IJCTT-International Journal of Computer Trends and Technology

Displaying 1-40 of 544 results

  • White Papers // Dec 2014

    Centralizing Sensor Network in the Lush to Improve the Quality

    Major issue in wireless sensor networks is Localization and the study is done over years. With the real time experience GreenOrbs, to know about the climatic condition in the forest; they are unable to get the proper data sitting remotely with the current technique employed for knowing weather conditions at...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Prohibiting Blocking Attacks in Wireless Networks Through Aggregating Cryptanalytic Primitives

    Unlock outlook of the connection without any type of wire based medium will puts down the intentional intervention assault, usually submitted to like jamming. These type of the intentional intervention with the transmission without wire commence the pad for the purpose of growing refutation of the provide services based assault...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Designing Of Distributed Firewalls in Cooperative Domains

    Firewalls have been broadly organized on the Internet aimed at acquiring secluded systems. A firewall forms every received or departing packet towards to choose whether to receive or reject the packet grounded on its strategy. Improving firewall strategies is vital aimed at enlightening system performance. Earlier effort on firewall optimization...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Novel Approach for Enhanced Adaptive Acknowledgement based Intrusion Detection for MANETs

    The change to wireless network from wired network has been a most evolving new worldwide trend within the past few decades. The quantifiability and quality brought by wireless network create its potential in several applications. Among all the up to date wireless networks, Mobile Ad hoc NETwork (MANET) is one...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Secure Online Application Safeguarding Data with Stegnography based Watermarking

    Digital watermarking is the act of hiding information in multimedia data (images, audio or video), for the purposes of content protection or authentication. In digital watermarking, the secret information (usually in the form of a bit-stream), the watermark, is embedded into a multimedia data such as cover data in such...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Quality of Service with Frequent Pattern Mining on Multi Crux Chunk

    A mining frequent pattern is a first fundamental data's mining tasks with the numerous practical application i.e., the consumer markets basket examination, webs mining, and the network intrusion discovery. When the databases sizes are larger, executing the mining tasks on the personals computers is always non trivial because of the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Tracking of Local Area Adversaries in Wireless Sensor Networks

    Now-a-days, spoofing has occupied in many network areas. Mainly it will effect on the networks, because everyone is copying the others things and implementing then the authors can do all things very simply and they can launch this process easily. In the network each and every data in sharing has...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Revolutionary Profit Maximization Technique for Cloud Computing with Arranging Peak Multi Servers

    The cloud computing became most popular in now-a-days, here the generous of finances of cloud computing is censoriously significant. To escalate the profits (income), the cloud service provider has needs to realize the cost of business and charge for facility and the authors come to know how they will give...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Excellent Surveillance for Multi-Channel Wireless Communication Networks

    Submissive monitoring circulated wireless data transmission is a supportive technique to examine tricks in wireless network for error analysis, to reserve executive and serious pathway examination. Here the authors are initiated QoM (Quality of Monitoring) it was defined by different predictable quantity of dynamic users monitor, and the study of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Geographical Position Updating Approach in Mobile Wireless Networks

    In general the people use the node transformation of data in the networks, in geographic nodes they need to update each and everything of their positions and data nodes as well as they need to identify the next neighbor nodes and its positions when they are sending the information from...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Finding the Destination of Moving-Object in Wireless Sensor Network

    Wireless network is more powerful and signal strength is very strong to send information and to receive the information in the network. To improve this process the authors added Tracking the object or finding the destination location with a moving object in an unknown location. They can see that tings...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Reliable Data Assurance among Peer To Peer System

    Technology and its implication the people carry forward has its meaning in its surrounding, If they consider the system of networking world which they really basic model has its own significance in the global world of Information Technology. In a networking of peer-to-peer system, the malicious activity is the major...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Parallelization of GUI Applications

    Parallel computing with respect to the computer architecture involves building multi-core processors. Utilization of these multiple-cores is done using parallel programming. It has been observed that not all parallel applications are similar. With the widespread usage of multicore processors, optimum utility of a computer's multiprocessing capability is taken care of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Securely Data Sharing with Indeterminate ID Allocation

    The authors are introducing a novel algorithm for anonymous data sharing of private data from different persons. By using this mechanism they are assigning nodes ID number from 1 to N. This assignment is anonymous in that the individuality receives the information without knowing identity of this to other member...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Wireless Sensor Expedition of Extensive Choice to Preserve the Quality

    The basic thing of wireless network is to provide the security in local areas and make difference between the general things to Green Orbs to observer the natural things. Remote controlling network area and its related devices the authors know it allows sum range to work and allow users to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Security Leakage Upper Bound Constraint to the Cloud through a Secure and Efficient Secondary Data

    Cloud computing provides considerable storage capacity to the users to deploy their applications without any modification its infrastructure details. Along with that all applications the authors have a large set of intermediate datasets it can generated by the implanted changes in the cloud computing and it is a challenging problem...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Secure Protocol for Maintaining Privacy & Confidentiality in Untrusted Database

    Usually once secrecy becomes an apprehension, encrypted data before outsourcing to a service provider. Now and then deployed on constructs of any software-based cryptographic, the encrypted data in for server-side query processing on, essentially limit query expressiveness. Now, the authors introduce trusted database, an outsourced database model that allows users...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Framework for Uplink Query Processing in Network-Assisted Mobile Computing

    Many mobile devices today access the data from the remote servers through the user generated queries. Processing of these queries should be done before the desired content to be delivered is identified. In this manner, when the processing is done the process will cut down the battery stand-by time there...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Cloud Architecture for Profit Maximization Based on Efficient Multi-Server Configuration

    Cloud computing becoming a very efficient and effective technology to use resources and services together. Now-a-days, cloud computing becomes most popular, here the indulgent of economics of cloud computing is critically important. To increase the profits, the cloud service provider needs to understand the business cost and facility charge and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Modern Framework for P2P Integrated Systems over Trust Model for Self-Organizing Nodes

    The open nature of the peer-to-peer systems exposes them to malicious actions. Here in this paper, the authors introducing distributed algorithms that can enable peer to get the trustworthiness of other peers based on interactions of those peers in the past with other peers. The peers in the network are...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Identification of Secured Single Sign-on Approach and to find Attackers in Distributed Systems

    Distributed systems are the huge amount of telecommunicated and adopting based network systems. So to provide the security in that large network the authors are implemented this paper, users can sign in only one time in their account. The users cannot able to login in their account many times until...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Requirements, Trade-offs and Design for Safe Encounter Based Mobile Social Network

    The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. Encounter traditional social network as opposed users abuse the information's. The new access presents provocations that are basically different from those social network designs tackled by earlier....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Privacy Perspectives of Record based Approach in Social Networks

    Mainly in this paper, the authors proposed, privacy is one of the most friction point that the people can see in social networks and when they involves the communications in social networks it get the information about the tings. They can see different types of communities of computer science researchers...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Performance Evaluation and Testing of EAACKSecure IDS for MANETs: Brief Study

    Among all the up to date wireless networks, Mobile Ad hoc NETwork (MANET) is one amongst the foremost necessary and classifiable applications. On the adverse to ancient spec, MANET doesn't need a set network infrastructure; each single node works as each a sender and a receiver and they trust their...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    A Survey on Data Aggregation in Big Data and Cloud Computing

    Cloud computing, rapidly emerging as a new computation concept, offers agile and scalable resource access in a utility-like fashion, particularly for the processing of big data. An important open problem here is to effectively progress the data, from various geographical locations more time, into a cloud for efficient processing. Big...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Mobile Agent Community Pool - A New View on Load Balancing in Cloud Computing

    With the advent of cloud computing, the era of technology is at its extreme. Accordingly several issues are under research. In this paper, the authors have considered Load balancing a major challenging issue and proposed architecture with the application of mobile agents. Load balancing is a methodology to distribute workload...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Phishing Email Filtering Techniques A Survey

    The most interesting species of Internet fraud is phishing. Email phishing is a vulnerable activity which is referred as email fraud, includes web link or form and asks for confidential information such as password, account details. The email will be classified as phishing email and legitimate email by various phishing...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Intelligent Interface Based Voice Activity Detector and Automatic Speech Recognition for Home Automation in WSN - a Survey

    A wireless sensor network is a wireless network which incorporates a gateway that provides wireless connectivity back to the wired world and distributed nodes. The wireless sensor networks are widely used in automation to offers various advantages and new challenges. The aim of this paper is to survey hand-held devices...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Efficient Data Transmission Using Energy Efficient Clustering Scheme for Wireless Ad-Hoc Sensor Network

    Wireless Ad-hoc Sensor Network (WASN) is characterized with low power, low computational capabilities and limited memory nodes. In WASN, secure routing protocols are used to protect against attacks. Partitioning the nodes into different cluster is one of the most effective methods to solve the problem of energy in Wireless Ad...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Reliability and Energy Efficient Cluster Based Routing Protocol for Wireless Sensor Networks

    Due to the recent development in wireless technology, sensor networks researchers' attention because of their applicability in many fields for effective collection of sensing data with low cost. Nodes in such applications are equipped with limited energy supply and need careful management in order to extend their lifetime. In order...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Retina Based Personal Identification System Using Skeletonization and Similarity Transformation

    Biometric security has become more important because of the increasing activities of terrorists and hackers. One of the most reliable biometric security systems is retina biometric security system, because no two people have the same retinal pattern. The proposed system consist of four modules viz, retina fundus acquisition, pre-processing, detection...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Distributed Parallel Efficient and Robust Detection of Clone Attacks in Wireless Sensor Networks

    Technology and its boundary can be measured in terms of loop hole which the user can tell it as vulnerability. If they consider the technology with it's surrounding of ethical hacker who can crack the system which is loop whole. In terms of wireless sensor network and the clone attacks...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Enhancing Coverage Extension with Service Differentiation in Wireless Networks

    Coverage extension is an important consideration for enhancing the network connectivity without changes in the infrastructure. So, in the existing system in order to enlarge the network coverage in wireless networks, an incentive and a scheduling algorithm are presented. Also considers the impacts in the quality-of-service whenever increasing the coverage....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Improve Intruder Detection in Virtual Network Systems

    Technologically providing security, the authors have implemented IDS. It is more secure beyond passwords, digital signatures, and confidentiality. IDS cannot substitute any of those mentioned mechanisms. But it can enhance a system where those mechanisms are not enough. For data efficiency, they have implemented a proxy server. The proxy server...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Analyse and Mitigate Flooding Attacks in Distributed Locations

    Wireless sensor network contains different challenges like energy conservation and security. These two challenges are more important forget the reliable and life time solutions. Previously much number of techniques has been proposed for increases the life time and enhances the security purpose. Those approaches are not satisfiable and efficient. In...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Clustering in Wireless Sensor Networks: A Survey

    Wireless Sensor Network (WSN) has emerged as a useful supplement to the modern wireless communication networks. Most suitable option of ways for information transfer finally ends up in saving of energy consumption resulting in increase of network lifetime of wireless device networks. Many routing, authority board, and information dissemination protocols...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Survey of Intrusion Detection Techniques in LEACH

    Security of Wireless Sensor Network (WSN) turn out to be a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Clustered Networks have been proposed to reduce the power consumption...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Source Anonymous Message Authentication in Security Networks

    Message authentication is an effective mechanism, used to authenticate the messages in Wireless Sensor Networks (WSNs). Wireless sensor network consists of a large number of sensor nodes. Each sensor node knows its location in the sensor domain and is capable of communicating with its neighboring nodes directly using geographic routing....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    A Comparative Study of Various Distance Measures for Software Fault Prediction

    Different distance measures have been used for efficiently predicting software faults at early stages of software development. One stereotyped approach for software fault prediction due to its computational efficiency is K-means clustering, which partitions the dataset into K number of clusters using any distance measure. Distance measures by using some...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Architecture to Achieving Security in WMN

    In previous paper, proposed a security architecture to ensure that unconditional anonymity for honest users and traceability of misbehaving users for network authorities in wireless mesh network. It strives to resolve the conflicts between the anonymity and traceability objectives, the key component; security architecture is a ticket based anonymity scheme....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption Using Blowfish Algorithm

    Cloud computing is a distributive computation task on the resource pool which consists of massive computers. LMS experiences with Cloud and Managed Cloud Service provider are due to numerous factors. Availability means that the services are available even when quite a number of nodes fail. Cloud services are provided by...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    Game Based Analysis of Distributed DoS Attacks Prevention Using Puzzle-Based Defense Strategy

    Security issues have become a major issue in recent years due to the development of technology in networking and its use in vicious way. A number of puzzle-based defense strategies have been established to overcome the flooding Denial-of-Service (DoS) attack which is eminent in the networks. DoS attacks are aimed...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    A New Reduced Clock Power Flip-Flop for Future SOC Applications

    In this paper a novel technique is proposed based on the comparison between Conventional Conditional Data Mapping Flip-flop and Clock Pair Shared D Flip Flop (CPSFF) here the authors are checking the working of CDMFF and the conventional D Flip-flop. Due to the immense growth in nanometer technology the SOC...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    Web Usage Mining: User Navigational Patterns Extraction From Web Logs

    Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. In this paper, the authors define the notion of a "User session" as being a temporally compact sequence of web accesses by a user. They also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Automation of Network Protocol Analysis

    This paper "Automation of Network Protocol Analysis" is mainly aimed to automate the entire process. Starting from sniffing the network packets till the validation of it has been taken care. Here, the authors have automated the logging part through a C program. Whenever packets will be transmitted from a system,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Analysis of VoIP Traffic With Multiple Packet Transfer

    Voice over Internet Protocol (VoIP) is a form of voice communication. Today Wireless LANs are providing a cost effective alternative for the voice communication. Initially the wireless access protocols are not suitable for the voice communication. Subsequently, new techniques are developed for the real time voice communication. In voice communication...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Implementation of SOBEL Edge Detection on FPGA

    The image processing algorithms has been limited to software implementation which is slower due to the limited processor speed. So, a dedicated processor for edge detection is required which was not possible until advancements in VLSI technology. The proposed work presents FPGA based architecture for Edge Detection using Sobel operator....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Android Based Mobile Application Development and Its Security

    In the advancing world of technology, Mobile applications are a rapidly growing segment of the global mobile market. Mobile applications are evolving at a meteor pace to give users a rich and fast user experience. In this paper, Android mobile platform for the mobile application development, layered approach and the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Web Mining Privacy Using Advanced DSA - Spatial LBS Case Study

    Web mining is new area of research in information technology; so many business applications that utilize data mining and text mining techniques to extract useful business information on the web have emerged from web searching to web mining. It is important for students to acquire knowledge and hands on experience...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    An Energy Efficient Remote Data Collection and Reprogramming of Wireless Sensors Networks

    Energy constrained sensor nodes are preloaded with the program code and data, which are usually unattended after deployment. Due to change in user requirements and environmental changes, preloaded software and firmware deployed in sensor nodes have to be reprogrammed on large number of sensor nodes to resolve the post deployment...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Secure Transmission Services in Wireless Networks Using Key Trees

    In contrast with conventional networks, mobile networks usually do not provide on-line access to trusted authorities or to centralized servers for secure message transmissions and exhibit problems like frequent problems due to link-node failures and pricey issues. For these reasons, existing solutions for secure message transmission services in regular networks...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks

    In this paper, the authors identify vulnerabilities of on-demand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mechanisms to defend against them. They propose BSMR, a novel secure multicast routing protocol that withstands insider attacks from colluding adversaries. The protocol is a software-based solution...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Behaviour Based Trust Management Using Geometric Mean Approach for Wireless Sensor Networks

    The resource constraints of Wireless Sensor Network (WSN) make it easy to attack and hard to protect. Although carefully designed cryptography and authentication help to make WSN securer, they are not good at dealing with compromised node and ageing node, whose misbehavior may impair the function of WSN. Hence, they...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Ray's Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. One promising alternatives of textual passwords is a graphical based password. According to human psychology, human can easily remember pictures. In this paper, the author has proposed a new hybrid graphical password based system. The system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel SHA-1 Approach in Database Security

    Database security is a major research area and includes topics such as database security, intrusion detection, DDos, privacy preserving, data mining and related papers in designing information systems that protect the privacy and ownership of individual or company information. A database contains data ranging from different degree of confidentiality and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Asynchronous Optical Burst Switching Networks

    The ever increasing demand for higher bandwidth due to the growth of bandwidth intensive applications such as video-on-demand, video conferencing, on-line banking, on-line auction and other multimedia applications motivated the search for alternatives to traditional electronic networks. Optical Burst Switching (OBS) is one such paradigm developed to handle the future...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Security Design Combining the Advantages of Cryptanalysis and Anonymous Routing Protocol to Achieve Data Secrecy and Anonymity

    Since internet is widely used these days, users privacy has become the main concern. Privacy is related to anonymity. Basic requirement for anonymity is to unlink the user's identity to specific activities such as in a untraceable e-cash system and P2P payment systems. To provide anonymity various techniques are made...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Linear Appearance Based Algorithms for Face Recognition

    Analyzing the face recognition rate of various current face recognition algorithms is absolutely critical in developing new robust algorithms. In this paper, the authors propose performance analysis of Principal Component Analysis (PCA), Linear Discriminate Analysis (LDA) and Locality Preserving Projections (LPP) for face recognition. This analysis was carried out on...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    FPGA Based Area and Throughput Implementation of JH and BLAKE Hash Function

    Implementation of area and throughput of the main building block (compression function) for two SHA-3 candidates BLAKE and JH hash function. The National Institute of Standards and Technology (NIST) has started a competition for a new secure hash standard. A significant comparison between the submitted candidates is only possible, if...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Survey on Computer Crime Scene Investigation Forensic Tools

    In the day to day life, the crime is becoming a big issue in the computer field. So to avoid and to protect from crime, Computer Forensics is used. This paper describes different tools that are used in the Computer Forensics. These tools are used to recover the data that...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel Approach for Supply Chain in Distributed Networks Using Multi Echelon

    In distribution networks ware-houses and distribution center will present at different locations and the authors have the problem in the covering all the distribution center using single path to minimize the cost and to maintain the optimal quantity at the warehouses they need to follow the specific methods in this...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel Approach for the Detection of SYN Flood Attack

    Denial of Service attack(DoS) is causing a serious and financial damage in recent years. They are performed easily by utilizing the weakness of the network protocol. There are many types of Dos attack namely IP spoofing SYN Flood. If should be notable that the firewall host hardly filters the SYN...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Document Clustering in Web Search Engine

    As the number of web pages grows, it becomes more difficult to find the relavant documents from the information retrieval engines, so by using clustering concept, the authors can find the grouped relavant documents. The main purpose of clustering techniques is to partitionate a set of entities into different groups,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Cost Estimation Tool for Commercial Software Development Industries

    As cost associated to the software development is increasing continuously, there is a need to direct attention at better understanding of development process and calibrating previous models and methods making them applicable to existing environment such as proposing hybrid tools using the techniques based on existing models. The main aim...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Simulation and Performance Analysis of DSDV, OLSR, DSR and ZRP Routing Protocols in Manets

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2012

    A Survey on Location Aware and Context Aware in Mobile Applications

    Mobile services and applications are used in changing contexts and surroundings. These services are made up of context-aware and offer contextually relevant information to the user. These facilities help to find the data and its use. Mobile computing refers to the use of any kind of computer in a moving...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2012

    Prevention of Security Concerns During Outlier Detection

    Data objects which do not comply with the general behavior or model of the data are called Outliers. Outlier Detection in databases has numerous applications such as fraud detection, customized marketing, and the search for terrorism. However, the use of Outlier Detection for various purposes is not an easy task....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2012

    Predicting Software Bugs Using Web Log Analysis Techniques and Na?ve Bayesian Technique

    With the continued growth and proliferation of Web services, software as a services and Web based information systems, the volumes of user data have reached astronomical proportions. As the World Wide Web is continuously and rapidly growing, it is necessary for the web miners to utilize intelligent tools in order...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2011

    Robust and Secure Digital Signature for Image Authentication Over Wireless Channels

    Now a days the transmission and distribution of the digital images by appending the digital signatures and content based image authentication schemes facing some triggers which are suitable for the insecure network and robust to transmission errors. The invasive distribution of digital images and the growing concern on their integrity...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2011

    Modified LRU Algorithm to Implement Proxy Server With Caching Policies

    In order to produce and develop a software system, it is necessary to have a method of choosing a suitable algorithm which satisfies the required quality attributes and maintains a trade-off between sometimes conflicting ones. Proxy server uses caching policies to store web documents using algorithms. For this, different algorithms...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2011

    A QOS-Aware Software Selection Method Based On Service Credibility Evaluation

    Many software's that share same or similar functional properties; so it is often a challenging effort to select credible and optimal software based on their various history QoS records. In view of this challenge, a novel QoS-aware software selection method based on service credibility evaluation is put forward, based on...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Standard Ethernet Interface as an Embedded Communication Network for Controlling and Monitoring the Devices

    Web access functionality is embedded in a device to enable low cost widely accessible and enhanced user interface functions for the device. A web server in the device provides access to the user interface functions for the device through a device web page. A web server can be embedded into...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Hardware Implementation of DWT for Image Compression Using SPIHT Algorithm

    In this paper, a DWT-based image processing system is developed on Xilinx Spartan3 Field Programmable Gate Array (FPGA) device using Embedded Development Kit (EDK) tools from Xilinx. Two different hardware architectures of Two Dimensional (2-D) DWT have been implemented as a coprocessor in an embedded system. One is direct implementation...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Protection System for VIP's With GPRS & Remote Monitoring

    In communication channel of a tele-operation control task, there always exists a time-delay problem which causes poor performance and even instability of the system. To overcome the time-delay problem, in this paper, the Smith predictor configuration is considered. The Smith predictor can stabilize the system by taking the time delay...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Implementation of CMOS Camera Device Driver and Bluetooth Technique on S3C2440 Using Linux

    With the processing of CMOS technology, the technology of video acquisition based on CMOS is becoming a new trend. However, many CMOS camera chip is not supported by the newest Linux kernel yet. The environmented image acquirement and the Bluetooth transmission system are studied and designed. In this paper, the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    A New Framework Design for IPTV

    An IPTV is a system used to deliver television services to the consumers who are registered subscribers for this system. This delivery of digital television is made possible by using Internet Protocol over a broadband connection, usually in a managed network rather than the public Internet to preserve quality of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    A Study on Post Mining of Association Rules Targeting User Interest

    Association Rule Mining means discovering interesting patterns with in large databases. Association rules are used in many application areas such as market base analysis, web log analysis, protein substructures. Several post processing methods were developed to reduce the number of rules using non-redundant rules or pruning techniques such as pruning,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    An Overview Mobility Effect on Transmissions Energy Consumption in Mobile Ad-Hoc Networks

    In mobile ad-hoc networks transmission energy is much important. Energy conservation is important issue in MANET because mobile nodes are basically battery powered and cannot function without proper power level. How transmission energy consumption affected mobility. Many authors publish related work. In this paper, the authors try to make a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    Dynamic Frequency Hopping: A Major Boon Towards Performance Improvisation of a GSM Mobile Network

    The primary problem in today's cellular network is to raise bandwidth efficiency of cellular system and handle blocking in the call between the subscribers. This will be done by improving the performance of system and reducing the interference to allow the users to achieve higher data rate. This designed system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    A Novel Approach in Cost Estimation Based on Algorithmic Model

    Software engineering is the step by step process for developing an efficient system, which is expected by the user. To achieve or develop the system they are having many lifecycle models. But while considering the software development lifecycle model cost estimation is the essential thing to predict how much effort...

    Provided By IJCTT-International Journal of Computer Trends and Technology