International Journal of Computer Technology and Applications

Displaying 121-160 of 288 results

  • White Papers // Feb 2012

    A New Approach for Web Information Extraction

    With the exponentially growing amount of information available on the Internet, an effective technique for users to discern the useful information from the unnecessary information is urgently required. Cleaning web pages for web data extraction becomes critical for improving performance of information retrieval and information extraction. So, the authors investigate...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Protection Switching and Rerouting in MPLS

    Multi-Protocol Label Switching (MPLS) has become an attractive technology of choice for Internet backbone service providers. MPLS recovery mechanisms are increasing in popularity because they can guarantee fast restoration and high QoS assurance. To provide dependable services MPLS networks make use of a set of procedures (detection, notification and fault...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Integration of GIS and SAP - Improves Business Processes

    Technology is an important factor to improve business processes. In previous trend businesses have been striving to optimize their processes and improve efficiency by using SAP systems for workflow management and GIS for location based information management. Many advances have been observed in both fields but no direct integration was...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Vulnerability Centric Exploitation Attempts in Open Source Software Systems

    There's been a lot of debate by security practitioners about the impact of open source approaches on security. One of the key issues is that open source exposes the source code to examination by everyone, both the attackers and defenders, and reasonable people disagree about the ultimate impact of this...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Performance Analysis of Manet Before and After Black Hole Attack

    A mobile ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of the prominent attacks...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Monitoring Approach for Surface Reconstruction From 3D Point Cloud

    This paper describes the surface reconstruction from 3D point cloud. The vertices of point cloud build a network of triangles using Delaunay Triangulation for 3D surface. DT plays an important role due to its guaranteed quality of triangular mesh generation. The process monitoring is emerging as a valuable tool and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    The Effectiveness of a Proposed System Based on Desktop Virtual Reality to Promote the Basic Concepts of Computer Security

    Teaching information security faces a lot of problems because, it has many abstract concepts which are difficult to understand and imagine in the traditional methods of teaching. In this paper, the authors have designed a proposed system based on desktop virtual reality to promote the basic concepts of computer security...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    An Approach to Improve Task Scheduling in a Decentralized Cloud Computing Environment

    Cloud computing has emerged as a promising platform that grants users with direct yet shared access to computing resources and services without worrying about the internal complex infrastructure. As a cloud must provide services to many users at the same time and different users have different QoS requirements, the scheduling...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Session Fixation Vulnerability in Web-Based Application

    Many web-based applications employ some kind of session management to create a user-friendly environment. Sessions are stored on server and associated with respective users by session IDentifiers (IDs). Naturally, session IDs present an attractive target for attackers, who, by obtaining them, effectively hijack users' identities. Knowing that, web servers are...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Development of Virtual Experiment on 7-Segment Display Decoder Using Virtual Intelligent SoftLab

    The authors use the decimal code to represent numbers. Digital electronic circuits in computers and calculators use general the binary code to represents numbers. A common task of decoding from machine language to decimal numbers is encoding. A very common output device to display decimal numbers is the seven segment...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Study on Cloud Security Issues and Challenges

    Cloud computing is one of the today's most exciting technology because of its cost-reducing associated with computing while increasing flexibility and scalability for computer processes. In the past few years, cloud computing has growing from being a promising business idea to one of the fastest growing parts of the IT...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Mining Unstructured Data From Web Using Soft Computing

    Copious material is available from the World Wide Web (WWW) in response to any user-provided query. It becomes tedious for the user to manually extract real required information from this material. Large document collections, such as those delivered by Internet search engines, are difficult and time-consuming for users to read...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    V2V Communication Survey - (Wireless Technology)

    This paper presents the specific application of wireless communication, Automotive Wireless Communication - also called as Vehicle-to-Vehicle Communication. The paper first gives an introduction to the Automotive Wireless Communication. It explains the technology used for Automotive Wireless Communication along with the various automotive applications relying on wireless communication. Automotive Wireless...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Forest Fire Prevention Using Wireless Sensor Networks

    Because of the rapid development of sensors, microprocessors, and network technology, a reliable technological condition has been provided for the authors' automatic real-time monitoring of forest fires control. This paper presents a new type of early warning systems which use a wireless sensor network to collect the information of forest...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Natural Language Query Processor for Database Interface

    With the increasing amount of information available on the Internet one of the most challenging tasks is to provide search interfaces that are easy to use without having to learn a specific syntax. Hence, the authors present a query interface exploiting the intuitiveness of natural language for the largest web-based...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Personal Authentication System Using Hand Vein Biometric

    With an increasing emphasis on security, automated personal identification using hand vein biometric feature is becoming a very active topic in both research and practical applications. The objective of this work is to present a biometric authentication system for high security physical access control based on hand vein pattern. Hand...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    An Efficient Paging Scheme for IP-Based Cellular Networks Using Mobility Management Protocol

    In interworked fixed and mobile networks, both Terminal Mobility (TM) and Personal Mobility (PM) should be supported and interworked to provide seamless universal mobility to mobile users. TM supports movement between different locations with the same Mobile Terminal (MT). In TM management, an MT updates its location when it changes...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Robust Routing Strategy for Density Spanner Based Wireless Ad Hoc Networks

    An important problem for wireless ad hoc networks has been to design overlay networks that allow time- and energy-efficient routing. Many local-control strategies for maintaining such overlay networks have already been suggested, but most of them are based on an oversimplified wireless communication model. The authors address cooperative caching in...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Intrusion Detection Systems in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are a new technology foreseen to be used increasingly in the near future due to their data acquisition and data processing abilities. Security for WSNs is an area that needs to be considered in order to protect the functionality of these networks, the data they convey...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Online Intrusion Alert Based on Aggregation and Correlation

    Traditional Intrusion Detection Systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections between them. In situations where there are intensive attacks, not only will actual alerts be mixed with false alerts, but the amount of alerts will also become unmanageable. As...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Algorithms for XML Tree Pattern Matching and Query Processing

    XML Tree Pattern Query (TPQ) processing is a research stream within XML data management that focuses on efficient TPQ answering. With the increasing popularity of XML for data representation, there is a lot of interest in query processing over data that conforms to a tree-structured data model. Queries on XML...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Fault Free Randomized Intrusion Tolerant Protocols

    Much of th people critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As the people dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Hierarchical Multicast Protocol for Multicasting Over Mobile Ad Hoc Networks

    In mobile ad hoc networks, an application scenario requires mostly collaborative mobility behavior. The key problem of those applications is scalability with regard to the number of multicast members as well as the number of the multicast group. To enhance efficiency and scalability with group mobility, the authors have proposed...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Delay Reduction and Scheduling in Multihop Wireless Networks

    In this paper, the authors analyze the delay performance of a multi-hop wireless network in which the routes between source-destination pairs are fixed. However, its delay performance may be quite poor even when the traffic load is not close to network capacity due to the following reason, each node has...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    High Dimensional Indexing in Image Databases With Adaptive Cluster Distance Bounding

    The authors consider approaches for exact similarity search in a high dimensional space of correlated features representing image datasets, based on principles of clustering and vector quantization. They develop an adaptive cluster distance bound based on separating hyper-planes that complements their index in selectively retrieving clusters that contain data entries...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Query and Update Load Shedding With MobiQual

    Freshness and accuracy are two key measures of Quality of Service (QoS) in location-based, mobile Continual Queries (CQs). However, it is often difficult to provide both fresh and accurate CQ results due to limited resources in computing and communication and fast-changing load conditions caused by continuous mobile node movement. Thus...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Query Driven Architecture for Programmable Network Measurement

    Accurate and real-time traffic measurement is becoming increasingly critical for large variety of applications including accounting, bandwidth provisioning and security analysis. Existing network measurement techniques, however, have major difficulty dealing with large number of flows in today's high-speed networks and offer limited scalability with increasing link speeds. Consequently, the current...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    A Study of Multimedia Broadcast and Multicast Service

    Multicast and Broadcast Service (MBS), or Multimedia Broadcast/Multicast Services (MBMS), is one of the important services to be supported by the next generation cellular systems. MBMS is an IP DataCast (IPDC) type of service that can be offered via existing GSM and UMTS cellular networks. The infrastructure gives the possibility...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Inter Cell Interference Management and Intra Cell User Scheduling in Multi Cell Networks

    To achieve high spatial capacity, wireless cellular networks consider the dense deployment of Base Stations (BSs) that cover small cells. As a consequence, Inter-Cell Interference (ICI) from neighboring BSs becomes a major source of performance degradation and the portion of users whose capacity is naturally limited by ICI grows. In...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Feb 2012

    Secure Anonymous Route Discovery Protocol for Ad Hoc Routing in Ad Hoc Wireless Networks

    Ad-hoc networks are a new paradigm of wireless communication for mobile hosts. There are various challenges that are faced in the Ad-hoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Performance Analysis of DYMO, LANMAR, STAR Routing Protocols for Grid Placement Model With Varying Network Size

    A Mobile Ad hoc NETworks (MANETs) are self organized wireless networks which are able to connect on a wireless medium without the use of a infrastructure or any centralized administration. Due to the absence of infrastructure, nodes may move frequently and the topology may change dynamically. The mobile nodes perform...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Survey on Visual Backchannel for Web Events Based on Cloud Computing

    The cloud computing based Visual Backchannel for web based events as a novel way of following and exploring online conversations about events. Micro blogging communities, such as Twitter, are increasingly used as digital backchannels for timely exchange of brief comments and impressions during political speeches, sport competitions, natural disasters, and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Cloud Computing and Online Operating System

    Cloud computing is known as Internet based computing, with shared resources, software and information is provided to computers and other devices. Cloud Computing is a Computing in which services and software are provided over the Internet (or "Cloud") which is very cheap and affordable. Cloud computing is a technology that...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Network Security Scanner

    Network Security Scanner (NSS) is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks the user network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Design and Analysis of Software Fault-Tolerant Techniques for Softcore Processors in Reliable Sram-Based Fpga

    This paper discusses high level techniques for designing fault tolerant systems in SRAM-based FPGAs, without modification in the FPGA architecture. Triple Modular Redundancy (TMR) has been successfully applied in FPGAs to mitigate transient faults, which are likely to occur in space applications. However, TMR comes with high area and power...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    QOS Enhancement for OFDM System Using Queuing Theory and an Optimized Estimator

    To the problem of bit and power allocation in Orthogonal Frequency Division Multiplexing (OFDM) system, a novel framework was proposed which introduced the Game theory and a new algorithm was applied. Firstly, the power allocation problem was described as non-cooperative Game process. Secondly, combined with influences of required Quality of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Understanding a Wireless Decentralized Check Pointing Arrangement in QOS Using MoG

    This paper deals with the understanding a wireless decentralized check pointing arrangement in QOS using MOG. Check pointing is more crucial in MOG systems than in their conventional wired counter parts due to host mobility. Dynamically, less reliable wireless links frequent disconnections and variation in mobile systems. The algorithms and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Differentiated Coverage Based Key Management Scheme for Heterogeneous Sensor Networks

    The previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Semantic Search Engine: A Survey

    The semantic search engines have some advantages on the web search engines from the users view. In this fast life everybody need the answer for their queries very fast. In this scenario semantic searching engines will be helpful. It deals with the actual meaning of the queries. The tremendous growth...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Self-Test Techniques in SoC for Low Power Consumption

    A generic built-in self-test needed for SoC devices implementing for low power consumption. In this the authors proposed a new technique to generate a fully pre-computed test set in a deterministic BIST using simple gray counter within a reasonable clock cycles. Conversely, they consider only a small part of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Concept of Privacy Protection in Data Mining

    In this paper, the authors address the issue of privacy preserving data mining. Specifically, they consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information. Their work is motivated by the need...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Jul 2011

    UEP Based on Proximity Pilot Subcarriers With FEC in OFDM

    A novel UEP (Unequal Error Protection) method is proposed that utilizes the subcarrier positions relative to pilot subcarriers in an OFDM multicarrier frame along with FEC (Forward Error Correction) schemes. With the available physical layer techniques, a prioritized encoding strategy based on the characteristics of the channel fading effects on...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Conceptual Usability Framework for Mobile Service Consumers

    Variation and count of mobile devices accrue each day and Service Oriented Architecture (SOA) decompose the systems into loosely coupled and platform independent software services that facilitate integration of mobile devices to enterprise systems as a service consumer or provider. The prosperity of interactive systems is relayed on the realization...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Signcryption Scheme Based on Elliptic Curve Cryptography

    In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Review on Cryptography Mechanisms

    In today's information age, communications play an important role which is becoming widespread as well. The same aspects of cryptography that make it useful for security and privacy make it particularly troublesome for law enforcement. The use of cryptography by criminals can prevent law enforcement from obtaining information needed for...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Performance Evaluation of EFCI and ERICA Schemes for ATM Networks

    Rate based congestion control promises effective traffic management for ABR service class suitable to data communications in ATM networks. The rate based congestion control algorithm dynamically regulates transmission rate of source end system according to feedback information from the network. In this paper, the authors described two rate based congestion...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A New Approach to Mine Frequent Pattern in Spatial Database Using TFP-Tree

    Today there are several skilled algorithms to mine frequent patterns. Frequent item set mining provides the associations and correlations among items in large transactional or relational database. In this paper a new approach to mine frequent pattern in spatial database using TFP-tree is proposed. The proposed approach generates a TFP-tree...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    A Review of Various Security Protocols in Wireless Sensor Network

    Sensor networks are highly distributed networks of small, lightweight wireless sensor nodes, deployed in large numbers to monitor the environment or system by the measurement of physical parameters such as temperature, pressure, or relative humidity, sound, vibration, motion or pollutants, at different locations. A WSN is composed of a large...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Protection of Web User's Privacy by Securing Browser from Web Privacy Attacks

    The Internet and World Wide Web being an essential part of everyone's life, the users have become more conscious about their privacy. The user's web privacy unfortunately, is not focused much by the current browsers. This paper focuses on the attacks which compromises user's anonymity, grab user's private data. It...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Heap Base Coordinator Finding With Fault Tolerant Method in Distributed Systems

    Coordinator finding in wireless networks is a very important problem, and this problem is solved by suitable algorithms. The main goals of coordinator finding are synchronizing the processes at optimal using of the resources. Many different algorithms have been presented for coordinator finding. The most important leader election algorithms are...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Reletive Distance Mobile Ad Hoc Networks (RDMAR)

    Ad hoc networks are characterized by wireless connectivity, continuous changing topology, distributed operation and ease of deployment routing in Ad hoc networks is a challenge due to mobility and thus is a current area of research. In context of Mobile Ad hoc NETworks (MANET) the authors can say that Mobile...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Resource Management in Distributed System

    Resource management in distributed environment is concerned with a system in which the main aim is to make sure that a user/client can access the remote resources with as much ease as it can access the local resources. The basis of resource management in the distributed system is also resource...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Formal Methods of Software Testing and Terminology

    Software provides a complete set of application development tools for building stand-alone, client-server, and Internet-enabled applications. But making it easy to build applications can be a two-edged sword. Not only can developers build powerful, sophisticated applications, but they can also build applications that frustrate users, waste computer resources, and damage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Secure Routing Protocol for Multi-Hop Wireless Networks

    Most recent ad hoc network research has focused on providing routing services without considering security. The authors detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, they identify three different environments with distinct security requirements. They propose a solution to one,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Analyzing Cognitive Radio Physical Layer on BER Performance Over Rician Fading Channel

    This paper analyzes the Bit Error Rate performance of Cognitive Radio Physical layer over Rician channel with AWGN noise under different channel encoding schemes, digital modulation schemes and channel conditions. The system outperforms with Reed Solomon along with convolution encoding for BPSK modulation technique as compared to other digital modulation...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Oct 2011

    Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

    The Cloud Computing is the next generation architecture of IT Enterprise. It moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. Here, focus is on cloud data storage security, an important aspect of quality of...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Aug 2011

    Evolution of the 4th Generation Mobile Communication Network: LTE-Advanced

    Mobile communication network experiences dramatic advances and changes over the last two decades. With the growing demand, the development of the design and optimization of radio access technologies and a further evolution of the existing system, the Third Generation Partnership Project (3GPP) had laid down the foundation of the future...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Performance Evaluation of MANET Routing Protocols Under CBR and FTP Traffic Classes

    Understanding the performance of routing protocols in ad hoc networks is a key feature to determine which routing protocol is best suited for which type of network scenario. From the literature survey it was found that there is a lot of work done on evaluating the performance of various MANET...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Hybrid Video Stabilization Technique for Hand Held Mobile Videos

    The videos taken from hand held mobile cameras suffer from different undesired slow motions like track, boom or pan. Hence it is desired to synthesis a new stabilized video sequence, by removing the undesired motion between the successive frames. Most of the previous methods assumes the camera motion model hence...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    The Technology Journey From Floppy Disk to Cloud Storage

    Data storage and backup needs have evolved over the years necessitating the need for evolution of data storage methods and devices. The needs for a higher storage capacity as well as versatility of storage devices and the need for technologically advanced storage devices became apparent. Once upon a time, storage...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Performance Analysis of Intrusion Detection in MANET

    A mobile ad hoc network is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network without the aid of any established infrastructure or centralized administration such as a base station. The ad hoc network provides lack of secure boundaries. At present,...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Studying the Importance and Feasibility of Software Testing

    Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing is the process of testing the functionality and correctness of software by running it. Software testing is usually performed for one of two reasons: defect detection, and reliability...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A New Paradigm for the Next Generation Wireless Optimization Cross Layer Design

    Cross-Layer Design (CLD) is a new paradigm that allows the optimization of communication network architectures across the traditional layer boundaries, but does not imply a change of the present layered architecture. Cross-Layer optimization is used in multi media application this is also used in run this type of applications parallel...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Design Approach for Fault Tolerance Algorithm in FPGA Architecture With BIST in Hardware Controller

    Redundancy based hardening techniques are applied at the pre-synthesis or synthesis level. To provide solutions for increasing the fault-tolerance capabilities with algorithms able to reduce sensitive configuration memory bits of FPGAs the authors use BIST method. While these systems frequently contain hardware redundancy to allow for continued operation in the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Threats in Optical Burst Switched Network

    Optical network is a viable network for future communication, which transmits data at an average rate of 50Tb/s. Optical Burst Switching is a trusted mechanism used for Optical network. There is a good amount of research done in the area of security in Optical networks. In addition, the issues related...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Design and Interfacing of High Speed Model of FPGA Using I2C Protocol

    Once the I2C protocol is being designed for interfacing the devices with each other (i.e. FPGA with OV7620) over a serial data line for getting high speed without data loss, as compare to any other communication methodology. The main purpose for developing the protocol is not only high speed communication...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Analysis and Design of Enhanced HTTP Proxy Cashing Server

    A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. A server is anything that has some resource that can be shared. A server...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    A Robust Zone Disjoint Multipath Routing Protocol

    A new multipath routing protocol which is disjoint at the zone level is proposed. The proposed routing protocol is based on the hybrid Zone based Hierarchical Link State Routing Protocol (ZHLS). The proposed work establishes multiple zone disjoint paths between the source and the destination zones. The establishment of multiple...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Transmission and System Control in Quantum Cryptography

    Quantum cryptography provides security using the laws of quantum mechanics. Currently, several types of protocols of Quantum Key Distribution (QKD) have been established. Some QKD protocols have been certified by proofs of unconditional security. QKD protocols have been confirmed to be resistant to any possible attack. Along with the progress...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Multicast Security Attacks and Its Counter Measures for Puma Protocol

    A Mobile Ad hoc NETwork (MANETs) is a continuously changing wireless network that can be created without any pre-existing infrastructure in which each node can operate as a router. MANETs has no clear line of control, so it is accessible to both legitimate network users and malicious attackers. The main...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // May 2011

    Secure Measures for the Vulnerabilities in MAODV

    Mobile Adhoc NETworks (MANETs) is a highly challenged network environment due to its special characteristics such as decentralization, dynamic topology and neighbor based routing. Most important application for ad-hoc networks is group oriented in nature and can therefore benefit from a multicast communication services. Most of the multicast routing protocols...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Mar 2012

    Transitive Coupling (TC) and Fault Proneness (FP) in Object Oriented Systems: A New Methodology

    Demand for Quality Software has undergone with rapid growth during the last few years. This is leading to an increase in the development of metrics for measuring the properties of software such as Coupling, Cohesion or Inheritance that can be used in early quality assessments. Quality Models that explore the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Semantic Search Engine: A Survey

    The semantic search engines have some advantages on the web search engines from the users view. In this fast life everybody need the answer for their queries very fast. In this scenario semantic searching engines will be helpful. It deals with the actual meaning of the queries. The tremendous growth...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Self-Test Techniques in SoC for Low Power Consumption

    A generic built-in self-test needed for SoC devices implementing for low power consumption. In this the authors proposed a new technique to generate a fully pre-computed test set in a deterministic BIST using simple gray counter within a reasonable clock cycles. Conversely, they consider only a small part of the...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Implementation of Unified Power Flow Controller (UPFC) for Power Quality Improvement in IEEE 14-Bus System

    In this paper the performance of Unified Power Flow Controller (UPFC) is investigated in controlling the flow of power over the transmission line. This research deals with digital simulation of standard IEEE 14-bus power system using UPFC to improve the real and reactive power flow control through a transmission line...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Blind Channel Equalization Based on Constant Power Criterion

    In present digital communications, the transmission effects such as multipath propagation and limited bandwidth produces linear distortion in the emitted signal, causing Inter symbol Interferences at the receiver sensor output. To enable the recovery of input symbols, channel equalization is used. Channel equalization is used to compensate the distortion effects...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Wireless Health Monitoring System for Smart Structures Using Embedded Real-Time Damage Detection and Identification Algorithms

    In this paper, a complex wireless sensing unit is designed for application in structural health monitoring systems. Fabricated from advanced embedded system technologies, the fundamental building block of the system is a wireless sensing unit capable of employing a spread-spectrum wireless modem for peer-to-peer communication between sensing units and a...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    An Efficient Load Balancing Algorithm for a Distributed Computer System

    This load balancing algorithm puts forward a new proposal to balance the server load. The load balancing system is a set of substitute buffer to share the server load, when their load exceeds its limit. The proposed technique gives an effective way to overcome the load balancing problem. Serving to...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Proactive Secret Sharing Scheme for Mobile Ad-Hoc Networks

    Threshold cryptography is a novel cryptographic technique sharing secret among members. It divides a secret key into multiple shares by a cryptographic operation. This technique is useful to provide a shared secret key to master nodes in a infrastructure-less Mobile Ad-hoc NETwork (MANET). As an additional component, Proactive Secret Sharing...

    Provided By International Journal of Computer Technology and Applications

  • White Papers // Dec 2011

    Survey on Architecture of Peer-to-Peer Network

    In recent times peer-to-peer networking has gained popularity since users can share files without having to communicate with a dedicated server. Peer-to-peer network have a scalable and fault-tolerant system that can locate nodes on a network with no need to maintain routing state having a lot of information. As the...

    Provided By International Journal of Computer Technology and Applications