International Journal of Computer Technology and Applications

Displaying 1-40 of 288 results

  • White Papers // Dec 2013

    An Effective Algorithm of Encryption and Decryption of Images Using Random Number Generation Technique and Huffman Coding

    Data security has become most important aspect while transmission of data and storage. The transmission and exchange of image also needs a high security. Cryptography is used to maintain security. In this paper, the authors implemented security for image. They have considered an image, read its pixels and convert it...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Improved Network Security Through Retinal Biometric Based Authentication

    Security and authentication are challenging problems due to the sprawling growth of Internet in today's environment. Therefore, the security of the network users has become an essential factor. There are various techniques available in the literature which make use of passwords, smart cards etc., to provide network related security. But...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Study on Improving Web Security Using SAML Token

    Web service is the most important word which is most commonly used by all computer professionals. Web services are mainly used for communicating different platform within a network connection. Web services are created based on SOA architecture. SOA platform is most popularly used in distributed systems. When using in distributed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    A Novel Hybrid Feature Selection and Intrusion Detection Based on PCNN and Support Vector Machine

    In this paper, the authors proposed a hybrid model for feature selection and intrusion detection. Feature selection is important issue in intrusion detection. The selection of feature in attack attribute and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2013

    Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA

    Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay-as-you-use fashion. As the data is stored in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Performance Analysis of Shortest Path Energy Efficient Routing Protocol in Wireless Sensor Networks Using NSRS Algorithm

    Wireless Sensor Network is an up-and-coming technology that shows great promise for various innovative applications both for public and military. Wireless Sensor Networks (WSNs) are Ad-hoc wireless networks of typically consists of hundreds or even thousands of small low-cost sensor nodes that communicate in a wireless way. A sensor node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Fast and Efficient IP Network Recovery using Multiple Routing Configuration

    Internet plays a vital role in the peoples communications infrastructure, due to slow convergence of routing protocols after network failure become a growing problem. To guarantee fast recovery from link and node failure in networks, the authors propose a new recovery scheme called Multiple Routing Configuration (MRC). Their proposed scheme...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Robust Aggregation in Sensor Network: An Efficient Frequent Itemset and Number of Occurrence Counting

    Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Design and development of Middleware Gateway IP Multimedia System and Web Services

    Rapid growth in Internet (Web) applications and usage of mobile in telecommunication is present trends in communication. In Web 2.0 web services architecture is become versatile tool for enterprise solutions in distributed environment systems. To provide an enterprise solution it is not possible to get professional solution at one place....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Secure Data Transmission in MANET Routing Protocol

    Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as Ad-hoc networks. A Mobile Ad hoc NETwork (MANET) is mobile, multi-hop, infrastructure less wireless network which is capable of autonomous operation. In this paper the authors have discussed some of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Energy-Efficient Reliable Routing in Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSN) can handle different traffic classes of multimedia content (video, audio streams and still images) as well as scalar data over the network. Use of general and efficient routing protocols for WMSN is of crucial significance. Similar to other traditional networks, in WMSN a noticeable proportion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Construction of Power Efficient Fault Tolerant Wireless Network Using Cone Based Algorithm

    Fault tolerant topology control for all to one communication holds significance in dynamic wireless networks with asymmetric wireless links. In this paper the author Investigates the various aspects of the problem mentioned above using the cone based distributed topology control algorithm. The topology of a wireless multi-hop network can be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Priority Based Scheduling Algorithm Using Time and Transmission Length in 802.11 Networks

    The fairness of IEEE 802.11 wireless networks is rigid to forecast and organize since it constructed based on uncertainty and difficulty of the MAC conflicts and dynamics. So, there is a great extent of packet data to be met in a network traffic jam and the packet data was collapsed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Simulation and Analysis of Receiver-Receiver Time Synchronization in Wireless Sensor Networks

    Wireless sensor networks were initially deployed for military applications. Gradually researchers found them to be very useful in applications like weather monitoring, target tracking, agriculture, industrial applications, and recently smart homes and kindergartens. All the WSN applications need partial or full time synchronization. Applications like acoustic ranging, target tracking or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Grid Computing for Different Applications

    Grid Computing delivers on the potential in the growth and abundance of network connected systems and bandwidth: computation, collaboration and communication over the Advanced Web. At the heart of Grid Computing is a computing infrastructure that provides dependable, consistent, pervasive and inexpensive access to computational capabilities. The use of grid...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Improved Diffie-Hellman Algorithm for Network Security Enhancement

    Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Quality is dependent on size and some other factors of network but...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Agile Plus - Comprehensive Model for Software Development

    In today's changing environment the main priority of a customer is software that executes 100% requirements of customer. In addition there should be some scope so that existing software must adopt future requirements too, that is, it should be flexible enough that can accommodate future requirements, within budget and timely...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Performance of AODV Against Black Hole Attacks in Mobile Ad-Hoc Networks

    Wireless Mobile Ad hoc NETwork (MANET) is a self-configuring network which is composed of several movable mobile nodes. These mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks is the Black...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Optimizing and Enhancing Parallel Multi Storage Backup Compression for Real-Time Database Systems

    One of the big challenges in the world was the amount of data being stored, especially in Data Warehouses. Data stored in databases keep growing as a result of businesses requirements for more information. A big portion of the cost of keeping large amounts of data is in the cost...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Strategy for Package Transformation for Linux Environment

    A Linux operating system is composed of a large number of software packages. Among packages there exist a variety of complex dependency relations, and their management is the foundation of building and maintaining Linux operating system. And the premise of the management is the dependency relations' extraction. Based on the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Emerging Trends in Quantum Cryptography - A Survey

    Privacy is paramount when communicating sensitive information in today's increasingly networked world. Both the business and government sectors have ever-more demanding secure communication needs. Conventional information assurance methods face increasing technological challenges and future threats, including unanticipated advances in mathematics, high-performance computing, and the possibility of large-scale quantum computation. Quantum...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey on Cloud Computing Architecture

    Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on demand. Users don't need expertise in or control over the technology infrastructure "In the cloud". Typical cloud computing providers deliver common business applications online that are accessed from another Web service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of New Cell Site in Telecom Sector

    This paper revaluates the basic requirements for the installation and implementation of new cell site in telecom sector and will discuss the impact of various physical and environmental conditions on the installation process. In simple terms, a cell site depicts a place where antennas and electronic communications equipment are located,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Efficient Routing Strategy for Prioritized Messages in Mobile WSN Using Geographic Forwarding Protocol

    The current work represents a new routing protocol considering the environment of wireless sensor network with dynamic mobility. The approach addresses the issues for both real time and non-real time data dissemination from the mobile sensors to the sink. The prime target of this approach is to resolve the issues...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy-Efficient Cooperative Protocol for Wireless Networks

    In cooperative networks, transmitting and receiving nodes recruit neighboring nodes to help in communication. The authors model a cooperative transmission link in wireless networks and then it forms a cluster at transmitter end and a receiver end. In this paper, they propose a cooperative communication protocol for formation of these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Measurement of Real Time Information Using GPU

    Parallel programming is about performance, for otherwise the authors would write a sequential program. A problem is where to find truly parallel hardware that can be dedicated to the task, One answer is Graphical Processing Units (GPUs), which can have hundreds of cores and are found in millions of desktop...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Analysis of Relay Stations in WiMAX Networks

    The demand for broadband services is growing IEEE sharply today. The traditional solutions to provide high speed broadband access is to use wired access technologies such as cable modem, Digital Subscriber Line (DSL), Ethernet and fiber optics. It is too difficult and expensive for carriers to build and maintain wired...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey: On Generation of Wireless Telephony Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

    In wireless network can classified in two way one is infrastructure network and another is infrastructure less. Infrastructure less wireless network is known as Ad-hoc network. An ad-hoc network is a Local Area Network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Performance Analysis Between AODV & DSR Routing Protocol

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Study and Detection of TCP SYN Flood Attacks With IP Spoofing and Its Mitigations

    Flooding attacks are major threats on TCP/IP protocol suite these days; Maximum attacks are launched through TCP and exploit the resources and bandwidth of the machine. Flooding attacks are DDOS (Distributed Denial Of Service) attacks and utilize the weakness of the network protocols. SYN flood exploits the 3-way handshaking of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Communication With Less Hardware

    Software Defined Radio is an emerging technology in the field of communication. In this paper, two applications based on SDR are discussed. First, the authors discuss the weather satellite image decoding using a SDR receiver, FUNCube Dongle (FCD). Second, Sudden Ionospheric Disturbances (SID)are studied with Software Defined Radio (SDR) and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Isolation of Malicious Node in Dos Scenario in Manet

    MANETs are extensively used these days for communication and there are various communication networks with different standards and computing techniques and as days are passing by the size of MANET is increasing day by day and its expansion is inevitable due to its high penetration and popularity for the usage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Low Power Analysis of Network-Level On-Chip Communication Using Asynchronous AMBA Protocol

    Network on-Chip (NoC) is a novel structural design template, which can be defied for complicated system level on-chip design. NoC has a potential to limit and present the bus-based communication. In this paper, the crisis to discuss is Low power consumption in an Asynchronous Network on-chip (NoC) level communication. NoC...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    An LMS Based Data Reduction Technique for Energy Conservation in Wireless Sensor Network (WSN)

    In preceding existence, Wireless Sensor Networks (WSNs) have gained an amplified attention from the research community and extended its boundaries in commercial, industrial and medical domains. The tailback in WSN based application development is the inadequate energy source. As sensor nodes are generally battery-powered devices, the critical aspect is to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Detection of Rogue Base Stations in Wimax/IEEE802.16 Using Sensors

    This paper considers the problem of detecting rogue base station in Wimax/802.16 networks. IEEE 802.16 is an emerging standard for broadband wireless communications that is receiving a lot of attention. Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of Concurrent Online MBIST for RFID Memories

    Concurrent online testing is a memory test mechanism where the memory can be tested concurrently with the system operation. Thus, it has instant error detection. Radio Frequency IDentification (RFID) devices relies on the correct operation of their memory for identification of objects and delivery of transponder's information. This paper presents...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC)

    Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats to the projects, thus, this projects must be designed and focused towards security in order to be able to stand...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Leader Election Algorithm in Wireless Environments Using Fibonacci Heap Structure

    Today is an era of wireless communication systems. The day is not so far when the whole distributed system of the world will goes wireless. Leader in a distributed system plays a vital role in various computing environments like wireless networks etc. The main focus of researchers is on electing...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Efficient Use of Bidirectional Communication to Increase Communication Capabilities in Distributed VANET

    Intelligent Transportation System (ITS) is the need for today's luxurious life where the traffic is unavoidable part of the people life. Vehicular Ad hoc NETwork (VANET) is a wireless network that is formed on the fly between collections of cars connected by wireless links. In ITS the different cars flying...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2010

    Error Free e-Messaging Technique Using Symmetric Key Encryption-EHDES

    Steganography has a relatively short history; even today ordinary dictionaries do not contain the word "Steganography". Books on steganography are still very few. The most important feature of this steganography is that it has a very large data hiding capacity. Steganography can be applied to variety of information systems. Some...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Performance Comparison of Single and Multipath Routing Protocols in Adhoc Networks

    In a Mobile Ad hoc NETwork (MANET), Mobile nodes communicate with each other using multi-hop wireless links. There is no stationery infrastructure, for instance there is no base station. Each node in the network also acts as a router, forwarding data packets for other nodes an ad hoc network can...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analyzing Performance of Proactive and Reactive Routing Protocols for Manets

    Mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration number of routing protocols like Proactive and Reactive protocols have been implemented. Various research communities are working in field of MANET and trying...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Service Composition in SOA and QoS Related Issues

    Service Oriented Architecture (SOA) is a modern approach to build distributed application and greatly reduce the time, effort and cost to develop the software projects. SOA provides the dynamic paradigm for composing distributed application even in heterogeneous environments. The dynamic composition feature in SOA makes evaluation of a QoS a...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Secure Digital Signature Scheme for Image Authentication Over Wireless Channels

    The introduction of 3G wireless communication systems, together with the invasive distribution of digital images and the growing concern on their originality triggers an emergent need of authenticating images received by unreliable channels, such as public Internet and wireless networks. To meet this need, a content-based image authentication scheme that...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Privacy Enhancing and Breach Reduction

    Hiding the information without getting it revealed to others while publishing in a network is a major task now a days. For example an individual who wants to share his personal information like hospitalized or banking data to a researcher for his future enhancement or for his benefit, how much...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Hardware Enhancement Association Rule With Privacy Preservation

    In recent days Data mining techniques have been widely used in various applications. One of the most important applications in data mining is association rule mining. For hardware implementation of Apriori-based association rule mining the authors have to load candidate item sets and a database into the hardware. As the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Review: Competitive Learning Algorithm of Neural Network

    This paper deals mainly with the development of new learning algorithms and the study of the dynamics of neural networks. This paper will cover issues about the unsupervised competitive learning as well as some of its variances like hard competitive learning and soft competitive learning. After introducing of unsupervised learning...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Job Scheduling in Cloud Computing Based on Horizontal Load Balancing

    Cloud computing is a latest new computing paradigm where applications, data and IT services are provided across dynamic and geographically dispersed organization. How to improve the global throughput and utilize Cloud computing resources proficiently and gain the maximum profits with job scheduling system is one of the Cloud computing service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    One Time Password Security Through Cryptography for Mobile Banking

    Electronic banking-which provides the economic services through internet-changed the business trade of banks drastically, also decreasing the cost and improving the ease for the user. Highly usage of phones in which internet is enabled makes the change of banking operations to mobile phones from desktop computers - a reasonable growth...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Performance Evaluation & Application of Smart Antenna in Sensor Networks

    This paper provides a method for forming a communications link of Wireless Sensor Networks (WSN) by enabling each WSN to act as a smart antenna. Each WSN is simulated as a set of randomly placed sensor nodes within a planar area. The proposed method involves a searching WSN, a receiving...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Dynamic Threshold Based Secret Sharing Scheme Using Polynomial Function

    In this paper, the authors will study the question of performing arbitrary updates in secret sharing schemes when shares of unaffected parties shall remain unchanged. They will introduce a zonal transformation matrix in the lifetime of secret sharing schemes to simplify constructions of multi-time secret sharing schemes and propose management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Enhanced EFCI Congestion Control Scheme for ATM Networks

    Traffic management and congestion control are key issues in ATM networks. Congestion control schemes promises effective traffic management and it uses feedback information from the network to specify the maximum rate at which each source can transmit cells in to the network. In this paper, the authors considered an Explicit...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Improvement in Software Development Process and Software Product Through Knowledge Management

    Software engineering is a complex business in which processes, used to build product, have to go through many phases with involvement of many people. All these phases required different knowledge expertise to work together and apply innovative ideas to return successful outcome without missing the quality and reliability factors from...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Three Party Quantum Authenticated Key Distribution Protocol Using Superposition States

    This paper presents a Quantum authenticated key distribution protocol that can perform key distribution and also ensure that the participants of the communication are authentic, both implicitly and explicitly. This protocol provides new directions in Classical cryptography and Quantum cryptography. The Participants of the protocol trust the third party regarding...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Micro Strip Patch Antenna and Its Applications: A Survey

    The study of microstrip patch antennas has made great progress in recent years. Compared with conventional antennas, microstrip patch antennas have more advantages and better prospects. They are lighter in weight, low volume, low cost, low profile, smaller in dimension and ease of fabrication and conformity. Moreover, the microstrip patch...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    An Overview of on Demand Wireless Adhoc Networks Protocols: DSR and TORA

    Wireless network are becoming popular now a days due their features like easy setup without the need of cabling. Wireless ad-hoc networks are a collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network. Each node in the network has a wireless Interface and communicates with each other...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Wide-Area Traffic: IP Multicast Receiver Handover for Mobile IP Networks

    Network arrivals are often modeled as Poisson processes for analytic simplicity, even though a number of traffic studies have shown that packet inter-arrivals are not exponentially distributed. The authors evaluate 24 wide-area traces, investigating a number of wide-area TCP arrival processes (session and connection arrivals, FTP data connection arrivals within...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Quantitative Analysis of DSR Routing Algorithm for Carrying Packet Telephony

    It has been difficult for researchers to realize Packet Telephony over Mobile Ad-hoc Networks due to the peculiar characteristics of these networks including dynamic nature of nodes. The nodes keep on changing their location and hence re-routing is frequently required. So a robust routing algorithm is prerequisite for successful implementation...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2010

    Securing Routing Protocols Against Active Attacks in Mobile Ad Hoc Networks

    According to the inherent nature of mobile Ad Hoc networks, the mobility of members, traditional public key infrastructure based on the certificates, is not suitable for these networks. ID-based cryptography is known as an appropriate solution for securing these networks. Various routing protocols for these networks are proposed. In some...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Design of Multiuser CDMA Systems in Fading Channels

    In this paper, the authors examine the effect of channel estimation errors on the performance of Multiple-Input - Multiple-Output (MIMO) systems that employ Code-Division Multiple-Access (CDMA) transmission. Channel estimation based on training techniques has widely been considered throughout the literature. However, employing these training techniques in MIMO-CDMA systems degrades system...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Identification and Analysis of Hard Disk Drive in Digital Forensic

    The dramatic increase in crime relating to the Internet and computers has caused a growing need for computer forensics. Computer forensic tools have been developed to assist computer forensic investigators in conducting a proper investigation into digital crimes. Digital forensics is a growing and important fields of research for current...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Object Oriented Testing Techniques: Survey and Challenges

    Object-oriented programs involve many unique features that are not present in their conventional counterparts. Examples are message passing, synchronization, dynamic binding, object instantiation, persistence, encapsulation, inheritance, and polymorphism. Testing for such program is, therefore, more difficult than that for conventional programs. Object-orientation has rapidly become accepted as the preferred paradigm...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    An Efficient Algorithm for Improved Web Usage Mining

    Clustering is a web mining technique, which is a demanding field of research in which its latent applications create their own special requirements. Clustering is a method of grouping similar data into data sets, called clusters. Cluster analysis is a primary technique in conventional data analysis and many clustering methods...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Fraud Detection in Information Leakage

    In the field of business, the owner having some crucial data may need to share it with third-parties. These trusted third-parties may use this data for their own benefit causing reputational and monetary damage to the owner's company. If some of the shared data is discovered at some illegal place,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2012

    The IRUV Protocol: Intelligent Routing Protocol in Urban Environment for Vanet

    Future Intelligent Transportation Systems require fast and reliable communication between cars (Vehicle-To-Vehicle V2V) or between a car and a road side unit (vehicle-to-infrastructure). The fundamental component for the success of Vehicular Ad-hoc NETworks (VANET) applications is routing. In this paper, the authors propose a VANET routing protocol that is especially...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Comparative Study of Cryptosystems With Elliptic Curve Cryptography Using Digital Signature

    Elliptic Curve Cryptography (ECC) is coming forth as an attractive public key cryptosystem for mobile/wireless environments compared to conventional cryptosystems like RSA and DSA. ECC provides better security with smaller key sizes, which results in faster computations, lower power consumption, as well as memory and bandwidth savings. However, the true...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Information Retrieval Through Multi-Agent System With Data Mining in Cloud Computing

    Problem solving solutions like Multi-Agent System (MAS) capitalizes on its multiple intelligent agents to receive precepts from the environment, process the information and produce the desired result for the environment. The wide scope of capabilities of an MAS permits the user to resolve functional, methodic, algorithmic or procedural query to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    The Application of Wireless Sensor Network in the Irrigation Area Automatic System

    In the irrigation area automatic system, high-performance embedded micro-controller and low-power technology is used to design the water wireless sensor network. The sensor node gathers the hydrographic information such as water-level, gate position and rainfall. The sink node receives the real-time data; the information center stores and processes those data...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Performance Evaluation of AODV and ADV Protocols in VANET Scenarios

    This paper presents a comparative test of two protocols namely-AODV and ADV in various mobility scenarios of Vehicular Ad-hoc NETworks (VANETs). In order to make comparison three performance criterions are selected which include number of packet drop, throughput and total time taken by NCTUns-6.0 to simulate the given network. To...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Node Selection Based Broadcast in Manets to Improve the Efficiency

    In this paper, the issue of broadcasting in Mobile Ad hoc NETworks (MANETs) is considered. A node equipped with directional antenna can divide the Omni directional transmission range into several sectors and turn some of them "On" for transmission. In the proposed scheme using a directional antenna, forwarding nodes selected...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    MySQL and MATLAB Interfacing for Biometric Template Protection With Encryption

    A new approach for biometric database management is presented with enhanced security features. This paper attempts to improve the security of biometric database system by interfacing with MySQL server. The signature templates are acquired for the database using digital pen tablet, encrypted using a simple pseudo noise based algorithm and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Elite: A New Component-Based Software Development Model

    Component Based Software Engineering (CBSE) approach is based on the idea to develop software systems by selecting appropriate components and then to assemble them with a well-defined software architecture. In this evolving era of Information Technology, there is lot of pressure on software research community to reduce development cost as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Study and Analysis of Bandwidth Flow Estimation Techniques for Wired/Wireless Networks

    In this topic, an analysis will be made on bandwidth flow estimation technique which comes under networking domain. Correct bandwidth constrained applications and tools are required for proper bandwidth estimation. A proper monitoring of available bandwidth is required during execution to avoid degradation in performance. A several measurement tools have...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    An Efficient Search Algorithm in Decentralized Peer-to-Peer Networks

    To Design efficient search algorithms is a key challenge in decentralized peer-to-peer networks. Flooding and Random Walk (RW) are two previous search algorithms. Flooding searches aggressively and covers the most nodes. However, it generates a large amount of query messages and, thus, does not scale. On the contrary, RW searches...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Security Enhancements in Dynamic Telecast Routing

    Wireless network has no stationary infrastructure. It provides several advantages such as fast and easy deployment, little or no reliance on a pre-existing infrastructure and cost-effectiveness. One of the major issues for data communication over wired and wireless networks is security .Different from the past work on the designs of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A MAC Technique for VoIP Services Using Back Off Algorithm in IEEE 802.11e Networks

    In the advent of emerging information super highway, voice over Internet Protocol has become a vital service with the demand for high quality of requirements in Wireless Local Area Network (WLANs). The IEEE 802.11e Standard has been recently introduced to mark the Quality of Service (QoS) competence in the ever...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Performance Analysis of Efficient and Geographic Multicast Routing Protocol for Mobile Adhoc Networks Using NS-2

    Group Communication has become important in Mobile Adhoc NETwork (MANET). But because of its dynamic topology it is difficult to implement group communication in MANET. In order to implement group communication, Efficient Geographic Multicasting Protocol (EGMP) came into existence, the efficiency and scalability of the protocol was already tested using...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET

    VANETs (Vehicular Ad hoc NETworks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. In VANET nodes which are vehicles can move safety with high speed and must communicate quickly and reliably. When an accident occurs in a road...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Defect Prevention Technique in Test Case of Software Process for Quality Improvement

    A test case in software engineering is a set of conditions or variables under which a tester will determine whether an application or software system is working correctly or not. The mechanism for determining whether a software program or system has passed or failed such a test is known as...

    Provided By International Journal of Computer Technology and Applications