International Journal of Computer Technology and Applications

Displaying 1-40 of 306 results

  • White Papers // Apr 2015

    Microcontroller Based Design of Power Meter

    In this paper, the authors present a design of an affordable and convenient means for consumers to accurately measure the power consumption of the electrical devices. If a consumer is able to measure the AC power drawn from a particular household circuit, then they would be able to calculate the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2015

    Recommender System for E-Shopping Using Users' Tipping Point

    E-commerce is one of the rapidly growing fields now-a-days. With today's trend, attraction of users towards online shopping is increased. In the field of online shopping, previously it was considered that users make the purchase decisions depending on their own choice. But the extensive studies have proved that the decision...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2014

    Crucial Concepts and Applications of Data Mining - - An Overview

    Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information that can be used to increase revenue, cuts costs or both. Data mining software is one of a number of analytical tools for analyzing data. It...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2014

    Scheduling Tasks in Embedded Systems Based on NoC Architecture

    In this paper, the author presents a new method to generate and schedule task in the architecture of embedded systems based on the simulated annealing. This novel method takes into account the attribute of divisibility of tasks. A proposal of represent the process in the form of trees. Despite the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2014

    Lock-Less Shared Memory Read/Write Using Message Passing

    Current thread synchronization methods Mutex, Semaphore, Monitorsare based on locks and software transactional memory is based on the database transactions. Locks have disadvantages including contention and dead lock. Software transactional memories can result in a lot of rolling back of transactions, if number of transactions and threads increases. This leads...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2014

    Design of 32-Bit ALU Using Low Power Energy Efficient Full Adder Circuits

    With the advancement of technology, Integrated Chip (IC) has achieved smaller chip size with more functions integrated. Through the usage of more transistors, it has lead to an increase of power dissipation and undesired noise. As the design gets more complex, this results in slower speed. Hence, the demand for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2014

    Privacy Preservation of Frequent Dataset to be Distributed

    Distributed data mining provides computational strength as it can share effectively the large amount of data among its various computational resources connected in a network. In order to design the accurate data models, this huge amount of precise information must be distributed among various computational clients to perform data mining...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Study on Improving Web Security Using SAML Token

    Web service is the most important word which is most commonly used by all computer professionals. Web services are mainly used for communicating different platform within a network connection. Web services are created based on SOA architecture. SOA platform is most popularly used in distributed systems. When using in distributed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    A Novel Hybrid Feature Selection and Intrusion Detection Based on PCNN and Support Vector Machine

    In this paper, the authors proposed a hybrid model for feature selection and intrusion detection. Feature selection is important issue in intrusion detection. The selection of feature in attack attribute and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Improved Network Security Through Retinal Biometric Based Authentication

    Security and authentication are challenging problems due to the sprawling growth of Internet in today's environment. Therefore, the security of the network users has become an essential factor. There are various techniques available in the literature which make use of passwords, smart cards etc., to provide network related security. But...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    An Effective Algorithm of Encryption and Decryption of Images Using Random Number Generation Technique and Huffman Coding

    Data security has become most important aspect while transmission of data and storage. The transmission and exchange of image also needs a high security. Cryptography is used to maintain security. In this paper, the authors implemented security for image. They have considered an image, read its pixels and convert it...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2013

    Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA

    Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay-as-you-use fashion. As the data is stored in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    Modern Research Trends in Association Data Mining Techniques

    Extracting needful information from the large pool of information is a primary task before predicting. Especially from a huge amount of incomplete, noisy, redundant and randomly scattered data. Data mining provides a framework that automatically discovers required patterns from dataset which will be using these predict future occurrence in analogous...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    Impact of Service Oriented Architecture on ERP Implementations in Technical Education

    These days, technical education is spreading all over the world (rural as well as urban areas) very rapidly and gradually application of ERP system in technical institutes is becoming common. But, with very fast changing technology there is a continued need to enhance the efficiency of operations in ERP system...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2013

    A Questionnaire of Student Satisfaction from College Using Data Mining

    Today, a questionnaire of student satisfaction is adopted by universities and very high level colleges but many medium level colleges are unable to decide upon proper implementation of student satisfaction. Although, data mining has been successful implemented in the business world for some time now, its use in higher education...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Performance Analysis of Shortest Path Energy Efficient Routing Protocol in Wireless Sensor Networks Using NSRS Algorithm

    Wireless Sensor Network is an up-and-coming technology that shows great promise for various innovative applications both for public and military. Wireless Sensor Networks (WSNs) are Ad-hoc wireless networks of typically consists of hundreds or even thousands of small low-cost sensor nodes that communicate in a wireless way. A sensor node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Fast and Efficient IP Network Recovery using Multiple Routing Configuration

    Internet plays a vital role in the peoples communications infrastructure, due to slow convergence of routing protocols after network failure become a growing problem. To guarantee fast recovery from link and node failure in networks, the authors propose a new recovery scheme called Multiple Routing Configuration (MRC). Their proposed scheme...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Robust Aggregation in Sensor Network: An Efficient Frequent Itemset and Number of Occurrence Counting

    Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Design and development of Middleware Gateway IP Multimedia System and Web Services

    Rapid growth in Internet (Web) applications and usage of mobile in telecommunication is present trends in communication. In Web 2.0 web services architecture is become versatile tool for enterprise solutions in distributed environment systems. To provide an enterprise solution it is not possible to get professional solution at one place....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Secure Data Transmission in MANET Routing Protocol

    Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as Ad-hoc networks. A Mobile Ad hoc NETwork (MANET) is mobile, multi-hop, infrastructure less wireless network which is capable of autonomous operation. In this paper the authors have discussed some of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Energy-Efficient Reliable Routing in Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSN) can handle different traffic classes of multimedia content (video, audio streams and still images) as well as scalar data over the network. Use of general and efficient routing protocols for WMSN is of crucial significance. Similar to other traditional networks, in WMSN a noticeable proportion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Construction of Power Efficient Fault Tolerant Wireless Network Using Cone Based Algorithm

    Fault tolerant topology control for all to one communication holds significance in dynamic wireless networks with asymmetric wireless links. In this paper the author Investigates the various aspects of the problem mentioned above using the cone based distributed topology control algorithm. The topology of a wireless multi-hop network can be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Priority Based Scheduling Algorithm Using Time and Transmission Length in 802.11 Networks

    The fairness of IEEE 802.11 wireless networks is rigid to forecast and organize since it constructed based on uncertainty and difficulty of the MAC conflicts and dynamics. So, there is a great extent of packet data to be met in a network traffic jam and the packet data was collapsed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Simulation and Analysis of Receiver-Receiver Time Synchronization in Wireless Sensor Networks

    Wireless sensor networks were initially deployed for military applications. Gradually researchers found them to be very useful in applications like weather monitoring, target tracking, agriculture, industrial applications, and recently smart homes and kindergartens. All the WSN applications need partial or full time synchronization. Applications like acoustic ranging, target tracking or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Grid Computing for Different Applications

    Grid Computing delivers on the potential in the growth and abundance of network connected systems and bandwidth: computation, collaboration and communication over the Advanced Web. At the heart of Grid Computing is a computing infrastructure that provides dependable, consistent, pervasive and inexpensive access to computational capabilities. The use of grid...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Improved Diffie-Hellman Algorithm for Network Security Enhancement

    Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Quality is dependent on size and some other factors of network but...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Agile Plus - Comprehensive Model for Software Development

    In today's changing environment the main priority of a customer is software that executes 100% requirements of customer. In addition there should be some scope so that existing software must adopt future requirements too, that is, it should be flexible enough that can accommodate future requirements, within budget and timely...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Performance of AODV Against Black Hole Attacks in Mobile Ad-Hoc Networks

    Wireless Mobile Ad hoc NETwork (MANET) is a self-configuring network which is composed of several movable mobile nodes. These mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks is the Black...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Optimizing and Enhancing Parallel Multi Storage Backup Compression for Real-Time Database Systems

    One of the big challenges in the world was the amount of data being stored, especially in Data Warehouses. Data stored in databases keep growing as a result of businesses requirements for more information. A big portion of the cost of keeping large amounts of data is in the cost...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Strategy for Package Transformation for Linux Environment

    A Linux operating system is composed of a large number of software packages. Among packages there exist a variety of complex dependency relations, and their management is the foundation of building and maintaining Linux operating system. And the premise of the management is the dependency relations' extraction. Based on the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Emerging Trends in Quantum Cryptography - A Survey

    Privacy is paramount when communicating sensitive information in today's increasingly networked world. Both the business and government sectors have ever-more demanding secure communication needs. Conventional information assurance methods face increasing technological challenges and future threats, including unanticipated advances in mathematics, high-performance computing, and the possibility of large-scale quantum computation. Quantum...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey on Cloud Computing Architecture

    Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on demand. Users don't need expertise in or control over the technology infrastructure "In the cloud". Typical cloud computing providers deliver common business applications online that are accessed from another Web service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of New Cell Site in Telecom Sector

    This paper revaluates the basic requirements for the installation and implementation of new cell site in telecom sector and will discuss the impact of various physical and environmental conditions on the installation process. In simple terms, a cell site depicts a place where antennas and electronic communications equipment are located,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Efficient Routing Strategy for Prioritized Messages in Mobile WSN Using Geographic Forwarding Protocol

    The current work represents a new routing protocol considering the environment of wireless sensor network with dynamic mobility. The approach addresses the issues for both real time and non-real time data dissemination from the mobile sensors to the sink. The prime target of this approach is to resolve the issues...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy-Efficient Cooperative Protocol for Wireless Networks

    In cooperative networks, transmitting and receiving nodes recruit neighboring nodes to help in communication. The authors model a cooperative transmission link in wireless networks and then it forms a cluster at transmitter end and a receiver end. In this paper, they propose a cooperative communication protocol for formation of these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Measurement of Real Time Information Using GPU

    Parallel programming is about performance, for otherwise the authors would write a sequential program. A problem is where to find truly parallel hardware that can be dedicated to the task, One answer is Graphical Processing Units (GPUs), which can have hundreds of cores and are found in millions of desktop...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Analysis of Relay Stations in WiMAX Networks

    The demand for broadband services is growing IEEE sharply today. The traditional solutions to provide high speed broadband access is to use wired access technologies such as cable modem, Digital Subscriber Line (DSL), Ethernet and fiber optics. It is too difficult and expensive for carriers to build and maintain wired...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey: On Generation of Wireless Telephony Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

    In wireless network can classified in two way one is infrastructure network and another is infrastructure less. Infrastructure less wireless network is known as Ad-hoc network. An ad-hoc network is a Local Area Network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Performance Analysis Between AODV & DSR Routing Protocol

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Sequential Pattern Mining with Various Constraints: An Enhanced Approach

    Sequential pattern mining is to find sequential purchasing behaviors for most customers from a large amount of customer transactions. Historical transaction data can be analyzed to discover customer purchasing habits. However, the size of the transaction database can be very large. It is very time consuming to find all the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Probablistic Clustering based on Web Documents

    Web search engine are often forced to pass through long ordered list of documents called snippets. Snippets are web document attributes. These snippets are returned by search engines. The basis of document clustering is an alternative method of organizing retrieval results. Clustering yet needed to be deployed for the search...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Minimizing Response Time and Effective Utilization of I/O-Bound Processes Using \"Approximate Zero Response Algorithm\"

    Various scheduling algorithm are available for the operating system to improve CPU utilization. Different scheduling algorithms have different properties that work on different scheduling criteria's and the choice of a particular algorithm may favor one class of processes over another. SJF gives minimum average waiting time for a given set...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Implementing KQML Performatives for Outsourcing Management System

    An agent is a computer system, situated in some environment that is capable of flexible autonomous action in order to meet its design objectives this is the commonly accepted definition for agents. Agents are autonomous, social, proactive, reactive, and communicate to achieve common goal. The Knowledge Query Manipulation Language (KQML)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Runtime CPU Scheduler Customization Framework for Real Time Operating System

    Most of the embedded systems have real-time requirements about the use of Real-Time Operating Systems able of satisfying the embedded system requirements. So, in embedded application where the real-time operating systems are noted are been called as the Real Time Embedded Operating Systems (REOS). Main features of that of real-time...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance of MIMO With Cyclic Coded OSTBC Using OFDM

    Wireless designers constantly seek to improve the spectrum efficiency/capacity, coverage of wireless networks, and link reliability. Space-time wireless technology that uses multiple antennas along with appropriate signalling and receiver techniques offers a powerful tool for improving wireless performance Space-time block codes were designed to achieve the maximum diversity order for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Efficient and Fair Exchange of Digital Signatures Based on RSA Algorithm

    A fair contract-signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a fair way, so that either each of them obtains the other's signature, or neither party does. Based on the RSA signature scheme, a new digital...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Analysis of Mesh and Position Based Hybrid Routing In MANETS: A Comprehensive Study

    Mobile Ad hoc NETworks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore, the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    RCP Supporting Emergency Applications of WSN

    Wireless Sensor Networks (WSN) can be used to monitor the people environment, objects in that environment and interactions of objects with each other. Use of WSN for emergency applications includes fire detection system in forest, soil motion detection, monitoring historical and public places, volcano monitoring etc. In WSN errors or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Optimization Technique for Multi-Join Operation in Active Data Warehouse

    In current scenario of fast changing data content in most dynamic heterogeneous application, data format transformation and data updates needs to be handled in traditional data ware housing. Many researches have been made under active data warehousing which keep the latest updates of more dynamic large multi-format data warehouses. Previous...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2012

    A Framework for Implementing e-Attendance System Using Near Field Communication in Android Os

    Education system in India has been changing widely in last 10 years due to the development of the technology. Smart class, E-learning, Video conferencing are some of them. The core idea of this paper is to implement some of the emerging technologies like mobile computing and near field communications and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    An Analysis of Distributed Computer Network Administration

    Computer Networking is necessary to human beings. People needed to share ideas, research knowledge, and the way of life to their friends. In the modern time, the role of computer networks became dreamy. Analyzing, accessing, sharing and storing of data and information are very easy with help of distributing computer...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Evaluation of Improved Algorithm for Wireless Sensor Networks

    Wireless sensor networks have recently come into prominence because they hold the potential to revolutionize many segments of the economy and life, from environmental monitoring and conservation, to manufacturing and business asset management, to automation in the transportation and health-care industries. Information collected by and transmitted on a sensor network...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Novel Approach for Securing Mobile Ad Hoc Network With an Enhanced Trust Calculation Method

    A Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range. Due to wide-ranging characteristics of the Ad Hoc Networks like decentralization, dynamic topology and neighbor based routing, it is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Trust, Privacy and Security Infrastructure for the Inter-Cloud

    Cloud Computing is one of the most important security challenges to manage and assure a secure usage over multi-provider Inter-Cloud environments with dedicated communication infrastructures, security mechanisms, processes and policies. Based on the collection of various Inter-Cloud usecases and scenarios within the private and public sector like DMTF (Distributed Management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Open Source in Cloud Computing

    Cloud computing is emerging as the latest BUZZ word in Information Technology. There is going to be a great shift from traditional network computing to cloud computing. The features of Cloud computing - Pay as you go and Virtualization has made it a long run in advance technologies. This paper...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Type of Security Threats and It's Prevention

    Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Cloud Computing Security With Nymble Technology

    Misbehave blacklisting schemes allow online service provide in cloud computer to prevent Misbehave access by abusive users while preserving the privacy of all Misbehave users (both abusive and non-abusive). The scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    3-D Graphical Password Used For Authentication

    In today's world, security is important aspect in day to day life. So, everyone used various ways for security purpose. People use passwords for their security. Generally, everyone uses textual password. Textual password is combination of alphabets and numbers. People keep textual password as name of their favorite things, actors...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Interpretation of Formal Proof for Cryptographic Protocols into Computational Model

    Cryptography is the spinal cord for all security measures involved in computing field so a lot of emphasis is required to be given to make it strong enough to deal all the transition of the security industry. The authors present a general method to prove security properties of multiple cryptographic...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Automatically Communication Path Creation and Reconfiguration in Dynamic Network Environment for Optimizing Performance to Network Applications

    Accessing network services across a wide area network still remains a challenging task and the difficulty mainly comes from the heterogeneous and constantly changing network environment, which usually causes undesirable user experience for network-oblivious applications. A promising approach to address this is to provide network awareness in communication paths. Many...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Consideration With Dynamic Routing Security

    One of the major issues for data communication over wired and wireless networks is the security. the past work is on the designs of cryptography algorithms and system infrastructures. Dynamic routing algorithm called improved dynamic routing with security consideration, which is based on the concept of Zone Routing Protocol (ZRP)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Simulation Based: Study and Analysis of Routing Protocol in Vehicular Ad-Hoc Network Environment

    A Vehicular Ad hoc NETwork (VANET) consists of vehicles which communicate with each other and exchange data via wireless communication links available between the vehicles which are in communication ranges of vehicles to improve the road safety in city. The communication between vehicles is used to provide road safety, comfort...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Quantitative Study and Comparison of Secure OLSR Routing Protocol

    This paper presents the comparison of the secure OLSR (Optimized Link State Routing Protocol) in mobile ad-hoc network with other approach. The authors compare the security from the different approach and their effect on the existing OLSR. The main aim of this paper is to study the various securities and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A New Routing Algorithm in MANETS: Location Aided Hybrid Routing

    In this paper, the authors propose a new hybrid routing protocol for MANET called Location Aided Hybrid Routing Protocol for MANET (LAHRP). The proposed routing algorithm not only aims to optimize bandwidth usage of MANETs by reducing the routing overload but also extend battery life of the mobile devices by...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Sep 2011

    Review of Solutions for Securing the Vehicular Networks

    The successful introduction of vehicular communication has to posses the design of robust security architecture that should be able to cope with security threats. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Vehicular networks are likely to become the most relevant form of mobile ad hoc...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Sep 2011

    Trustworthy Computing Under Identity-Based Encryption

    The authors propose a fully functional Identity-Based Encryption scheme (IBE). The scheme has chosen cipher text security in the random oracle model assuming a variant of the computational Diffie-Hellman problem. Their system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2010

    Error Free e-Messaging Technique Using Symmetric Key Encryption-EHDES

    Steganography has a relatively short history; even today ordinary dictionaries do not contain the word "Steganography". Books on steganography are still very few. The most important feature of this steganography is that it has a very large data hiding capacity. Steganography can be applied to variety of information systems. Some...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Simulation Study Between the Random Based Synthetic Entity Mobility Models in Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a network formed without any central administration which consists of mobile nodes that use a wireless interface to send packet data. MANETs are extremely flexible and each node is free to move independently, in any random direction. Each node in MANET maintains continuously the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Network Intrusion Forensic Analysis Using Intrusion Detection System

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Novel Approach for Cheating Prevention Through Visual Cryptographic Analysis

    Confidentiality is probably the most common aspect of information security and the authors need to protect their valuable information and it has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of integer mathematical techniques related aspects of Information Security such as confidentiality,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Identity Based Color Image Cryptography

    An Identity based cryptography based on visual cryptography scheme was proposed for protecting color image. A color image to be protected and authentic entities such as account number, password, signature image are given as input. The binary key image is obtained by distributing the digital signature of obtained authentic entities....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    A Compressed Anti IP Spoofing Mechanism Using Cryptography

    Internet becomes a backbone of every sector, which gives essential information of each domain like education, concerns, entertainment etc. Data stealing and data theft is the well known thing in networks. IP spoofing is one of the techniques of data stealing in the form of malicious IP address. Spoofed packet...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    A Security Approach in System Development Life Cycle

    Many software organizations today are confronted with challenge of building secure software systems. Traditional software engineering principles place little emphasis on security. These principles tend to tread security as one of a long list of quality factors that are expected from all professionally developed software. As software systems of today...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Web Data Mining Using an Intelligent Information System Design

    To use the large amounts of information efficiently on the Web to make the information processing intelligent, personalized and automatic is the most important applications of the current data mining technology. Model Driven Architecture (MDA) which is used for code generation has many benefits over traditional software development methods. An...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    A Checklist Based Framework for Software Security Risk Management

    As security of software systems is becoming more and more important in the current era of e-commerce and e-governance, traditional approaches for software development should be supplanted with a formal approach to security in the software life cycle. Both a software security checklist and assessment tools should be incorporated into...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Proficient Cluster-Based Routing Protocol Using EBSA and Leach Approaches

    In this paper, the authors deal with Delay-Tolerant Networking (DTN) where they seek to address the technical issues in heterogeneous networks along with the homogeneous networks that may lack continuous network connectivity. The main objective is to distributively group mobile nodes into a cluster, which can then interchangeably share their...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Hybridization of Advance Technologies in the Field of WLAN

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometers for radio communications). Wireless wide area cellular network solutions have...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Low Read Equivalent Stress Fault Detection in CMOS SRAMs Using MARCH Algorithm

    This paper outlines the reduction of Read Equivalent Stress (RES) during test of SRAM memories and demonstrates that the modified pre-charge activity reduces RES because of the predictable addressing sequence. The authors exploit this observation in order to show minimization of power dissipation during test by eliminating the unnecessary power...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    An Efficient Approach to Access Database in J2ME Applications

    Application development for mobile devices has been very challenging. Distributed applications for mobile devices should have uninterrupted data access. Though most of the mobile phones have CLDC configuration, Java provides no standard JDBC driver and API for mobile devices with CLDC configuration. Relational database in J2ME can be used with...

    Provided By International Journal of Computer Technology and Applications