International Journal of Computer Technology and Applications

Displaying 1-40 of 288 results

  • White Papers // Dec 2013

    An Effective Algorithm of Encryption and Decryption of Images Using Random Number Generation Technique and Huffman Coding

    Data security has become most important aspect while transmission of data and storage. The transmission and exchange of image also needs a high security. Cryptography is used to maintain security. In this paper, the authors implemented security for image. They have considered an image, read its pixels and convert it...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Study on Improving Web Security Using SAML Token

    Web service is the most important word which is most commonly used by all computer professionals. Web services are mainly used for communicating different platform within a network connection. Web services are created based on SOA architecture. SOA platform is most popularly used in distributed systems. When using in distributed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    A Novel Hybrid Feature Selection and Intrusion Detection Based on PCNN and Support Vector Machine

    In this paper, the authors proposed a hybrid model for feature selection and intrusion detection. Feature selection is important issue in intrusion detection. The selection of feature in attack attribute and normal traffic attribute is challenging task. The selection of known and unknown attack is also faced a problem of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2013

    Improved Network Security Through Retinal Biometric Based Authentication

    Security and authentication are challenging problems due to the sprawling growth of Internet in today's environment. Therefore, the security of the network users has become an essential factor. There are various techniques available in the literature which make use of passwords, smart cards etc., to provide network related security. But...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2013

    Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA

    Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay-as-you-use fashion. As the data is stored in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Performance Analysis of Shortest Path Energy Efficient Routing Protocol in Wireless Sensor Networks Using NSRS Algorithm

    Wireless Sensor Network is an up-and-coming technology that shows great promise for various innovative applications both for public and military. Wireless Sensor Networks (WSNs) are Ad-hoc wireless networks of typically consists of hundreds or even thousands of small low-cost sensor nodes that communicate in a wireless way. A sensor node...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Fast and Efficient IP Network Recovery using Multiple Routing Configuration

    Internet plays a vital role in the peoples communications infrastructure, due to slow convergence of routing protocols after network failure become a growing problem. To guarantee fast recovery from link and node failure in networks, the authors propose a new recovery scheme called Multiple Routing Configuration (MRC). Their proposed scheme...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Robust Aggregation in Sensor Network: An Efficient Frequent Itemset and Number of Occurrence Counting

    Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2012

    Design and development of Middleware Gateway IP Multimedia System and Web Services

    Rapid growth in Internet (Web) applications and usage of mobile in telecommunication is present trends in communication. In Web 2.0 web services architecture is become versatile tool for enterprise solutions in distributed environment systems. To provide an enterprise solution it is not possible to get professional solution at one place....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Secure Data Transmission in MANET Routing Protocol

    Information exchange in a network of mobile and wireless nodes without any infrastructure support such networks are called as Ad-hoc networks. A Mobile Ad hoc NETwork (MANET) is mobile, multi-hop, infrastructure less wireless network which is capable of autonomous operation. In this paper the authors have discussed some of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Energy-Efficient Reliable Routing in Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSN) can handle different traffic classes of multimedia content (video, audio streams and still images) as well as scalar data over the network. Use of general and efficient routing protocols for WMSN is of crucial significance. Similar to other traditional networks, in WMSN a noticeable proportion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2012

    Construction of Power Efficient Fault Tolerant Wireless Network Using Cone Based Algorithm

    Fault tolerant topology control for all to one communication holds significance in dynamic wireless networks with asymmetric wireless links. In this paper the author Investigates the various aspects of the problem mentioned above using the cone based distributed topology control algorithm. The topology of a wireless multi-hop network can be...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Priority Based Scheduling Algorithm Using Time and Transmission Length in 802.11 Networks

    The fairness of IEEE 802.11 wireless networks is rigid to forecast and organize since it constructed based on uncertainty and difficulty of the MAC conflicts and dynamics. So, there is a great extent of packet data to be met in a network traffic jam and the packet data was collapsed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Simulation and Analysis of Receiver-Receiver Time Synchronization in Wireless Sensor Networks

    Wireless sensor networks were initially deployed for military applications. Gradually researchers found them to be very useful in applications like weather monitoring, target tracking, agriculture, industrial applications, and recently smart homes and kindergartens. All the WSN applications need partial or full time synchronization. Applications like acoustic ranging, target tracking or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Grid Computing for Different Applications

    Grid Computing delivers on the potential in the growth and abundance of network connected systems and bandwidth: computation, collaboration and communication over the Advanced Web. At the heart of Grid Computing is a computing infrastructure that provides dependable, consistent, pervasive and inexpensive access to computational capabilities. The use of grid...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Improved Diffie-Hellman Algorithm for Network Security Enhancement

    Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Quality is dependent on size and some other factors of network but...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Agile Plus - Comprehensive Model for Software Development

    In today's changing environment the main priority of a customer is software that executes 100% requirements of customer. In addition there should be some scope so that existing software must adopt future requirements too, that is, it should be flexible enough that can accommodate future requirements, within budget and timely...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Performance of AODV Against Black Hole Attacks in Mobile Ad-Hoc Networks

    Wireless Mobile Ad hoc NETwork (MANET) is a self-configuring network which is composed of several movable mobile nodes. These mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks is the Black...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Optimizing and Enhancing Parallel Multi Storage Backup Compression for Real-Time Database Systems

    One of the big challenges in the world was the amount of data being stored, especially in Data Warehouses. Data stored in databases keep growing as a result of businesses requirements for more information. A big portion of the cost of keeping large amounts of data is in the cost...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Strategy for Package Transformation for Linux Environment

    A Linux operating system is composed of a large number of software packages. Among packages there exist a variety of complex dependency relations, and their management is the foundation of building and maintaining Linux operating system. And the premise of the management is the dependency relations' extraction. Based on the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Emerging Trends in Quantum Cryptography - A Survey

    Privacy is paramount when communicating sensitive information in today's increasingly networked world. Both the business and government sectors have ever-more demanding secure communication needs. Conventional information assurance methods face increasing technological challenges and future threats, including unanticipated advances in mathematics, high-performance computing, and the possibility of large-scale quantum computation. Quantum...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey on Cloud Computing Architecture

    Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on demand. Users don't need expertise in or control over the technology infrastructure "In the cloud". Typical cloud computing providers deliver common business applications online that are accessed from another Web service...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of New Cell Site in Telecom Sector

    This paper revaluates the basic requirements for the installation and implementation of new cell site in telecom sector and will discuss the impact of various physical and environmental conditions on the installation process. In simple terms, a cell site depicts a place where antennas and electronic communications equipment are located,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Efficient Routing Strategy for Prioritized Messages in Mobile WSN Using Geographic Forwarding Protocol

    The current work represents a new routing protocol considering the environment of wireless sensor network with dynamic mobility. The approach addresses the issues for both real time and non-real time data dissemination from the mobile sensors to the sink. The prime target of this approach is to resolve the issues...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy-Efficient Cooperative Protocol for Wireless Networks

    In cooperative networks, transmitting and receiving nodes recruit neighboring nodes to help in communication. The authors model a cooperative transmission link in wireless networks and then it forms a cluster at transmitter end and a receiver end. In this paper, they propose a cooperative communication protocol for formation of these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Measurement of Real Time Information Using GPU

    Parallel programming is about performance, for otherwise the authors would write a sequential program. A problem is where to find truly parallel hardware that can be dedicated to the task, One answer is Graphical Processing Units (GPUs), which can have hundreds of cores and are found in millions of desktop...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Analysis of Relay Stations in WiMAX Networks

    The demand for broadband services is growing IEEE sharply today. The traditional solutions to provide high speed broadband access is to use wired access technologies such as cable modem, Digital Subscriber Line (DSL), Ethernet and fiber optics. It is too difficult and expensive for carriers to build and maintain wired...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Survey: On Generation of Wireless Telephony Technology

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometres for radio communications). When the context is clear, the term...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

    In wireless network can classified in two way one is infrastructure network and another is infrastructure less. Infrastructure less wireless network is known as Ad-hoc network. An ad-hoc network is a Local Area Network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Performance Analysis Between AODV & DSR Routing Protocol

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    A Study and Detection of TCP SYN Flood Attacks With IP Spoofing and Its Mitigations

    Flooding attacks are major threats on TCP/IP protocol suite these days; Maximum attacks are launched through TCP and exploit the resources and bandwidth of the machine. Flooding attacks are DDOS (Distributed Denial Of Service) attacks and utilize the weakness of the network protocols. SYN flood exploits the 3-way handshaking of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Communication With Less Hardware

    Software Defined Radio is an emerging technology in the field of communication. In this paper, two applications based on SDR are discussed. First, the authors discuss the weather satellite image decoding using a SDR receiver, FUNCube Dongle (FCD). Second, Sudden Ionospheric Disturbances (SID)are studied with Software Defined Radio (SDR) and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Isolation of Malicious Node in Dos Scenario in Manet

    MANETs are extensively used these days for communication and there are various communication networks with different standards and computing techniques and as days are passing by the size of MANET is increasing day by day and its expansion is inevitable due to its high penetration and popularity for the usage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Low Power Analysis of Network-Level On-Chip Communication Using Asynchronous AMBA Protocol

    Network on-Chip (NoC) is a novel structural design template, which can be defied for complicated system level on-chip design. NoC has a potential to limit and present the bus-based communication. In this paper, the crisis to discuss is Low power consumption in an Asynchronous Network on-chip (NoC) level communication. NoC...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    An LMS Based Data Reduction Technique for Energy Conservation in Wireless Sensor Network (WSN)

    In preceding existence, Wireless Sensor Networks (WSNs) have gained an amplified attention from the research community and extended its boundaries in commercial, industrial and medical domains. The tailback in WSN based application development is the inadequate energy source. As sensor nodes are generally battery-powered devices, the critical aspect is to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Detection of Rogue Base Stations in Wimax/IEEE802.16 Using Sensors

    This paper considers the problem of detecting rogue base station in Wimax/802.16 networks. IEEE 802.16 is an emerging standard for broadband wireless communications that is receiving a lot of attention. Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2012

    Implementation of Concurrent Online MBIST for RFID Memories

    Concurrent online testing is a memory test mechanism where the memory can be tested concurrently with the system operation. Thus, it has instant error detection. Radio Frequency IDentification (RFID) devices relies on the correct operation of their memory for identification of objects and delivery of transponder's information. This paper presents...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC)

    Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats to the projects, thus, this projects must be designed and focused towards security in order to be able to stand...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Sequential Pattern Mining with Various Constraints: An Enhanced Approach

    Sequential pattern mining is to find sequential purchasing behaviors for most customers from a large amount of customer transactions. Historical transaction data can be analyzed to discover customer purchasing habits. However, the size of the transaction database can be very large. It is very time consuming to find all the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jun 2012

    Leader Election Algorithm in Wireless Environments Using Fibonacci Heap Structure

    Today is an era of wireless communication systems. The day is not so far when the whole distributed system of the world will goes wireless. Leader in a distributed system plays a vital role in various computing environments like wireless networks etc. The main focus of researchers is on electing...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Comparative Study of the Available Solutions to Minimize Denial of Service Attacks in Wireless LAN

    Denial of Service (DoS) attack is a major attack in Wireless Local Area Network. This paper studies the available solutions for Denial of Service (DoS) attacks and compares them with each other in a wireless infrastructure network. All these methods are used to minimize the DoS attacks. It discusses the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Cryptography and Steganography - A Survey

    Digital communication has become an essential part of infrastructure now-a-days, a lot of applications are Internet-based and it is important that communication be made secret. As a result, the security of information passed over an open channel has become a fundamental issue and therefore, the confidentiality and data integrity are...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    The Importance of QoS & QoE Management in Wireless Communication System

    Now-a-day, wireless communication systems are popular due to its wide advantages. In the customer's point of view, the authors can say the most of the customer requirements related to communication from one place to another place are fulfilled up to the most extent using these systems. The initiation to these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Image Cipher Technique for Covert and Low Bandwidth Channels

    Security of images during the transmission over covert low bandwidth channel has importance in today's image communications for confidential, integrated and secure real time communication. The major security problems during communication over covert and low bandwidth channel is to reduce no of bits, efficient and secure cryptographic techniques such that...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Writing Software Requirements Specification Quality Requirements: An Approach to Manage Requirements Volatility

    Quality requirements, that form a major sub-category of requirements, define a broad set system-wide attributes such as security, performance, usability and scalability. Unfortunately, many organizations pay less attention to quality requirements & assume that the necessary qualities are implicitly understood & will naturally emerge as the product is developed. In...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Fuzzy QOS Key Base Secured MANET Routing With Multipath Data Fragmentation (FQKSMR)

    MANET or Mobile Adhoc Network has drawn considerable research attention and application over the last few years. With the increase of applicability, and adaptability of the network in Private virtual network or wireless personal area network, the attacks and intrusion of MENT data has also increased which has lead to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Applying Object Oriented Metrics to C#(C Sharp) Programs

    Object-oriented technology is becoming increasingly popular in industrial software development environments. This technology helps in the development of a software product of higher quality and lower maintenance costs. Since the traditional software metrics aims at the procedure-oriented software development so it cannot fulfill the requirement of the object-oriented software, as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Simulation Study Between the Random Based Synthetic Entity Mobility Models in Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a network formed without any central administration which consists of mobile nodes that use a wireless interface to send packet data. MANETs are extremely flexible and each node is free to move independently, in any random direction. Each node in MANET maintains continuously the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Network Intrusion Forensic Analysis Using Intrusion Detection System

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Novel Approach for Cheating Prevention Through Visual Cryptographic Analysis

    Confidentiality is probably the most common aspect of information security and the authors need to protect their valuable information and it has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of integer mathematical techniques related aspects of Information Security such as confidentiality,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Identity Based Color Image Cryptography

    An Identity based cryptography based on visual cryptography scheme was proposed for protecting color image. A color image to be protected and authentic entities such as account number, password, signature image are given as input. The binary key image is obtained by distributing the digital signature of obtained authentic entities....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    A Compressed Anti IP Spoofing Mechanism Using Cryptography

    Internet becomes a backbone of every sector, which gives essential information of each domain like education, concerns, entertainment etc. Data stealing and data theft is the well known thing in networks. IP spoofing is one of the techniques of data stealing in the form of malicious IP address. Spoofed packet...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    A Security Approach in System Development Life Cycle

    Many software organizations today are confronted with challenge of building secure software systems. Traditional software engineering principles place little emphasis on security. These principles tend to tread security as one of a long list of quality factors that are expected from all professionally developed software. As software systems of today...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Web Data Mining Using an Intelligent Information System Design

    To use the large amounts of information efficiently on the Web to make the information processing intelligent, personalized and automatic is the most important applications of the current data mining technology. Model Driven Architecture (MDA) which is used for code generation has many benefits over traditional software development methods. An...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    A Checklist Based Framework for Software Security Risk Management

    As security of software systems is becoming more and more important in the current era of e-commerce and e-governance, traditional approaches for software development should be supplanted with a formal approach to security in the software life cycle. Both a software security checklist and assessment tools should be incorporated into...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Proficient Cluster-Based Routing Protocol Using EBSA and Leach Approaches

    In this paper, the authors deal with Delay-Tolerant Networking (DTN) where they seek to address the technical issues in heterogeneous networks along with the homogeneous networks that may lack continuous network connectivity. The main objective is to distributively group mobile nodes into a cluster, which can then interchangeably share their...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Hybridization of Advance Technologies in the Field of WLAN

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometers for radio communications). Wireless wide area cellular network solutions have...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Low Read Equivalent Stress Fault Detection in CMOS SRAMs Using MARCH Algorithm

    This paper outlines the reduction of Read Equivalent Stress (RES) during test of SRAM memories and demonstrates that the modified pre-charge activity reduces RES because of the predictable addressing sequence. The authors exploit this observation in order to show minimization of power dissipation during test by eliminating the unnecessary power...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    An Efficient Approach to Access Database in J2ME Applications

    Application development for mobile devices has been very challenging. Distributed applications for mobile devices should have uninterrupted data access. Though most of the mobile phones have CLDC configuration, Java provides no standard JDBC driver and API for mobile devices with CLDC configuration. Relational database in J2ME can be used with...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Buffer Overflow Attack Blocker Using Sigfree Concept

    SigFree - online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. Motivated by the observation that buffer overflow attacks typically contain executables whereas legitimate client requests never contain executables in most Internet services, SigFree blocks attacks by detecting...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Low Power at Different Levels of VLSI Design and Clock Distribution Schemes

    Low power chip requirement in the VLSI industry is main considerable field due to the reduction of chip dimension day by day and environmental factors. In this paper various low power techniques at Gate level, Architecture level and different tradeoffs between different clock distribution schemes like as single driver clock...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    PSO and ACO Based Approach for Solving Combinatorial Fuzzy Job Shop Scheduling Problem

    This paper proposes a prominent approach to solve job shop scheduling problem based on Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO). The steps to generate the solution are grouped as planning, scheduling and optimization. Initially, fuzzy logic is applied for planning and then the scheduling stage is optimized...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Transmission of Picturesque Content With Code Base Cryptosystem

    Problem faced by today's communicators with sensitive information data is not only security but also the speed of communication and size of content. The authors' paper has emphasis in the concern of all simultaneously. For security and speed they use Mceliece cryptosystem, for size, they use SEQUITUR technique. Nowadays, the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Vehicle Telematics System Using GPRS

    Vehicle Telematics is a term used to define electric data exchange between connected vehicles. Next generation Telematics services demanding remote access to vehicle operational data. A challenge with vehicles utilizing complicated embedded systems is how to extract the vehicle diagnostic data, evaluate it to expose possible problems and determine how...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Load Sharing With OCGRR for Network Processors Which Supports Different Services

    A new scheme for packet transaction in a router is used, which provides load sharing among multiple network processors for various traffic patterns by introducing an OCGRR scheduler at the output port of the core router and multiprocessors. A feedback control mechanism prevents processor overload. The incoming traffic is scheduled...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    FPGA Based Kalman Filter for Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a set of tiny and low-cost devices equipped with different kind of sensors, a small microcontroller and a radio transceiver, typically powered by batteries. Target tracking is one of the very important applications of such a network system. Traditionally, KF (Kalman Filtering) and its...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Comparison of Compaction Techniques in VLSI Physical Design

    The rapid growth in integration technology has been made possible by the automation of various steps involved in the design and fabrication of VLSI chips. The main factors which decide the quality of any chip are power consumption, area and performance of the chip. The demand of light weighted &...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Efficient Cryptographic Key Generation Using Biometrics

    Biometrics gives a lot of methods in high-secure applications while using natural, user-friendly and fast authentication. Cryptography is intended to ensure the secrecy and authenticity of message. The cryptographic key will be long, so it is difficult to remember, protecting the confidentiality of the cryptographic keys is one of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2010

    A New Technique to Transmit a Reduce Sized Image Using Triple Enhanced Data Encryption Standard (EHDES)

    In current era, an image transmission becomes more usable and effective for improvement in various fields. The security of image is most important while the image is transmitted. The authors kept in mind the security of transmission and capacity of channel, triple EHDES provides more complexity and enhanced security and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2010

    An Efficient Manner to Secure Large Size Data With Authentication & Integrity Using Double - EHDES

    In this paper, the authors presents an efficient manner, which provide them a secure, compress transmission of message. This approach really enhances the capability and maximum utilization of busy channel. A complete transmission is always based upon correctness and delivery on time and the massage transmission is too much sensitive...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2010

    Error Free e-Messaging Technique Using Symmetric Key Encryption-EHDES

    Steganography has a relatively short history; even today ordinary dictionaries do not contain the word "Steganography". Books on steganography are still very few. The most important feature of this steganography is that it has a very large data hiding capacity. Steganography can be applied to variety of information systems. Some...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Studying the Importance and Feasibility of Software Testing

    Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing is the process of testing the functionality and correctness of software by running it. Software testing is usually performed for one of two reasons: defect detection, and reliability...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A New Paradigm for the Next Generation Wireless Optimization Cross Layer Design

    Cross-Layer Design (CLD) is a new paradigm that allows the optimization of communication network architectures across the traditional layer boundaries, but does not imply a change of the present layered architecture. Cross-Layer optimization is used in multi media application this is also used in run this type of applications parallel...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Design Approach for Fault Tolerance Algorithm in FPGA Architecture With BIST in Hardware Controller

    Redundancy based hardening techniques are applied at the pre-synthesis or synthesis level. To provide solutions for increasing the fault-tolerance capabilities with algorithms able to reduce sensitive configuration memory bits of FPGAs the authors use BIST method. While these systems frequently contain hardware redundancy to allow for continued operation in the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Threats in Optical Burst Switched Network

    Optical network is a viable network for future communication, which transmits data at an average rate of 50Tb/s. Optical Burst Switching is a trusted mechanism used for Optical network. There is a good amount of research done in the area of security in Optical networks. In addition, the issues related...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Design and Interfacing of High Speed Model of FPGA Using I2C Protocol

    Once the I2C protocol is being designed for interfacing the devices with each other (i.e. FPGA with OV7620) over a serial data line for getting high speed without data loss, as compare to any other communication methodology. The main purpose for developing the protocol is not only high speed communication...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Analysis and Design of Enhanced HTTP Proxy Cashing Server

    A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. A server is anything that has some resource that can be shared. A server...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Robust Zone Disjoint Multipath Routing Protocol

    A new multipath routing protocol which is disjoint at the zone level is proposed. The proposed routing protocol is based on the hybrid Zone based Hierarchical Link State Routing Protocol (ZHLS). The proposed work establishes multiple zone disjoint paths between the source and the destination zones. The establishment of multiple...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Transmission and System Control in Quantum Cryptography

    Quantum cryptography provides security using the laws of quantum mechanics. Currently, several types of protocols of Quantum Key Distribution (QKD) have been established. Some QKD protocols have been certified by proofs of unconditional security. QKD protocols have been confirmed to be resistant to any possible attack. Along with the progress...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Multicast Security Attacks and Its Counter Measures for Puma Protocol

    A Mobile Ad hoc NETwork (MANETs) is a continuously changing wireless network that can be created without any pre-existing infrastructure in which each node can operate as a router. MANETs has no clear line of control, so it is accessible to both legitimate network users and malicious attackers. The main...

    Provided By International Journal of Computer Technology and Applications