IJCTT-International Journal of Computer Trends and Technology

Displaying 1-40 of 499 results

  • White Papers // Nov 2014

    Performance Evaluation and Testing of EAACKSecure IDS for MANETs: Brief Study

    Among all the up to date wireless networks, Mobile Ad hoc NETwork (MANET) is one amongst the foremost necessary and classifiable applications. On the adverse to ancient spec, MANET doesn't need a set network infrastructure; each single node works as each a sender and a receiver and they trust their...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    A Survey on Data Aggregation in Big Data and Cloud Computing

    Cloud computing, rapidly emerging as a new computation concept, offers agile and scalable resource access in a utility-like fashion, particularly for the processing of big data. An important open problem here is to effectively progress the data, from various geographical locations more time, into a cloud for efficient processing. Big...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Mobile Agent Community Pool - A New View on Load Balancing in Cloud Computing

    With the advent of cloud computing, the era of technology is at its extreme. Accordingly several issues are under research. In this paper, the authors have considered Load balancing a major challenging issue and proposed architecture with the application of mobile agents. Load balancing is a methodology to distribute workload...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Phishing Email Filtering Techniques A Survey

    The most interesting species of Internet fraud is phishing. Email phishing is a vulnerable activity which is referred as email fraud, includes web link or form and asks for confidential information such as password, account details. The email will be classified as phishing email and legitimate email by various phishing...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Intelligent Interface Based Voice Activity Detector and Automatic Speech Recognition for Home Automation in WSN - a Survey

    A wireless sensor network is a wireless network which incorporates a gateway that provides wireless connectivity back to the wired world and distributed nodes. The wireless sensor networks are widely used in automation to offers various advantages and new challenges. The aim of this paper is to survey hand-held devices...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    TrPF: Location Aware Participation System For Mobile Users

    The ubiquity of the various cheap embedded sensors on mobile devices, such as cameras, microphones, accelerometers, and so on, is enabling the emergence of participatory sensing applications. During participatory sensing individuals can collect and analyze the participator's location as well as trajectory privacy which break the participators privacy. In the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Network Coding an Secure and Efficient Process for Content Distribution

    Content distribution in network sometimes may be vulnerable henceforth unauthorized users can inject \"Bogus\" data to corrupt the content during its distribution process in order to deplete the network resource. The direct application of network coding may be insecure. Content verification is the important and practical issue when maintaining integrity...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Multimedia Streaming Adaptation Based on Portrayal of Coded Video

    In this paper, the authors extend the current concept of Multiple Description Coding (MDC) to their proposed domain, by proposing efficient splitting of standard Single Description Coded (SDC) video into a multi-stream representation. The Multiple Description Video Splitting (MDVS) scheme is proposed to operate at network edge, which increases robustness...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Study of DNS Based On the Command and Control

    The authors have conducted a systematic study on the feasibility of solely using DNS queries for massive-scale stealthy communication among entities on the Internet. Attackers, in particular botnet controllers, use secret messaging systems to set up large-scale command and control. In order to systematically understand the potential capability of attackers,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Load Balance Schema is Used to Improve Performance in Cloud Computing Environment

    To improve the efficiency and performance in cloud computing environment, the authors introduce load balance technique in cloud computing. Load balance model is used to partition public cloud into several clouds. Public cloud consists of many nodes. In some cases cloud is very large and complex at this situation load...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Efficient and Secure Auditing To Cloud Storage in Cloud Computing

    Cloud computing is a prominent technology and computing paradigm bringing forward to many new challenges for security and access control. When users share the private or sensitive content using cloud servers some security issues are raised here. In recent years many number of access control third party software's are control...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Survey on Various Techniques of User Authentication and Graphical Password

    The process of identifying an individual usually based on a username and password. Passwords are the best commonly used method for identifying users in computer and communication systems. Usually, passwords are strings of letters and digits, i.e., they are alpha-numeric. Graphical passwords, which contain of some actions that the user...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Smart Data Back-Up Technique for Cloud Computing Using Secure Erasure Coding

    In cloud computing, data generated in electronic form are large in amount. To manage this data efficiently, there is an essential of data recovery services. To handle this, the authors propose a smart remote data backup algorithm i.e. Secure Erasure Coding (SEC) algorithm. The objective of proposed algorithm is twofold;...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Valid Key Exchange Between Two Servers Password with High Reliability

    Password Authentic Key Altercation (PAKE) remains anywhere a client and a server, who stocks a PIN, validate every additional and in the interim found a cryptographic pin through argument of mails. Now this situation, altogether the PIN essential towards to validate clients is deposited now unique server. Uncertainty the server...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Cryptographic Primitives Based Privacy Preserved for Social Networking in Cloud

    In the actual world, a third party companies will publish social networks, e.g., a cloud service provider, for commerce intellect. An important point is privacy preserving when declare social system of connection data. The paper describes a unique type security problem, termed surroundings violation. The authors guess that an raider...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Cluster-Based Trust Model for Online Reputation System

    With the rapid development of online reputation systems, manipulations against such systems are evolving quickly. In this paper, the authors propose a cluster based approached theory to protect reputations. Tested against users attack data taken from a cyber-competition, the proposed system has achieved a better performance in terms of accurately...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    A Framework for Balancing Load Across Systems for Efficient Reliability

    Global content requests dynamically routed to the nearest content servers, increasing the uploading speed of page, maximizing the bandwidth and delivering same content regardless of load and network congestions. According to network traffic and number of nodes, the network algorithm chooses the optimal routing option to deliver the content with...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Measuring Sustainability Impact of Software

    The quality of software architectures determines sustainability of the software to a large extent. Measuring sustainability of a software architecture both during early designs using scenarios and during evolution using scenarios and metrics, which is highly relevant in practice, have great impacts on software sustainability. Sustainability indicators and composite index...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Privacy Preserving of Intermediate Datasets In Cloud for Improving Efficiency

    Cloud computing provides massive storage capacity to the users to deploy their applications without any infrastructure investment. Along with those applications a large set of intermediate datasets will be generated, and it is a challenging problem to preserve the privacy of those intermediate datasets. Encrypting all datasets in cloud is...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Model and Design of System in Peer to Peer Network for Balanced Data Transfer

    Open nature of peer-to-peer systems exposes them to vindictive activity. Building trust relationships among peers can diminish attacks of vindictive peers. This paper presents distributed algorithms that entitle a peer to reason about trustworthiness of the other peers based on previous recommendations and interactions. Peers create their own trust network...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Secure and Reliable Cloud Security from Single to Multi Clouds

    Now-a-days, many organizations are using cloud computing and it's rapidly increased. The usage of cloud computing is low cost it provides more profits and accessibility of data. In cloud computing environment the major factor is ensuring the security for cloud computing, in the cloud sensitive information can be stored by...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Data Anonymization via Sensitive Labels in Social Networks

    Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. Recently, researchers have developed privacy models similar to k-anonymity to prevent node re-identification through structure information. However, even when these privacy models are enforced, an attacker may still be...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Dynamic Data Sharing with Key Encryption in the Cloud for Group Owners

    The cloud computing mechanism became a major platform to store the collection resources of whichever group and spread those group properties with group member. But issue is the cloud is not reliable partner for storing a confidential data on it. The authors are proposing in this paper a model by...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    An Intelligent Technique for Framework and Security Issues Association in Multi Cloud Environment

    Cloud computing is a recent technology which rapidly developing in area of information technology has the concern of the network. It provides a huge change in technology that Internet based computing, by which software, information and shared resources are provided to computers and the strategy on demand, like the grid...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    A Novel Approach for Securing Data using Cipher Text Policy Attribute Based Encryption

    With the recent assumption and diffusion of data sharing paradigm in distributed systems such as cloud computing or online social networks, there have been increasing concerns and demands for distributed data security. The support of policies updates and enforcement of access policies is one of the most challenging issues in...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    A Secure Framework for Mollifying Attacks in Cloud

    The cloud computing becoming a major platform for storing the data from various organizations, instead of storing their data with them store in the cloud with this reducing the money as well as work load. The authors use computers to store and access the personal data as well as business...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Fall in Cloud Computing Rates

    The problem of pricing the cloud for clients' usage has been an issue since the invention of cloud computing. The basic problem for pricing arises because, as soon as the cloud vendors set a price for their customers, new vendors in the market try to come up with a cheaper...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Stabilizing Load Across Cloud for Distributed File Access

    Distributed file systems in clouds such as GFS (Google File System) and HDFS (Hadoop Distributed File Systems) rely on central servers to manage the metadata and the load balancing. DFS are keys building block for cloud computing application based on the reduce programming. In this file system node at the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    A Reliable Framework for Secure Cloud Storage Process through Cipher Text Policy Attribute Based Encryption

    The database related outsourcing for the cloud storage based servers is a very rising trend between many of the available firms and also all the eligible and authorized users. The cloud related servers will be keeping all the data's of the user those are already registered on the different hosts...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    A Formal Approach to Distributed System Security Test Generation

    Deployment of distributed systems sets high requirements for procedures for the security testing of these systems. This paper introduces: a list of typical threats based on standards and actual practices; an extended six-layered model for test generation mission on the basis of technical specifications and end-user requirements. Based on the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    A Design of Secure Confront based Social Network for Exigency and Trade-offs

    Encounter-based social network and encounter-based systems link users who share a location at the same time, as apprised to the traditional social network model of joining users who have an offline friendship. The new access presents provocations that are basically different from those social network designs tackled by earlier. In...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Equality Workloads with Priority Based Association in the Cloud

    The complex applications are attracted by cloud computing is increased in day-to-day manner to run in remote data centers. Many applications needs parallel processing capabilities. The nature of parallel application is decrease the utilization of CPU resources as parallelism grows, because of the communication and synchronization between parallel processes. It...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Hiding and Extracting Secret Data from Digital Media

    Extracting embedded data without understanding the analysis over a wide band in a spectrum domain of a digital medium like image, audio, and video and it considered a problem of active blind spread spectrum steganalysis and attempted to recover unknown messages hidden in image hosts via multi-signature spread spectrum embedding....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    A Novel Approach for Ensuring Data Integrity and Verification in the Cloud

    To increase the security in cloud server and to maintain the data in secure form the authors are providing here a secured privacy based data sharing process in cloud servers. When user store his data will store directly in cloud servers for that user may face some of the problems...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Securing Digital Forensics on Cloud Computing through Log based Accession

    Cloud computing is getting huge attention from the IT industry recently. Almost all the top most companies of the IT sector are showing their interest and efforts on cloud computing and release services about cloud computing in succession. But it is vulnerable for security threats. If the users want to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    A Novel Architecture for Verifiable Reckon System in the Cloud

    There are several factors which depend on the billing system: non-repudiation capabilities must have integrity billing transactions, a minimal computation cost have non-obstructive. And the monitoring of Service Level Agreement (SLA) should be provided in a trusted manner in terms of security capabilities of existing systems are limited and to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    A Novel Approach for Secure Data Sharing in Multi- Owner Groups in Cloud

    The cloud computing becoming a major platform for storing the group resources of any group and distributed those group resources among group member. But cloud is not the trusted partner for storing a secure data on it. In this paper, the authors proposing a model by which they can store...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    An Etiquette Approach for Public Audit and Preserve Data at Cloud

    The purpose of cloud computing is a long dreamed vision of computing as a utility, where user want to store their data remotely into the cloud and so as to enjoy the on demand of high quality application and services for the shared pool of configurable computing storage of outsourcing...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    A Contemporary Framework for P2P Connected Systems through Trust Model for Self Organizing Nodes

    The open nature of the peer-to-peer systems exposes them to malicious actions. Here in this paper, the authors introducing distributed algorithms that can enable peer to get the trustworthiness of other peers based on interactions of those peers in the past with other peers. The peers in the network are...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    A Novel Approach for Cost Efficient Query Services in Cloud Computing

    Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs. In this paper, the authors address two fundamental issues in such...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption Using Blowfish Algorithm

    Cloud computing is a distributive computation task on the resource pool which consists of massive computers. LMS experiences with Cloud and Managed Cloud Service provider are due to numerous factors. Availability means that the services are available even when quite a number of nodes fail. Cloud services are provided by...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    Game Based Analysis of Distributed DoS Attacks Prevention Using Puzzle-Based Defense Strategy

    Security issues have become a major issue in recent years due to the development of technology in networking and its use in vicious way. A number of puzzle-based defense strategies have been established to overcome the flooding Denial-of-Service (DoS) attack which is eminent in the networks. DoS attacks are aimed...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    A New Reduced Clock Power Flip-Flop for Future SOC Applications

    In this paper a novel technique is proposed based on the comparison between Conventional Conditional Data Mapping Flip-flop and Clock Pair Shared D Flip Flop (CPSFF) here the authors are checking the working of CDMFF and the conventional D Flip-flop. Due to the immense growth in nanometer technology the SOC...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    Web Usage Mining: User Navigational Patterns Extraction From Web Logs

    Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. In this paper, the authors define the notion of a "User session" as being a temporally compact sequence of web accesses by a user. They also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Automation of Network Protocol Analysis

    This paper "Automation of Network Protocol Analysis" is mainly aimed to automate the entire process. Starting from sniffing the network packets till the validation of it has been taken care. Here, the authors have automated the logging part through a C program. Whenever packets will be transmitted from a system,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Analysis of VoIP Traffic With Multiple Packet Transfer

    Voice over Internet Protocol (VoIP) is a form of voice communication. Today Wireless LANs are providing a cost effective alternative for the voice communication. Initially the wireless access protocols are not suitable for the voice communication. Subsequently, new techniques are developed for the real time voice communication. In voice communication...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Implementation of SOBEL Edge Detection on FPGA

    The image processing algorithms has been limited to software implementation which is slower due to the limited processor speed. So, a dedicated processor for edge detection is required which was not possible until advancements in VLSI technology. The proposed work presents FPGA based architecture for Edge Detection using Sobel operator....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Android Based Mobile Application Development and Its Security

    In the advancing world of technology, Mobile applications are a rapidly growing segment of the global mobile market. Mobile applications are evolving at a meteor pace to give users a rich and fast user experience. In this paper, Android mobile platform for the mobile application development, layered approach and the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Web Mining Privacy Using Advanced DSA - Spatial LBS Case Study

    Web mining is new area of research in information technology; so many business applications that utilize data mining and text mining techniques to extract useful business information on the web have emerged from web searching to web mining. It is important for students to acquire knowledge and hands on experience...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    An Energy Efficient Remote Data Collection and Reprogramming of Wireless Sensors Networks

    Energy constrained sensor nodes are preloaded with the program code and data, which are usually unattended after deployment. Due to change in user requirements and environmental changes, preloaded software and firmware deployed in sensor nodes have to be reprogrammed on large number of sensor nodes to resolve the post deployment...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Secure Transmission Services in Wireless Networks Using Key Trees

    In contrast with conventional networks, mobile networks usually do not provide on-line access to trusted authorities or to centralized servers for secure message transmissions and exhibit problems like frequent problems due to link-node failures and pricey issues. For these reasons, existing solutions for secure message transmission services in regular networks...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks

    In this paper, the authors identify vulnerabilities of on-demand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mechanisms to defend against them. They propose BSMR, a novel secure multicast routing protocol that withstands insider attacks from colluding adversaries. The protocol is a software-based solution...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Behaviour Based Trust Management Using Geometric Mean Approach for Wireless Sensor Networks

    The resource constraints of Wireless Sensor Network (WSN) make it easy to attack and hard to protect. Although carefully designed cryptography and authentication help to make WSN securer, they are not good at dealing with compromised node and ageing node, whose misbehavior may impair the function of WSN. Hence, they...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Ray's Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. One promising alternatives of textual passwords is a graphical based password. According to human psychology, human can easily remember pictures. In this paper, the author has proposed a new hybrid graphical password based system. The system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel SHA-1 Approach in Database Security

    Database security is a major research area and includes topics such as database security, intrusion detection, DDos, privacy preserving, data mining and related papers in designing information systems that protect the privacy and ownership of individual or company information. A database contains data ranging from different degree of confidentiality and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Asynchronous Optical Burst Switching Networks

    The ever increasing demand for higher bandwidth due to the growth of bandwidth intensive applications such as video-on-demand, video conferencing, on-line banking, on-line auction and other multimedia applications motivated the search for alternatives to traditional electronic networks. Optical Burst Switching (OBS) is one such paradigm developed to handle the future...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Security Design Combining the Advantages of Cryptanalysis and Anonymous Routing Protocol to Achieve Data Secrecy and Anonymity

    Since internet is widely used these days, users privacy has become the main concern. Privacy is related to anonymity. Basic requirement for anonymity is to unlink the user's identity to specific activities such as in a untraceable e-cash system and P2P payment systems. To provide anonymity various techniques are made...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Linear Appearance Based Algorithms for Face Recognition

    Analyzing the face recognition rate of various current face recognition algorithms is absolutely critical in developing new robust algorithms. In this paper, the authors propose performance analysis of Principal Component Analysis (PCA), Linear Discriminate Analysis (LDA) and Locality Preserving Projections (LPP) for face recognition. This analysis was carried out on...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    FPGA Based Area and Throughput Implementation of JH and BLAKE Hash Function

    Implementation of area and throughput of the main building block (compression function) for two SHA-3 candidates BLAKE and JH hash function. The National Institute of Standards and Technology (NIST) has started a competition for a new secure hash standard. A significant comparison between the submitted candidates is only possible, if...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Survey on Computer Crime Scene Investigation Forensic Tools

    In the day to day life, the crime is becoming a big issue in the computer field. So to avoid and to protect from crime, Computer Forensics is used. This paper describes different tools that are used in the Computer Forensics. These tools are used to recover the data that...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel Approach for Supply Chain in Distributed Networks Using Multi Echelon

    In distribution networks ware-houses and distribution center will present at different locations and the authors have the problem in the covering all the distribution center using single path to minimize the cost and to maintain the optimal quantity at the warehouses they need to follow the specific methods in this...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel Approach for the Detection of SYN Flood Attack

    Denial of Service attack(DoS) is causing a serious and financial damage in recent years. They are performed easily by utilizing the weakness of the network protocol. There are many types of Dos attack namely IP spoofing SYN Flood. If should be notable that the firewall host hardly filters the SYN...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Document Clustering in Web Search Engine

    As the number of web pages grows, it becomes more difficult to find the relavant documents from the information retrieval engines, so by using clustering concept, the authors can find the grouped relavant documents. The main purpose of clustering techniques is to partitionate a set of entities into different groups,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Cost Estimation Tool for Commercial Software Development Industries

    As cost associated to the software development is increasing continuously, there is a need to direct attention at better understanding of development process and calibrating previous models and methods making them applicable to existing environment such as proposing hybrid tools using the techniques based on existing models. The main aim...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Simulation and Performance Analysis of DSDV, OLSR, DSR and ZRP Routing Protocols in Manets

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2012

    A Survey on Location Aware and Context Aware in Mobile Applications

    Mobile services and applications are used in changing contexts and surroundings. These services are made up of context-aware and offer contextually relevant information to the user. These facilities help to find the data and its use. Mobile computing refers to the use of any kind of computer in a moving...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2012

    Prevention of Security Concerns During Outlier Detection

    Data objects which do not comply with the general behavior or model of the data are called Outliers. Outlier Detection in databases has numerous applications such as fraud detection, customized marketing, and the search for terrorism. However, the use of Outlier Detection for various purposes is not an easy task....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2012

    Predicting Software Bugs Using Web Log Analysis Techniques and Na?ve Bayesian Technique

    With the continued growth and proliferation of Web services, software as a services and Web based information systems, the volumes of user data have reached astronomical proportions. As the World Wide Web is continuously and rapidly growing, it is necessary for the web miners to utilize intelligent tools in order...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2011

    Robust and Secure Digital Signature for Image Authentication Over Wireless Channels

    Now a days the transmission and distribution of the digital images by appending the digital signatures and content based image authentication schemes facing some triggers which are suitable for the insecure network and robust to transmission errors. The invasive distribution of digital images and the growing concern on their integrity...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2011

    Modified LRU Algorithm to Implement Proxy Server With Caching Policies

    In order to produce and develop a software system, it is necessary to have a method of choosing a suitable algorithm which satisfies the required quality attributes and maintains a trade-off between sometimes conflicting ones. Proxy server uses caching policies to store web documents using algorithms. For this, different algorithms...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2011

    A QOS-Aware Software Selection Method Based On Service Credibility Evaluation

    Many software's that share same or similar functional properties; so it is often a challenging effort to select credible and optimal software based on their various history QoS records. In view of this challenge, a novel QoS-aware software selection method based on service credibility evaluation is put forward, based on...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Standard Ethernet Interface as an Embedded Communication Network for Controlling and Monitoring the Devices

    Web access functionality is embedded in a device to enable low cost widely accessible and enhanced user interface functions for the device. A web server in the device provides access to the user interface functions for the device through a device web page. A web server can be embedded into...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Hardware Implementation of DWT for Image Compression Using SPIHT Algorithm

    In this paper, a DWT-based image processing system is developed on Xilinx Spartan3 Field Programmable Gate Array (FPGA) device using Embedded Development Kit (EDK) tools from Xilinx. Two different hardware architectures of Two Dimensional (2-D) DWT have been implemented as a coprocessor in an embedded system. One is direct implementation...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Protection System for VIP's With GPRS & Remote Monitoring

    In communication channel of a tele-operation control task, there always exists a time-delay problem which causes poor performance and even instability of the system. To overcome the time-delay problem, in this paper, the Smith predictor configuration is considered. The Smith predictor can stabilize the system by taking the time delay...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Implementation of CMOS Camera Device Driver and Bluetooth Technique on S3C2440 Using Linux

    With the processing of CMOS technology, the technology of video acquisition based on CMOS is becoming a new trend. However, many CMOS camera chip is not supported by the newest Linux kernel yet. The environmented image acquirement and the Bluetooth transmission system are studied and designed. In this paper, the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    A New Framework Design for IPTV

    An IPTV is a system used to deliver television services to the consumers who are registered subscribers for this system. This delivery of digital television is made possible by using Internet Protocol over a broadband connection, usually in a managed network rather than the public Internet to preserve quality of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    A Study on Post Mining of Association Rules Targeting User Interest

    Association Rule Mining means discovering interesting patterns with in large databases. Association rules are used in many application areas such as market base analysis, web log analysis, protein substructures. Several post processing methods were developed to reduce the number of rules using non-redundant rules or pruning techniques such as pruning,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    An Overview Mobility Effect on Transmissions Energy Consumption in Mobile Ad-Hoc Networks

    In mobile ad-hoc networks transmission energy is much important. Energy conservation is important issue in MANET because mobile nodes are basically battery powered and cannot function without proper power level. How transmission energy consumption affected mobility. Many authors publish related work. In this paper, the authors try to make a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    Dynamic Frequency Hopping: A Major Boon Towards Performance Improvisation of a GSM Mobile Network

    The primary problem in today's cellular network is to raise bandwidth efficiency of cellular system and handle blocking in the call between the subscribers. This will be done by improving the performance of system and reducing the interference to allow the users to achieve higher data rate. This designed system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    A Novel Approach in Cost Estimation Based on Algorithmic Model

    Software engineering is the step by step process for developing an efficient system, which is expected by the user. To achieve or develop the system they are having many lifecycle models. But while considering the software development lifecycle model cost estimation is the essential thing to predict how much effort...

    Provided By IJCTT-International Journal of Computer Trends and Technology