International Journal of Computer Technology and Applications

Displaying 1-40 of 306 results

  • White Papers // Apr 2015

    Recommender System for E-Shopping Using Users' Tipping Point

    E-commerce is one of the rapidly growing fields now-a-days. With today's trend, attraction of users towards online shopping is increased. In the field of online shopping, previously it was considered that users make the purchase decisions depending on their own choice. But the extensive studies have proved that the decision...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2015

    Microcontroller Based Design of Power Meter

    In this paper, the authors present a design of an affordable and convenient means for consumers to accurately measure the power consumption of the electrical devices. If a consumer is able to measure the AC power drawn from a particular household circuit, then they would be able to calculate the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2014

    Scheduling Tasks in Embedded Systems Based on NoC Architecture

    In this paper, the author presents a new method to generate and schedule task in the architecture of embedded systems based on the simulated annealing. This novel method takes into account the attribute of divisibility of tasks. A proposal of represent the process in the form of trees. Despite the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2014

    Crucial Concepts and Applications of Data Mining - - An Overview

    Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information that can be used to increase revenue, cuts costs or both. Data mining software is one of a number of analytical tools for analyzing data. It...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2014

    Lock-Less Shared Memory Read/Write Using Message Passing

    Current thread synchronization methods Mutex, Semaphore, Monitorsare based on locks and software transactional memory is based on the database transactions. Locks have disadvantages including contention and dead lock. Software transactional memories can result in a lot of rolling back of transactions, if number of transactions and threads increases. This leads...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2014

    Design of 32-Bit ALU Using Low Power Energy Efficient Full Adder Circuits

    With the advancement of technology, Integrated Chip (IC) has achieved smaller chip size with more functions integrated. Through the usage of more transistors, it has lead to an increase of power dissipation and undesired noise. As the design gets more complex, this results in slower speed. Hence, the demand for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2014

    Privacy Preservation of Frequent Dataset to be Distributed

    Distributed data mining provides computational strength as it can share effectively the large amount of data among its various computational resources connected in a network. In order to design the accurate data models, this huge amount of precise information must be distributed among various computational clients to perform data mining...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    An Effective Algorithm of Encryption and Decryption of Images Using Random Number Generation Technique and Huffman Coding

    Data security has become most important aspect while transmission of data and storage. The transmission and exchange of image also needs a high security. Cryptography is used to maintain security. In this paper, the authors implemented security for image. They have considered an image, read its pixels and convert it...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Study on Improving Web Security Using SAML Token

    Web service is the most important word which is most commonly used by all computer professionals. Web services are mainly used for communicating different platform within a network connection. Web services are created based on SOA architecture. SOA platform is most popularly used in distributed systems. When using in distributed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    A Novel Hybrid Feature Selection and Intrusion Detection Based on PCNN and Support Vector Machine

    In this paper, the authors proposed a hybrid model for feature selection and intrusion detection. Feature selection is important issue in intrusion detection. The selection of feature in attack attribute and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Improved Network Security Through Retinal Biometric Based Authentication

    Security and authentication are challenging problems due to the sprawling growth of Internet in today's environment. Therefore, the security of the network users has become an essential factor. There are various techniques available in the literature which make use of passwords, smart cards etc., to provide network related security. But...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2013

    Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA

    Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay-as-you-use fashion. As the data is stored in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    A Questionnaire of Student Satisfaction from College Using Data Mining

    Today, a questionnaire of student satisfaction is adopted by universities and very high level colleges but many medium level colleges are unable to decide upon proper implementation of student satisfaction. Although, data mining has been successful implemented in the business world for some time now, its use in higher education...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    Modern Research Trends in Association Data Mining Techniques

    Extracting needful information from the large pool of information is a primary task before predicting. Especially from a huge amount of incomplete, noisy, redundant and randomly scattered data. Data mining provides a framework that automatically discovers required patterns from dataset which will be using these predict future occurrence in analogous...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    Impact of Service Oriented Architecture on ERP Implementations in Technical Education

    These days, technical education is spreading all over the world (rural as well as urban areas) very rapidly and gradually application of ERP system in technical institutes is becoming common. But, with very fast changing technology there is a continued need to enhance the efficiency of operations in ERP system...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Performance Analysis of Shortest Path Energy Efficient Routing Protocol in Wireless Sensor Networks Using NSRS Algorithm

    Wireless Sensor Network is an up-and-coming technology that shows great promise for various innovative applications both for public and military. Wireless Sensor Networks (WSNs) are Ad-hoc wireless networks of typically consists of hundreds or even thousands of small low-cost sensor nodes that communicate in a wireless way. A sensor node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Fast and Efficient IP Network Recovery using Multiple Routing Configuration

    Internet plays a vital role in the peoples communications infrastructure, due to slow convergence of routing protocols after network failure become a growing problem. To guarantee fast recovery from link and node failure in networks, the authors propose a new recovery scheme called Multiple Routing Configuration (MRC). Their proposed scheme...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Robust Aggregation in Sensor Network: An Efficient Frequent Itemset and Number of Occurrence Counting

    Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Design and development of Middleware Gateway IP Multimedia System and Web Services

    Rapid growth in Internet (Web) applications and usage of mobile in telecommunication is present trends in communication. In Web 2.0 web services architecture is become versatile tool for enterprise solutions in distributed environment systems. To provide an enterprise solution it is not possible to get professional solution at one place....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Secure Data Transmission in MANET Routing Protocol

    Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as Ad-hoc networks. A Mobile Ad hoc NETwork (MANET) is mobile, multi-hop, infrastructure less wireless network which is capable of autonomous operation. In this paper the authors have discussed some of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Construction of Power Efficient Fault Tolerant Wireless Network Using Cone Based Algorithm

    Fault tolerant topology control for all to one communication holds significance in dynamic wireless networks with asymmetric wireless links. In this paper the author Investigates the various aspects of the problem mentioned above using the cone based distributed topology control algorithm. The topology of a wireless multi-hop network can be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Energy-Efficient Reliable Routing in Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSN) can handle different traffic classes of multimedia content (video, audio streams and still images) as well as scalar data over the network. Use of general and efficient routing protocols for WMSN is of crucial significance. Similar to other traditional networks, in WMSN a noticeable proportion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Priority Based Scheduling Algorithm Using Time and Transmission Length in 802.11 Networks

    The fairness of IEEE 802.11 wireless networks is rigid to forecast and organize since it constructed based on uncertainty and difficulty of the MAC conflicts and dynamics. So, there is a great extent of packet data to be met in a network traffic jam and the packet data was collapsed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Simulation and Analysis of Receiver-Receiver Time Synchronization in Wireless Sensor Networks

    Wireless sensor networks were initially deployed for military applications. Gradually researchers found them to be very useful in applications like weather monitoring, target tracking, agriculture, industrial applications, and recently smart homes and kindergartens. All the WSN applications need partial or full time synchronization. Applications like acoustic ranging, target tracking or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Grid Computing for Different Applications

    Grid Computing delivers on the potential in the growth and abundance of network connected systems and bandwidth: computation, collaboration and communication over the Advanced Web. At the heart of Grid Computing is a computing infrastructure that provides dependable, consistent, pervasive and inexpensive access to computational capabilities. The use of grid...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Improved Diffie-Hellman Algorithm for Network Security Enhancement

    Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Quality is dependent on size and some other factors of network but...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Agile Plus - Comprehensive Model for Software Development

    In today's changing environment the main priority of a customer is software that executes 100% requirements of customer. In addition there should be some scope so that existing software must adopt future requirements too, that is, it should be flexible enough that can accommodate future requirements, within budget and timely...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Performance of AODV Against Black Hole Attacks in Mobile Ad-Hoc Networks

    Wireless Mobile Ad hoc NETwork (MANET) is a self-configuring network which is composed of several movable mobile nodes. These mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks is the Black...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Optimizing and Enhancing Parallel Multi Storage Backup Compression for Real-Time Database Systems

    One of the big challenges in the world was the amount of data being stored, especially in Data Warehouses. Data stored in databases keep growing as a result of businesses requirements for more information. A big portion of the cost of keeping large amounts of data is in the cost...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Strategy for Package Transformation for Linux Environment

    A Linux operating system is composed of a large number of software packages. Among packages there exist a variety of complex dependency relations, and their management is the foundation of building and maintaining Linux operating system. And the premise of the management is the dependency relations' extraction. Based on the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Emerging Trends in Quantum Cryptography - A Survey

    Privacy is paramount when communicating sensitive information in today's increasingly networked world. Both the business and government sectors have ever-more demanding secure communication needs. Conventional information assurance methods face increasing technological challenges and future threats, including unanticipated advances in mathematics, high-performance computing, and the possibility of large-scale quantum computation. Quantum...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey on Cloud Computing Architecture

    Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on demand. Users don't need expertise in or control over the technology infrastructure "In the cloud". Typical cloud computing providers deliver common business applications online that are accessed from another Web service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of New Cell Site in Telecom Sector

    This paper revaluates the basic requirements for the installation and implementation of new cell site in telecom sector and will discuss the impact of various physical and environmental conditions on the installation process. In simple terms, a cell site depicts a place where antennas and electronic communications equipment are located,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Efficient Routing Strategy for Prioritized Messages in Mobile WSN Using Geographic Forwarding Protocol

    The current work represents a new routing protocol considering the environment of wireless sensor network with dynamic mobility. The approach addresses the issues for both real time and non-real time data dissemination from the mobile sensors to the sink. The prime target of this approach is to resolve the issues...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy-Efficient Cooperative Protocol for Wireless Networks

    In cooperative networks, transmitting and receiving nodes recruit neighboring nodes to help in communication. The authors model a cooperative transmission link in wireless networks and then it forms a cluster at transmitter end and a receiver end. In this paper, they propose a cooperative communication protocol for formation of these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Measurement of Real Time Information Using GPU

    Parallel programming is about performance, for otherwise the authors would write a sequential program. A problem is where to find truly parallel hardware that can be dedicated to the task, One answer is Graphical Processing Units (GPUs), which can have hundreds of cores and are found in millions of desktop...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Analysis of Relay Stations in WiMAX Networks

    The demand for broadband services is growing IEEE sharply today. The traditional solutions to provide high speed broadband access is to use wired access technologies such as cable modem, Digital Subscriber Line (DSL), Ethernet and fiber optics. It is too difficult and expensive for carriers to build and maintain wired...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey: On Generation of Wireless Telephony Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

    In wireless network can classified in two way one is infrastructure network and another is infrastructure less. Infrastructure less wireless network is known as Ad-hoc network. An ad-hoc network is a Local Area Network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Performance Analysis Between AODV & DSR Routing Protocol

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Construction of Power Efficient Fault Tolerant Wireless Network Using Cone Based Algorithm

    Fault tolerant topology control for all to one communication holds significance in dynamic wireless networks with asymmetric wireless links. In this paper the author Investigates the various aspects of the problem mentioned above using the cone based distributed topology control algorithm. The topology of a wireless multi-hop network can be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Secure Data Transmission in MANET Routing Protocol

    Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as Ad-hoc networks. A Mobile Ad hoc NETwork (MANET) is mobile, multi-hop, infrastructure less wireless network which is capable of autonomous operation. In this paper the authors have discussed some of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Design and development of Middleware Gateway IP Multimedia System and Web Services

    Rapid growth in Internet (Web) applications and usage of mobile in telecommunication is present trends in communication. In Web 2.0 web services architecture is become versatile tool for enterprise solutions in distributed environment systems. To provide an enterprise solution it is not possible to get professional solution at one place....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Robust Aggregation in Sensor Network: An Efficient Frequent Itemset and Number of Occurrence Counting

    Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Fast and Efficient IP Network Recovery using Multiple Routing Configuration

    Internet plays a vital role in the peoples communications infrastructure, due to slow convergence of routing protocols after network failure become a growing problem. To guarantee fast recovery from link and node failure in networks, the authors propose a new recovery scheme called Multiple Routing Configuration (MRC). Their proposed scheme...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Performance Analysis of Shortest Path Energy Efficient Routing Protocol in Wireless Sensor Networks Using NSRS Algorithm

    Wireless Sensor Network is an up-and-coming technology that shows great promise for various innovative applications both for public and military. Wireless Sensor Networks (WSNs) are Ad-hoc wireless networks of typically consists of hundreds or even thousands of small low-cost sensor nodes that communicate in a wireless way. A sensor node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Priority Based Scheduling Algorithm Using Time and Transmission Length in 802.11 Networks

    The fairness of IEEE 802.11 wireless networks is rigid to forecast and organize since it constructed based on uncertainty and difficulty of the MAC conflicts and dynamics. So, there is a great extent of packet data to be met in a network traffic jam and the packet data was collapsed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2012

    Underwater Acoustic Sensor Networks: A Survey on MAC and Routing Protocols

    In this paper, a detailed survey on the current protocols for medium access control layer and routing layer in the area underwater acoustic sensor networks are given. This survey is on some of the best MAC protocols and routing protocols and also it compares them based on some critical parameters...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC)

    Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats to the projects, thus, this projects must be designed and focused towards security in order to be able to stand...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Energy-Efficient Reliable Routing in Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSN) can handle different traffic classes of multimedia content (video, audio streams and still images) as well as scalar data over the network. Use of general and efficient routing protocols for WMSN is of crucial significance. Similar to other traditional networks, in WMSN a noticeable proportion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Sep 2011

    Review of Solutions for Securing the Vehicular Networks

    The successful introduction of vehicular communication has to posses the design of robust security architecture that should be able to cope with security threats. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Vehicular networks are likely to become the most relevant form of mobile ad hoc...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Sep 2011

    Trustworthy Computing Under Identity-Based Encryption

    The authors propose a fully functional Identity-Based Encryption scheme (IBE). The scheme has chosen cipher text security in the random oracle model assuming a variant of the computational Diffie-Hellman problem. Their system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Object Oriented Testing Techniques: Survey and Challenges

    Object-oriented programs involve many unique features that are not present in their conventional counterparts. Examples are message passing, synchronization, dynamic binding, object instantiation, persistence, encapsulation, inheritance, and polymorphism. Testing for such program is, therefore, more difficult than that for conventional programs. Object-orientation has rapidly become accepted as the preferred paradigm...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    An Efficient Algorithm for Improved Web Usage Mining

    Clustering is a web mining technique, which is a demanding field of research in which its latent applications create their own special requirements. Clustering is a method of grouping similar data into data sets, called clusters. Cluster analysis is a primary technique in conventional data analysis and many clustering methods...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Framework to Measure and Maintain the Quality of Software Using the Concept of Code Readability

    Present day's software industry is using software metrics to estimate the complexity of software systems to find software cost estimation, software development control, software testing, software assurance and software maintenance. The relationship between a simple set of local code features and human concept of readability can be derived by collecting...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Performance Comparison of Single and Multipath Routing Protocols in Adhoc Networks

    In a Mobile Ad hoc NETwork (MANET), Mobile nodes communicate with each other using multi-hop wireless links. There is no stationery infrastructure, for instance there is no base station. Each node in the network also acts as a router, forwarding data packets for other nodes an ad hoc network can...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analyzing Performance of Proactive and Reactive Routing Protocols for Manets

    Mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration number of routing protocols like Proactive and Reactive protocols have been implemented. Various research communities are working in field of MANET and trying...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Service Composition in SOA and QoS Related Issues

    Service Oriented Architecture (SOA) is a modern approach to build distributed application and greatly reduce the time, effort and cost to develop the software projects. SOA provides the dynamic paradigm for composing distributed application even in heterogeneous environments. The dynamic composition feature in SOA makes evaluation of a QoS a...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Secure Digital Signature Scheme for Image Authentication Over Wireless Channels

    The introduction of 3G wireless communication systems, together with the invasive distribution of digital images and the growing concern on their originality triggers an emergent need of authenticating images received by unreliable channels, such as public Internet and wireless networks. To meet this need, a content-based image authentication scheme that...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Privacy Enhancing and Breach Reduction

    Hiding the information without getting it revealed to others while publishing in a network is a major task now a days. For example an individual who wants to share his personal information like hospitalized or banking data to a researcher for his future enhancement or for his benefit, how much...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Hardware Enhancement Association Rule With Privacy Preservation

    In recent days Data mining techniques have been widely used in various applications. One of the most important applications in data mining is association rule mining. For hardware implementation of Apriori-based association rule mining the authors have to load candidate item sets and a database into the hardware. As the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Review: Competitive Learning Algorithm of Neural Network

    This paper deals mainly with the development of new learning algorithms and the study of the dynamics of neural networks. This paper will cover issues about the unsupervised competitive learning as well as some of its variances like hard competitive learning and soft competitive learning. After introducing of unsupervised learning...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Job Scheduling in Cloud Computing Based on Horizontal Load Balancing

    Cloud computing is a latest new computing paradigm where applications, data and IT services are provided across dynamic and geographically dispersed organization. How to improve the global throughput and utilize Cloud computing resources proficiently and gain the maximum profits with job scheduling system is one of the Cloud computing service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    One Time Password Security Through Cryptography for Mobile Banking

    Electronic banking-which provides the economic services through internet-changed the business trade of banks drastically, also decreasing the cost and improving the ease for the user. Highly usage of phones in which internet is enabled makes the change of banking operations to mobile phones from desktop computers - a reasonable growth...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Performance Evaluation & Application of Smart Antenna in Sensor Networks

    This paper provides a method for forming a communications link of Wireless Sensor Networks (WSN) by enabling each WSN to act as a smart antenna. Each WSN is simulated as a set of randomly placed sensor nodes within a planar area. The proposed method involves a searching WSN, a receiving...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Threshold Based Secret Sharing Scheme Using Polynomial Function

    In this paper, the authors will study the question of performing arbitrary updates in secret sharing schemes when shares of unaffected parties shall remain unchanged. They will introduce a zonal transformation matrix in the lifetime of secret sharing schemes to simplify constructions of multi-time secret sharing schemes and propose management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Enhanced EFCI Congestion Control Scheme for ATM Networks

    Traffic management and congestion control are key issues in ATM networks. Congestion control schemes promises effective traffic management and it uses feedback information from the network to specify the maximum rate at which each source can transmit cells in to the network. In this paper, the authors considered an Explicit...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Improvement in Software Development Process and Software Product Through Knowledge Management

    Software engineering is a complex business in which processes, used to build product, have to go through many phases with involvement of many people. All these phases required different knowledge expertise to work together and apply innovative ideas to return successful outcome without missing the quality and reliability factors from...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Three Party Quantum Authenticated Key Distribution Protocol Using Superposition States

    This paper presents a Quantum authenticated key distribution protocol that can perform key distribution and also ensure that the participants of the communication are authentic, both implicitly and explicitly. This protocol provides new directions in Classical cryptography and Quantum cryptography. The Participants of the protocol trust the third party regarding...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Micro Strip Patch Antenna and Its Applications: A Survey

    The study of microstrip patch antennas has made great progress in recent years. Compared with conventional antennas, microstrip patch antennas have more advantages and better prospects. They are lighter in weight, low volume, low cost, low profile, smaller in dimension and ease of fabrication and conformity. Moreover, the microstrip patch...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    An Overview of on Demand Wireless Adhoc Networks Protocols: DSR and TORA

    Wireless network are becoming popular now a days due their features like easy setup without the need of cabling. Wireless ad-hoc networks are a collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network. Each node in the network has a wireless Interface and communicates with each other...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Wide-Area Traffic: IP Multicast Receiver Handover for Mobile IP Networks

    Network arrivals are often modeled as Poisson processes for analytic simplicity, even though a number of traffic studies have shown that packet inter-arrivals are not exponentially distributed. The authors evaluate 24 wide-area traces, investigating a number of wide-area TCP arrival processes (session and connection arrivals, FTP data connection arrivals within...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Quantitative Analysis of DSR Routing Algorithm for Carrying Packet Telephony

    It has been difficult for researchers to realize Packet Telephony over Mobile Ad-hoc Networks due to the peculiar characteristics of these networks including dynamic nature of nodes. The nodes keep on changing their location and hence re-routing is frequently required. So a robust routing algorithm is prerequisite for successful implementation...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2010

    Securing Routing Protocols Against Active Attacks in Mobile Ad Hoc Networks

    According to the inherent nature of mobile Ad Hoc networks, the mobility of members, traditional public key infrastructure based on the certificates, is not suitable for these networks. ID-based cryptography is known as an appropriate solution for securing these networks. Various routing protocols for these networks are proposed. In some...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Design of Multiuser CDMA Systems in Fading Channels

    In this paper, the authors examine the effect of channel estimation errors on the performance of Multiple-Input - Multiple-Output (MIMO) systems that employ Code-Division Multiple-Access (CDMA) transmission. Channel estimation based on training techniques has widely been considered throughout the literature. However, employing these training techniques in MIMO-CDMA systems degrades system...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Identification and Analysis of Hard Disk Drive in Digital Forensic

    The dramatic increase in crime relating to the Internet and computers has caused a growing need for computer forensics. Computer forensic tools have been developed to assist computer forensic investigators in conducting a proper investigation into digital crimes. Digital forensics is a growing and important fields of research for current...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    The Role of Quality Assurance in Software Development Projects: Project Failures and Business Performance

    Despite rapid advances in all facets of technology, the software industry still struggles with the formidable task of developing software applications that meet quality standards, and budget constraints. The need for software to be error-free remained a challenge to the IT industry. Therefore, the primary purpose of this study is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A New Approach to Mine Frequent Pattern in Spatial Database Using TFP-Tree

    Today there are several skilled algorithms to mine frequent patterns. Frequent item set mining provides the associations and correlations among items in large transactional or relational database. In this paper a new approach to mine frequent pattern in spatial database using TFP-tree is proposed. The proposed approach generates a TFP-tree...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Review of Various Security Protocols in Wireless Sensor Network

    Sensor networks are highly distributed networks of small, lightweight wireless sensor nodes, deployed in large numbers to monitor the environment or system by the measurement of physical parameters such as temperature, pressure, or relative humidity, sound, vibration, motion or pollutants, at different locations. A WSN is composed of a large...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Protection of Web User's Privacy by Securing Browser from Web Privacy Attacks

    The Internet and World Wide Web being an essential part of everyone's life, the users have become more conscious about their privacy. The user's web privacy unfortunately, is not focused much by the current browsers. This paper focuses on the attacks which compromises user's anonymity, grab user's private data. It...

    Provided By International Journal of Computer Technology and Applications