International Journal of Computer Technology and Applications

Displaying 1-40 of 284 results

  • White Papers // Dec 2013

    An Effective Algorithm of Encryption and Decryption of Images Using Random Number Generation Technique and Huffman Coding

    Data security has become most important aspect while transmission of data and storage. The transmission and exchange of image also needs a high security. Cryptography is used to maintain security. In this paper, the authors implemented security for image. They have considered an image, read its pixels and convert it...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Study on Improving Web Security Using SAML Token

    Web service is the most important word which is most commonly used by all computer professionals. Web services are mainly used for communicating different platform within a network connection. Web services are created based on SOA architecture. SOA platform is most popularly used in distributed systems. When using in distributed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    A Novel Hybrid Feature Selection and Intrusion Detection Based on PCNN and Support Vector Machine

    In this paper, the authors proposed a hybrid model for feature selection and intrusion detection. Feature selection is important issue in intrusion detection. The selection of feature in attack attribute and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Improved Network Security Through Retinal Biometric Based Authentication

    Security and authentication are challenging problems due to the sprawling growth of Internet in today's environment. Therefore, the security of the network users has become an essential factor. There are various techniques available in the literature which make use of passwords, smart cards etc., to provide network related security. But...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2013

    Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA

    Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay-as-you-use fashion. As the data is stored in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Performance Analysis of Shortest Path Energy Efficient Routing Protocol in Wireless Sensor Networks Using NSRS Algorithm

    Wireless Sensor Network is an up-and-coming technology that shows great promise for various innovative applications both for public and military. Wireless Sensor Networks (WSNs) are Ad-hoc wireless networks of typically consists of hundreds or even thousands of small low-cost sensor nodes that communicate in a wireless way. A sensor node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Fast and Efficient IP Network Recovery using Multiple Routing Configuration

    Internet plays a vital role in the peoples communications infrastructure, due to slow convergence of routing protocols after network failure become a growing problem. To guarantee fast recovery from link and node failure in networks, the authors propose a new recovery scheme called Multiple Routing Configuration (MRC). Their proposed scheme...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Robust Aggregation in Sensor Network: An Efficient Frequent Itemset and Number of Occurrence Counting

    Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Design and development of Middleware Gateway IP Multimedia System and Web Services

    Rapid growth in Internet (Web) applications and usage of mobile in telecommunication is present trends in communication. In Web 2.0 web services architecture is become versatile tool for enterprise solutions in distributed environment systems. To provide an enterprise solution it is not possible to get professional solution at one place....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Secure Data Transmission in MANET Routing Protocol

    Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as Ad-hoc networks. A Mobile Ad hoc NETwork (MANET) is mobile, multi-hop, infrastructure less wireless network which is capable of autonomous operation. In this paper the authors have discussed some of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Energy-Efficient Reliable Routing in Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSN) can handle different traffic classes of multimedia content (video, audio streams and still images) as well as scalar data over the network. Use of general and efficient routing protocols for WMSN is of crucial significance. Similar to other traditional networks, in WMSN a noticeable proportion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Construction of Power Efficient Fault Tolerant Wireless Network Using Cone Based Algorithm

    Fault tolerant topology control for all to one communication holds significance in dynamic wireless networks with asymmetric wireless links. In this paper the author Investigates the various aspects of the problem mentioned above using the cone based distributed topology control algorithm. The topology of a wireless multi-hop network can be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Priority Based Scheduling Algorithm Using Time and Transmission Length in 802.11 Networks

    The fairness of IEEE 802.11 wireless networks is rigid to forecast and organize since it constructed based on uncertainty and difficulty of the MAC conflicts and dynamics. So, there is a great extent of packet data to be met in a network traffic jam and the packet data was collapsed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey: On Generation of Wireless Telephony Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

    In wireless network can classified in two way one is infrastructure network and another is infrastructure less. Infrastructure less wireless network is known as Ad-hoc network. An ad-hoc network is a Local Area Network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Performance Analysis Between AODV & DSR Routing Protocol

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Study and Detection of TCP SYN Flood Attacks With IP Spoofing and Its Mitigations

    Flooding attacks are major threats on TCP/IP protocol suite these days; Maximum attacks are launched through TCP and exploit the resources and bandwidth of the machine. Flooding attacks are DDOS (Distributed Denial Of Service) attacks and utilize the weakness of the network protocols. SYN flood exploits the 3-way handshaking of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Communication With Less Hardware

    Software Defined Radio is an emerging technology in the field of communication. In this paper, two applications based on SDR are discussed. First, the authors discuss the weather satellite image decoding using a SDR receiver, FUNCube Dongle (FCD). Second, Sudden Ionospheric Disturbances (SID)are studied with Software Defined Radio (SDR) and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Isolation of Malicious Node in Dos Scenario in Manet

    MANETs are extensively used these days for communication and there are various communication networks with different standards and computing techniques and as days are passing by the size of MANET is increasing day by day and its expansion is inevitable due to its high penetration and popularity for the usage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Low Power Analysis of Network-Level On-Chip Communication Using Asynchronous AMBA Protocol

    Network on-Chip (NoC) is a novel structural design template, which can be defied for complicated system level on-chip design. NoC has a potential to limit and present the bus-based communication. In this paper, the crisis to discuss is Low power consumption in an Asynchronous Network on-chip (NoC) level communication. NoC...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    An LMS Based Data Reduction Technique for Energy Conservation in Wireless Sensor Network (WSN)

    In preceding existence, Wireless Sensor Networks (WSNs) have gained an amplified attention from the research community and extended its boundaries in commercial, industrial and medical domains. The tailback in WSN based application development is the inadequate energy source. As sensor nodes are generally battery-powered devices, the critical aspect is to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Detection of Rogue Base Stations in Wimax/IEEE802.16 Using Sensors

    This paper considers the problem of detecting rogue base station in Wimax/802.16 networks. IEEE 802.16 is an emerging standard for broadband wireless communications that is receiving a lot of attention. Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of Concurrent Online MBIST for RFID Memories

    Concurrent online testing is a memory test mechanism where the memory can be tested concurrently with the system operation. Thus, it has instant error detection. Radio Frequency IDentification (RFID) devices relies on the correct operation of their memory for identification of objects and delivery of transponder's information. This paper presents...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Simulation and Analysis of Receiver-Receiver Time Synchronization in Wireless Sensor Networks

    Wireless sensor networks were initially deployed for military applications. Gradually researchers found them to be very useful in applications like weather monitoring, target tracking, agriculture, industrial applications, and recently smart homes and kindergartens. All the WSN applications need partial or full time synchronization. Applications like acoustic ranging, target tracking or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Grid Computing for Different Applications

    Grid Computing delivers on the potential in the growth and abundance of network connected systems and bandwidth: computation, collaboration and communication over the Advanced Web. At the heart of Grid Computing is a computing infrastructure that provides dependable, consistent, pervasive and inexpensive access to computational capabilities. The use of grid...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Improved Diffie-Hellman Algorithm for Network Security Enhancement

    Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Quality is dependent on size and some other factors of network but...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Agile Plus - Comprehensive Model for Software Development

    In today's changing environment the main priority of a customer is software that executes 100% requirements of customer. In addition there should be some scope so that existing software must adopt future requirements too, that is, it should be flexible enough that can accommodate future requirements, within budget and timely...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Performance of AODV Against Black Hole Attacks in Mobile Ad-Hoc Networks

    Wireless Mobile Ad hoc NETwork (MANET) is a self-configuring network which is composed of several movable mobile nodes. These mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks is the Black...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Optimizing and Enhancing Parallel Multi Storage Backup Compression for Real-Time Database Systems

    One of the big challenges in the world was the amount of data being stored, especially in Data Warehouses. Data stored in databases keep growing as a result of businesses requirements for more information. A big portion of the cost of keeping large amounts of data is in the cost...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Strategy for Package Transformation for Linux Environment

    A Linux operating system is composed of a large number of software packages. Among packages there exist a variety of complex dependency relations, and their management is the foundation of building and maintaining Linux operating system. And the premise of the management is the dependency relations' extraction. Based on the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Emerging Trends in Quantum Cryptography - A Survey

    Privacy is paramount when communicating sensitive information in today's increasingly networked world. Both the business and government sectors have ever-more demanding secure communication needs. Conventional information assurance methods face increasing technological challenges and future threats, including unanticipated advances in mathematics, high-performance computing, and the possibility of large-scale quantum computation. Quantum...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey on Cloud Computing Architecture

    Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on demand. Users don't need expertise in or control over the technology infrastructure "In the cloud". Typical cloud computing providers deliver common business applications online that are accessed from another Web service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of New Cell Site in Telecom Sector

    This paper revaluates the basic requirements for the installation and implementation of new cell site in telecom sector and will discuss the impact of various physical and environmental conditions on the installation process. In simple terms, a cell site depicts a place where antennas and electronic communications equipment are located,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Efficient Routing Strategy for Prioritized Messages in Mobile WSN Using Geographic Forwarding Protocol

    The current work represents a new routing protocol considering the environment of wireless sensor network with dynamic mobility. The approach addresses the issues for both real time and non-real time data dissemination from the mobile sensors to the sink. The prime target of this approach is to resolve the issues...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy-Efficient Cooperative Protocol for Wireless Networks

    In cooperative networks, transmitting and receiving nodes recruit neighboring nodes to help in communication. The authors model a cooperative transmission link in wireless networks and then it forms a cluster at transmitter end and a receiver end. In this paper, they propose a cooperative communication protocol for formation of these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Measurement of Real Time Information Using GPU

    Parallel programming is about performance, for otherwise the authors would write a sequential program. A problem is where to find truly parallel hardware that can be dedicated to the task, One answer is Graphical Processing Units (GPUs), which can have hundreds of cores and are found in millions of desktop...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Analysis of Relay Stations in WiMAX Networks

    The demand for broadband services is growing IEEE sharply today. The traditional solutions to provide high speed broadband access is to use wired access technologies such as cable modem, Digital Subscriber Line (DSL), Ethernet and fiber optics. It is too difficult and expensive for carriers to build and maintain wired...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Novel Approach: Security Measures and Concerns of Cloud Computing

    Cloud computing is one of the coming forth as well as the buzzword concept nowadays. Cloud computing serves various advancement in the field of IT industry such as Google, Microsoft, Amazon and distinguish various data and information resources from a given infrastructure in order to enhance the services provided to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Efficient Use of Bidirectional Communication to Increase Communication Capabilities in Distributed VANET

    Intelligent Transportation System (ITS) is the need for today's luxurious life where the traffic is unavoidable part of the people life. Vehicular Ad hoc NETwork (VANET) is a wireless network that is formed on the fly between collections of cars connected by wireless links. In ITS the different cars flying...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    A Novel Approach of AODV for Stability and Energy Efficient Routing for Manet Using IPV6

    In a Mobile Ad hoc NETwork (MANET), the topology of the network may change rapidly and unexpectedly due to mobility of nodes. Thus, setting up routes that meet high reliability is a very challenging issue. Another important problem in the MANETs is the energy consumption of nodes. This paper presents...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    A Review of Various Attacks on Biometrics System and Their Known Solutions

    In the current digital world the people have various authentication systems which identify an individual. For example biometrics authentication system, knowledge based authentication system, token based authentication system. These systems have their own advantages and disadvantages. One system removes the disadvantages of other. A biometrics system is known as one...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Handoff Management Scheme Using PHMIPv6 in Mobile ADHOC Networks

    Fast handoff management in mobile IPv6 environment has been a research subject for a long time. The Key concept behind cooperative diversity based protocol is Partner-based Hierarchical MIPv6 (PHMIPv6) promises an acceleration of the handoff management operation by relaying some signaling over a selected partner node prior to the actual...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    High Throughput AES Encryption Algorithm Implementation on FPGA

    This paper describes an efficient hardware realization of the Advanced Encryption Standard (AES) algorithm using FPGA. The AES also known as the Rijndael algorithm was selected as a Standard on October 2, 2000 by National Institute of Standards and Technology (NIST). Encryption algorithms are used to ensure security of transmission...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    A Novel Processor Architecture for Pairing Based Cryptography Applications

    Cryptographic pairing (bilinear mapping) is a core algorithm for various cryptography protocols. It is computationally expensive and inefficiently computed with general purpose processors. Although there has been previous work looking into efficient hardware designs for pairing, most of these systems use small characteristic curves which are incompatible with practical software...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Network Resilience Through Multiple Routing Configurations

    The authors propose the use of Multi-Topology (MT) routing for network resilience against link and node failures. They describe the multi-topologies by an n-dimensional vector of different link costs for all links in the network. It is the base for the calculation of n shortest path trees from any node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Improving Quantitative Measurements Using Different Segmantation Techniques for Satellite Images

    Image segmentation is the most practical approach among all virtually automated image recognition systems. Feature extraction and recognition have numerous applications on telecommunication, weather forecasting, environment exploration and medical diagnosis. This paper deals with different image segmentation algorithms. The quality of satellite image is affected by atmosphere, temperature, etc. By...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Information Security Using Blend of Steganography and Cryptography

    In this paper, information security is achieved using the combination of both cryptography and steganography techniques. Firstly preprocessing of data is done by using data dictionary module and then encryption and compression of data before sending it to receiver using Gray Level Modification (GLM) technique. Matrix and coding technique has...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Link Adaptation & Recursive Estimation for GPRS Wireless Networks

    In most of the mobile or cellular systems, the height of the mobile antenna may be much lower than the surrounding structures. Thus, the existence of a direct or line of sight path between the transmitter and the receiver is highly unlikely. In such a case, propagation is mainly due...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    DADI: Data Access by Data Intrusion

    The mining is a source for the data base as it requires several elements and techniques for the retrieval operations. Some techniques and their corresponding technologies have an important role in the database which is required in large amounts for data access. The primary method is to retrieve the relevant...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    A Client Level Tool for Concluding Router Packet Forwarding Priority

    Packet Forwarding Prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of network measurements, the performance of applications and the effectiveness of network troubleshooting procedures. Despite its potential impacts, no information on PFP settings is readily...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Telecast Routing With Security Intensification

    Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of network security algorithms and system infrastructures, the authors will propose a dynamic broadcast routing algorithm that could randomize delivery paths for data transmission. The algorithm...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Versions of 802.16

    Worldwide Interoperability for Microwave Access (WIMAX) which is currently employed in some parts of the world is the new era of communication. It is approved by IEEE 802.16 group and is the latest technology which is a standard for point-to-multipoint wireless networking. To deliver "Last mile" broadband connectivity to home...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analysis of Frequent Item Set Mining on Variant Datasets

    Over the last two decades, with advances in storage media technology, storage devices have become larger and more economically viable. As a result, businesses, large corporations, etc., have started storing and archiving various types of data in the form of large databases. The purpose of storing data is two-fold: first,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analysis of Coaxial Feeding and Strip Line Feeding on the Performance of the Square Patch Antenna

    Microstrip patch antennas have different feeding techniques. They can be divided based on power transfer mechanism from feed line to patch. This paper focuses on the design, model and simulation of a microstrip patch antenna by applying two well known and mostly used feeding techniques. Those are coaxial feeding and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    High Performance Ordering Scheme for MIMO Transmission

    The QR-OSIC receiver design for the transmitter-side power allocated MIMO system. Based on the properties of the function and ordering results, the authors develop the efficient ordering algorithms in combination with the PA scheme. From the convexity of the -function, they derive the ordering strategy that makes the channel gains...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    An Analytical Model to Evaluate the Approaches of Mobility Management

    Now-a-day's efficient mobility management for mobile users in wireless networking is a crucial issue. To maintain global mobility in IP networking the Mobile internet protocol has been proposed. To reduce the signaling traffic related to the Mobile Terminals (MTs) registration with the Home Agents (HAs), whenever their Care-of-Addresses (CoAs) change...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    An Appliance Approach: RTST to Reduce Cost & Time

    A new framework has been developed for Regression Test Selection Technique (RTST) to reduce cost & time. Now, the authors find how it works with some and provide relevant result with data. In RTST, to check the validity of modified software, they select test case from existing test set and....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Rotation, Scaling and Translation Analysis of Biometric Signature Templates

    Biometric authentication systems that make use of signature verification methods often render optimum performance only under limited and restricted conditions. Such methods utilize several training samples so as to achieve high accuracy. Moreover, several constraints are imposed on the end-user so that the system may work optimally, and as expected....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Reliable and Efficient Flooding Algorithm for Broadcasting in VANET

    In MANETs, each node is equipped with a wireless transmitter and receiver and is typically free to move around in an arbitrary fashion. The self-configuration ability of MANETs makes them suitable for a wide variety of applications. VANET research concentrates on roads, more so on roads with some reasonable node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Data Tagging and Data Locating in Cloud Based SOA

    Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources. It implies a service oriented architecture, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on-demand services and many other things. When the Software as a Service Provider or Infrastructure as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Framework to Measure and Maintain the Quality of Software Using the Concept of Code Readability

    Present day's software industry is using software metrics to estimate the complexity of software systems to find software cost estimation, software development control, software testing, software assurance and software maintenance. The relationship between a simple set of local code features and human concept of readability can be derived by collecting...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Performance Comparison of Single and Multipath Routing Protocols in Adhoc Networks

    In a Mobile Ad hoc NETwork (MANET), Mobile nodes communicate with each other using multi-hop wireless links. There is no stationery infrastructure, for instance there is no base station. Each node in the network also acts as a router, forwarding data packets for other nodes an ad hoc network can...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analyzing Performance of Proactive and Reactive Routing Protocols for Manets

    Mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration number of routing protocols like Proactive and Reactive protocols have been implemented. Various research communities are working in field of MANET and trying...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Service Composition in SOA and QoS Related Issues

    Service Oriented Architecture (SOA) is a modern approach to build distributed application and greatly reduce the time, effort and cost to develop the software projects. SOA provides the dynamic paradigm for composing distributed application even in heterogeneous environments. The dynamic composition feature in SOA makes evaluation of a QoS a...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Secure Digital Signature Scheme for Image Authentication Over Wireless Channels

    The introduction of 3G wireless communication systems, together with the invasive distribution of digital images and the growing concern on their originality triggers an emergent need of authenticating images received by unreliable channels, such as public Internet and wireless networks. To meet this need, a content-based image authentication scheme that...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Privacy Enhancing and Breach Reduction

    Hiding the information without getting it revealed to others while publishing in a network is a major task now a days. For example an individual who wants to share his personal information like hospitalized or banking data to a researcher for his future enhancement or for his benefit, how much...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Hardware Enhancement Association Rule With Privacy Preservation

    In recent days Data mining techniques have been widely used in various applications. One of the most important applications in data mining is association rule mining. For hardware implementation of Apriori-based association rule mining the authors have to load candidate item sets and a database into the hardware. As the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Review: Competitive Learning Algorithm of Neural Network

    This paper deals mainly with the development of new learning algorithms and the study of the dynamics of neural networks. This paper will cover issues about the unsupervised competitive learning as well as some of its variances like hard competitive learning and soft competitive learning. After introducing of unsupervised learning...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Job Scheduling in Cloud Computing Based on Horizontal Load Balancing

    Cloud computing is a latest new computing paradigm where applications, data and IT services are provided across dynamic and geographically dispersed organization. How to improve the global throughput and utilize Cloud computing resources proficiently and gain the maximum profits with job scheduling system is one of the Cloud computing service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    One Time Password Security Through Cryptography for Mobile Banking

    Electronic banking-which provides the economic services through internet-changed the business trade of banks drastically, also decreasing the cost and improving the ease for the user. Highly usage of phones in which internet is enabled makes the change of banking operations to mobile phones from desktop computers - a reasonable growth...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Performance Evaluation & Application of Smart Antenna in Sensor Networks

    This paper provides a method for forming a communications link of Wireless Sensor Networks (WSN) by enabling each WSN to act as a smart antenna. Each WSN is simulated as a set of randomly placed sensor nodes within a planar area. The proposed method involves a searching WSN, a receiving...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Threshold Based Secret Sharing Scheme Using Polynomial Function

    In this paper, the authors will study the question of performing arbitrary updates in secret sharing schemes when shares of unaffected parties shall remain unchanged. They will introduce a zonal transformation matrix in the lifetime of secret sharing schemes to simplify constructions of multi-time secret sharing schemes and propose management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Enhanced EFCI Congestion Control Scheme for ATM Networks

    Traffic management and congestion control are key issues in ATM networks. Congestion control schemes promises effective traffic management and it uses feedback information from the network to specify the maximum rate at which each source can transmit cells in to the network. In this paper, the authors considered an Explicit...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Improvement in Software Development Process and Software Product Through Knowledge Management

    Software engineering is a complex business in which processes, used to build product, have to go through many phases with involvement of many people. All these phases required different knowledge expertise to work together and apply innovative ideas to return successful outcome without missing the quality and reliability factors from...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Three Party Quantum Authenticated Key Distribution Protocol Using Superposition States

    This paper presents a Quantum authenticated key distribution protocol that can perform key distribution and also ensure that the participants of the communication are authentic, both implicitly and explicitly. This protocol provides new directions in Classical cryptography and Quantum cryptography. The Participants of the protocol trust the third party regarding...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Micro Strip Patch Antenna and Its Applications: A Survey

    The study of microstrip patch antennas has made great progress in recent years. Compared with conventional antennas, microstrip patch antennas have more advantages and better prospects. They are lighter in weight, low volume, low cost, low profile, smaller in dimension and ease of fabrication and conformity. Moreover, the microstrip patch...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    An Overview of on Demand Wireless Adhoc Networks Protocols: DSR and TORA

    Wireless network are becoming popular now a days due their features like easy setup without the need of cabling. Wireless ad-hoc networks are a collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network. Each node in the network has a wireless Interface and communicates with each other...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Wide-Area Traffic: IP Multicast Receiver Handover for Mobile IP Networks

    Network arrivals are often modeled as Poisson processes for analytic simplicity, even though a number of traffic studies have shown that packet inter-arrivals are not exponentially distributed. The authors evaluate 24 wide-area traces, investigating a number of wide-area TCP arrival processes (session and connection arrivals, FTP data connection arrivals within...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Quantitative Analysis of DSR Routing Algorithm for Carrying Packet Telephony

    It has been difficult for researchers to realize Packet Telephony over Mobile Ad-hoc Networks due to the peculiar characteristics of these networks including dynamic nature of nodes. The nodes keep on changing their location and hence re-routing is frequently required. So a robust routing algorithm is prerequisite for successful implementation...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2010

    Securing Routing Protocols Against Active Attacks in Mobile Ad Hoc Networks

    According to the inherent nature of mobile Ad Hoc networks, the mobility of members, traditional public key infrastructure based on the certificates, is not suitable for these networks. ID-based cryptography is known as an appropriate solution for securing these networks. Various routing protocols for these networks are proposed. In some...

    Provided By International Journal of Computer Technology and Applications