IJCTT-International Journal of Computer Trends and Technology

Displaying 1-40 of 416 results

  • White Papers // Jul 2014

    Mining Multidimensional Data Using Constraint Frequent Pattern in Medical Dataset

    Frequent pattern mining is an active field in data mining research in last decade. Many literatures have been emerged and tremendous programs have been made. This paper has been designed to find out the best mining method for the patient with sugar, heart diseases by defining certain conditions. Recent analysis...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Intrusion Detection Based On Fuzzy Logic Approach Using Simplified Swarm Optimization

    The intrusion is becoming more essential for effective defense against attacks that are constantly changing in magnitude and complexity. Mainly intrusion detection relies on the extensive knowledge of security experts. The paper proposed a new detection mechanism as Fuzzy Intrusion Detection Engine (FIDE) that uses fuzzy logic to access network...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Design of a Content Management System Based On the Use of Metadata

    In this paper, the authors present the design of a Content Manager System (CMS) based on the use of metadata. This paper will help the users to understand the development of software for content management and the various constraints and resources used for this kind of development. This design will...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Adaptive Mobile Social Video Streaming In Loud Network

    While hassle on video traffic over cell phone networks have been unpleasant the wireless link capability cannot keep up with the traffic exact. The space between the traffic demand and the link capability, all along with time-varying link position, results in reduced service excellence of video streaming over cell phone...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Configuration of Mobile Communication in Data-Intensive WSNS

    Wireless Sensor Networks (WSNs) are more and more used data-intensive purpose such as micro-climate observing, accuracy agriculture, and video/audio scrutiny. A key defy faced by data-intensive WSNs is to broadcast all the data produce within an application's duration to the bottom posting regardless of the fact that sensor nodes have...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Secure Storage of Profile Matching of Distributed-Based Mobile Social Networks

    The profile identical means two users comparing their individual profile and is frequently the first step towards effectual PMSN. It, however, conflicts with the users' growing isolation concerns about disclosing their individual profiles to complete strangers before deciding to relate with them. The authors' protocols make possible two users to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Underwater Sensor System Effective Time Synchronization in Networks of Mobile

    Time synchronization is main need for lots of services given by various networks. Many of time synchronization protocols have been explored for terrestrial WSNs (Wireless Sensor Networks). Any have, no one in them can be enforced to UWSNs (UnderWater Sensor Networks) directly. UWSNs synchronization algorithms must under taken extra factors...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Energy-Aware Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks

    Single path routing protocols in WSN may lead to holes in the network, as only the nodes present in the single path are utilized for data transmission. Therefore, multipath routing protocols are recommended for WSN. Multipath routing protocols increases the network lifetime by distributing the traffic among multiple paths. Node...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Secure Routing using Multiple Domains for Wireless Sensor Networks

    Secure transmission of data packets is a major challenge in wireless sensor networks. There is a possibility of an attacker creating security holes in the network. Hence, network security and reliability can be achieved by discovering random multiple paths using multiple domains, and forwarding data packets from the source node...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    A Survey on Single Sign-On Mechanisms for Distributed Computer Networks

    A distributed computer network is a special type of network, which facilitates the customers to use different network services which are provided by the service providers. In the distributed computer networks, user verification is an important process for the security. In the verification process, the decision is taken whether the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Detection of Attacks and QoS Improvement using Heterogeneous Green Framework in Cognitive Radio Network

    Energy-efficient communication has sparked tremendous interest in recent years as one of the main design goals of future wireless Heterogeneous Networks (HetNets). This has resulted in paradigm shift of current operation from data oriented to energy-efficient oriented networks. This framework is cognitive in holistic sense and aims at improving energy...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Effective Data Aggregation Based EDDEEC Protocol for Hetrogeneous WSNs

    Because of restricted battery of sensor nodes, power effectiveness found to be the key check of restricted life of wireless sensor networks. So the key attention of the current work is to discover the numerous protocols which have concentrated on reducing the power utilization problem and how anyone can improve...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Performance Comparison of Data Mining Algorithms: A Case Study on Car Evaluation Dataset

    Cars are essentially part of the people everyday lives. There are different types of cars as produced by different manufacturers; therefore the buyer has a choice to make. The choice buyers or drivers have mostly depends on the price, safety, and how luxurious or spacious the car is. Data mining...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Cooperative Congestion Control in P2P Networks Edge Router

    Next generation data centers and cloud computing design architectures require high data rates of the order of 100 GBPS from the Internet. This paper presents Random Early Detection (RED) edge routers for congestion avoidance in P2P networks. The edge routers detect the possible congestion by computing the average queue size....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Web Crawler: Extracting the Web Data

    Internet usage has increased a lot in recent times. Users can find their resources by using different hypertext links. This usage of Internet has led to the invention of web crawlers. Web crawlers are full text search engines which assist users in navigating the web. These web crawlers can also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    An Integration Approach for Data Extraction and Coalition

    Web database is nothing but online database which generates query result based on user's result. From the query result, extract the data from many application i.e., data integration which need cooperate with multiple web application. CTVS is the method for novel data extraction, which is used to extract the data...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Smart City Analysis Using Spatial Data and Predicting the Sustainability

    Smart city planning is crucial as it should balance among resources and the needs of the city. It allows to achieve good eco-friendly industries, there by supporting both the nature and the stake holders. Setting up an industry is a difficult problem, because it should optimize the resources and allocating...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Integration of Cloud Computing and Web2.0 Collaboration Technologies in E-Learning

    Cloud computing technology is an emerging new computing paradigm for delivering computing services. Although it still in its early stage, it has changed the way how many applications are developed and accessed. This computing approach relies on a number of existing technologies, such as Web2.0, virtualization, Service Oriented Architecture (SOA),...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Performance Comparison of Two Streaming Data Clustering Algorithms

    The Weighted Fuzzy C-Mean clustering algorithm (WFCM) and Weighted Fuzzy C-Mean-Adaptive Cluster number (WFCM-AC) are extension of traditional fuzzy c-mean algorithm to stream data clustering algorithm. Clusters in WFCM are generated by renewing the centers of weighted cluster by iteration. On the other hand, WFCM-AC generates clusters by applying WFCM...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    A Synonym Based Approach of Data Mining in Search Engine Optimization

    In today's era with the rapid growth of information on the web, makes users turn to search engines as a replacement of traditional media. This makes sorting of particular information through billions of web pages and displaying the relevant data makes the task tough for the search engine. Remedy for...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Distributed Data Security Enhancement in Cloud Computing

    Rapidly growing information technology and connectivity to the internet in all forms of hand-held devices to mainframe computers of bigger organizations have one important need and that is connectivity to source of data and internet from any location possible in a secure and dependable manner. The cloud computing comes to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Virtualization Approaches in Cloud Computing

    In the growing age of cloud computing demands in almost all the sectors like TV channel to online shopping to educational institution etc., the cloud infrastructure cost goes very high. Therefore, the concept of virtualization needs to be understood and implement in the cloud computing systems, which enables the user...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Cloud Computing and Virtualization Security: A Survey

    The term cloud computing comes from the telecommunication world. The meaning of term cloud computing is \"Computing is in the cloud\". This term is related with the computation, data access, software which can be easily accessed by the end user. Cloud computing is one important domain in now days, the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Puzzle Based Client-Server Authentication Model with Secure Data Transfer

    In the present day scenario, the authors are seeing that many online applications are attacked by the intruders, and there is no proper solution built for the same. Here in this proposed paper, they are working on the area which is not only providing security to the data but also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Novel Design in Cloud Towards the Data Integrity

    Cloud computing frequently is taken to be a term that simply renames common technologies and techniques that the authors have come to know in IT. It is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. It can reduce the storage cost...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Cloud Based Backup Service

    In the current scenario, people carry or back up files in flash drives and external drives. Popular applications like dropbox, Google Drive are also being used for these purposes. Limitations of using these methods are they have memory constraints and the user needs to manually need to upload the files/folders...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Providing the Secure Data Transmission in the Network Using Open Source Packet Analyzer

    Intrusion Detection System (IDS) is a device or software application that monitors network and system activities for malicious activities or policy violations and produces report to a management station.IDS is process of detecting intrusion in database, network or any other device for providing secure data transmission. In this paper, the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    A Review of ZeroAccess peer-to-peer Botnet

    Today ZeroAccess is one of the widespread threats over the internet. The total number of infected systems is in the tens of millions with the number of lively infection. ZeroAccess is a peer-to-peer botnet that affects Microsoft windows operating systems. It is used to download other malware on an infected...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    How to Track Online Service Level Agreement

    SLA (Service Level Agreement) is defined by an organization to fulfill its client requirements, the time within which the deliverables should be turned over to the clients. Tracking of SLA can be done manually by checking the status, priority of any particular task. Manual SLA tracking takes time as one...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Prevention and Detection Techniques for SQL Injection Attacks

    SQL injection attacks is the effective mechanism for hacker for stealing the useful information regarding web application or database management system, use of this attack anonymous user obtain the confidential information. Different kind of Web application run with help of web server using World Wide Web protocol and many of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Research Methodology on Web Mining for Malware Detection

    Web mining is based on knowledge discovery from web. It is extract the knowledge framework represents in a proper way. Web mining is like a graph & all pages are node & each connects with hyperlinks. Web mining is useful to extract the information, image, text, audio, video, documents and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems

    The popularity and wide spread usage of Peer-To-Peer (P2P) systems has soared over the past several years. Throughout the evolution of P2P systems the definition of P2P has changed along with the software architecture of the various P2P applications. While the initial popular usage of P2P systems was for file...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Performance Evaluation of OLSR and DSR Routing Protocols for Wireless Sensor Networks (WSN)

    Wireless Sensor Network (WSN) has been regarded as a distinguished ad hoc network that can be used to fulfill multiple tasks and applications. Since a WSN consists hundreds of small size, low cost and battery powered sensor nodes. These nodes have the event sensing capabilities, data processing capabilities. Number of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    On URL Classification

    Web-based malware attacks are growing threat to today's Internet security. These types of attacks are common and lead to serious security cost. Malicious links are used as source to the distribution channels to propagate malware all over the Web. Due to which victim systems get easily infected and systems fall...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Cluster Based Anomaly Detection in Wireless LAN

    Data mining methods have gained importance in addressing computer network security. Existing rule based classification models for anomaly detection is ineffective in dealing with dynamic changes in intrusion patterns and characteristic. Unsupervised learning methods have been given a closer look for network anomaly detection. The authors investigate hierarchical clustering algorithm...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Accident Prevention System and Security for Vehicles

    In this paper, the authors focus mainly on road accidents occurring due to poor indication of sign boards, drowsy state and drunken state of drivers in both two wheelers and four wheelers. The eye blink sensor detects the drowsy state and alarms the driver using buzzer. The alcohol sensor detects...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    An Efficient Secured Iris Recognition and Verification Based on Multiscale Feature Extraction Technique

    In, general, human iris is considered as a valid biometrics for personal identification. Traditional approaches, such as keys, ID cards, username and password, are neither satisfactory nor reliable enough in many security fields, biometrics authorizations based on face, iris, fingerprint have become a modern research filed. In those methods, iris...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Secure Encryption Method for Biometric Iris Pattern

    Biometric identification techniques are widely in use for authentication in a variety of applications since it is unique and time tested method. Iris pattern varies from person to person and it typically remains unchanged from birth until death. It helps to prevent identity frauds and at the same time this...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    An Algorithmic Framework Security Model for Internet of Things

    This submission is a theoretical analysis of the possible approach employable in designing of security algorithms for Internet of Things (IoT). The main tool employed to draw the summary presented here, was through desktop research of applications in similar modeling on related fields. However, it should be clear to the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Multi-Packet Reception Technology in Random Access Wireless Networks: A Survey

    Medium Access Control (MAC) Layer plays an important role in Wireless Local Area Network (WLAN). However, as it has to deal with many packets received by the users, it faces lot of challenges in terms of packet collisions and reception. Multi-Packet Reception (MPR) technology will address the above problems and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption Using Blowfish Algorithm

    Cloud computing is a distributive computation task on the resource pool which consists of massive computers. LMS experiences with Cloud and Managed Cloud Service provider are due to numerous factors. Availability means that the services are available even when quite a number of nodes fail. Cloud services are provided by...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    Game Based Analysis of Distributed DoS Attacks Prevention Using Puzzle-Based Defense Strategy

    Security issues have become a major issue in recent years due to the development of technology in networking and its use in vicious way. A number of puzzle-based defense strategies have been established to overcome the flooding Denial-of-Service (DoS) attack which is eminent in the networks. DoS attacks are aimed...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    A New Reduced Clock Power Flip-Flop for Future SOC Applications

    In this paper a novel technique is proposed based on the comparison between Conventional Conditional Data Mapping Flip-flop and Clock Pair Shared D Flip Flop (CPSFF) here the authors are checking the working of CDMFF and the conventional D Flip-flop. Due to the immense growth in nanometer technology the SOC...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    Web Usage Mining: User Navigational Patterns Extraction From Web Logs

    Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. In this paper, the authors define the notion of a "User session" as being a temporally compact sequence of web accesses by a user. They also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Automation of Network Protocol Analysis

    This paper "Automation of Network Protocol Analysis" is mainly aimed to automate the entire process. Starting from sniffing the network packets till the validation of it has been taken care. Here, the authors have automated the logging part through a C program. Whenever packets will be transmitted from a system,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Analysis of VoIP Traffic With Multiple Packet Transfer

    Voice over Internet Protocol (VoIP) is a form of voice communication. Today Wireless LANs are providing a cost effective alternative for the voice communication. Initially the wireless access protocols are not suitable for the voice communication. Subsequently, new techniques are developed for the real time voice communication. In voice communication...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Implementation of SOBEL Edge Detection on FPGA

    The image processing algorithms has been limited to software implementation which is slower due to the limited processor speed. So, a dedicated processor for edge detection is required which was not possible until advancements in VLSI technology. The proposed work presents FPGA based architecture for Edge Detection using Sobel operator....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Android Based Mobile Application Development and Its Security

    In the advancing world of technology, Mobile applications are a rapidly growing segment of the global mobile market. Mobile applications are evolving at a meteor pace to give users a rich and fast user experience. In this paper, Android mobile platform for the mobile application development, layered approach and the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Web Mining Privacy Using Advanced DSA - Spatial LBS Case Study

    Web mining is new area of research in information technology; so many business applications that utilize data mining and text mining techniques to extract useful business information on the web have emerged from web searching to web mining. It is important for students to acquire knowledge and hands on experience...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    An Energy Efficient Remote Data Collection and Reprogramming of Wireless Sensors Networks

    Energy constrained sensor nodes are preloaded with the program code and data, which are usually unattended after deployment. Due to change in user requirements and environmental changes, preloaded software and firmware deployed in sensor nodes have to be reprogrammed on large number of sensor nodes to resolve the post deployment...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Secure Transmission Services in Wireless Networks Using Key Trees

    In contrast with conventional networks, mobile networks usually do not provide on-line access to trusted authorities or to centralized servers for secure message transmissions and exhibit problems like frequent problems due to link-node failures and pricey issues. For these reasons, existing solutions for secure message transmission services in regular networks...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks

    In this paper, the authors identify vulnerabilities of on-demand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mechanisms to defend against them. They propose BSMR, a novel secure multicast routing protocol that withstands insider attacks from colluding adversaries. The protocol is a software-based solution...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Behaviour Based Trust Management Using Geometric Mean Approach for Wireless Sensor Networks

    The resource constraints of Wireless Sensor Network (WSN) make it easy to attack and hard to protect. Although carefully designed cryptography and authentication help to make WSN securer, they are not good at dealing with compromised node and ageing node, whose misbehavior may impair the function of WSN. Hence, they...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Ray's Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. One promising alternatives of textual passwords is a graphical based password. According to human psychology, human can easily remember pictures. In this paper, the author has proposed a new hybrid graphical password based system. The system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel SHA-1 Approach in Database Security

    Database security is a major research area and includes topics such as database security, intrusion detection, DDos, privacy preserving, data mining and related papers in designing information systems that protect the privacy and ownership of individual or company information. A database contains data ranging from different degree of confidentiality and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Asynchronous Optical Burst Switching Networks

    The ever increasing demand for higher bandwidth due to the growth of bandwidth intensive applications such as video-on-demand, video conferencing, on-line banking, on-line auction and other multimedia applications motivated the search for alternatives to traditional electronic networks. Optical Burst Switching (OBS) is one such paradigm developed to handle the future...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Security Design Combining the Advantages of Cryptanalysis and Anonymous Routing Protocol to Achieve Data Secrecy and Anonymity

    Since internet is widely used these days, users privacy has become the main concern. Privacy is related to anonymity. Basic requirement for anonymity is to unlink the user's identity to specific activities such as in a untraceable e-cash system and P2P payment systems. To provide anonymity various techniques are made...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Linear Appearance Based Algorithms for Face Recognition

    Analyzing the face recognition rate of various current face recognition algorithms is absolutely critical in developing new robust algorithms. In this paper, the authors propose performance analysis of Principal Component Analysis (PCA), Linear Discriminate Analysis (LDA) and Locality Preserving Projections (LPP) for face recognition. This analysis was carried out on...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    FPGA Based Area and Throughput Implementation of JH and BLAKE Hash Function

    Implementation of area and throughput of the main building block (compression function) for two SHA-3 candidates BLAKE and JH hash function. The National Institute of Standards and Technology (NIST) has started a competition for a new secure hash standard. A significant comparison between the submitted candidates is only possible, if...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Survey on Computer Crime Scene Investigation Forensic Tools

    In the day to day life, the crime is becoming a big issue in the computer field. So to avoid and to protect from crime, Computer Forensics is used. This paper describes different tools that are used in the Computer Forensics. These tools are used to recover the data that...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel Approach for Supply Chain in Distributed Networks Using Multi Echelon

    In distribution networks ware-houses and distribution center will present at different locations and the authors have the problem in the covering all the distribution center using single path to minimize the cost and to maintain the optimal quantity at the warehouses they need to follow the specific methods in this...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel Approach for the Detection of SYN Flood Attack

    Denial of Service attack(DoS) is causing a serious and financial damage in recent years. They are performed easily by utilizing the weakness of the network protocol. There are many types of Dos attack namely IP spoofing SYN Flood. If should be notable that the firewall host hardly filters the SYN...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Document Clustering in Web Search Engine

    As the number of web pages grows, it becomes more difficult to find the relavant documents from the information retrieval engines, so by using clustering concept, the authors can find the grouped relavant documents. The main purpose of clustering techniques is to partitionate a set of entities into different groups,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Cost Estimation Tool for Commercial Software Development Industries

    As cost associated to the software development is increasing continuously, there is a need to direct attention at better understanding of development process and calibrating previous models and methods making them applicable to existing environment such as proposing hybrid tools using the techniques based on existing models. The main aim...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Simulation and Performance Analysis of DSDV, OLSR, DSR and ZRP Routing Protocols in Manets

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2012

    A Survey on Location Aware and Context Aware in Mobile Applications

    Mobile services and applications are used in changing contexts and surroundings. These services are made up of context-aware and offer contextually relevant information to the user. These facilities help to find the data and its use. Mobile computing refers to the use of any kind of computer in a moving...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2012

    Prevention of Security Concerns During Outlier Detection

    Data objects which do not comply with the general behavior or model of the data are called Outliers. Outlier Detection in databases has numerous applications such as fraud detection, customized marketing, and the search for terrorism. However, the use of Outlier Detection for various purposes is not an easy task....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2012

    Predicting Software Bugs Using Web Log Analysis Techniques and Na?ve Bayesian Technique

    With the continued growth and proliferation of Web services, software as a services and Web based information systems, the volumes of user data have reached astronomical proportions. As the World Wide Web is continuously and rapidly growing, it is necessary for the web miners to utilize intelligent tools in order...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2011

    Robust and Secure Digital Signature for Image Authentication Over Wireless Channels

    Now a days the transmission and distribution of the digital images by appending the digital signatures and content based image authentication schemes facing some triggers which are suitable for the insecure network and robust to transmission errors. The invasive distribution of digital images and the growing concern on their integrity...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2011

    Modified LRU Algorithm to Implement Proxy Server With Caching Policies

    In order to produce and develop a software system, it is necessary to have a method of choosing a suitable algorithm which satisfies the required quality attributes and maintains a trade-off between sometimes conflicting ones. Proxy server uses caching policies to store web documents using algorithms. For this, different algorithms...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2011

    A QOS-Aware Software Selection Method Based On Service Credibility Evaluation

    Many software's that share same or similar functional properties; so it is often a challenging effort to select credible and optimal software based on their various history QoS records. In view of this challenge, a novel QoS-aware software selection method based on service credibility evaluation is put forward, based on...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Standard Ethernet Interface as an Embedded Communication Network for Controlling and Monitoring the Devices

    Web access functionality is embedded in a device to enable low cost widely accessible and enhanced user interface functions for the device. A web server in the device provides access to the user interface functions for the device through a device web page. A web server can be embedded into...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Hardware Implementation of DWT for Image Compression Using SPIHT Algorithm

    In this paper, a DWT-based image processing system is developed on Xilinx Spartan3 Field Programmable Gate Array (FPGA) device using Embedded Development Kit (EDK) tools from Xilinx. Two different hardware architectures of Two Dimensional (2-D) DWT have been implemented as a coprocessor in an embedded system. One is direct implementation...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Protection System for VIP's With GPRS & Remote Monitoring

    In communication channel of a tele-operation control task, there always exists a time-delay problem which causes poor performance and even instability of the system. To overcome the time-delay problem, in this paper, the Smith predictor configuration is considered. The Smith predictor can stabilize the system by taking the time delay...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Implementation of CMOS Camera Device Driver and Bluetooth Technique on S3C2440 Using Linux

    With the processing of CMOS technology, the technology of video acquisition based on CMOS is becoming a new trend. However, many CMOS camera chip is not supported by the newest Linux kernel yet. The environmented image acquirement and the Bluetooth transmission system are studied and designed. In this paper, the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    A New Framework Design for IPTV

    An IPTV is a system used to deliver television services to the consumers who are registered subscribers for this system. This delivery of digital television is made possible by using Internet Protocol over a broadband connection, usually in a managed network rather than the public Internet to preserve quality of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    A Study on Post Mining of Association Rules Targeting User Interest

    Association Rule Mining means discovering interesting patterns with in large databases. Association rules are used in many application areas such as market base analysis, web log analysis, protein substructures. Several post processing methods were developed to reduce the number of rules using non-redundant rules or pruning techniques such as pruning,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    An Overview Mobility Effect on Transmissions Energy Consumption in Mobile Ad-Hoc Networks

    In mobile ad-hoc networks transmission energy is much important. Energy conservation is important issue in MANET because mobile nodes are basically battery powered and cannot function without proper power level. How transmission energy consumption affected mobility. Many authors publish related work. In this paper, the authors try to make a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    Dynamic Frequency Hopping: A Major Boon Towards Performance Improvisation of a GSM Mobile Network

    The primary problem in today's cellular network is to raise bandwidth efficiency of cellular system and handle blocking in the call between the subscribers. This will be done by improving the performance of system and reducing the interference to allow the users to achieve higher data rate. This designed system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    A Novel Approach in Cost Estimation Based on Algorithmic Model

    Software engineering is the step by step process for developing an efficient system, which is expected by the user. To achieve or develop the system they are having many lifecycle models. But while considering the software development lifecycle model cost estimation is the essential thing to predict how much effort...

    Provided By IJCTT-International Journal of Computer Trends and Technology