reduces cost of production. This paper presents an approach for classification of commonly...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Feb 2011

    An Empirical Evaluation of LIKE Operator in Oracle

    In database systems, user makes query and that query will be responded by the DBMS. Generally, there are a variety of methods for computing the response of the given query. It is the responsibility of the query processor to transform the query as entered by the user into an equivalent...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2010

    Dynamic Data Updates for Mobile Devices by Using 802.11 Wireless Communications

    Mobile devices are used for conveying important information. Opportunity exist to introduce users to different application of resource constraint mobile device. Currently, the client is forced to continuously poll for updates from potentially different data sources, such as, e-commerce, on-line auctions, stock and weather sites, to stay up to date...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2010

    Fuzzy Approach for Selecting Optimal COTS Based Software Products Under Consensus Recovery Block Scheme

    The cost associated with development of a large and complex software system is formidable. In today's customer driven market, improvement of quality aspects in terms of reliability of the product is also gaining increased importance. But the resources are limited and the manager has to maneuver within a tight schedule....

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Nov 2010

    Hash Security for Ad Hoc Routing

    A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Nov 2010

    ACBRAAM: A Content Based Routing Algorithm Using Ant Agents for Manets

    A Mobile Ad hoc NETwork (MANET) is a temporary network which is formed by a group of wireless mobile devices without the aid of any centralized infrastructure. In such environments, finding the identity of a mobile device and maintaining the paths between any two nodes are challenging tasks, in real...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Nov 2010

    Study of the Effects of Noise & Future Time Stamps on a New Model Based Encryption Mechanism

    In this paper, the encryption mechanism in MANET & WSN is considered. One of the very important parameters with MANET & WSN is its low computing power availability in its real time environment. Thus Security is an equal parameter in theses environments and equally important is its low computing power....

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    Study of Impact of Mobile Ad Hoc Networking and Its Future Applications

    Today, many people carry numerous portable devices, such as laptops, mobile phones, PDAs and mp3 players, for use in their professional and private lives. For the most part, these devices are used separately-that is, their applications do not interact. Imagine, however, if they could interact directly: participants at a meeting...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Nov 2011

    Rough Set Techniques for 24 Hour Knowledge Factory

    24 Hour Knowledge Factory is the work culture that incorporates different people contributing together in collaborated manner on various modules of the same project. But as advancements occurred, it was found that the approach is as difficult to realize as it is to imagine. The smooth work flow amidst the...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Nov 2010

    Hash Security for Ad Hoc Routing

    A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Nov 2010

    ACBRAAM: A Content Based Routing Algorithm Using Ant Agents for Manets

    A Mobile Ad hoc NETwork (MANET) is a temporary network which is formed by a group of wireless mobile devices without the aid of any centralized infrastructure. In such environments, finding the identity of a mobile device and maintaining the paths between any two nodes are challenging tasks, in real...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2010

    Dynamic Data Updates for Mobile Devices by Using 802.11 Wireless Communications

    Mobile devices are used for conveying important information. Opportunity exist to introduce users to different application of resource constraint mobile device. Currently, the client is forced to continuously poll for updates from potentially different data sources, such as, e-commerce, on-line auctions, stock and weather sites, to stay up to date...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Nov 2010

    Study of the Effects of Noise & Future Time Stamps on a New Model Based Encryption Mechanism

    In this paper, the encryption mechanism in MANET & WSN is considered. One of the very important parameters with MANET & WSN is its low computing power availability in its real time environment. Thus Security is an equal parameter in theses environments and equally important is its low computing power....

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Apr 2011

    Simulation and Proportional Evaluation of AODV and DSR in Different Environment of WSN

    Simulation and comparison of the routing protocols for network topology hold a significant position in the performance evaluation of wireless networks. This paper, discusses performance evaluation of Ad-hoc On demand Distance Vector (AODV) and Dynamic Source Routing (DSR), routing protocols for static WSN using NS-2. Energy efficiency, latency, throughput and...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Apr 2011

    Load Balancing in Integrated MANET, WLAN and Cellular Network

    This paper integrates mobile ad-hoc network, wireless local area network and cellular network. It balances the load among the three networks in the integrated heterogeneous environment. It uses a home agent for the selection of the optimal network depending upon the type of session of the mobile nodes. It uses...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2010

    Fuzzy Approach for Selecting Optimal COTS Based Software Products Under Consensus Recovery Block Scheme

    The cost associated with development of a large and complex software system is formidable. In today's customer driven market, improvement of quality aspects in terms of reliability of the product is also gaining increased importance. But the resources are limited and the manager has to maneuver within a tight schedule....

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Aug 2010

    An Enhanced Genetic Algorithm Approach to ATM Network Design

    The world of telecommunications is booming the telecommunication infrastructures are becoming more complex, and consequently, interest in developing broadband integrated service of digital network technologies like Asynchronous Transfer Mode (ATM) and Wireless ATM (WATM) are gaining momentum. The changing traffic pattern and the new technologies used in ATM networks make...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Apr 2011

    Iterative Self Organized Data Algorithm for Fault Classification of Mechanical System

    The challenging issue for mechanical industry is to develop fast & reliable fault diagnosis systems before total breakdown of machine. Fault diagnosis & classification of faults of mechanical systems is a difficult task. It improves productivity & reduces cost of production. This paper presents an approach for classification of commonly...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    A Framework for Hierarchical Clustering Based Indexing in Search Engines

    Granting efficient and fast accesses to the index is a key issue for performances of Web Search Engines. In order to enhance memory utilization and favor fast query resolution, WSEs use Inverted File (IF) indexes that consist of an array of the posting lists where each posting list is associated...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Jul 2011

    Web 3.0 in Education & Research

    The continuous evolution of the Internet has opened unimaginable opportunities and challenges in web based education and learning. The traditional version of web, i.e., web 1.0 started as a read only medium; the next version web 2.0 established itself as read/write medium. Now the currently evolving version of web, viz.,...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    Measuring IT Effectiveness in Banks of India for Sustainable Development

    Banks in India have invested heavily on deployment of Information Technology (IT) in the past one decade. IT over the years has become business driver rather than a business enabler. Sustainable development of banks depends heavily on effective use of IT. This calls for measuring the effectiveness of IT in...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Feb 2011

    An Empirical Evaluation of LIKE Operator in Oracle

    In database systems, user makes query and that query will be responded by the DBMS. Generally, there are a variety of methods for computing the response of the given query. It is the responsibility of the query processor to transform the query as entered by the user into an equivalent...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    Two Level Caching Techniques for Improving Result Ranking

    Due to the rapid growth of the Web from a few thousand pages in 2000 to its current size of several billion pages, users increasingly depend on web search engines for locating relevant information. One of the main challenges for search engines is to provide a good ranking function that...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    Exploring Alternatives Topologies for Network-on-Chip Architectures

    With increase in integration density and complexity of the System-On-Chip (SOC), the conventional interconnects are not suitable to fulfill the demands. The application of traditional network technologies in the form of Network-on-Chip is a potential solution. NoC design space has many variables. Selection of a better topology results in lesser...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2011

    Process Benchmarking Through Lean Six Sigma for ERP Sustainability in Small & Medium Enterprises

    Enterprise Resource Planning was a term restricted purely to elite class. ERP for small business calls for voluminous investments. But the question that kept ringing in the market was can everyone afford it? The answer was a stubborn no initially but not anymore. The world is changing, and new opportunities...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    EECHDA: Energy Effecient Clustering Hierarchy and Data Accumulation for Sensor Networks

    A wireless sensor network with a large number of tiny sensor nodes can be used as an effective tool for gathering data for various applications under different situations. One of the major issues in wireless sensor network is developing an energy - efficient routing protocol which has a significant impact...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    A Novel Metric For Detection of Jellyfish Reorder Attack on Adhoc Network

    Ad Hoc networks are susceptible to many attacks due to its unique characteristics such as open network architecture, stringent resource constraints, shared wireless medium and highly dynamic topology. The attacks can be of different types out of which denial of service is one of the most difficult attacks to detect...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Replication Strategies in Mobile Environments

    Transaction management in wireless environment poses challenging issues in preserving data consistency and fault tolerance. As the mobile databases are prone to frequent disconnections, bandwidth limitations, and mobility, etc. efficient execution of the transaction may not always be guaranteed. Replicating data at several sites is a powerful mechanism which not...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    An Effective Technique For Data Security in Modern Cryptosystem

    Present paper provides a conceptual framework on the proposed C-QUBITS Key exchange technique, which is used as a base for the data security through quantum computing in the modern cryptosystem. In the first phase a detailed description of the BB84 Cryptographic protocol is given, which is used as a standard...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Mar 2010

    Computational Modeling of Cell Survival Using VHDL

    The model for cell survival has been implemented using Very High Speed Integrated Circuit Hardware Description Language (VHDL) (Xilinx Tool) taking three input signals: Tumor Necrosis Factor-a (TNF), Epidermal Growth Factor (EGF) and Insulin. Cell survival has been regulated by the interaction of five proteins viz P13K, TNFR1, EGFR, IRS...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    On Lattice Based Cryptographic Sampling: An Algorithmic Approach

    In this paper, the authors propose a practical lattice based reduction by sampling to avoid any dependence on Schnorr's Geometric Series Assumption. It is a generalization of Schnorr's RSR algorithm. It is also well defined for bases where this algorithm is not applicable. It demonstrates that the sampling reduction can...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    A Comparative Study of Software Requirement Tools for Secure Software Development

    Requirement is the foundation of the entire software development life cycle. With proper requirement management a project can deliver the right solution on time and within budget. Requirement elicitation, requirement specification, and requirement validation are important to assure the quality of requirement documentations. All these three activities can be better...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Application of Fuzzy Relations in Convalescing Link Structure

    The link structure of website allows them to spread the link power of home page to the individual pages of the site. In this paper, the authors define the content and web pages as two important and prominent factors in website navigation and restate the enhancement in the website navigation...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    System Versus Process Prespective of Enterprise Resource Planning Implementations

    This paper reviews literature concerning implementation of Enterprise Resource Planning (ERP), its successful and unsuccessful cases, and the critical success factors of its implementation, in order to identify gaps in academic thinking and propose future research opportunities. ERP implementation research often takes only a systems-oriented view of the implementation process...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Design Patterns for Successful Service Oriented Architecture Implementation

    The successful implementation of Service Oriented Architecture (SOA) relies on a careful and holistic approach to business planning. One of the most important tools in the evaluation, purchase, and ongoing use of SOA is the best practices that vendors, consultants, and customers have developed and used. The promise of business...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    A Secure Private Key Encryption Technique for Data Security in Modern Cryptosystem

    The paper provides a conceptual framework on the proposed private key encryption technique that can be used for data security in modern cryptosystem. This encryption technique uses the concept of arithmetic coding and can be used as an independent system as well as can be clubbed with any of the...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Robust Source Coding Steganographic Technique Using Wavelet Transforms

    Information hiding has emerged as an important research field to resolve the problems in network security, quality of service control and secure communications through public and private channels. Keeping the network in a desired state is the utmost requirement of network communications. The paper is being done in different fields...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Comparative Study of Distributed Computing Paradigms

    The mobile agent paradigm has revolutionised the distributed computing environment. There are different paradigms used in distributed computing, such as - client-server paradigm, remote procedure paradigm and mobile agent paradigm. The client-server is based upon the concept of a server, which serves the various request of the clients and in...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Service Oriented Architecture for Business Dynamics: An Agent Based Business Modeling Approach

    In today's rapidly changing environment the industries are interested in executing business functions that has scope in multiple applications. Business dynamics and technological innovations have felt organizations to comply with a disparate mix of operating systems, applications and databases. This makes it difficult, time-consuming and costly for IT departments to...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Resource Optimization Using XML

    EXtensible Markup Language [XML] database is one of the hot areas of research now days. Number of developers and research organizations are working on the capabilities and efficiency of using EXtensible Markup Language [XML] database because of its unique structure and processing speed. In any web based database search, there...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Web Document Clustering for Finding Expertise in Research Area

    Researchers often need to find expertise in their chosen area of research. Finding expertise is very useful as relevant research papers can be studied and the experts could be identified. Therefore, finding expertise in the chosen area of research has always attracted interest among academic community. These days research institutions...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Performance Analysis of High Speed Data Networks Using Priority Discipline

    Recent advancements in network technology allow integration of different services on the same networking infrastructure. Thus, voice, data and video or multimedia traffic share the same transmission, switching and storage resources over a single network. This integration offers the user a single access facility to all communication services through a...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // May 2011

    Optimized Image Representation in Memory Using Linear Arrays

    Various Image representation methods consume very large amounts of memory and takes large transmission time over the network. In this paper, the authors have tried to reduce memory requirements for storing images which can get transmitted in small time period. Initially, the preamble of a digital image as well as...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Dec 2008

    Data Dissemination in Mobile Computing Environment

    Data dissemination in asymmetrical communication environment, where the downlink communication capacity is much greater than the uplink communication capacity, is best suited for mobile environment. In this architecture there will be a stationary server continuously broadcasting different data items over the air. The mobile clients continuously listen to the channel...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Sep 2011

    Genetic Algorithm Based Optimal Testing Effort Allocation Problem for Modular Software

    Software Reliability Growth Models (SRGM) are used to assess modular software quantitatively and predict the reliability of each of the modules during module testing phase. In the last few decades various SRGM's have been proposed in literature. However, it is difficult to select the best model from a plethora of...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Jan 2012

    Performance Comparison of XY, OE and DY Ad Routing Algorithm by Load Variation Analysis of 2-Dimensional Mesh Topology Based Network-on-Chip

    Network on chip is a scalable and flexible communication architecture for the design of core based System-on-Chip. Communication performance of a NOC heavily depends on routing algorithm. XY routing algorithm is distributed deterministic routing algorithm. Odd-Even (OE) routing algorithm is distributed adaptive routing algorithm with deadlock-free ability. DyAD combines the...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)

  • White Papers // Jan 2012

    Determination of Efficiency of Hybrid Photovoltaic Thermal Air Collectors Using Aritificial Neural Network Approach for Different PV Technology

    In this paper an attempt has been made to determine efficiency of semi transparent hybrid photovoltaic thermal double pass air collector for different PV technology and compare it with single pass air collector using Artificial Neural Network (ANN) technique for New Delhi weather station of India. The MATLAB 7.1 neural...

    Provided By BVICAM's International Journal of Information Technology (BIJIT)