International Journal of Computer Technology and Applications

Displaying 81-120 of 306 results

  • White Papers // Apr 2012

    A Framework for Implementing e-Attendance System Using Near Field Communication in Android Os

    Education system in India has been changing widely in last 10 years due to the development of the technology. Smart class, E-learning, Video conferencing are some of them. The core idea of this paper is to implement some of the emerging technologies like mobile computing and near field communications and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2012

    The IRUV Protocol: Intelligent Routing Protocol in Urban Environment for Vanet

    Future Intelligent Transportation Systems require fast and reliable communication between cars (Vehicle-To-Vehicle V2V) or between a car and a road side unit (vehicle-to-infrastructure). The fundamental component for the success of Vehicular Ad-hoc NETworks (VANET) applications is routing. In this paper, the authors propose a VANET routing protocol that is especially...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Fraud Detection in Information Leakage

    In the field of business, the owner having some crucial data may need to share it with third-parties. These trusted third-parties may use this data for their own benefit causing reputational and monetary damage to the owner's company. If some of the shared data is discovered at some illegal place,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Optimization Technique for Multi-Join Operation in Active Data Warehouse

    In current scenario of fast changing data content in most dynamic heterogeneous application, data format transformation and data updates needs to be handled in traditional data ware housing. Many researches have been made under active data warehousing which keep the latest updates of more dynamic large multi-format data warehouses. Previous...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Analysis of Mesh and Position Based Hybrid Routing In MANETS: A Comprehensive Study

    Mobile Ad hoc NETworks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore, the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    RCP Supporting Emergency Applications of WSN

    Wireless Sensor Networks (WSN) can be used to monitor the people environment, objects in that environment and interactions of objects with each other. Use of WSN for emergency applications includes fire detection system in forest, soil motion detection, monitoring historical and public places, volcano monitoring etc. In WSN errors or...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Consideration With Dynamic Routing Security

    One of the major issues for data communication over wired and wireless networks is the security. the past work is on the designs of cryptography algorithms and system infrastructures. Dynamic routing algorithm called improved dynamic routing with security consideration, which is based on the concept of Zone Routing Protocol (ZRP)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance of MIMO With Cyclic Coded OSTBC Using OFDM

    Wireless designers constantly seek to improve the spectrum efficiency/capacity, coverage of wireless networks, and link reliability. Space-time wireless technology that uses multiple antennas along with appropriate signalling and receiver techniques offers a powerful tool for improving wireless performance Space-time block codes were designed to achieve the maximum diversity order for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Efficient and Fair Exchange of Digital Signatures Based on RSA Algorithm

    A fair contract-signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a fair way, so that either each of them obtains the other's signature, or neither party does. Based on the RSA signature scheme, a new digital...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A New Routing Algorithm in MANETS: Location Aided Hybrid Routing

    In this paper, the authors propose a new hybrid routing protocol for MANET called Location Aided Hybrid Routing Protocol for MANET (LAHRP). The proposed routing algorithm not only aims to optimize bandwidth usage of MANETs by reducing the routing overload but also extend battery life of the mobile devices by...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Runtime CPU Scheduler Customization Framework for Real Time Operating System

    Most of the embedded systems have real-time requirements about the use of Real-Time Operating Systems able of satisfying the embedded system requirements. So, in embedded application where the real-time operating systems are noted are been called as the Real Time Embedded Operating Systems (REOS). Main features of that of real-time...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    An Efficient Algorithm for Improved Web Usage Mining

    Clustering is a web mining technique, which is a demanding field of research in which its latent applications create their own special requirements. Clustering is a method of grouping similar data into data sets, called clusters. Cluster analysis is a primary technique in conventional data analysis and many clustering methods...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Open Source in Cloud Computing

    Cloud computing is emerging as the latest BUZZ word in Information Technology. There is going to be a great shift from traditional network computing to cloud computing. The features of Cloud computing - Pay as you go and Virtualization has made it a long run in advance technologies. This paper...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Type of Security Threats and It's Prevention

    Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Object Oriented Testing Techniques: Survey and Challenges

    Object-oriented programs involve many unique features that are not present in their conventional counterparts. Examples are message passing, synchronization, dynamic binding, object instantiation, persistence, encapsulation, inheritance, and polymorphism. Testing for such program is, therefore, more difficult than that for conventional programs. Object-orientation has rapidly become accepted as the preferred paradigm...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Implementing KQML Performatives for Outsourcing Management System

    An agent is a computer system, situated in some environment that is capable of flexible autonomous action in order to meet its design objectives this is the commonly accepted definition for agents. Agents are autonomous, social, proactive, reactive, and communicate to achieve common goal. The Knowledge Query Manipulation Language (KQML)...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    An Analysis of Distributed Computer Network Administration

    Computer Networking is necessary to human beings. People needed to share ideas, research knowledge, and the way of life to their friends. In the modern time, the role of computer networks became dreamy. Analyzing, accessing, sharing and storing of data and information are very easy with help of distributing computer...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Evaluation of Improved Algorithm for Wireless Sensor Networks

    Wireless sensor networks have recently come into prominence because they hold the potential to revolutionize many segments of the economy and life, from environmental monitoring and conservation, to manufacturing and business asset management, to automation in the transportation and health-care industries. Information collected by and transmitted on a sensor network...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Novel Approach for Securing Mobile Ad Hoc Network With an Enhanced Trust Calculation Method

    A Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range. Due to wide-ranging characteristics of the Ad Hoc Networks like decentralization, dynamic topology and neighbor based routing, it is...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Trust, Privacy and Security Infrastructure for the Inter-Cloud

    Cloud Computing is one of the most important security challenges to manage and assure a secure usage over multi-provider Inter-Cloud environments with dedicated communication infrastructures, security mechanisms, processes and policies. Based on the collection of various Inter-Cloud usecases and scenarios within the private and public sector like DMTF (Distributed Management...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Minimizing Response Time and Effective Utilization of I/O-Bound Processes Using \"Approximate Zero Response Algorithm\"

    Various scheduling algorithm are available for the operating system to improve CPU utilization. Different scheduling algorithms have different properties that work on different scheduling criteria's and the choice of a particular algorithm may favor one class of processes over another. SJF gives minimum average waiting time for a given set...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Simulation Based: Study and Analysis of Routing Protocol in Vehicular Ad-Hoc Network Environment

    A Vehicular Ad hoc NETwork (VANET) consists of vehicles which communicate with each other and exchange data via wireless communication links available between the vehicles which are in communication ranges of vehicles to improve the road safety in city. The communication between vehicles is used to provide road safety, comfort...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    A Quantitative Study and Comparison of Secure OLSR Routing Protocol

    This paper presents the comparison of the secure OLSR (Optimized Link State Routing Protocol) in mobile ad-hoc network with other approach. The authors compare the security from the different approach and their effect on the existing OLSR. The main aim of this paper is to study the various securities and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Software Engineering Challenges of Migration Projects

    Organizations often face the challenges of migration from legacy systems to new target systems. Such migration efforts represent a complex engineering problem. This paper describes migration planning, identifies influencing factors, outlines a set of migration planning activities and offers a set of guidelines for the migration planning. Many organizations face...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Transitive Coupling (TC) and Fault Proneness (FP) in Object Oriented Systems: A New Methodology

    Demand for Quality Software has undergone with rapid growth during the last few years. This is leading to an increase in the development of metrics for measuring the properties of software such as Coupling, Cohesion or Inheritance that can be used in early quality assessments. Quality Models that explore the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Probablistic Clustering based on Web Documents

    Web search engine are often forced to pass through long ordered list of documents called snippets. Snippets are web document attributes. These snippets are returned by search engines. The basis of document clustering is an alternative method of organizing retrieval results. Clustering yet needed to be deployed for the search...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Performance Anaysis of Embedded Zero Tree and Set Partitioning in Hierarchical Tree

    Compressing an image is significantly different than compressing raw binary data. For this different compression algorithm are used to compress images. Discrete wavelet transform has been widely used to compress the image. Wavelet transform are very powerful compared to other transform because its ability to describe any type of signals...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Cloud Computing Security With Nymble Technology

    Misbehave blacklisting schemes allow online service provide in cloud computer to prevent Misbehave access by abusive users while preserving the privacy of all Misbehave users (both abusive and non-abusive). The scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    3-D Graphical Password Used For Authentication

    In today's world, security is important aspect in day to day life. So, everyone used various ways for security purpose. People use passwords for their security. Generally, everyone uses textual password. Textual password is combination of alphabets and numbers. People keep textual password as name of their favorite things, actors...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Interpretation of Formal Proof for Cryptographic Protocols into Computational Model

    Cryptography is the spinal cord for all security measures involved in computing field so a lot of emphasis is required to be given to make it strong enough to deal all the transition of the security industry. The authors present a general method to prove security properties of multiple cryptographic...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Automatically Communication Path Creation and Reconfiguration in Dynamic Network Environment for Optimizing Performance to Network Applications

    Accessing network services across a wide area network still remains a challenging task and the difficulty mainly comes from the heterogeneous and constantly changing network environment, which usually causes undesirable user experience for network-oblivious applications. A promising approach to address this is to provide network awareness in communication paths. Many...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    V2V Communication Survey - (Wireless Technology)

    This paper presents the specific application of wireless communication, Automotive Wireless Communication - also called as Vehicle-to-Vehicle Communication. The paper first gives an introduction to the Automotive Wireless Communication. It explains the technology used for Automotive Wireless Communication along with the various automotive applications relying on wireless communication. Automotive Wireless...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Forest Fire Prevention Using Wireless Sensor Networks

    Because of the rapid development of sensors, microprocessors, and network technology, a reliable technological condition has been provided for the authors' automatic real-time monitoring of forest fires control. This paper presents a new type of early warning systems which use a wireless sensor network to collect the information of forest...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Natural Language Query Processor for Database Interface

    With the increasing amount of information available on the Internet one of the most challenging tasks is to provide search interfaces that are easy to use without having to learn a specific syntax. Hence, the authors present a query interface exploiting the intuitiveness of natural language for the largest web-based...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Personal Authentication System Using Hand Vein Biometric

    With an increasing emphasis on security, automated personal identification using hand vein biometric feature is becoming a very active topic in both research and practical applications. The objective of this work is to present a biometric authentication system for high security physical access control based on hand vein pattern. Hand...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    An Efficient Paging Scheme for IP-Based Cellular Networks Using Mobility Management Protocol

    In interworked fixed and mobile networks, both Terminal Mobility (TM) and Personal Mobility (PM) should be supported and interworked to provide seamless universal mobility to mobile users. TM supports movement between different locations with the same Mobile Terminal (MT). In TM management, an MT updates its location when it changes...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Robust Routing Strategy for Density Spanner Based Wireless Ad Hoc Networks

    An important problem for wireless ad hoc networks has been to design overlay networks that allow time- and energy-efficient routing. Many local-control strategies for maintaining such overlay networks have already been suggested, but most of them are based on an oversimplified wireless communication model. The authors address cooperative caching in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Intrusion Detection Systems in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are a new technology foreseen to be used increasingly in the near future due to their data acquisition and data processing abilities. Security for WSNs is an area that needs to be considered in order to protect the functionality of these networks, the data they convey...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Online Intrusion Alert Based on Aggregation and Correlation

    Traditional Intrusion Detection Systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections between them. In situations where there are intensive attacks, not only will actual alerts be mixed with false alerts, but the amount of alerts will also become unmanageable. As...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Algorithms for XML Tree Pattern Matching and Query Processing

    XML Tree Pattern Query (TPQ) processing is a research stream within XML data management that focuses on efficient TPQ answering. With the increasing popularity of XML for data representation, there is a lot of interest in query processing over data that conforms to a tree-structured data model. Queries on XML...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Online Intrusion Alert Based on Aggregation and Correlation

    Traditional Intrusion Detection Systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections between them. In situations where there are intensive attacks, not only will actual alerts be mixed with false alerts, but the amount of alerts will also become unmanageable. As...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Algorithms for XML Tree Pattern Matching and Query Processing

    XML Tree Pattern Query (TPQ) processing is a research stream within XML data management that focuses on efficient TPQ answering. With the increasing popularity of XML for data representation, there is a lot of interest in query processing over data that conforms to a tree-structured data model. Queries on XML...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Fault Free Randomized Intrusion Tolerant Protocols

    Much of th people critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As the people dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Hierarchical Multicast Protocol for Multicasting Over Mobile Ad Hoc Networks

    In mobile ad hoc networks, an application scenario requires mostly collaborative mobility behavior. The key problem of those applications is scalability with regard to the number of multicast members as well as the number of the multicast group. To enhance efficiency and scalability with group mobility, the authors have proposed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Security Enhancements in Dynamic Telecast Routing

    Wireless network has no stationary infrastructure. It provides several advantages such as fast and easy deployment, little or no reliance on a pre-existing infrastructure and cost-effectiveness. One of the major issues for data communication over wired and wireless networks is security .Different from the past work on the designs of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A MAC Technique for VoIP Services Using Back Off Algorithm in IEEE 802.11e Networks

    In the advent of emerging information super highway, voice over Internet Protocol has become a vital service with the demand for high quality of requirements in Wireless Local Area Network (WLANs). The IEEE 802.11e Standard has been recently introduced to mark the Quality of Service (QoS) competence in the ever...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Performance Analysis of Efficient and Geographic Multicast Routing Protocol for Mobile Adhoc Networks Using NS-2

    Group Communication has become important in Mobile Adhoc NETwork (MANET). But because of its dynamic topology it is difficult to implement group communication in MANET. In order to implement group communication, Efficient Geographic Multicasting Protocol (EGMP) came into existence, the efficiency and scalability of the protocol was already tested using...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET

    VANETs (Vehicular Ad hoc NETworks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. In VANET nodes which are vehicles can move safety with high speed and must communicate quickly and reliably. When an accident occurs in a road...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Defect Prevention Technique in Test Case of Software Process for Quality Improvement

    A test case in software engineering is a set of conditions or variables under which a tester will determine whether an application or software system is working correctly or not. The mechanism for determining whether a software program or system has passed or failed such a test is known as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Controlling Ip Spoofing Through Packet Filtering

    IP address spoofing refers to the creation of Internet Protocol packets with a forged source IP address, called spoofing, it is a method of attacking a network in order to gain unauthorized access. The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. The...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Zigbee Based Voice Control System for Smart Home

    This paper details the overall design of a Wireless Home Automation System (WHAS). This is fuelled by the need to provide supporting systems for the elderly and the disabled, especially those who live alone. The automation centre's on recognition of voice commands and uses low-power RF Zig-Bee wireless communication modules...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Wireless Sensor Network Safety Study

    Few security mechanisms in Wireless Sensor Networks (WSNs) have been implemented, and even fewer have been applied in real deployments. The limited resources of each sensor node makes security in WSNs hard, as the tradeoff between security and practicality must be carefully considered. These complex systems include in their design...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Challenging Issues and Limitations of Mobile Computing

    Mobile computing is becoming increasingly important due to the rise in the number of portable computers and the desire to have continuous network connectivity to the Internet irrespective of the physical location of the node. Mobile computing has fast become an important new paradigm in today's world of networked computing...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Ghids: A Hybrid Honeypot System Using Genetic Algorithm

    Intrusions Detection Systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. Honeypots are decoy computer resources set up for the purpose of monitoring and logging the activities of entities that probe, attack or compromise them. This paper describes a hybrid honeypot...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    An Efficient Web Server Optimization Technique Based on DNS

    A group of web-server system can be deployed to support high request rate. The Domain Name System (DNS) servers act as a mediator between the client and web-servers. It dispatches the client request among the web-servers through the URL-name to IP-address mapping mechanism. In this paper, the authors propose a...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A New Approach for Web Information Extraction

    With the exponentially growing amount of information available on the Internet, an effective technique for users to discern the useful information from the unnecessary information is urgently required. Cleaning web pages for web data extraction becomes critical for improving performance of information retrieval and information extraction. So, the authors investigate...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Protection Switching and Rerouting in MPLS

    Multi-Protocol Label Switching (MPLS) has become an attractive technology of choice for Internet backbone service providers. MPLS recovery mechanisms are increasing in popularity because they can guarantee fast restoration and high QoS assurance. To provide dependable services MPLS networks make use of a set of procedures (detection, notification and fault...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Integration of GIS and SAP - Improves Business Processes

    Technology is an important factor to improve business processes. In previous trend businesses have been striving to optimize their processes and improve efficiency by using SAP systems for workflow management and GIS for location based information management. Many advances have been observed in both fields but no direct integration was...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Vulnerability Centric Exploitation Attempts in Open Source Software Systems

    There's been a lot of debate by security practitioners about the impact of open source approaches on security. One of the key issues is that open source exposes the source code to examination by everyone, both the attackers and defenders, and reasonable people disagree about the ultimate impact of this...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Performance Analysis of Manet Before and After Black Hole Attack

    A mobile ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of the prominent attacks...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Monitoring Approach for Surface Reconstruction From 3D Point Cloud

    This paper describes the surface reconstruction from 3D point cloud. The vertices of point cloud build a network of triangles using Delaunay Triangulation for 3D surface. DT plays an important role due to its guaranteed quality of triangular mesh generation. The process monitoring is emerging as a valuable tool and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    The Effectiveness of a Proposed System Based on Desktop Virtual Reality to Promote the Basic Concepts of Computer Security

    Teaching information security faces a lot of problems because, it has many abstract concepts which are difficult to understand and imagine in the traditional methods of teaching. In this paper, the authors have designed a proposed system based on desktop virtual reality to promote the basic concepts of computer security...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    An Approach to Improve Task Scheduling in a Decentralized Cloud Computing Environment

    Cloud computing has emerged as a promising platform that grants users with direct yet shared access to computing resources and services without worrying about the internal complex infrastructure. As a cloud must provide services to many users at the same time and different users have different QoS requirements, the scheduling...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Session Fixation Vulnerability in Web-Based Application

    Many web-based applications employ some kind of session management to create a user-friendly environment. Sessions are stored on server and associated with respective users by session IDentifiers (IDs). Naturally, session IDs present an attractive target for attackers, who, by obtaining them, effectively hijack users' identities. Knowing that, web servers are...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Development of Virtual Experiment on 7-Segment Display Decoder Using Virtual Intelligent SoftLab

    The authors use the decimal code to represent numbers. Digital electronic circuits in computers and calculators use general the binary code to represents numbers. A common task of decoding from machine language to decimal numbers is encoding. A very common output device to display decimal numbers is the seven segment...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Study on Cloud Security Issues and Challenges

    Cloud computing is one of the today's most exciting technology because of its cost-reducing associated with computing while increasing flexibility and scalability for computer processes. In the past few years, cloud computing has growing from being a promising business idea to one of the fastest growing parts of the IT...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Mining Unstructured Data From Web Using Soft Computing

    Copious material is available from the World Wide Web (WWW) in response to any user-provided query. It becomes tedious for the user to manually extract real required information from this material. Large document collections, such as those delivered by Internet search engines, are difficult and time-consuming for users to read...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Fraud Detection in Information Leakage

    In the field of business, the owner having some crucial data may need to share it with third-parties. These trusted third-parties may use this data for their own benefit causing reputational and monetary damage to the owner's company. If some of the shared data is discovered at some illegal place,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Apr 2012

    The IRUV Protocol: Intelligent Routing Protocol in Urban Environment for Vanet

    Future Intelligent Transportation Systems require fast and reliable communication between cars (Vehicle-To-Vehicle V2V) or between a car and a road side unit (vehicle-to-infrastructure). The fundamental component for the success of Vehicular Ad-hoc NETworks (VANET) applications is routing. In this paper, the authors propose a VANET routing protocol that is especially...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Comparative Study of Cryptosystems With Elliptic Curve Cryptography Using Digital Signature

    Elliptic Curve Cryptography (ECC) is coming forth as an attractive public key cryptosystem for mobile/wireless environments compared to conventional cryptosystems like RSA and DSA. ECC provides better security with smaller key sizes, which results in faster computations, lower power consumption, as well as memory and bandwidth savings. However, the true...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Information Retrieval Through Multi-Agent System With Data Mining in Cloud Computing

    Problem solving solutions like Multi-Agent System (MAS) capitalizes on its multiple intelligent agents to receive precepts from the environment, process the information and produce the desired result for the environment. The wide scope of capabilities of an MAS permits the user to resolve functional, methodic, algorithmic or procedural query to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    The Application of Wireless Sensor Network in the Irrigation Area Automatic System

    In the irrigation area automatic system, high-performance embedded micro-controller and low-power technology is used to design the water wireless sensor network. The sensor node gathers the hydrographic information such as water-level, gate position and rainfall. The sink node receives the real-time data; the information center stores and processes those data...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Performance Evaluation of AODV and ADV Protocols in VANET Scenarios

    This paper presents a comparative test of two protocols namely-AODV and ADV in various mobility scenarios of Vehicular Ad-hoc NETworks (VANETs). In order to make comparison three performance criterions are selected which include number of packet drop, throughput and total time taken by NCTUns-6.0 to simulate the given network. To...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Node Selection Based Broadcast in Manets to Improve the Efficiency

    In this paper, the issue of broadcasting in Mobile Ad hoc NETworks (MANETs) is considered. A node equipped with directional antenna can divide the Omni directional transmission range into several sectors and turn some of them "On" for transmission. In the proposed scheme using a directional antenna, forwarding nodes selected...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    MySQL and MATLAB Interfacing for Biometric Template Protection With Encryption

    A new approach for biometric database management is presented with enhanced security features. This paper attempts to improve the security of biometric database system by interfacing with MySQL server. The signature templates are acquired for the database using digital pen tablet, encrypted using a simple pseudo noise based algorithm and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Elite: A New Component-Based Software Development Model

    Component Based Software Engineering (CBSE) approach is based on the idea to develop software systems by selecting appropriate components and then to assemble them with a well-defined software architecture. In this evolving era of Information Technology, there is lot of pressure on software research community to reduce development cost as...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Study and Analysis of Bandwidth Flow Estimation Techniques for Wired/Wireless Networks

    In this topic, an analysis will be made on bandwidth flow estimation technique which comes under networking domain. Correct bandwidth constrained applications and tools are required for proper bandwidth estimation. A proper monitoring of available bandwidth is required during execution to avoid degradation in performance. A several measurement tools have...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    An Efficient Search Algorithm in Decentralized Peer-to-Peer Networks

    To Design efficient search algorithms is a key challenge in decentralized peer-to-peer networks. Flooding and Random Walk (RW) are two previous search algorithms. Flooding searches aggressively and covers the most nodes. However, it generates a large amount of query messages and, thus, does not scale. On the contrary, RW searches...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Delay Reduction and Scheduling in Multihop Wireless Networks

    In this paper, the authors analyze the delay performance of a multi-hop wireless network in which the routes between source-destination pairs are fixed. However, its delay performance may be quite poor even when the traffic load is not close to network capacity due to the following reason, each node has...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    High Dimensional Indexing in Image Databases With Adaptive Cluster Distance Bounding

    The authors consider approaches for exact similarity search in a high dimensional space of correlated features representing image datasets, based on principles of clustering and vector quantization. They develop an adaptive cluster distance bound based on separating hyper-planes that complements their index in selectively retrieving clusters that contain data entries...

    Provided By International Journal of Computer Technology and Applications