International Journal of Computer Technology and Applications

Displaying 1-40 of 306 results

  • White Papers // Apr 2015

    Recommender System for E-Shopping Using Users' Tipping Point

    E-commerce is one of the rapidly growing fields now-a-days. With today's trend, attraction of users towards online shopping is increased. In the field of online shopping, previously it was considered that users make the purchase decisions depending on their own choice. But the extensive studies have proved that the decision...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2015

    Microcontroller Based Design of Power Meter

    In this paper, the authors present a design of an affordable and convenient means for consumers to accurately measure the power consumption of the electrical devices. If a consumer is able to measure the AC power drawn from a particular household circuit, then they would be able to calculate the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2014

    Scheduling Tasks in Embedded Systems Based on NoC Architecture

    In this paper, the author presents a new method to generate and schedule task in the architecture of embedded systems based on the simulated annealing. This novel method takes into account the attribute of divisibility of tasks. A proposal of represent the process in the form of trees. Despite the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2014

    Crucial Concepts and Applications of Data Mining - - An Overview

    Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information that can be used to increase revenue, cuts costs or both. Data mining software is one of a number of analytical tools for analyzing data. It...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2014

    Lock-Less Shared Memory Read/Write Using Message Passing

    Current thread synchronization methods Mutex, Semaphore, Monitorsare based on locks and software transactional memory is based on the database transactions. Locks have disadvantages including contention and dead lock. Software transactional memories can result in a lot of rolling back of transactions, if number of transactions and threads increases. This leads...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2014

    Design of 32-Bit ALU Using Low Power Energy Efficient Full Adder Circuits

    With the advancement of technology, Integrated Chip (IC) has achieved smaller chip size with more functions integrated. Through the usage of more transistors, it has lead to an increase of power dissipation and undesired noise. As the design gets more complex, this results in slower speed. Hence, the demand for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2014

    Privacy Preservation of Frequent Dataset to be Distributed

    Distributed data mining provides computational strength as it can share effectively the large amount of data among its various computational resources connected in a network. In order to design the accurate data models, this huge amount of precise information must be distributed among various computational clients to perform data mining...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    An Effective Algorithm of Encryption and Decryption of Images Using Random Number Generation Technique and Huffman Coding

    Data security has become most important aspect while transmission of data and storage. The transmission and exchange of image also needs a high security. Cryptography is used to maintain security. In this paper, the authors implemented security for image. They have considered an image, read its pixels and convert it...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Study on Improving Web Security Using SAML Token

    Web service is the most important word which is most commonly used by all computer professionals. Web services are mainly used for communicating different platform within a network connection. Web services are created based on SOA architecture. SOA platform is most popularly used in distributed systems. When using in distributed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    A Novel Hybrid Feature Selection and Intrusion Detection Based on PCNN and Support Vector Machine

    In this paper, the authors proposed a hybrid model for feature selection and intrusion detection. Feature selection is important issue in intrusion detection. The selection of feature in attack attribute and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Improved Network Security Through Retinal Biometric Based Authentication

    Security and authentication are challenging problems due to the sprawling growth of Internet in today's environment. Therefore, the security of the network users has become an essential factor. There are various techniques available in the literature which make use of passwords, smart cards etc., to provide network related security. But...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2013

    Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA

    Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay-as-you-use fashion. As the data is stored in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    A Questionnaire of Student Satisfaction from College Using Data Mining

    Today, a questionnaire of student satisfaction is adopted by universities and very high level colleges but many medium level colleges are unable to decide upon proper implementation of student satisfaction. Although, data mining has been successful implemented in the business world for some time now, its use in higher education...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    Modern Research Trends in Association Data Mining Techniques

    Extracting needful information from the large pool of information is a primary task before predicting. Especially from a huge amount of incomplete, noisy, redundant and randomly scattered data. Data mining provides a framework that automatically discovers required patterns from dataset which will be using these predict future occurrence in analogous...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    Impact of Service Oriented Architecture on ERP Implementations in Technical Education

    These days, technical education is spreading all over the world (rural as well as urban areas) very rapidly and gradually application of ERP system in technical institutes is becoming common. But, with very fast changing technology there is a continued need to enhance the efficiency of operations in ERP system...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Performance Analysis of Shortest Path Energy Efficient Routing Protocol in Wireless Sensor Networks Using NSRS Algorithm

    Wireless Sensor Network is an up-and-coming technology that shows great promise for various innovative applications both for public and military. Wireless Sensor Networks (WSNs) are Ad-hoc wireless networks of typically consists of hundreds or even thousands of small low-cost sensor nodes that communicate in a wireless way. A sensor node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Fast and Efficient IP Network Recovery using Multiple Routing Configuration

    Internet plays a vital role in the peoples communications infrastructure, due to slow convergence of routing protocols after network failure become a growing problem. To guarantee fast recovery from link and node failure in networks, the authors propose a new recovery scheme called Multiple Routing Configuration (MRC). Their proposed scheme...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Robust Aggregation in Sensor Network: An Efficient Frequent Itemset and Number of Occurrence Counting

    Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Design and development of Middleware Gateway IP Multimedia System and Web Services

    Rapid growth in Internet (Web) applications and usage of mobile in telecommunication is present trends in communication. In Web 2.0 web services architecture is become versatile tool for enterprise solutions in distributed environment systems. To provide an enterprise solution it is not possible to get professional solution at one place....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Secure Data Transmission in MANET Routing Protocol

    Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as Ad-hoc networks. A Mobile Ad hoc NETwork (MANET) is mobile, multi-hop, infrastructure less wireless network which is capable of autonomous operation. In this paper the authors have discussed some of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Construction of Power Efficient Fault Tolerant Wireless Network Using Cone Based Algorithm

    Fault tolerant topology control for all to one communication holds significance in dynamic wireless networks with asymmetric wireless links. In this paper the author Investigates the various aspects of the problem mentioned above using the cone based distributed topology control algorithm. The topology of a wireless multi-hop network can be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Energy-Efficient Reliable Routing in Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSN) can handle different traffic classes of multimedia content (video, audio streams and still images) as well as scalar data over the network. Use of general and efficient routing protocols for WMSN is of crucial significance. Similar to other traditional networks, in WMSN a noticeable proportion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Priority Based Scheduling Algorithm Using Time and Transmission Length in 802.11 Networks

    The fairness of IEEE 802.11 wireless networks is rigid to forecast and organize since it constructed based on uncertainty and difficulty of the MAC conflicts and dynamics. So, there is a great extent of packet data to be met in a network traffic jam and the packet data was collapsed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Simulation and Analysis of Receiver-Receiver Time Synchronization in Wireless Sensor Networks

    Wireless sensor networks were initially deployed for military applications. Gradually researchers found them to be very useful in applications like weather monitoring, target tracking, agriculture, industrial applications, and recently smart homes and kindergartens. All the WSN applications need partial or full time synchronization. Applications like acoustic ranging, target tracking or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Grid Computing for Different Applications

    Grid Computing delivers on the potential in the growth and abundance of network connected systems and bandwidth: computation, collaboration and communication over the Advanced Web. At the heart of Grid Computing is a computing infrastructure that provides dependable, consistent, pervasive and inexpensive access to computational capabilities. The use of grid...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Improved Diffie-Hellman Algorithm for Network Security Enhancement

    Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Quality is dependent on size and some other factors of network but...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Agile Plus - Comprehensive Model for Software Development

    In today's changing environment the main priority of a customer is software that executes 100% requirements of customer. In addition there should be some scope so that existing software must adopt future requirements too, that is, it should be flexible enough that can accommodate future requirements, within budget and timely...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Performance of AODV Against Black Hole Attacks in Mobile Ad-Hoc Networks

    Wireless Mobile Ad hoc NETwork (MANET) is a self-configuring network which is composed of several movable mobile nodes. These mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks is the Black...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Optimizing and Enhancing Parallel Multi Storage Backup Compression for Real-Time Database Systems

    One of the big challenges in the world was the amount of data being stored, especially in Data Warehouses. Data stored in databases keep growing as a result of businesses requirements for more information. A big portion of the cost of keeping large amounts of data is in the cost...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Strategy for Package Transformation for Linux Environment

    A Linux operating system is composed of a large number of software packages. Among packages there exist a variety of complex dependency relations, and their management is the foundation of building and maintaining Linux operating system. And the premise of the management is the dependency relations' extraction. Based on the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Emerging Trends in Quantum Cryptography - A Survey

    Privacy is paramount when communicating sensitive information in today's increasingly networked world. Both the business and government sectors have ever-more demanding secure communication needs. Conventional information assurance methods face increasing technological challenges and future threats, including unanticipated advances in mathematics, high-performance computing, and the possibility of large-scale quantum computation. Quantum...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey on Cloud Computing Architecture

    Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on demand. Users don't need expertise in or control over the technology infrastructure "In the cloud". Typical cloud computing providers deliver common business applications online that are accessed from another Web service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of New Cell Site in Telecom Sector

    This paper revaluates the basic requirements for the installation and implementation of new cell site in telecom sector and will discuss the impact of various physical and environmental conditions on the installation process. In simple terms, a cell site depicts a place where antennas and electronic communications equipment are located,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Efficient Routing Strategy for Prioritized Messages in Mobile WSN Using Geographic Forwarding Protocol

    The current work represents a new routing protocol considering the environment of wireless sensor network with dynamic mobility. The approach addresses the issues for both real time and non-real time data dissemination from the mobile sensors to the sink. The prime target of this approach is to resolve the issues...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy-Efficient Cooperative Protocol for Wireless Networks

    In cooperative networks, transmitting and receiving nodes recruit neighboring nodes to help in communication. The authors model a cooperative transmission link in wireless networks and then it forms a cluster at transmitter end and a receiver end. In this paper, they propose a cooperative communication protocol for formation of these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Measurement of Real Time Information Using GPU

    Parallel programming is about performance, for otherwise the authors would write a sequential program. A problem is where to find truly parallel hardware that can be dedicated to the task, One answer is Graphical Processing Units (GPUs), which can have hundreds of cores and are found in millions of desktop...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Analysis of Relay Stations in WiMAX Networks

    The demand for broadband services is growing IEEE sharply today. The traditional solutions to provide high speed broadband access is to use wired access technologies such as cable modem, Digital Subscriber Line (DSL), Ethernet and fiber optics. It is too difficult and expensive for carriers to build and maintain wired...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey: On Generation of Wireless Telephony Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

    In wireless network can classified in two way one is infrastructure network and another is infrastructure less. Infrastructure less wireless network is known as Ad-hoc network. An ad-hoc network is a Local Area Network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Performance Analysis Between AODV & DSR Routing Protocol

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Simulation and Analysis of Receiver-Receiver Time Synchronization in Wireless Sensor Networks

    Wireless sensor networks were initially deployed for military applications. Gradually researchers found them to be very useful in applications like weather monitoring, target tracking, agriculture, industrial applications, and recently smart homes and kindergartens. All the WSN applications need partial or full time synchronization. Applications like acoustic ranging, target tracking or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Grid Computing for Different Applications

    Grid Computing delivers on the potential in the growth and abundance of network connected systems and bandwidth: computation, collaboration and communication over the Advanced Web. At the heart of Grid Computing is a computing infrastructure that provides dependable, consistent, pervasive and inexpensive access to computational capabilities. The use of grid...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Improved Diffie-Hellman Algorithm for Network Security Enhancement

    Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Quality is dependent on size and some other factors of network but...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Agile Plus - Comprehensive Model for Software Development

    In today's changing environment the main priority of a customer is software that executes 100% requirements of customer. In addition there should be some scope so that existing software must adopt future requirements too, that is, it should be flexible enough that can accommodate future requirements, within budget and timely...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Performance of AODV Against Black Hole Attacks in Mobile Ad-Hoc Networks

    Wireless Mobile Ad hoc NETwork (MANET) is a self-configuring network which is composed of several movable mobile nodes. These mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks is the Black...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Optimizing and Enhancing Parallel Multi Storage Backup Compression for Real-Time Database Systems

    One of the big challenges in the world was the amount of data being stored, especially in Data Warehouses. Data stored in databases keep growing as a result of businesses requirements for more information. A big portion of the cost of keeping large amounts of data is in the cost...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Strategy for Package Transformation for Linux Environment

    A Linux operating system is composed of a large number of software packages. Among packages there exist a variety of complex dependency relations, and their management is the foundation of building and maintaining Linux operating system. And the premise of the management is the dependency relations' extraction. Based on the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Emerging Trends in Quantum Cryptography - A Survey

    Privacy is paramount when communicating sensitive information in today's increasingly networked world. Both the business and government sectors have ever-more demanding secure communication needs. Conventional information assurance methods face increasing technological challenges and future threats, including unanticipated advances in mathematics, high-performance computing, and the possibility of large-scale quantum computation. Quantum...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey on Cloud Computing Architecture

    Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on demand. Users don't need expertise in or control over the technology infrastructure "In the cloud". Typical cloud computing providers deliver common business applications online that are accessed from another Web service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of New Cell Site in Telecom Sector

    This paper revaluates the basic requirements for the installation and implementation of new cell site in telecom sector and will discuss the impact of various physical and environmental conditions on the installation process. In simple terms, a cell site depicts a place where antennas and electronic communications equipment are located,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Efficient Routing Strategy for Prioritized Messages in Mobile WSN Using Geographic Forwarding Protocol

    The current work represents a new routing protocol considering the environment of wireless sensor network with dynamic mobility. The approach addresses the issues for both real time and non-real time data dissemination from the mobile sensors to the sink. The prime target of this approach is to resolve the issues...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy-Efficient Cooperative Protocol for Wireless Networks

    In cooperative networks, transmitting and receiving nodes recruit neighboring nodes to help in communication. The authors model a cooperative transmission link in wireless networks and then it forms a cluster at transmitter end and a receiver end. In this paper, they propose a cooperative communication protocol for formation of these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Measurement of Real Time Information Using GPU

    Parallel programming is about performance, for otherwise the authors would write a sequential program. A problem is where to find truly parallel hardware that can be dedicated to the task, One answer is Graphical Processing Units (GPUs), which can have hundreds of cores and are found in millions of desktop...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Analysis of Relay Stations in WiMAX Networks

    The demand for broadband services is growing IEEE sharply today. The traditional solutions to provide high speed broadband access is to use wired access technologies such as cable modem, Digital Subscriber Line (DSL), Ethernet and fiber optics. It is too difficult and expensive for carriers to build and maintain wired...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey: On Generation of Wireless Telephony Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

    In wireless network can classified in two way one is infrastructure network and another is infrastructure less. Infrastructure less wireless network is known as Ad-hoc network. An ad-hoc network is a Local Area Network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Performance Analysis Between AODV & DSR Routing Protocol

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Study and Detection of TCP SYN Flood Attacks With IP Spoofing and Its Mitigations

    Flooding attacks are major threats on TCP/IP protocol suite these days; Maximum attacks are launched through TCP and exploit the resources and bandwidth of the machine. Flooding attacks are DDOS (Distributed Denial Of Service) attacks and utilize the weakness of the network protocols. SYN flood exploits the 3-way handshaking of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Communication With Less Hardware

    Software Defined Radio is an emerging technology in the field of communication. In this paper, two applications based on SDR are discussed. First, the authors discuss the weather satellite image decoding using a SDR receiver, FUNCube Dongle (FCD). Second, Sudden Ionospheric Disturbances (SID)are studied with Software Defined Radio (SDR) and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Isolation of Malicious Node in Dos Scenario in Manet

    MANETs are extensively used these days for communication and there are various communication networks with different standards and computing techniques and as days are passing by the size of MANET is increasing day by day and its expansion is inevitable due to its high penetration and popularity for the usage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Low Power Analysis of Network-Level On-Chip Communication Using Asynchronous AMBA Protocol

    Network on-Chip (NoC) is a novel structural design template, which can be defied for complicated system level on-chip design. NoC has a potential to limit and present the bus-based communication. In this paper, the crisis to discuss is Low power consumption in an Asynchronous Network on-chip (NoC) level communication. NoC...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    An LMS Based Data Reduction Technique for Energy Conservation in Wireless Sensor Network (WSN)

    In preceding existence, Wireless Sensor Networks (WSNs) have gained an amplified attention from the research community and extended its boundaries in commercial, industrial and medical domains. The tailback in WSN based application development is the inadequate energy source. As sensor nodes are generally battery-powered devices, the critical aspect is to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Detection of Rogue Base Stations in Wimax/IEEE802.16 Using Sensors

    This paper considers the problem of detecting rogue base station in Wimax/802.16 networks. IEEE 802.16 is an emerging standard for broadband wireless communications that is receiving a lot of attention. Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of Concurrent Online MBIST for RFID Memories

    Concurrent online testing is a memory test mechanism where the memory can be tested concurrently with the system operation. Thus, it has instant error detection. Radio Frequency IDentification (RFID) devices relies on the correct operation of their memory for identification of objects and delivery of transponder's information. This paper presents...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Leader Election Algorithm in Wireless Environments Using Fibonacci Heap Structure

    Today is an era of wireless communication systems. The day is not so far when the whole distributed system of the world will goes wireless. Leader in a distributed system plays a vital role in various computing environments like wireless networks etc. The main focus of researchers is on electing...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    An Efficient Transmission of Data for MANETs Using Human Based Recommendation Exchange Protocol

    This paper analyzes a trust model for mobile ad hoc networks. The authors provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers the recommendation of trustworthy neighbors and the experience of the node itself. In order to give trust value beyond the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Cross Layer Design Proposals for Wireless Networks: A Perspective and Detailed Study

    Wireless communication has emerged as one of the most buzzword field from the research point of view over the last few years. Explosive and increased growth of wireless technologies has resulted in increasing demand of better quality of service to the end users. Various cross layer design proposals of wireless...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    FPGA Implementation of a MIPS RISC Processor

    This paper targets the implementation design of a MIPS (Microprocessor without Interlocked Pipeline Stages) RISC (Reduced Instruction Set Computer) Processor using VHDL (Very high speed integrated circuit Hardware Description Language). In this paper MIPS instruction format, instruction data path, decoder modules are analyzed. Furthermore, the authors design Instruction Fetch (IF)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Efficient Cluster Based Multicast Using Fair Key and Resource Scheduler for Social Network Communication in MANET

    A MANET (Mobile Ad-hoc NETwork) is defined as a wireless medium transmitting the message from source to destination without using any infrastructure framework. To achieve a group communication in MANET, multicasting is used. The process of integrating the MANET with multicasting improves the privacy level of users and widens the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Performance Enhancement of Transport Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are deployed with large number of small sensor devices which are highly distributed. The sensor nodes are able to organize flexibly into a multi-hop ad-hoc network. The major task of sensor nodes is to sense physical data and transmit the gathered information to one or more...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Security in Cloud Computing Using File Encryption

    In cloud computing, Security of file or data is provided to the end user in the private cloud environment. The main concern is to provide the security to end user to protect files or data from unauthorized user. Difference is that the research is done in cloud, but security related...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Adaptive STBC Coded MIMO System With Near Full Multiplexing Gain Using CSI

    When compared to Single-Input Single-Output system (SISO), the multiple-input multiple-output system have a better and larger channel capacity. With this, it is succeeded of having a better multiplexing gain. To approach the channel capacity the Adaptive Modulation technique is a better technique which is utilized by channel state information at...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Software Engineering Challenges of Migration Projects

    Organizations often face the challenges of migration from legacy systems to new target systems. Such migration efforts represent a complex engineering problem. This paper describes migration planning, identifies influencing factors, outlines a set of migration planning activities and offers a set of guidelines for the migration planning. Many organizations face...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Transitive Coupling (TC) and Fault Proneness (FP) in Object Oriented Systems: A New Methodology

    Demand for Quality Software has undergone with rapid growth during the last few years. This is leading to an increase in the development of metrics for measuring the properties of software such as Coupling, Cohesion or Inheritance that can be used in early quality assessments. Quality Models that explore the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Scheduler in Cloud Computing Using Open Source Technologies

    Cloud Computing utilities are coming to be omnipresent, and then are beginning to serve as the essential root of computing capacity for both undertakings and private computing requisitions. Any request comes to cloud will be provided by cloud in terms of Virtual Machine. On which basis, Virtual Machine will be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Anonymous and Adoptable Key Management Scheme for Multicast and Broadcast Services

    The popularity of group-oriented applications, secure and efficient communication among all group members has become a major issue. Another major issue is that to provide dynamic rekeying for all the users that join and leave the group. For the rekeying of the group key all members of the group should...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Integrating Data Warehouses With Web Data for OLAP Using Semantic Data Clustering Techniques

    Now-a-days, Information retrieval plays an important role in the web. Many researches presented techniques for information retrieval process from databases. The previous work presented extended tree pattern clustering process for XML massive storages. This paper presents a new technique termed Semantic Data Clustering (SDC) technique for combining the Data warehouse...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Proposed Service Broker Policy for Data Center Selection in Cloud Environment With Implementation

    Cloud Services may be offered as public or private or combined. There is the demand of timely, repeatable, and controllable methodologies for evaluation of algorithms, applications, and policies before actual development of cloud products. Using simulation, the authors can study the behavior of them in cloud environment. Cloud-Analyst, the Cloud-Sim...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    An Improved Ant Colony Optimization Algorithm for Multiple QoS Routing to Find Multiple Feasible Paths for Packet Switched Network

    In recent years, Ant-based algorithms were used to solve classical routing problems such as: traveling salesman problem, vehicle routing problem, quadratic assignment problem, connection-oriented/connectionless routing, sequential ordering, graph coloring and shortest common super-sequence. In this paper, the authors propose an ant colony optimization based, QoS routing algorithm to find multiple...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Multipath Extension of AODV to Improve End to End Delay

    This paper describes improvement in standard routing protocol AODV for mobile ad-hoc networks. The authors' mechanism setups multiple paths based on less hop count. It allows to store multiple paths based on threshold. At time of link failure, it will switch to next available path. To set up multiple path,...

    Provided By International Journal of Computer Technology and Applications