International Journal of Computer Technology and Applications

Displaying 81-120 of 288 results

  • White Papers // Mar 2012

    A New Routing Algorithm in MANETS: Location Aided Hybrid Routing

    In this paper, the authors propose a new hybrid routing protocol for MANET called Location Aided Hybrid Routing Protocol for MANET (LAHRP). The proposed routing algorithm not only aims to optimize bandwidth usage of MANETs by reducing the routing overload but also extend battery life of the mobile devices by...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Runtime CPU Scheduler Customization Framework for Real Time Operating System

    Most of the embedded systems have real-time requirements about the use of Real-Time Operating Systems able of satisfying the embedded system requirements. So, in embedded application where the real-time operating systems are noted are been called as the Real Time Embedded Operating Systems (REOS). Main features of that of real-time...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Object Oriented Testing Techniques: Survey and Challenges

    Object-oriented programs involve many unique features that are not present in their conventional counterparts. Examples are message passing, synchronization, dynamic binding, object instantiation, persistence, encapsulation, inheritance, and polymorphism. Testing for such program is, therefore, more difficult than that for conventional programs. Object-orientation has rapidly become accepted as the preferred paradigm...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Open Source in Cloud Computing

    Cloud computing is emerging as the latest BUZZ word in Information Technology. There is going to be a great shift from traditional network computing to cloud computing. The features of Cloud computing - Pay as you go and Virtualization has made it a long run in advance technologies. This paper...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Type of Security Threats and It's Prevention

    Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Implementing KQML Performatives for Outsourcing Management System

    An agent is a computer system, situated in some environment that is capable of flexible autonomous action in order to meet its design objectives this is the commonly accepted definition for agents. Agents are autonomous, social, proactive, reactive, and communicate to achieve common goal. The Knowledge Query Manipulation Language (KQML)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    An Analysis of Distributed Computer Network Administration

    Computer Networking is necessary to human beings. People needed to share ideas, research knowledge, and the way of life to their friends. In the modern time, the role of computer networks became dreamy. Analyzing, accessing, sharing and storing of data and information are very easy with help of distributing computer...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Evaluation of Improved Algorithm for Wireless Sensor Networks

    Wireless sensor networks have recently come into prominence because they hold the potential to revolutionize many segments of the economy and life, from environmental monitoring and conservation, to manufacturing and business asset management, to automation in the transportation and health-care industries. Information collected by and transmitted on a sensor network...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Novel Approach for Securing Mobile Ad Hoc Network With an Enhanced Trust Calculation Method

    A Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range. Due to wide-ranging characteristics of the Ad Hoc Networks like decentralization, dynamic topology and neighbor based routing, it is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Trust, Privacy and Security Infrastructure for the Inter-Cloud

    Cloud Computing is one of the most important security challenges to manage and assure a secure usage over multi-provider Inter-Cloud environments with dedicated communication infrastructures, security mechanisms, processes and policies. Based on the collection of various Inter-Cloud usecases and scenarios within the private and public sector like DMTF (Distributed Management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Transitive Coupling (TC) and Fault Proneness (FP) in Object Oriented Systems: A New Methodology

    Demand for Quality Software has undergone with rapid growth during the last few years. This is leading to an increase in the development of metrics for measuring the properties of software such as Coupling, Cohesion or Inheritance that can be used in early quality assessments. Quality Models that explore the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Simulation Based: Study and Analysis of Routing Protocol in Vehicular Ad-Hoc Network Environment

    A Vehicular Ad hoc NETwork (VANET) consists of vehicles which communicate with each other and exchange data via wireless communication links available between the vehicles which are in communication ranges of vehicles to improve the road safety in city. The communication between vehicles is used to provide road safety, comfort...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Quantitative Study and Comparison of Secure OLSR Routing Protocol

    This paper presents the comparison of the secure OLSR (Optimized Link State Routing Protocol) in mobile ad-hoc network with other approach. The authors compare the security from the different approach and their effect on the existing OLSR. The main aim of this paper is to study the various securities and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Software Engineering Challenges of Migration Projects

    Organizations often face the challenges of migration from legacy systems to new target systems. Such migration efforts represent a complex engineering problem. This paper describes migration planning, identifies influencing factors, outlines a set of migration planning activities and offers a set of guidelines for the migration planning. Many organizations face...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Minimizing Response Time and Effective Utilization of I/O-Bound Processes Using \"Approximate Zero Response Algorithm\"

    Various scheduling algorithm are available for the operating system to improve CPU utilization. Different scheduling algorithms have different properties that work on different scheduling criteria's and the choice of a particular algorithm may favor one class of processes over another. SJF gives minimum average waiting time for a given set...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Cloud Computing Security With Nymble Technology

    Misbehave blacklisting schemes allow online service provide in cloud computer to prevent Misbehave access by abusive users while preserving the privacy of all Misbehave users (both abusive and non-abusive). The scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    3-D Graphical Password Used For Authentication

    In today's world, security is important aspect in day to day life. So, everyone used various ways for security purpose. People use passwords for their security. Generally, everyone uses textual password. Textual password is combination of alphabets and numbers. People keep textual password as name of their favorite things, actors...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Interpretation of Formal Proof for Cryptographic Protocols into Computational Model

    Cryptography is the spinal cord for all security measures involved in computing field so a lot of emphasis is required to be given to make it strong enough to deal all the transition of the security industry. The authors present a general method to prove security properties of multiple cryptographic...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Automatically Communication Path Creation and Reconfiguration in Dynamic Network Environment for Optimizing Performance to Network Applications

    Accessing network services across a wide area network still remains a challenging task and the difficulty mainly comes from the heterogeneous and constantly changing network environment, which usually causes undesirable user experience for network-oblivious applications. A promising approach to address this is to provide network awareness in communication paths. Many...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Probablistic Clustering based on Web Documents

    Web search engine are often forced to pass through long ordered list of documents called snippets. Snippets are web document attributes. These snippets are returned by search engines. The basis of document clustering is an alternative method of organizing retrieval results. Clustering yet needed to be deployed for the search...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Comparative Study of Cryptosystems With Elliptic Curve Cryptography Using Digital Signature

    Elliptic Curve Cryptography (ECC) is coming forth as an attractive public key cryptosystem for mobile/wireless environments compared to conventional cryptosystems like RSA and DSA. ECC provides better security with smaller key sizes, which results in faster computations, lower power consumption, as well as memory and bandwidth savings. However, the true...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Information Retrieval Through Multi-Agent System With Data Mining in Cloud Computing

    Problem solving solutions like Multi-Agent System (MAS) capitalizes on its multiple intelligent agents to receive precepts from the environment, process the information and produce the desired result for the environment. The wide scope of capabilities of an MAS permits the user to resolve functional, methodic, algorithmic or procedural query to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    The Application of Wireless Sensor Network in the Irrigation Area Automatic System

    In the irrigation area automatic system, high-performance embedded micro-controller and low-power technology is used to design the water wireless sensor network. The sensor node gathers the hydrographic information such as water-level, gate position and rainfall. The sink node receives the real-time data; the information center stores and processes those data...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Performance Evaluation of AODV and ADV Protocols in VANET Scenarios

    This paper presents a comparative test of two protocols namely-AODV and ADV in various mobility scenarios of Vehicular Ad-hoc NETworks (VANETs). In order to make comparison three performance criterions are selected which include number of packet drop, throughput and total time taken by NCTUns-6.0 to simulate the given network. To...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Node Selection Based Broadcast in Manets to Improve the Efficiency

    In this paper, the issue of broadcasting in Mobile Ad hoc NETworks (MANETs) is considered. A node equipped with directional antenna can divide the Omni directional transmission range into several sectors and turn some of them "On" for transmission. In the proposed scheme using a directional antenna, forwarding nodes selected...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    MySQL and MATLAB Interfacing for Biometric Template Protection With Encryption

    A new approach for biometric database management is presented with enhanced security features. This paper attempts to improve the security of biometric database system by interfacing with MySQL server. The signature templates are acquired for the database using digital pen tablet, encrypted using a simple pseudo noise based algorithm and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Elite: A New Component-Based Software Development Model

    Component Based Software Engineering (CBSE) approach is based on the idea to develop software systems by selecting appropriate components and then to assemble them with a well-defined software architecture. In this evolving era of Information Technology, there is lot of pressure on software research community to reduce development cost as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Study and Analysis of Bandwidth Flow Estimation Techniques for Wired/Wireless Networks

    In this topic, an analysis will be made on bandwidth flow estimation technique which comes under networking domain. Correct bandwidth constrained applications and tools are required for proper bandwidth estimation. A proper monitoring of available bandwidth is required during execution to avoid degradation in performance. A several measurement tools have...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    An Efficient Search Algorithm in Decentralized Peer-to-Peer Networks

    To Design efficient search algorithms is a key challenge in decentralized peer-to-peer networks. Flooding and Random Walk (RW) are two previous search algorithms. Flooding searches aggressively and covers the most nodes. However, it generates a large amount of query messages and, thus, does not scale. On the contrary, RW searches...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Security Enhancements in Dynamic Telecast Routing

    Wireless network has no stationary infrastructure. It provides several advantages such as fast and easy deployment, little or no reliance on a pre-existing infrastructure and cost-effectiveness. One of the major issues for data communication over wired and wireless networks is security .Different from the past work on the designs of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A MAC Technique for VoIP Services Using Back Off Algorithm in IEEE 802.11e Networks

    In the advent of emerging information super highway, voice over Internet Protocol has become a vital service with the demand for high quality of requirements in Wireless Local Area Network (WLANs). The IEEE 802.11e Standard has been recently introduced to mark the Quality of Service (QoS) competence in the ever...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Performance Analysis of Efficient and Geographic Multicast Routing Protocol for Mobile Adhoc Networks Using NS-2

    Group Communication has become important in Mobile Adhoc NETwork (MANET). But because of its dynamic topology it is difficult to implement group communication in MANET. In order to implement group communication, Efficient Geographic Multicasting Protocol (EGMP) came into existence, the efficiency and scalability of the protocol was already tested using...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET

    VANETs (Vehicular Ad hoc NETworks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. In VANET nodes which are vehicles can move safety with high speed and must communicate quickly and reliably. When an accident occurs in a road...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Defect Prevention Technique in Test Case of Software Process for Quality Improvement

    A test case in software engineering is a set of conditions or variables under which a tester will determine whether an application or software system is working correctly or not. The mechanism for determining whether a software program or system has passed or failed such a test is known as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Controlling Ip Spoofing Through Packet Filtering

    IP address spoofing refers to the creation of Internet Protocol packets with a forged source IP address, called spoofing, it is a method of attacking a network in order to gain unauthorized access. The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. The...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Zigbee Based Voice Control System for Smart Home

    This paper details the overall design of a Wireless Home Automation System (WHAS). This is fuelled by the need to provide supporting systems for the elderly and the disabled, especially those who live alone. The automation centre's on recognition of voice commands and uses low-power RF Zig-Bee wireless communication modules...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Wireless Sensor Network Safety Study

    Few security mechanisms in Wireless Sensor Networks (WSNs) have been implemented, and even fewer have been applied in real deployments. The limited resources of each sensor node makes security in WSNs hard, as the tradeoff between security and practicality must be carefully considered. These complex systems include in their design...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Challenging Issues and Limitations of Mobile Computing

    Mobile computing is becoming increasingly important due to the rise in the number of portable computers and the desire to have continuous network connectivity to the Internet irrespective of the physical location of the node. Mobile computing has fast become an important new paradigm in today's world of networked computing...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Ghids: A Hybrid Honeypot System Using Genetic Algorithm

    Intrusions Detection Systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. This paper describes a hybrid honeypot...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    An Efficient Web Server Optimization Technique Based on DNS

    A group of web-server system can be deployed to support high request rate. The Domain Name System (DNS) servers act as a mediator between the client and web-servers. It dispatches the client request among the web-servers through the URL-name to IP-address mapping mechanism. In this paper, the authors propose a...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Design and Analysis of Software Fault-Tolerant Techniques for Softcore Processors in Reliable Sram-Based Fpga

    This paper discusses high level techniques for designing fault tolerant systems in SRAM-based FPGAs, without modification in the FPGA architecture. Triple Modular Redundancy (TMR) has been successfully applied in FPGAs to mitigate transient faults, which are likely to occur in space applications. However, TMR comes with high area and power...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Comparative Study of the Available Solutions to Minimize Denial of Service Attacks in Wireless LAN

    Denial of Service (DoS) attack is a major attack in Wireless Local Area Network. This paper studies the available solutions for Denial of Service (DoS) attacks and compares them with each other in a wireless infrastructure network. All these methods are used to minimize the DoS attacks. It discusses the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Cryptography and Steganography - A Survey

    Digital communication has become an essential part of infrastructure now-a-days, a lot of applications are Internet-based and it is important that communication be made secret. As a result, the security of information passed over an open channel has become a fundamental issue and therefore, the confidentiality and data integrity are...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    The Importance of QoS & QoE Management in Wireless Communication System

    Now-a-day, wireless communication systems are popular due to its wide advantages. In the customer's point of view, the authors can say the most of the customer requirements related to communication from one place to another place are fulfilled up to the most extent using these systems. The initiation to these...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Image Cipher Technique for Covert and Low Bandwidth Channels

    Security of images during the transmission over covert low bandwidth channel has importance in today's image communications for confidential, integrated and secure real time communication. The major security problems during communication over covert and low bandwidth channel is to reduce no of bits, efficient and secure cryptographic techniques such that...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Writing Software Requirements Specification Quality Requirements: An Approach to Manage Requirements Volatility

    Quality requirements, that form a major sub-category of requirements, define a broad set system-wide attributes such as security, performance, usability and scalability. Unfortunately, many organizations pay less attention to quality requirements & assume that the necessary qualities are implicitly understood & will naturally emerge as the product is developed. In...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Fuzzy QOS Key Base Secured MANET Routing With Multipath Data Fragmentation (FQKSMR)

    MANET or Mobile Adhoc Network has drawn considerable research attention and application over the last few years. With the increase of applicability, and adaptability of the network in Private virtual network or wireless personal area network, the attacks and intrusion of MENT data has also increased which has lead to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Applying Object Oriented Metrics to C#(C Sharp) Programs

    Object-oriented technology is becoming increasingly popular in industrial software development environments. This technology helps in the development of a software product of higher quality and lower maintenance costs. Since the traditional software metrics aims at the procedure-oriented software development so it cannot fulfill the requirement of the object-oriented software, as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Simulation Study Between the Random Based Synthetic Entity Mobility Models in Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a network formed without any central administration which consists of mobile nodes that use a wireless interface to send packet data. MANETs are extremely flexible and each node is free to move independently, in any random direction. Each node in MANET maintains continuously the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Network Intrusion Forensic Analysis Using Intrusion Detection System

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Novel Approach for Cheating Prevention Through Visual Cryptographic Analysis

    Confidentiality is probably the most common aspect of information security and the authors need to protect their valuable information and it has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of integer mathematical techniques related aspects of Information Security such as confidentiality,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Identity Based Color Image Cryptography

    An Identity based cryptography based on visual cryptography scheme was proposed for protecting color image. A color image to be protected and authentic entities such as account number, password, signature image are given as input. The binary key image is obtained by distributing the digital signature of obtained authentic entities....

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    A Compressed Anti IP Spoofing Mechanism Using Cryptography

    Internet becomes a backbone of every sector, which gives essential information of each domain like education, concerns, entertainment etc. Data stealing and data theft is the well known thing in networks. IP spoofing is one of the techniques of data stealing in the form of malicious IP address. Spoofed packet...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    A Security Approach in System Development Life Cycle

    Many software organizations today are confronted with challenge of building secure software systems. Traditional software engineering principles place little emphasis on security. These principles tend to tread security as one of a long list of quality factors that are expected from all professionally developed software. As software systems of today...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Web Data Mining Using an Intelligent Information System Design

    To use the large amounts of information efficiently on the Web to make the information processing intelligent, personalized and automatic is the most important applications of the current data mining technology. Model Driven Architecture (MDA) which is used for code generation has many benefits over traditional software development methods. An...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    A Checklist Based Framework for Software Security Risk Management

    As security of software systems is becoming more and more important in the current era of e-commerce and e-governance, traditional approaches for software development should be supplanted with a formal approach to security in the software life cycle. Both a software security checklist and assessment tools should be incorporated into...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Proficient Cluster-Based Routing Protocol Using EBSA and Leach Approaches

    In this paper, the authors deal with Delay-Tolerant Networking (DTN) where they seek to address the technical issues in heterogeneous networks along with the homogeneous networks that may lack continuous network connectivity. The main objective is to distributively group mobile nodes into a cluster, which can then interchangeably share their...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Hybridization of Advance Technologies in the Field of WLAN

    Wireless communication is the transfer of information over a distance without the use of enhanced electrical conductors or "Wires". The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometers for radio communications). Wireless wide area cellular network solutions have...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Low Read Equivalent Stress Fault Detection in CMOS SRAMs Using MARCH Algorithm

    This paper outlines the reduction of Read Equivalent Stress (RES) during test of SRAM memories and demonstrates that the modified pre-charge activity reduces RES because of the predictable addressing sequence. The authors exploit this observation in order to show minimization of power dissipation during test by eliminating the unnecessary power...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    An Efficient Approach to Access Database in J2ME Applications

    Application development for mobile devices has been very challenging. Distributed applications for mobile devices should have uninterrupted data access. Though most of the mobile phones have CLDC configuration, Java provides no standard JDBC driver and API for mobile devices with CLDC configuration. Relational database in J2ME can be used with...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2011

    Buffer Overflow Attack Blocker Using Sigfree Concept

    SigFree - online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. Motivated by the observation that buffer overflow attacks typically contain executables whereas legitimate client requests never contain executables in most Internet services, SigFree blocks attacks by detecting...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Low Power at Different Levels of VLSI Design and Clock Distribution Schemes

    Low power chip requirement in the VLSI industry is main considerable field due to the reduction of chip dimension day by day and environmental factors. In this paper various low power techniques at Gate level, Architecture level and different tradeoffs between different clock distribution schemes like as single driver clock...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    PSO and ACO Based Approach for Solving Combinatorial Fuzzy Job Shop Scheduling Problem

    This paper proposes a prominent approach to solve job shop scheduling problem based on Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO). The steps to generate the solution are grouped as planning, scheduling and optimization. Initially, fuzzy logic is applied for planning and then the scheduling stage is optimized...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Transmission of Picturesque Content With Code Base Cryptosystem

    Problem faced by today's communicators with sensitive information data is not only security but also the speed of communication and size of content. The authors' paper has emphasis in the concern of all simultaneously. For security and speed they use Mceliece cryptosystem, for size, they use SEQUITUR technique. Nowadays, the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Vehicle Telematics System Using GPRS

    Vehicle Telematics is a term used to define electric data exchange between connected vehicles. Next generation Telematics services demanding remote access to vehicle operational data. A challenge with vehicles utilizing complicated embedded systems is how to extract the vehicle diagnostic data, evaluate it to expose possible problems and determine how...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Load Sharing With OCGRR for Network Processors Which Supports Different Services

    A new scheme for packet transaction in a router is used, which provides load sharing among multiple network processors for various traffic patterns by introducing an OCGRR scheduler at the output port of the core router and multiprocessors. A feedback control mechanism prevents processor overload. The incoming traffic is scheduled...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    FPGA Based Kalman Filter for Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a set of tiny and low-cost devices equipped with different kind of sensors, a small microcontroller and a radio transceiver, typically powered by batteries. Target tracking is one of the very important applications of such a network system. Traditionally, KF (Kalman Filtering) and its...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Comparison of Compaction Techniques in VLSI Physical Design

    The rapid growth in integration technology has been made possible by the automation of various steps involved in the design and fabrication of VLSI chips. The main factors which decide the quality of any chip are power consumption, area and performance of the chip. The demand of light weighted &...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jan 2011

    Efficient Cryptographic Key Generation Using Biometrics

    Biometrics gives a lot of methods in high-secure applications while using natural, user-friendly and fast authentication. Cryptography is intended to ensure the secrecy and authenticity of message. The cryptographic key will be long, so it is difficult to remember, protecting the confidentiality of the cryptographic keys is one of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2010

    A New Technique to Transmit a Reduce Sized Image Using Triple Enhanced Data Encryption Standard (EHDES)

    In current era, an image transmission becomes more usable and effective for improvement in various fields. The security of image is most important while the image is transmitted. The authors kept in mind the security of transmission and capacity of channel, triple EHDES provides more complexity and enhanced security and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Nov 2010

    An Efficient Manner to Secure Large Size Data With Authentication & Integrity Using Double - EHDES

    In this paper, the authors presents an efficient manner, which provide them a secure, compress transmission of message. This approach really enhances the capability and maximum utilization of busy channel. A complete transmission is always based upon correctness and delivery on time and the massage transmission is too much sensitive...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    QOS Enhancement for OFDM System Using Queuing Theory and an Optimized Estimator

    To the problem of bit and power allocation in Orthogonal Frequency Division Multiplexing (OFDM) system, a novel framework was proposed which introduced the Game theory and a new algorithm was applied. Firstly, the power allocation problem was described as non-cooperative Game process. Secondly, combined with influences of required Quality of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Understanding a Wireless Decentralized Check Pointing Arrangement in QOS Using MoG

    This paper deals with the understanding a wireless decentralized check pointing arrangement in QOS using MOG. Check pointing is more crucial in MOG systems than in their conventional wired counter parts due to host mobility. Dynamically, less reliable wireless links frequent disconnections and variation in mobile systems. The algorithms and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Differentiated Coverage Based Key Management Scheme for Heterogeneous Sensor Networks

    The previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    The Role of Quality Assurance in Software Development Projects: Project Failures and Business Performance

    Despite rapid advances in all facets of technology, the software industry still struggles with the formidable task of developing software applications that meet quality standards, and budget constraints. The need for software to be error-free remained a challenge to the IT industry. Therefore, the primary purpose of this study is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks

    Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    An Index Based Congestion Aware Routing Protocol for Wireless Sensor Networks

    Energy efficient protocol is very important in Wireless Sensor Networks (WSNs) because the nodes in WSNs are usually battery operated sensing devices with limited energy resources and replacing the batteries is usually not an option. Thus energy efficiency is one of the most important issues in WSNs. Routing protocols which...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Congestion Control Avoidance in Adhoc Network Using Queuing Model

    Mobile ad hoc network is an emerging standard or wireless communication. Due to the impendence in infrastructure dependencies these networks are rapidly emerging. These networks are since evolving has to develop methodologies for the compatibility of current services in such an environment. Various services compatibilities were studied and methodologies were...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Reliable Software Development With Proposed Quality Oriented Software Testing Metrics

    For an effective test measurement, a software tester requires a testing metrics that could measure the quality and productivity of software development process along with increasing its reusability, correctness and maintainability. Until now, the understanding of measuring software quality is not yet sophisticated enough and is still far away from...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Sec.AODV for MANETs Using MD5 With Cryptography

    Mobile Ad hoc NETworks (MANETs) characteristics present major vulnerabilities in security. The threats which thought-out in MANETs are due to maliciousness that intentionally disrupts the network by using variety of attacks and due to insecure routing protocols (e.g. AODV), which were developed without considering security in mind. Due to lack...

    Provided By International Journal of Computer Technology and Applications