IJCTT-International Journal of Computer Trends and Technology

Displaying 1-40 of 471 results

  • White Papers // Oct 2014

    TrPF: Location Aware Participation System For Mobile Users

    The ubiquity of the various cheap embedded sensors on mobile devices, such as cameras, microphones, accelerometers, and so on, is enabling the emergence of participatory sensing applications. During participatory sensing individuals can collect and analyze the participator's location as well as trajectory privacy which break the participators privacy. In the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Network Coding an Secure and Efficient Process for Content Distribution

    Content distribution in network sometimes may be vulnerable henceforth unauthorized users can inject \"Bogus\" data to corrupt the content during its distribution process in order to deplete the network resource. The direct application of network coding may be insecure. Content verification is the important and practical issue when maintaining integrity...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Multimedia Streaming Adaptation Based on Portrayal of Coded Video

    In this paper, the authors extend the current concept of Multiple Description Coding (MDC) to their proposed domain, by proposing efficient splitting of standard Single Description Coded (SDC) video into a multi-stream representation. The Multiple Description Video Splitting (MDVS) scheme is proposed to operate at network edge, which increases robustness...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Study of DNS Based On the Command and Control

    The authors have conducted a systematic study on the feasibility of solely using DNS queries for massive-scale stealthy communication among entities on the Internet. Attackers, in particular botnet controllers, use secret messaging systems to set up large-scale command and control. In order to systematically understand the potential capability of attackers,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Load Balance Schema is Used to Improve Performance in Cloud Computing Environment

    To improve the efficiency and performance in cloud computing environment, the authors introduce load balance technique in cloud computing. Load balance model is used to partition public cloud into several clouds. Public cloud consists of many nodes. In some cases cloud is very large and complex at this situation load...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Efficient and Secure Auditing To Cloud Storage in Cloud Computing

    Cloud computing is a prominent technology and computing paradigm bringing forward to many new challenges for security and access control. When users share the private or sensitive content using cloud servers some security issues are raised here. In recent years many number of access control third party software's are control...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Survey on Various Techniques of User Authentication and Graphical Password

    The process of identifying an individual usually based on a username and password. Passwords are the best commonly used method for identifying users in computer and communication systems. Usually, passwords are strings of letters and digits, i.e., they are alpha-numeric. Graphical passwords, which contain of some actions that the user...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Smart Data Back-Up Technique for Cloud Computing Using Secure Erasure Coding

    In cloud computing, data generated in electronic form are large in amount. To manage this data efficiently, there is an essential of data recovery services. To handle this, the authors propose a smart remote data backup algorithm i.e. Secure Erasure Coding (SEC) algorithm. The objective of proposed algorithm is twofold;...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Valid Key Exchange Between Two Servers Password with High Reliability

    Password Authentic Key Altercation (PAKE) remains anywhere a client and a server, who stocks a PIN, validate every additional and in the interim found a cryptographic pin through argument of mails. Now this situation, altogether the PIN essential towards to validate clients is deposited now unique server. Uncertainty the server...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Cryptographic Primitives Based Privacy Preserved for Social Networking in Cloud

    In the actual world, a third party companies will publish social networks, e.g., a cloud service provider, for commerce intellect. An important point is privacy preserving when declare social system of connection data. The paper describes a unique type security problem, termed surroundings violation. The authors guess that an raider...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Cluster-Based Trust Model for Online Reputation System

    With the rapid development of online reputation systems, manipulations against such systems are evolving quickly. In this paper, the authors propose a cluster based approached theory to protect reputations. Tested against users attack data taken from a cyber-competition, the proposed system has achieved a better performance in terms of accurately...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    A Framework for Balancing Load Across Systems for Efficient Reliability

    Global content requests dynamically routed to the nearest content servers, increasing the uploading speed of page, maximizing the bandwidth and delivering same content regardless of load and network congestions. According to network traffic and number of nodes, the network algorithm chooses the optimal routing option to deliver the content with...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Measuring Sustainability Impact of Software

    The quality of software architectures determines sustainability of the software to a large extent. Measuring sustainability of a software architecture both during early designs using scenarios and during evolution using scenarios and metrics, which is highly relevant in practice, have great impacts on software sustainability. Sustainability indicators and composite index...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Privacy Preserving of Intermediate Datasets In Cloud for Improving Efficiency

    Cloud computing provides massive storage capacity to the users to deploy their applications without any infrastructure investment. Along with those applications a large set of intermediate datasets will be generated, and it is a challenging problem to preserve the privacy of those intermediate datasets. Encrypting all datasets in cloud is...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Model and Design of System in Peer to Peer Network for Balanced Data Transfer

    Open nature of peer-to-peer systems exposes them to vindictive activity. Building trust relationships among peers can diminish attacks of vindictive peers. This paper presents distributed algorithms that entitle a peer to reason about trustworthiness of the other peers based on previous recommendations and interactions. Peers create their own trust network...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Secure and Reliable Cloud Security from Single to Multi Clouds

    Now-a-days, many organizations are using cloud computing and it's rapidly increased. The usage of cloud computing is low cost it provides more profits and accessibility of data. In cloud computing environment the major factor is ensuring the security for cloud computing, in the cloud sensitive information can be stored by...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Replica Allocation in MANET's by Handling Selfish Nodes

    In a Mobile Ad hoc NETwork (MANET), the mobility and resource constraints of mobile nodes may lead to network partitioning and performance degradation. Several data replication techniques assume that all mobile nodes collaborate fully in terms of sharing their memory space to increase the performance of the network. But, in...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    A Framework for Immune and Distributed Contour Matching in Social Networks

    The profile matching is defined as two users comparing their personal profiles and is often the first step towards effective proximity mobile social networks. However according to user's perspective the growing privacy issues about make their personal profiles to complete strangers before deciding to interact with them. Proposed protocols enable...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Heterogeneous Multi Core Processors for Improving the Efficiency of Market Basket Analysis Algorithm in Data Mining

    Heterogeneous multi core processors can offer diverse computing capabilities. The efficiency of market basket analysis algorithm can be improved with heterogeneous multi core processors. Market basket analysis algorithm utilizes apriori algorithm and is one of the popular data mining algorithms which can utilize Map/Reduce framework to perform analysis. The algorithm...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Simulation of Jelly Fish Periodic Attack in Mobile Ad hoc Networks

    The advancement in wireless communication have given arise to various wireless networks like Mobile Ad hoc NETworks (MANETs), wireless sensor networks and many more. MANET networks are vulnerable to various types of attacks and threats due to its unique characteristics like dynamic topology, shared physical medium, distributed operations and many...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    A Novel Design and Implementation of Delegated Access Control for Privacy in Clouds Outsourcing

    By usage of approaches of conventional encryption, the privacy of the information against the cloud was assured and is not enough to hold up the access control policies of fine-grained organizational enforcement. Modern approaches to put into effect access control policies on outsourced information by means of selective encryption require...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    A Rumination of Error Diffusions in Color Extended Visual Cryptography

    Color Visual Cryptography (VC) is a secret sharing scheme which uses to encrypt a secret message into n halftone image shares. The users can recover the secret image by stacking their shares, and then secret image can be revealed. In extended visual cryptography, the share images are constructed to contain...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Access to Cloud Networks Depending Attribute for Content Sharing

    In this paper, the authors explores a novel MCP-ABE (Multi-message Ciphertext Policy Attribute-Based Encryption) technique, and make use of the multi-message Ciphertext policy attribute-based encryption to plan an access manage scheme for distributing scalable media depending on information clients' attributes (e.g., gender, nationality and age) rather than an clear catalog...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    A Chaos-based Image Encryption Scheme Using Permutation-Substitution Architecture

    Recently, a great number of chaos-based image encryption algorithms have been proposed. But most of them are either deficient in security or complicated. In this paper, the authors propose a permutation-substitution image encryption scheme based on generalized Arnold map. Only one round of permutation and one round of substitution are...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Aspect Based Topic and Opinion Mining

    The proposed system focus on document-level, feature level opinion classification or general domains in conjunction with topic detection and opinion sentiment analysis, based on the semantic label annotation techniques. An additionally ATOM has been suggested. And the proposed system finally identifies whether the semantic orientation of the given text is...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Test Data Management

    Management is required in each and every phase of life and so does in any software project. A software project goes through many stages: requirement analysis, designing, development, testing and maintenance. In order to successfully complete each stage, a certain form of management is required. Testing stage also has a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Efficient Handling of Big Data Volume Using Heterogeneous Distributed File Systems

    Big data is the emerging technology of modern world. With the increasing users of online based services the growth of data is tremendous. As the size increases there comes the challenge to handle the large Volume in big data. This paper is to handle the volume of big data in...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Blocking Implication Attacks on Social Network Private Information

    In the cloud computing environment load balancing has a major effect on the presentation. Good load balancing creates cloud computing most effective and progresses client fulfillment. This paper initiates a good load balance design for the public cloud depending upon the cloud separation paper with a switch mechanism to select...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Performance Evaluation of Protocols for Secure Routing in Manets

    Mobile Ad-hoc NETworks (MANETs) can form a network by allowing the wireless nodes without any fixed infrastructure. For MANET's, early routing protocols are not accounted because of security issues. Further, cryptographic methods were revised to secure the routing information. These protocols had created new avenues for Denial of Service (DoS)...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    WIFI Electricity

    Electricity is a necessity of today's modern life. It is difficult to imagine a day without electricity. The people can use electricity with the help of wires. These wires are bulky and occupy a lot of space. Now-a-days they see dusty power cord tangles which create some problem around the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    A New Approaches to Improve Server Secuirty by Using Media Access Control Address Verification

    A Local Area Network (LAN) is usually privately owned and links the devices in a single office, building, or campus. Currently, LAN has been widely used in the different fields. Depending on the requirements of an organization and the kinds of technology used, a LAN can be extended throughout a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Secure Cloud Storage through Public Auditing and Cryptographic Primitives

    The purpose of cloud computing is a long dreamed vision of computing as a utility, where user want to store their data remotely into the cloud and so as to enjoy the on demand of high quality application and services for the shared pool of configurable computing storage of outsourcing...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Get Me on the Map If You Can: Secure Locale Scepticism Activity

    There are two things to consider about this application that is Location-Based Service (LBS) and Social Network Services (SNS). Now-a-days, almost every social network service provider giving the facilities to the user so that user can share or produce their location to the specified persons. Many Location Based Services (LBS)...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    Mining High Dimensional Data Using Attribute Clustering-Based Feature Subset Selection Algorithm

    Attribute based cluster involves, selecting the items or search the data item based on attributes. Common attributes are clustered and store those into a single place, so by this the users can simply search the items; many more feature selections methods have been proposed and read for machine learning applications....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2014

    A Framework to Ensure Quality of Service with New Trail and Security in Networks

    The authors present a method to find another path, after link failures, from a source node to a destination node, before the interior gateway protocol (e.g., OSPF or IS-IS) has had a chance to reconverge in response to the failure. The target application is a small (up to tens of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Secure and Privacy Preserving Image Storage System in Cloud Computing

    Cloud computing is a huge platform for data storage. It has been become an integral part of data storage system. As the computing environment increasing day-by-day, the data also increasing rapidly. In which the image data also increasing in huge amount in computing environment. Storing the image data in cloud...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    An Adequate Password Authentication Scheme for Information Interchange using Keys

    In this paper, AES algorithm used for the encryption and decryption this is mush secure and it is faster than the triples DES algorithm and it can worked only in the hardware. AES required only 1 password to encrypt the data as compare to the DES require 2 password data...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Review of Role Based Access Control Method for Securing User Space in Cloud Computing

    Cloud computing is a distributed system which supports various types of services like SAAS, IAAS and PASS. The data resides with in the cloud is vital, hence there is a need to preserve the data as well as to maintain the privacy of cloud users. In conventional access control mechanisms,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    Selection of Most Appropriate Backpropagation Training Algorithm in Data Pattern Recognition

    One of the computer technology development in the creation of the current approach in resolving an issue is soft computing. Soft computing is part of the intelligent system that is a model approach to computing by imitating human reason and has the ability to reason and learn in an environment...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2014

    EFSR: Evolutionary Fisheye State Routing Protocol in Mobile Ad Hoc Networks

    Mobile ad hoc network is wireless network that utilizes multi-hop radio relayed and are capable of operating without the support of any fixed infrastructure. The absence of any central coordinator makes the routing more complex. In mobile ad hoc network, the routing and resource managements are done in which all...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption Using Blowfish Algorithm

    Cloud computing is a distributive computation task on the resource pool which consists of massive computers. LMS experiences with Cloud and Managed Cloud Service provider are due to numerous factors. Availability means that the services are available even when quite a number of nodes fail. Cloud services are provided by...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    Game Based Analysis of Distributed DoS Attacks Prevention Using Puzzle-Based Defense Strategy

    Security issues have become a major issue in recent years due to the development of technology in networking and its use in vicious way. A number of puzzle-based defense strategies have been established to overcome the flooding Denial-of-Service (DoS) attack which is eminent in the networks. DoS attacks are aimed...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2012

    A New Reduced Clock Power Flip-Flop for Future SOC Applications

    In this paper a novel technique is proposed based on the comparison between Conventional Conditional Data Mapping Flip-flop and Clock Pair Shared D Flip Flop (CPSFF) here the authors are checking the working of CDMFF and the conventional D Flip-flop. Due to the immense growth in nanometer technology the SOC...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    Web Usage Mining: User Navigational Patterns Extraction From Web Logs

    Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. In this paper, the authors define the notion of a "User session" as being a temporally compact sequence of web accesses by a user. They also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Automation of Network Protocol Analysis

    This paper "Automation of Network Protocol Analysis" is mainly aimed to automate the entire process. Starting from sniffing the network packets till the validation of it has been taken care. Here, the authors have automated the logging part through a C program. Whenever packets will be transmitted from a system,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Analysis of VoIP Traffic With Multiple Packet Transfer

    Voice over Internet Protocol (VoIP) is a form of voice communication. Today Wireless LANs are providing a cost effective alternative for the voice communication. Initially the wireless access protocols are not suitable for the voice communication. Subsequently, new techniques are developed for the real time voice communication. In voice communication...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Implementation of SOBEL Edge Detection on FPGA

    The image processing algorithms has been limited to software implementation which is slower due to the limited processor speed. So, a dedicated processor for edge detection is required which was not possible until advancements in VLSI technology. The proposed work presents FPGA based architecture for Edge Detection using Sobel operator....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Android Based Mobile Application Development and Its Security

    In the advancing world of technology, Mobile applications are a rapidly growing segment of the global mobile market. Mobile applications are evolving at a meteor pace to give users a rich and fast user experience. In this paper, Android mobile platform for the mobile application development, layered approach and the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Web Mining Privacy Using Advanced DSA - Spatial LBS Case Study

    Web mining is new area of research in information technology; so many business applications that utilize data mining and text mining techniques to extract useful business information on the web have emerged from web searching to web mining. It is important for students to acquire knowledge and hands on experience...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    An Energy Efficient Remote Data Collection and Reprogramming of Wireless Sensors Networks

    Energy constrained sensor nodes are preloaded with the program code and data, which are usually unattended after deployment. Due to change in user requirements and environmental changes, preloaded software and firmware deployed in sensor nodes have to be reprogrammed on large number of sensor nodes to resolve the post deployment...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Secure Transmission Services in Wireless Networks Using Key Trees

    In contrast with conventional networks, mobile networks usually do not provide on-line access to trusted authorities or to centralized servers for secure message transmissions and exhibit problems like frequent problems due to link-node failures and pricey issues. For these reasons, existing solutions for secure message transmission services in regular networks...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks

    In this paper, the authors identify vulnerabilities of on-demand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mechanisms to defend against them. They propose BSMR, a novel secure multicast routing protocol that withstands insider attacks from colluding adversaries. The protocol is a software-based solution...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Behaviour Based Trust Management Using Geometric Mean Approach for Wireless Sensor Networks

    The resource constraints of Wireless Sensor Network (WSN) make it easy to attack and hard to protect. Although carefully designed cryptography and authentication help to make WSN securer, they are not good at dealing with compromised node and ageing node, whose misbehavior may impair the function of WSN. Hence, they...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2012

    Ray's Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. One promising alternatives of textual passwords is a graphical based password. According to human psychology, human can easily remember pictures. In this paper, the author has proposed a new hybrid graphical password based system. The system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel SHA-1 Approach in Database Security

    Database security is a major research area and includes topics such as database security, intrusion detection, DDos, privacy preserving, data mining and related papers in designing information systems that protect the privacy and ownership of individual or company information. A database contains data ranging from different degree of confidentiality and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Asynchronous Optical Burst Switching Networks

    The ever increasing demand for higher bandwidth due to the growth of bandwidth intensive applications such as video-on-demand, video conferencing, on-line banking, on-line auction and other multimedia applications motivated the search for alternatives to traditional electronic networks. Optical Burst Switching (OBS) is one such paradigm developed to handle the future...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Security Design Combining the Advantages of Cryptanalysis and Anonymous Routing Protocol to Achieve Data Secrecy and Anonymity

    Since internet is widely used these days, users privacy has become the main concern. Privacy is related to anonymity. Basic requirement for anonymity is to unlink the user's identity to specific activities such as in a untraceable e-cash system and P2P payment systems. To provide anonymity various techniques are made...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Performance Analysis of Linear Appearance Based Algorithms for Face Recognition

    Analyzing the face recognition rate of various current face recognition algorithms is absolutely critical in developing new robust algorithms. In this paper, the authors propose performance analysis of Principal Component Analysis (PCA), Linear Discriminate Analysis (LDA) and Locality Preserving Projections (LPP) for face recognition. This analysis was carried out on...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    FPGA Based Area and Throughput Implementation of JH and BLAKE Hash Function

    Implementation of area and throughput of the main building block (compression function) for two SHA-3 candidates BLAKE and JH hash function. The National Institute of Standards and Technology (NIST) has started a competition for a new secure hash standard. A significant comparison between the submitted candidates is only possible, if...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Survey on Computer Crime Scene Investigation Forensic Tools

    In the day to day life, the crime is becoming a big issue in the computer field. So to avoid and to protect from crime, Computer Forensics is used. This paper describes different tools that are used in the Computer Forensics. These tools are used to recover the data that...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel Approach for Supply Chain in Distributed Networks Using Multi Echelon

    In distribution networks ware-houses and distribution center will present at different locations and the authors have the problem in the covering all the distribution center using single path to minimize the cost and to maintain the optimal quantity at the warehouses they need to follow the specific methods in this...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    A Novel Approach for the Detection of SYN Flood Attack

    Denial of Service attack(DoS) is causing a serious and financial damage in recent years. They are performed easily by utilizing the weakness of the network protocol. There are many types of Dos attack namely IP spoofing SYN Flood. If should be notable that the firewall host hardly filters the SYN...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2012

    Document Clustering in Web Search Engine

    As the number of web pages grows, it becomes more difficult to find the relavant documents from the information retrieval engines, so by using clustering concept, the authors can find the grouped relavant documents. The main purpose of clustering techniques is to partitionate a set of entities into different groups,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Cost Estimation Tool for Commercial Software Development Industries

    As cost associated to the software development is increasing continuously, there is a need to direct attention at better understanding of development process and calibrating previous models and methods making them applicable to existing environment such as proposing hybrid tools using the techniques based on existing models. The main aim...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2012

    Simulation and Performance Analysis of DSDV, OLSR, DSR and ZRP Routing Protocols in Manets

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2012

    A Survey on Location Aware and Context Aware in Mobile Applications

    Mobile services and applications are used in changing contexts and surroundings. These services are made up of context-aware and offer contextually relevant information to the user. These facilities help to find the data and its use. Mobile computing refers to the use of any kind of computer in a moving...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2012

    Prevention of Security Concerns During Outlier Detection

    Data objects which do not comply with the general behavior or model of the data are called Outliers. Outlier Detection in databases has numerous applications such as fraud detection, customized marketing, and the search for terrorism. However, the use of Outlier Detection for various purposes is not an easy task....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2012

    Predicting Software Bugs Using Web Log Analysis Techniques and Na?ve Bayesian Technique

    With the continued growth and proliferation of Web services, software as a services and Web based information systems, the volumes of user data have reached astronomical proportions. As the World Wide Web is continuously and rapidly growing, it is necessary for the web miners to utilize intelligent tools in order...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2011

    Robust and Secure Digital Signature for Image Authentication Over Wireless Channels

    Now a days the transmission and distribution of the digital images by appending the digital signatures and content based image authentication schemes facing some triggers which are suitable for the insecure network and robust to transmission errors. The invasive distribution of digital images and the growing concern on their integrity...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2011

    Modified LRU Algorithm to Implement Proxy Server With Caching Policies

    In order to produce and develop a software system, it is necessary to have a method of choosing a suitable algorithm which satisfies the required quality attributes and maintains a trade-off between sometimes conflicting ones. Proxy server uses caching policies to store web documents using algorithms. For this, different algorithms...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2011

    A QOS-Aware Software Selection Method Based On Service Credibility Evaluation

    Many software's that share same or similar functional properties; so it is often a challenging effort to select credible and optimal software based on their various history QoS records. In view of this challenge, a novel QoS-aware software selection method based on service credibility evaluation is put forward, based on...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Standard Ethernet Interface as an Embedded Communication Network for Controlling and Monitoring the Devices

    Web access functionality is embedded in a device to enable low cost widely accessible and enhanced user interface functions for the device. A web server in the device provides access to the user interface functions for the device through a device web page. A web server can be embedded into...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Hardware Implementation of DWT for Image Compression Using SPIHT Algorithm

    In this paper, a DWT-based image processing system is developed on Xilinx Spartan3 Field Programmable Gate Array (FPGA) device using Embedded Development Kit (EDK) tools from Xilinx. Two different hardware architectures of Two Dimensional (2-D) DWT have been implemented as a coprocessor in an embedded system. One is direct implementation...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Protection System for VIP's With GPRS & Remote Monitoring

    In communication channel of a tele-operation control task, there always exists a time-delay problem which causes poor performance and even instability of the system. To overcome the time-delay problem, in this paper, the Smith predictor configuration is considered. The Smith predictor can stabilize the system by taking the time delay...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Implementation of CMOS Camera Device Driver and Bluetooth Technique on S3C2440 Using Linux

    With the processing of CMOS technology, the technology of video acquisition based on CMOS is becoming a new trend. However, many CMOS camera chip is not supported by the newest Linux kernel yet. The environmented image acquirement and the Bluetooth transmission system are studied and designed. In this paper, the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    A New Framework Design for IPTV

    An IPTV is a system used to deliver television services to the consumers who are registered subscribers for this system. This delivery of digital television is made possible by using Internet Protocol over a broadband connection, usually in a managed network rather than the public Internet to preserve quality of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    A Study on Post Mining of Association Rules Targeting User Interest

    Association Rule Mining means discovering interesting patterns with in large databases. Association rules are used in many application areas such as market base analysis, web log analysis, protein substructures. Several post processing methods were developed to reduce the number of rules using non-redundant rules or pruning techniques such as pruning,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    An Overview Mobility Effect on Transmissions Energy Consumption in Mobile Ad-Hoc Networks

    In mobile ad-hoc networks transmission energy is much important. Energy conservation is important issue in MANET because mobile nodes are basically battery powered and cannot function without proper power level. How transmission energy consumption affected mobility. Many authors publish related work. In this paper, the authors try to make a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    Dynamic Frequency Hopping: A Major Boon Towards Performance Improvisation of a GSM Mobile Network

    The primary problem in today's cellular network is to raise bandwidth efficiency of cellular system and handle blocking in the call between the subscribers. This will be done by improving the performance of system and reducing the interference to allow the users to achieve higher data rate. This designed system...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2012

    A Novel Approach in Cost Estimation Based on Algorithmic Model

    Software engineering is the step by step process for developing an efficient system, which is expected by the user. To achieve or develop the system they are having many lifecycle models. But while considering the software development lifecycle model cost estimation is the essential thing to predict how much effort...

    Provided By IJCTT-International Journal of Computer Trends and Technology