IJCTT-International Journal of Computer Trends and Technology

Displaying 1-40 of 456 results

  • White Papers // Oct 2014

    TrPF: Location Aware Participation System For Mobile Users

    The ubiquity of the various cheap embedded sensors on mobile devices, such as cameras, microphones, accelerometers, and so on, is enabling the emergence of participatory sensing applications. During participatory sensing individuals can collect and analyze the participator's location as well as trajectory privacy which break the participators privacy. In the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Replica Allocation in MANET's by Handling Selfish Nodes

    In a Mobile Ad hoc NETwork (MANET), the mobility and resource constraints of mobile nodes may lead to network partitioning and performance degradation. Several data replication techniques assume that all mobile nodes collaborate fully in terms of sharing their memory space to increase the performance of the network. But, in...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    A Framework for Immune and Distributed Contour Matching in Social Networks

    The profile matching is defined as two users comparing their personal profiles and is often the first step towards effective proximity mobile social networks. However according to user's perspective the growing privacy issues about make their personal profiles to complete strangers before deciding to interact with them. Proposed protocols enable...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Heterogeneous Multi Core Processors for Improving the Efficiency of Market Basket Analysis Algorithm in Data Mining

    Heterogeneous multi core processors can offer diverse computing capabilities. The efficiency of market basket analysis algorithm can be improved with heterogeneous multi core processors. Market basket analysis algorithm utilizes apriori algorithm and is one of the popular data mining algorithms which can utilize Map/Reduce framework to perform analysis. The algorithm...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Simulation of Jelly Fish Periodic Attack in Mobile Ad hoc Networks

    The advancement in wireless communication have given arise to various wireless networks like Mobile Ad hoc NETworks (MANETs), wireless sensor networks and many more. MANET networks are vulnerable to various types of attacks and threats due to its unique characteristics like dynamic topology, shared physical medium, distributed operations and many...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    A Novel Design and Implementation of Delegated Access Control for Privacy in Clouds Outsourcing

    By usage of approaches of conventional encryption, the privacy of the information against the cloud was assured and is not enough to hold up the access control policies of fine-grained organizational enforcement. Modern approaches to put into effect access control policies on outsourced information by means of selective encryption require...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    A Rumination of Error Diffusions in Color Extended Visual Cryptography

    Color Visual Cryptography (VC) is a secret sharing scheme which uses to encrypt a secret message into n halftone image shares. The users can recover the secret image by stacking their shares, and then secret image can be revealed. In extended visual cryptography, the share images are constructed to contain...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Access to Cloud Networks Depending Attribute for Content Sharing

    In this paper, the authors explores a novel MCP-ABE (Multi-message Ciphertext Policy Attribute-Based Encryption) technique, and make use of the multi-message Ciphertext policy attribute-based encryption to plan an access manage scheme for distributing scalable media depending on information clients' attributes (e.g., gender, nationality and age) rather than an clear catalog...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    A Chaos-based Image Encryption Scheme Using Permutation-Substitution Architecture

    Recently, a great number of chaos-based image encryption algorithms have been proposed. But most of them are either deficient in security or complicated. In this paper, the authors propose a permutation-substitution image encryption scheme based on generalized Arnold map. Only one round of permutation and one round of substitution are...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Aspect Based Topic and Opinion Mining

    The proposed system focus on document-level, feature level opinion classification or general domains in conjunction with topic detection and opinion sentiment analysis, based on the semantic label annotation techniques. An additionally ATOM has been suggested. And the proposed system finally identifies whether the semantic orientation of the given text is...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Test Data Management

    Management is required in each and every phase of life and so does in any software project. A software project goes through many stages: requirement analysis, designing, development, testing and maintenance. In order to successfully complete each stage, a certain form of management is required. Testing stage also has a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Efficient Handling of Big Data Volume Using Heterogeneous Distributed File Systems

    Big data is the emerging technology of modern world. With the increasing users of online based services the growth of data is tremendous. As the size increases there comes the challenge to handle the large Volume in big data. This paper is to handle the volume of big data in...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Blocking Implication Attacks on Social Network Private Information

    In the cloud computing environment load balancing has a major effect on the presentation. Good load balancing creates cloud computing most effective and progresses client fulfillment. This paper initiates a good load balance design for the public cloud depending upon the cloud separation paper with a switch mechanism to select...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Performance Evaluation of Protocols for Secure Routing in Manets

    Mobile Ad-hoc NETworks (MANETs) can form a network by allowing the wireless nodes without any fixed infrastructure. For MANET's, early routing protocols are not accounted because of security issues. Further, cryptographic methods were revised to secure the routing information. These protocols had created new avenues for Denial of Service (DoS)...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    WIFI Electricity

    Electricity is a necessity of today's modern life. It is difficult to imagine a day without electricity. The people can use electricity with the help of wires. These wires are bulky and occupy a lot of space. Now-a-days they see dusty power cord tangles which create some problem around the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    A New Approaches to Improve Server Secuirty by Using Media Access Control Address Verification

    A Local Area Network (LAN) is usually privately owned and links the devices in a single office, building, or campus. Currently, LAN has been widely used in the different fields. Depending on the requirements of an organization and the kinds of technology used, a LAN can be extended throughout a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Secure Cloud Storage through Public Auditing and Cryptographic Primitives

    The purpose of cloud computing is a long dreamed vision of computing as a utility, where user want to store their data remotely into the cloud and so as to enjoy the on demand of high quality application and services for the shared pool of configurable computing storage of outsourcing...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Get Me on the Map If You Can: Secure Locale Scepticism Activity

    There are two things to consider about this application that is Location-Based Service (LBS) and Social Network Services (SNS). Now-a-days, almost every social network service provider giving the facilities to the user so that user can share or produce their location to the specified persons. Many Location Based Services (LBS)...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Mining High Dimensional Data Using Attribute Clustering-Based Feature Subset Selection Algorithm

    Attribute based cluster involves, selecting the items or search the data item based on attributes. Common attributes are clustered and store those into a single place, so by this the users can simply search the items; many more feature selections methods have been proposed and read for machine learning applications....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    A Framework to Ensure Quality of Service with New Trail and Security in Networks

    The authors present a method to find another path, after link failures, from a source node to a destination node, before the interior gateway protocol (e.g., OSPF or IS-IS) has had a chance to reconverge in response to the failure. The target application is a small (up to tens of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Secure and Privacy Preserving Image Storage System in Cloud Computing

    Cloud computing is a huge platform for data storage. It has been become an integral part of data storage system. As the computing environment increasing day-by-day, the data also increasing rapidly. In which the image data also increasing in huge amount in computing environment. Storing the image data in cloud...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    An Adequate Password Authentication Scheme for Information Interchange using Keys

    In this paper, AES algorithm used for the encryption and decryption this is mush secure and it is faster than the triples DES algorithm and it can worked only in the hardware. AES required only 1 password to encrypt the data as compare to the DES require 2 password data...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Review of Role Based Access Control Method for Securing User Space in Cloud Computing

    Cloud computing is a distributed system which supports various types of services like SAAS, IAAS and PASS. The data resides with in the cloud is vital, hence there is a need to preserve the data as well as to maintain the privacy of cloud users. In conventional access control mechanisms,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Selection of Most Appropriate Backpropagation Training Algorithm in Data Pattern Recognition

    One of the computer technology development in the creation of the current approach in resolving an issue is soft computing. Soft computing is part of the intelligent system that is a model approach to computing by imitating human reason and has the ability to reason and learn in an environment...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    EFSR: Evolutionary Fisheye State Routing Protocol in Mobile Ad Hoc Networks

    Mobile ad hoc network is wireless network that utilizes multi-hop radio relayed and are capable of operating without the support of any fixed infrastructure. The absence of any central coordinator makes the routing more complex. In mobile ad hoc network, the routing and resource managements are done in which all...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    A Study of Blockage Control Design and Transmission Accuracy in Opportunistic Networks

    Opportunistic networks are one of the classes of Mobile Ad hoc NETworks (MANETs) where contacts in between mobile nodes occur unpredictably and where a total end-to-end path in between source and destination rarely exists. Two main functions, conventionally provided by the transport layer, are protecting the reliability of data transmission...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Enhancing Robust Security Strategy for Web Social Networks

    To identify confidentiality risks in grid data sets. It provides an algorithm for the risks. A grid consists of entities connected by links representing relations such as friendship, communication, or shared activity. To maintain confidentiality when publishing grid data, it is constant challenging one, because an individual's grid context can...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Iris Recognition based on Wavelet Transform and Probabilistic Neural Network

    Iris recognition is one of the main applications of machine vision that is widely attended in recent years that can be used in ID validity, identity recognition and so on. In this paper, the authors propose an iris recognition system using wavelet decomposition method and Probabilistic Neural Network (PNN) to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Security in Cloud Network

    Cloud computing is a technology where large number of computers is connected through a real-time communication network. The users are flexible while storing their information in cloud network. At any time period they are capable of accessing their information from network. By this application the way of storage of users...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    A Credit Based Framework to Mitigating Multiple Hole Attack in Reactive Routing Protocol

    The recent advancements in the wireless technology and their wide-spread deployment have made remarkable enhancements in efficiency in the corporate and industrial and military sectors. The increasing popularity and usage of wireless technology is creating a need for more secure wireless ad hoc networks. This paper aims researched and developed...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Securing Data through Re-Encryption in Unreliable clouds

    A novel approach for securing encrypted data in cloud is most important task. As the people can see that many companies are dependent on cloud these days so it is necessary to give high security to data to win over the customer confidence. Keys for the data encrypted in cloud...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Finding Similarity between Search Results from Web Databases using Clustering Algorithm

    Internet has become an indispensable part of the peoples' lives. Web mining is the application of data mining process to discover knowledge from web data, including web documents, hyperlinks and web pages. The data retrieval techniques from web help to extract knowledge is used on structured data from Web data....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    A Survey on Primary User Emulation Detection Mechanisms in Cognitive Radio Networks

    Cognitive radio is one of the main technologies in the wireless communications. The cognitive radio networks are composed of cognitive, spectrum-agile devices which is able to modify their network configurations according to the spectral environment. This cognitive radio provides the chance reusing portions of the spectrum temporarily for the secondary...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Real Time and Past Positional Location Analysis of Friends in a Social Network Using Smart Devices

    Now-a-days, mobile applications have been used for certain purposes. The fact that mobile phones are comprehensively used by almost everybody in this world makes mobile applications completely more effective & influential with unmatchable & unthinkable capabilities. The application that the authors have decided & planned to develop will enable a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Attribute-Based Data Sharing to Provide Priority Based Security to Improve the Performance Efficiency

    Time and technology has its own significance, in the aspect of information technology and its security constraint is always a question mark to the demographic of the world of technology ion the system of information technology. With the kind of concept in the today's market the authors have wide use...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Robust Intrusion Detection Mechanism for Mobile Adhoc Networks

    Due to their natural mobility and scalability, Mobile Ad hoc NETworks (MANETs) are always preferred since the day of their invention. But the open medium nature of MANETs makes them more vulnerable to attacks and hence results in the degradation of performance. This paper proposes an ideal intrusion detection system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Data Mining Approaches on Detection of Students' Academic Failure and Dropout: A Brief Survey

    Educational Data Mining (EDM) is an emerging discipline that focuses on applying data mining tools and techniques to educationally related data. The discipline focuses on analyzing educational data to develop models for improving learning experiences and improving institutional effectiveness. Exams failure among school students has long fed a large number...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Mining Multidimensional Data Using Constraint Frequent Pattern in Medical Dataset

    Frequent pattern mining is an active field in data mining research in last decade. Many literatures have been emerged and tremendous programs have been made. This paper has been designed to find out the best mining method for the patient with sugar, heart diseases by defining certain conditions. Recent analysis...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Intrusion Detection Based On Fuzzy Logic Approach Using Simplified Swarm Optimization

    The intrusion is becoming more essential for effective defense against attacks that are constantly changing in magnitude and complexity. Mainly intrusion detection relies on the extensive knowledge of security experts. The paper proposed a new detection mechanism as Fuzzy Intrusion Detection Engine (FIDE) that uses fuzzy logic to access network...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2014

    Design of a Content Management System Based On the Use of Metadata

    In this paper, the authors present the design of a Content Manager System (CMS) based on the use of metadata. This paper will help the users to understand the development of software for content management and the various constraints and resources used for this kind of development. This design will...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption Using Blowfish Algorithm

    Cloud computing is a distributive computation task on the resource pool which consists of massive computers. LMS experiences with Cloud and Managed Cloud Service provider are due to numerous factors. Availability means that the services are available even when quite a number of nodes fail. Cloud services are provided by...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    Game Based Analysis of Distributed DoS Attacks Prevention Using Puzzle-Based Defense Strategy

    Security issues have become a major issue in recent years due to the development of technology in networking and its use in vicious way. A number of puzzle-based defense strategies have been established to overcome the flooding Denial-of-Service (DoS) attack which is eminent in the networks. DoS attacks are aimed...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    A New Reduced Clock Power Flip-Flop for Future SOC Applications

    In this paper a novel technique is proposed based on the comparison between Conventional Conditional Data Mapping Flip-flop and Clock Pair Shared D Flip Flop (CPSFF) here the authors are checking the working of CDMFF and the conventional D Flip-flop. Due to the immense growth in nanometer technology the SOC...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    Web Usage Mining: User Navigational Patterns Extraction From Web Logs

    Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. In this paper, the authors define the notion of a "User session" as being a temporally compact sequence of web accesses by a user. They also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Automation of Network Protocol Analysis

    This paper "Automation of Network Protocol Analysis" is mainly aimed to automate the entire process. Starting from sniffing the network packets till the validation of it has been taken care. Here, the authors have automated the logging part through a C program. Whenever packets will be transmitted from a system,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Analysis of VoIP Traffic With Multiple Packet Transfer

    Voice over Internet Protocol (VoIP) is a form of voice communication. Today Wireless LANs are providing a cost effective alternative for the voice communication. Initially the wireless access protocols are not suitable for the voice communication. Subsequently, new techniques are developed for the real time voice communication. In voice communication...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Implementation of SOBEL Edge Detection on FPGA

    The image processing algorithms has been limited to software implementation which is slower due to the limited processor speed. So, a dedicated processor for edge detection is required which was not possible until advancements in VLSI technology. The proposed work presents FPGA based architecture for Edge Detection using Sobel operator....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Android Based Mobile Application Development and Its Security

    In the advancing world of technology, Mobile applications are a rapidly growing segment of the global mobile market. Mobile applications are evolving at a meteor pace to give users a rich and fast user experience. In this paper, Android mobile platform for the mobile application development, layered approach and the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Web Mining Privacy Using Advanced DSA - Spatial LBS Case Study

    Web mining is new area of research in information technology; so many business applications that utilize data mining and text mining techniques to extract useful business information on the web have emerged from web searching to web mining. It is important for students to acquire knowledge and hands on experience...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    An Energy Efficient Remote Data Collection and Reprogramming of Wireless Sensors Networks

    Energy constrained sensor nodes are preloaded with the program code and data, which are usually unattended after deployment. Due to change in user requirements and environmental changes, preloaded software and firmware deployed in sensor nodes have to be reprogrammed on large number of sensor nodes to resolve the post deployment...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Secure Transmission Services in Wireless Networks Using Key Trees

    In contrast with conventional networks, mobile networks usually do not provide on-line access to trusted authorities or to centralized servers for secure message transmissions and exhibit problems like frequent problems due to link-node failures and pricey issues. For these reasons, existing solutions for secure message transmission services in regular networks...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks

    In this paper, the authors identify vulnerabilities of on-demand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mechanisms to defend against them. They propose BSMR, a novel secure multicast routing protocol that withstands insider attacks from colluding adversaries. The protocol is a software-based solution...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Behaviour Based Trust Management Using Geometric Mean Approach for Wireless Sensor Networks

    The resource constraints of Wireless Sensor Network (WSN) make it easy to attack and hard to protect. Although carefully designed cryptography and authentication help to make WSN securer, they are not good at dealing with compromised node and ageing node, whose misbehavior may impair the function of WSN. Hence, they...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Ray's Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. One promising alternatives of textual passwords is a graphical based password. According to human psychology, human can easily remember pictures. In this paper, the author has proposed a new hybrid graphical password based system. The system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel SHA-1 Approach in Database Security

    Database security is a major research area and includes topics such as database security, intrusion detection, DDos, privacy preserving, data mining and related papers in designing information systems that protect the privacy and ownership of individual or company information. A database contains data ranging from different degree of confidentiality and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Asynchronous Optical Burst Switching Networks

    The ever increasing demand for higher bandwidth due to the growth of bandwidth intensive applications such as video-on-demand, video conferencing, on-line banking, on-line auction and other multimedia applications motivated the search for alternatives to traditional electronic networks. Optical Burst Switching (OBS) is one such paradigm developed to handle the future...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Security Design Combining the Advantages of Cryptanalysis and Anonymous Routing Protocol to Achieve Data Secrecy and Anonymity

    Since internet is widely used these days, users privacy has become the main concern. Privacy is related to anonymity. Basic requirement for anonymity is to unlink the user's identity to specific activities such as in a untraceable e-cash system and P2P payment systems. To provide anonymity various techniques are made...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Linear Appearance Based Algorithms for Face Recognition

    Analyzing the face recognition rate of various current face recognition algorithms is absolutely critical in developing new robust algorithms. In this paper, the authors propose performance analysis of Principal Component Analysis (PCA), Linear Discriminate Analysis (LDA) and Locality Preserving Projections (LPP) for face recognition. This analysis was carried out on...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    FPGA Based Area and Throughput Implementation of JH and BLAKE Hash Function

    Implementation of area and throughput of the main building block (compression function) for two SHA-3 candidates BLAKE and JH hash function. The National Institute of Standards and Technology (NIST) has started a competition for a new secure hash standard. A significant comparison between the submitted candidates is only possible, if...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Survey on Computer Crime Scene Investigation Forensic Tools

    In the day to day life, the crime is becoming a big issue in the computer field. So to avoid and to protect from crime, Computer Forensics is used. This paper describes different tools that are used in the Computer Forensics. These tools are used to recover the data that...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel Approach for Supply Chain in Distributed Networks Using Multi Echelon

    In distribution networks ware-houses and distribution center will present at different locations and the authors have the problem in the covering all the distribution center using single path to minimize the cost and to maintain the optimal quantity at the warehouses they need to follow the specific methods in this...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel Approach for the Detection of SYN Flood Attack

    Denial of Service attack(DoS) is causing a serious and financial damage in recent years. They are performed easily by utilizing the weakness of the network protocol. There are many types of Dos attack namely IP spoofing SYN Flood. If should be notable that the firewall host hardly filters the SYN...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Document Clustering in Web Search Engine

    As the number of web pages grows, it becomes more difficult to find the relavant documents from the information retrieval engines, so by using clustering concept, the authors can find the grouped relavant documents. The main purpose of clustering techniques is to partitionate a set of entities into different groups,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Cost Estimation Tool for Commercial Software Development Industries

    As cost associated to the software development is increasing continuously, there is a need to direct attention at better understanding of development process and calibrating previous models and methods making them applicable to existing environment such as proposing hybrid tools using the techniques based on existing models. The main aim...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Simulation and Performance Analysis of DSDV, OLSR, DSR and ZRP Routing Protocols in Manets

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2012

    A Survey on Location Aware and Context Aware in Mobile Applications

    Mobile services and applications are used in changing contexts and surroundings. These services are made up of context-aware and offer contextually relevant information to the user. These facilities help to find the data and its use. Mobile computing refers to the use of any kind of computer in a moving...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2012

    Prevention of Security Concerns During Outlier Detection

    Data objects which do not comply with the general behavior or model of the data are called Outliers. Outlier Detection in databases has numerous applications such as fraud detection, customized marketing, and the search for terrorism. However, the use of Outlier Detection for various purposes is not an easy task....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2012

    Predicting Software Bugs Using Web Log Analysis Techniques and Na?ve Bayesian Technique

    With the continued growth and proliferation of Web services, software as a services and Web based information systems, the volumes of user data have reached astronomical proportions. As the World Wide Web is continuously and rapidly growing, it is necessary for the web miners to utilize intelligent tools in order...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2011

    Robust and Secure Digital Signature for Image Authentication Over Wireless Channels

    Now a days the transmission and distribution of the digital images by appending the digital signatures and content based image authentication schemes facing some triggers which are suitable for the insecure network and robust to transmission errors. The invasive distribution of digital images and the growing concern on their integrity...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2011

    Modified LRU Algorithm to Implement Proxy Server With Caching Policies

    In order to produce and develop a software system, it is necessary to have a method of choosing a suitable algorithm which satisfies the required quality attributes and maintains a trade-off between sometimes conflicting ones. Proxy server uses caching policies to store web documents using algorithms. For this, different algorithms...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2011

    A QOS-Aware Software Selection Method Based On Service Credibility Evaluation

    Many software's that share same or similar functional properties; so it is often a challenging effort to select credible and optimal software based on their various history QoS records. In view of this challenge, a novel QoS-aware software selection method based on service credibility evaluation is put forward, based on...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Standard Ethernet Interface as an Embedded Communication Network for Controlling and Monitoring the Devices

    Web access functionality is embedded in a device to enable low cost widely accessible and enhanced user interface functions for the device. A web server in the device provides access to the user interface functions for the device through a device web page. A web server can be embedded into...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Hardware Implementation of DWT for Image Compression Using SPIHT Algorithm

    In this paper, a DWT-based image processing system is developed on Xilinx Spartan3 Field Programmable Gate Array (FPGA) device using Embedded Development Kit (EDK) tools from Xilinx. Two different hardware architectures of Two Dimensional (2-D) DWT have been implemented as a coprocessor in an embedded system. One is direct implementation...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Protection System for VIP's With GPRS & Remote Monitoring

    In communication channel of a tele-operation control task, there always exists a time-delay problem which causes poor performance and even instability of the system. To overcome the time-delay problem, in this paper, the Smith predictor configuration is considered. The Smith predictor can stabilize the system by taking the time delay...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Implementation of CMOS Camera Device Driver and Bluetooth Technique on S3C2440 Using Linux

    With the processing of CMOS technology, the technology of video acquisition based on CMOS is becoming a new trend. However, many CMOS camera chip is not supported by the newest Linux kernel yet. The environmented image acquirement and the Bluetooth transmission system are studied and designed. In this paper, the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    A New Framework Design for IPTV

    An IPTV is a system used to deliver television services to the consumers who are registered subscribers for this system. This delivery of digital television is made possible by using Internet Protocol over a broadband connection, usually in a managed network rather than the public Internet to preserve quality of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    A Study on Post Mining of Association Rules Targeting User Interest

    Association Rule Mining means discovering interesting patterns with in large databases. Association rules are used in many application areas such as market base analysis, web log analysis, protein substructures. Several post processing methods were developed to reduce the number of rules using non-redundant rules or pruning techniques such as pruning,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    An Overview Mobility Effect on Transmissions Energy Consumption in Mobile Ad-Hoc Networks

    In mobile ad-hoc networks transmission energy is much important. Energy conservation is important issue in MANET because mobile nodes are basically battery powered and cannot function without proper power level. How transmission energy consumption affected mobility. Many authors publish related work. In this paper, the authors try to make a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    Dynamic Frequency Hopping: A Major Boon Towards Performance Improvisation of a GSM Mobile Network

    The primary problem in today's cellular network is to raise bandwidth efficiency of cellular system and handle blocking in the call between the subscribers. This will be done by improving the performance of system and reducing the interference to allow the users to achieve higher data rate. This designed system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    A Novel Approach in Cost Estimation Based on Algorithmic Model

    Software engineering is the step by step process for developing an efficient system, which is expected by the user. To achieve or develop the system they are having many lifecycle models. But while considering the software development lifecycle model cost estimation is the essential thing to predict how much effort...

    Provided By IJCTT-International Journal of Computer Trends and Technology