IJCTT-International Journal of Computer Trends and Technology

Displaying 1-40 of 578 results

  • White Papers // Feb 2015

    Location Based Search Queries with Ultimate Privacy Preserving Considerations

    The location-based searching services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. To efficiently compute the location based queries which are found in any uncertain range in the entire region, and provide much more possible solutions related to that queries...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates

    In this paper, the authors base their research on biometric systems security. They begin by introducing biometrics after which they will describe how a biometric system works before they later define what a biometric template is. Thereafter, they will explore attacks on biometric systems and lay more emphasis on biometric...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    An Overview of the Existing Routing Protocols and Trust Based Algorithms in Mobile Ad-hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a temporary network that can be dynamically formed to exchange information by wireless hosts which may be mobile. The network is ad hoc because it does not rely on any pre-existing network infrastructure like routers in wired networks. The devices in a MANET can communicate...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Big Data Analysis: Apache Storm Perspective

    The boom in the technology has resulted in emergence of new concepts and challenges. Big data is one of those spoke about terms today. Big data is becoming a synonym for competitive advantages in business rivalries. Despite enormous benefits, big data accompanies some serious challenges and when it comes to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Service Differentiation based on Contention Window with Enhanced Collision Resolution LR-WPANs

    The IEEE 802.15.4 MAC standard defines the channel access for low-rate, low-power communication applications such as Wireless Sensor Networks but does not differentiate between high or low priority data. The authors study few priority based service differentiation mechanisms which distinguish between such data for each and every device, and also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Overview on - A Content Filter for Unwanted Messages in Online Social Network

    Data mining is a process of analyzing and extracting useful information from databases. It helps to retrieve more information in various fields. Thus, data mining techniques provide an ease of making decisions regarding their user needs. The term spam is defined as unsolicited message and the goal of spam categorization...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Analysis of Various Clustering Techniques for Wireless Sensor Networks

    Recent years have seen expanded interest with the potential utilization of Wireless Sensor Networks (WSNs) in a wide mixed bag of uses and it has changed into a hot examination range. Owing to various favorable circumstances, clustering is currently an element extension of steering innovation in WSNs. The outline of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    A Review on Effective Data Aggregation Techniques

    From the primarily based WSNs circumstance, energy as well as bandwidth on the sensors usually are valued assets and vital to consume skillfully. Data aggregation at the base section by individual nodes causes flooding on the data which consequences throughout maximum energy consumption. In this paper, the evaluation on Data...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    A Comprehensive Study of Mechanisms Dealing Credit Cards to Defy Social Engineering Crimes

    Now-a-days, credit cards have become a prerequisite in the people daily activities. The misuse of credit card is increasing day-by-day. There are several ways in which a offender performs a credit card fraud. It is always been advised to exercise and provide additional security to the credit cards in order...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Efficient Robust Interactive Personalized Mobile Search Engine

    Technology and its service based cluster mechanism plays the most important role in the building the Technology in better and smarter way to implement the best of technological advancement. In the paper of recent era where mobile plays like a PC or the users can call these days mobile more...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    An Enhanced TCP Performance Based on Dynamically Weighted HMM in Optical Burst Switching for Loss Classification

    In recent times, Optical Burst Switching (OBS) is a raising contending technology in the network performance area. Therefore, because of the in efficiency of buffers, losses exist due to contention on the concurrent burst arrival in the core nodes. In this paper, contention loss occur which doesn't indicates the congestion...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    An Improved Classification of Network Traffic Using Adaptive Nearest Cluster Based Classifier

    In modern network security and management architecture, classification of traffic plays a major role in recent years. In particular, the process of intrusion detection and QoS control is considered as a essential components in traffic classification. Recent method uses statistical feature related classification approach with machine learning techniques for traffic...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Adaptive Context-Aware Data Management Scheme for Mobile Environments

    Data sharing and delivering in mobile environments is one of the most important interest issues in such environments. Therefore, data management is one of the biggest problems in these dynamic environments. In this dynamic environment, a user's context such as user's profile, user's social situation, and user's interests may affect...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Cloud Computing for Retailing Industry: An Overview

    Cloud computing is a novel approach which is practicing by many industries in the world, specifically the small and medium scale industries. It has become a talk of the town in computing industry and in business. Its gaining popularity can provide a lot of opportunities for the retailing industry to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Survey of a Lightweight Proactive Source Routing Protocol for Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is a wireless communication network and the nodes that are not lies within the direct transmission range of each other depend on the intermediate nodes to forward data. Opportunistic data forwarding has drawn much attention in the research community of multi-hop wireless networking, with most...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Designing Of Distributed Firewalls in Cooperative Domains

    Firewalls have been broadly organized on the Internet aimed at acquiring secluded systems. A firewall forms every received or departing packet towards to choose whether to receive or reject the packet grounded on its strategy. Improving firewall strategies is vital aimed at enlightening system performance. Earlier effort on firewall optimization...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Novel Approach for Enhanced Adaptive Acknowledgement based Intrusion Detection for MANETs

    The change to wireless network from wired network has been a most evolving new worldwide trend within the past few decades. The quantifiability and quality brought by wireless network create its potential in several applications. Among all the up to date wireless networks, Mobile Ad hoc NETwork (MANET) is one...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Secure Online Application Safeguarding Data with Stegnography based Watermarking

    Digital watermarking is the act of hiding information in multimedia data (images, audio or video), for the purposes of content protection or authentication. In digital watermarking, the secret information (usually in the form of a bit-stream), the watermark, is embedded into a multimedia data such as cover data in such...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Quality of Service with Frequent Pattern Mining on Multi Crux Chunk

    A mining frequent pattern is a first fundamental data's mining tasks with the numerous practical application i.e., the consumer markets basket examination, webs mining, and the network intrusion discovery. When the databases sizes are larger, executing the mining tasks on the personals computers is always non trivial because of the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Tracking of Local Area Adversaries in Wireless Sensor Networks

    Now-a-days, spoofing has occupied in many network areas. Mainly it will effect on the networks, because everyone is copying the others things and implementing then the authors can do all things very simply and they can launch this process easily. In the network each and every data in sharing has...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Wireless Sensor Expedition of Extensive Choice to Preserve the Quality

    The basic thing of wireless network is to provide the security in local areas and make difference between the general things to Green Orbs to observer the natural things. Remote controlling network area and its related devices the authors know it allows sum range to work and allow users to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Securely Data Sharing with Indeterminate ID Allocation

    The authors are introducing a novel algorithm for anonymous data sharing of private data from different persons. By using this mechanism they are assigning nodes ID number from 1 to N. This assignment is anonymous in that the individuality receives the information without knowing identity of this to other member...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Parallelization of GUI Applications

    Parallel computing with respect to the computer architecture involves building multi-core processors. Utilization of these multiple-cores is done using parallel programming. It has been observed that not all parallel applications are similar. With the widespread usage of multicore processors, optimum utility of a computer's multiprocessing capability is taken care of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Reliable Data Assurance among Peer To Peer System

    Technology and its implication the people carry forward has its meaning in its surrounding, If they consider the system of networking world which they really basic model has its own significance in the global world of Information Technology. In a networking of peer-to-peer system, the malicious activity is the major...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Finding the Destination of Moving-Object in Wireless Sensor Network

    Wireless network is more powerful and signal strength is very strong to send information and to receive the information in the network. To improve this process the authors added Tracking the object or finding the destination location with a moving object in an unknown location. They can see that tings...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Geographical Position Updating Approach in Mobile Wireless Networks

    In general the people use the node transformation of data in the networks, in geographic nodes they need to update each and everything of their positions and data nodes as well as they need to identify the next neighbor nodes and its positions when they are sending the information from...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Excellent Surveillance for Multi-Channel Wireless Communication Networks

    Submissive monitoring circulated wireless data transmission is a supportive technique to examine tricks in wireless network for error analysis, to reserve executive and serious pathway examination. Here the authors are initiated QoM (Quality of Monitoring) it was defined by different predictable quantity of dynamic users monitor, and the study of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Revolutionary Profit Maximization Technique for Cloud Computing with Arranging Peak Multi Servers

    The cloud computing became most popular in now-a-days, here the generous of finances of cloud computing is censoriously significant. To escalate the profits (income), the cloud service provider has needs to realize the cost of business and charge for facility and the authors come to know how they will give...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Privacy Perspectives of Record based Approach in Social Networks

    Mainly in this paper, the authors proposed, privacy is one of the most friction point that the people can see in social networks and when they involves the communications in social networks it get the information about the tings. They can see different types of communities of computer science researchers...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Requirements, Trade-offs and Design for Safe Encounter Based Mobile Social Network

    The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. Encounter traditional social network as opposed users abuse the information's. The new access presents provocations that are basically different from those social network designs tackled by earlier....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Identification of Secured Single Sign-on Approach and to find Attackers in Distributed Systems

    Distributed systems are the huge amount of telecommunicated and adopting based network systems. So to provide the security in that large network the authors are implemented this paper, users can sign in only one time in their account. The users cannot able to login in their account many times until...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Modern Framework for P2P Integrated Systems over Trust Model for Self-Organizing Nodes

    The open nature of the peer-to-peer systems exposes them to malicious actions. Here in this paper, the authors introducing distributed algorithms that can enable peer to get the trustworthiness of other peers based on interactions of those peers in the past with other peers. The peers in the network are...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Cloud Architecture for Profit Maximization Based on Efficient Multi-Server Configuration

    Cloud computing becoming a very efficient and effective technology to use resources and services together. Now-a-days, cloud computing becomes most popular, here the indulgent of economics of cloud computing is critically important. To increase the profits, the cloud service provider needs to understand the business cost and facility charge and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Framework for Uplink Query Processing in Network-Assisted Mobile Computing

    Many mobile devices today access the data from the remote servers through the user generated queries. Processing of these queries should be done before the desired content to be delivered is identified. In this manner, when the processing is done the process will cut down the battery stand-by time there...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Secure Protocol for Maintaining Privacy & Confidentiality in Untrusted Database

    Usually once secrecy becomes an apprehension, encrypted data before outsourcing to a service provider. Now and then deployed on constructs of any software-based cryptographic, the encrypted data in for server-side query processing on, essentially limit query expressiveness. Now, the authors introduce trusted database, an outsourced database model that allows users...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Security Leakage Upper Bound Constraint to the Cloud through a Secure and Efficient Secondary Data

    Cloud computing provides considerable storage capacity to the users to deploy their applications without any modification its infrastructure details. Along with that all applications the authors have a large set of intermediate datasets it can generated by the implanted changes in the cloud computing and it is a challenging problem...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Centralizing Sensor Network in the Lush to Improve the Quality

    Major issue in wireless sensor networks is Localization and the study is done over years. With the real time experience GreenOrbs, to know about the climatic condition in the forest; they are unable to get the proper data sitting remotely with the current technique employed for knowing weather conditions at...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Prohibiting Blocking Attacks in Wireless Networks Through Aggregating Cryptanalytic Primitives

    Unlock outlook of the connection without any type of wire based medium will puts down the intentional intervention assault, usually submitted to like jamming. These type of the intentional intervention with the transmission without wire commence the pad for the purpose of growing refutation of the provide services based assault...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Extended SQL Aggregation for Database Transformation

    Product life cycles to prepare a normalized data set from relational database for analysis require significant efforts and it is time consuming task. The main reason is that, in general the database grows with many tables and views that must be joined, aggregated and transformed in order to build the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Novel Integrated Approach for Big Data Mining

    The growing volume of digital internet of things is fuelling it even extra. The rate of data increase is surprising and this information comes at a speed, with diversity which is not necessarily structured. Ability to examine this massive amount of data is bringing a new age of productivity growth,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Efficient Sink Scheduling for Data Travelling in WSNs with Delay Constraint

    The objective of system is to use sink mobility to prolong the network lifetime in wireless sensor networks where the information delay caused by moving the sink should be bounded. In this paper, a unified framework for analyzing the joint sink mobility, routing, delay, and so on is built. The...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Effectiveness in Packet Data Transmission in the Reserved Channel Bandwidth Wireless Sensor Network

    In the trend of wireless sensor network, where nodes plays the most important role in implementing the wave based communication. These days if people look the telecom Industry where IT plays the crucial role in implementing the path of communication has changed a lot, considering those factors in this paper...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    A Meta-heuristic Approach for Image Segmentation using Firefly Algorithm

    Image segmentation is one of the main steps of image processing, in which any image is being subdivided into multiple segments. Each segment will represent some kind of information to user in the form of color, intensity, or texture. Image segmentation is one of the basic and important steps of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Deadline - Cost Based Job Scheduling Using Greedy Approach in a Multi-Layer Environment

    Cloud computing is a well-liked computing model to support on demand services. With the use of Internet technologies, scalable resources are delivered as a service to external customers. Scheduling in cloud is responsible for selection of best suitable resources for task execution, by considering some static and dynamic parameters and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    An Implementation of Secure Data Exchange Ensuring Authentication and Authorization Using Color Drops

    Secure communication is when two entities are communicating and do not want a third party to listen in. For that they need to communicate in a way not susceptible to eavesdropping or interception. Here maintain user privacy, and preserve data integrity via encryption and decryption technique. Using a trust-overlay network...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    An Efficient Query Mining Framework Using Spatial Hidden Markov Models for Automatic Annotation of Images

    A novel method for automatic annotation of images is used with keywords from a generic vocabulary of concepts or objects combined with annotation-based retrieval of images. This can be done by using spatial hidden Markov model, in which states represent concepts. The parameters of this model are estimated from a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Different Type of Feature Selection for Text Classification

    Text categorization is the task of deciding whether a document belongs to a set of pre specified classes of documents. Automatic classification schemes can greatly facilitate the process of categorization. Categorization of documents is challenging, as the number of discriminating words can be very large. Many existing algorithms simply would...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Web Content Classification: A Survey

    As the information contained within the web is increasing day-by-day, organizing this information could be a necessary requirement. The data mining process is to extract information from a data set and transform it into an understandable structure for further use. Classification of web page content is essential to many tasks...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Content Based Image Mining Technique for Image Retrieval Using Optimized Hybrid Clustering

    Content based image retrieval system is a widely used method for finding and retrieving images from large databases. In this paper, the authors describe the development and implementation of a content based image mining technique for image retrieval .The proposed CBIR technique uses more than one clustering techniques to improve...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Attribute Based User Control Access for Cloud Storage Data

    Online documents provide very convenient ways for individuals to store and share various data including personal profile, business documents and etc on remote online data servers. Cloud computing, regarded as the future IT architecture, and even promises to provide unlimited and elastic computing resources to cloud users in a very...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Mobility in Cloud Systems

    Cloud computing is a huge amount of distributed and dynamic resources that are provided on request to clients over the Internet. This technology improves applications services by arranging machines and distributed resources in a single huge computational entity. Normally, cloud servers don't operate at full capacity; means there's some processing...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Achieving Privacy Assured Outsourcing of Data in Cloud Using Optimalvisual Cryptography

    Security has emerged as the most feared aspect of cloud computing and a major hindrance for the customers. In existing system for establishing secure and privacy-assured service outsourcing in cloud computing which uses linear programming and compressed sensing techniques to transform images, which aims to take security, complexity, and efficiency...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    VirtuMob : Remote Display Virtualization Solution For Smartphones

    Mobility is an important attribute in today's computing world. Mobile devices, Smartphone and tablet PC are becoming an integral part of human life because they are most effective and convenient communication tools. This paper proposes a system to connect and access the desktops of remote computer systems using an android...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Energy Efficiency in Cloud Data Centers Using Load Balancing

    Cloud computing is an expanding area in research and industry today, which involves virtualization, distributed computing, internet, and software and web services. This paper presents an approach for scheduling algorithms that can maintain the load balancing. In this paper the authors have developed power optimization algorithm which over comes the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    A Qualitative Study of Various Improvements in Cluster Based Routing Protocols for WSN

    A wireless sensor network is comprised of hundreds and thousands of small tiny devices called sensor nodes which are distributed in such a way so as to monitor real environment conditions likewise temperature, pressure, humidity, etc. But most of the wireless sensor networks are constrained to their low network lifetime...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Improved Authentication Scheme for Dynamic Groups in the Cloud

    Now-a-days most of the organizations managing data to the cloud such that an active member of the group can be able to share data with other members of the group. Because of its insecure nature, the authors propose Initiator which acts as the middleware between the group manager and the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Survey on Clustering Algorithm for Document Clustering

    In today era all document are in electronic format to save space and easy access. So, the biggest task is to the retrieve document from large database. The document clustering is the process of partitioning collected data into subgroups with similarities. The purpose of document clustering is to provide technique...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Performance Comparison of Two Streaming Data Clustering Algorithms

    The Weighted Fuzzy C-Mean clustering algorithm (WFCM) and Weighted Fuzzy C-Mean-Adaptive Cluster number (WFCM-AC) are extension of traditional fuzzy c-mean algorithm to stream data clustering algorithm. Clusters in WFCM are generated by renewing the centers of weighted cluster by iteration. On the other hand, WFCM-AC generates clusters by applying WFCM...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Smart City Analysis Using Spatial Data and Predicting the Sustainability

    Smart city planning is crucial as it should balance among resources and the needs of the city. It allows to achieve good eco-friendly industries, there by supporting both the nature and the stake holders. Setting up an industry is a difficult problem, because it should optimize the resources and allocating...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Integration of Cloud Computing and Web2.0 Collaboration Technologies in E-Learning

    Cloud computing technology is an emerging new computing paradigm for delivering computing services. Although it still in its early stage, it has changed the way how many applications are developed and accessed. This computing approach relies on a number of existing technologies, such as Web2.0, virtualization, Service Oriented Architecture (SOA),...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    IDS in Cloud Environment

    During recent years, various new technologies have been invented for network based systems. A large volume of data is transferred between the systems via Internet. In today's time, providing security to the network based systems is very important to perform all operations in reliable manner. With graduate increase in number...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Unsupervised Opinion Mining From Text Reviews Using SentiWordNet

    Opinion mining is a discipline or area of text classification which continues gives contribution in research field. Sentiment analysis is one another name of opinion mining. Opinion mining analyzes and classifies the user generated data like reviews, blogs, comments, articles etc. Now-a-days every people use web services and gives their...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Design of Adder in Multiple Logic Styles for Low Power VLSI

    The main consideration for design and implementation of various logics and arithmetic functions, such as an adder, are the choice of basic pass transistor approach due to their high operating speed and low power dissipation. This paper is to design carry skip adder based on different technologies such as CPL...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    LowPower 32-Bit DADDA Multipleir

    Now-a-days, low power applications play a crucial task in designing of VLSI based digital circuits. They demand to investigate different techniques to reduce power consumption in digital circuits while maintains computational throughput. Low power VLSI design is a significant research area for past decades since the increasing demands on portable...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Design of a Multiplexer in Multiple Logic Styles for Low Power VLSI

    The increasing demand for low-power Very Large Scale Integration (VLSI) can be addressed at different design levels, such as the architectural, circuit, layout, and the process technology level. At the circuit design level, considerable potential for power savings exists by means of proper choice of a logic style for implementing...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2013

    A Comparative Study of 7T SRAM Cells

    Memories are integral part of most of the digital devices and hence reducing power consumption of memory is very important in improving the system performance, efficiency and stability. In this paper, a novel 7T SRAM cell is introduced and it is compared with the two existing 7T SRAM cells. The...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    A Study on Post Mining of Association Rules Targeting User Interest

    Association Rule Mining means discovering interesting patterns with in large databases. Association rules are used in many application areas such as market base analysis, web log analysis, protein substructures. Several post processing methods were developed to reduce the number of rules using non-redundant rules or pruning techniques such as pruning,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks

    In this paper, the authors identify vulnerabilities of on-demand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mechanisms to defend against them. They propose BSMR, a novel secure multicast routing protocol that withstands insider attacks from colluding adversaries. The protocol is a software-based solution...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Behaviour Based Trust Management Using Geometric Mean Approach for Wireless Sensor Networks

    The resource constraints of Wireless Sensor Network (WSN) make it easy to attack and hard to protect. Although carefully designed cryptography and authentication help to make WSN securer, they are not good at dealing with compromised node and ageing node, whose misbehavior may impair the function of WSN. Hence, they...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Ray's Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. One promising alternatives of textual passwords is a graphical based password. According to human psychology, human can easily remember pictures. In this paper, the author has proposed a new hybrid graphical password based system. The system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel SHA-1 Approach in Database Security

    Database security is a major research area and includes topics such as database security, intrusion detection, DDos, privacy preserving, data mining and related papers in designing information systems that protect the privacy and ownership of individual or company information. A database contains data ranging from different degree of confidentiality and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Asynchronous Optical Burst Switching Networks

    The ever increasing demand for higher bandwidth due to the growth of bandwidth intensive applications such as video-on-demand, video conferencing, on-line banking, on-line auction and other multimedia applications motivated the search for alternatives to traditional electronic networks. Optical Burst Switching (OBS) is one such paradigm developed to handle the future...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Security Design Combining the Advantages of Cryptanalysis and Anonymous Routing Protocol to Achieve Data Secrecy and Anonymity

    Since internet is widely used these days, users privacy has become the main concern. Privacy is related to anonymity. Basic requirement for anonymity is to unlink the user's identity to specific activities such as in a untraceable e-cash system and P2P payment systems. To provide anonymity various techniques are made...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Linear Appearance Based Algorithms for Face Recognition

    Analyzing the face recognition rate of various current face recognition algorithms is absolutely critical in developing new robust algorithms. In this paper, the authors propose performance analysis of Principal Component Analysis (PCA), Linear Discriminate Analysis (LDA) and Locality Preserving Projections (LPP) for face recognition. This analysis was carried out on...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    FPGA Based Area and Throughput Implementation of JH and BLAKE Hash Function

    Implementation of area and throughput of the main building block (compression function) for two SHA-3 candidates BLAKE and JH hash function. The National Institute of Standards and Technology (NIST) has started a competition for a new secure hash standard. A significant comparison between the submitted candidates is only possible, if...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Survey on Computer Crime Scene Investigation Forensic Tools

    In the day to day life, the crime is becoming a big issue in the computer field. So to avoid and to protect from crime, Computer Forensics is used. This paper describes different tools that are used in the Computer Forensics. These tools are used to recover the data that...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    An Overview Mobility Effect on Transmissions Energy Consumption in Mobile Ad-Hoc Networks

    In mobile ad-hoc networks transmission energy is much important. Energy conservation is important issue in MANET because mobile nodes are basically battery powered and cannot function without proper power level. How transmission energy consumption affected mobility. Many authors publish related work. In this paper, the authors try to make a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    Dynamic Frequency Hopping: A Major Boon Towards Performance Improvisation of a GSM Mobile Network

    The primary problem in today's cellular network is to raise bandwidth efficiency of cellular system and handle blocking in the call between the subscribers. This will be done by improving the performance of system and reducing the interference to allow the users to achieve higher data rate. This designed system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    A Novel Approach in Cost Estimation Based on Algorithmic Model

    Software engineering is the step by step process for developing an efficient system, which is expected by the user. To achieve or develop the system they are having many lifecycle models. But while considering the software development lifecycle model cost estimation is the essential thing to predict how much effort...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2012

    Neural Network Associated With Recognition of Facial Expressions of Basic Emotions

    The science of image processing, helps t to recognize the human gesture for general life applications. For example, observing the gesture of a driver when he/she is driving and alerting him/her when in sleepy mood will be quite useful. Human gestures can be identified by observing the different movements of...

    Provided By IJCTT-International Journal of Computer Trends and Technology